Control editor Walt Boyes speaks to the TÜV Safety Symposium in Cologne. Read a transcript of his speech, "Warum Ist Sicherheit So Schwer?/Why Is Safety so HARD?09/02/2008
Properly functioning steam traps open to release condensate and automatically close when steam is present. Failed traps waste fuel, reduce efficiency, increase production costs and compromise the overall integrity of the steam and condensate systems. Traps should be tested on a regular basis -- or the neglect may be quite costly.10/09/2009
Industrial personal computer (IPC) technology is used in ever increasing volume in the manufacturing environment. This White Paper provides a report for OEMs and manufacturers who use computers in their manufacturing equipment and processes.08/01/2005
Why aren't companies using asset management programs to improve performance and increase plant reliability?
Could the biggest obstacle to asset management be management? This white paper explores the experiences of users who have successfully implemented an effective asset management and reliability program and discusses the culture and work process changes required in order to achieve significant change.04/20/2015
We're about to acquire a significant new cybervulnerability. The world's energy utilities are starting to install hundreds of millions of 'smart meters' which contain a remote off switch. Its main purpose is to ensure that customers who default on their payments can be switched remotely to a prepay tariff; secondary purposes include supporting interruptible tariffs and implementing rolling power cuts at times of supply shortage. The off switch creates information security problems of a kind, and on a scale, that the energy companies have not had to face before. From the viewpoint of a cyber attacker - whether a hostile government agency, a terrorist organization or even a militant environmental group - the ideal attack on a target country is to interrupt its citizens' electricity supply. This is the cyber equivalent of a nuclear strike; when electricity stops, then pretty soon everything else does too. Until now, the only plausible ways to do that involved attacks on critical generation, transmission and distribution assets, which are increasingly well defended. Smart meters change the game. The combination of commands that will cause meters to interrupt the supply, of applets and software upgrades that run in the meters, and of cryptographic keys that are used to authenticate these commands and software changes, create a new strategic vulnerability, which we discuss in this paper.
Posted pursuant to the creative commons license at http://creativecommons.org/licenses/by-nd/2.5/08/02/2010
As industrial Ethernet networks grow in number and importance, keeping the right traffic on and off the network becomes essential
The use of Ethernet for industrial automation has grown dramatically. One of the main benefits of moving from legacy fieldbus to Ethernet is the ability to connect the front office to the manufacturing system. This is possible because Ethernet is not a proprietary communication protocol. The non-proprietary nature of Ethernet allows engineers to mix and match equipment from different vendors and get competitive bids. This combination of better office-factory communication and open standards helped industrial Ethernet gain recent widespread acceptance.
But with these benefits come potential problems. As networks and the services they provide evolve and servers or user machines are replaced and upgraded, the likelihood of passing unwanted, often obsolete protocols within the network increases.
Potentially more challenging is the existence of unknown protocols that may degrade the performance of the network. Unknown protocols are often caused by well-intended but uninformed employees who attach unauthorized devices, such as wireless access points, to the network. They can also be caused by traffic such as streaming audio from employees listening to Internet radio stations while working.04/28/2009
Often the Best Choice for Applications Where SingleFunction Relays Aren’t Capable Enough and a Safety-Rated PLC is Overkill07/23/2014
This paper will address
- Knowing when to do a pH sensor calibration versus a calibration check
- How to properly clean a pH sensor
- How to perform a pH sensor calibration
- A decision tree for step by step guidance
The phrase in the above title is actually incorrect in its sequence of wording. All pH readings are supposed to be taken and accepted only when the pH sensor is clean. After all, a contaminated pH sensor may yield an incorrect reading. So one must make sure the sensor is clean before doing a calibration. Once a pH sensor is installed in the process and operating, how do you determine when it is time to take the sensor out of the process and do a cleaning, or a calibration? Does one perform both a cleaning and a calibration or just a cleaning, or just a calibration, or does one just perform a calibration check in buffers or...?
This is something that can be quite confusing, especially when the operational practices and procedures documented by your company's Quality Control or Environmental Practices department may not be specific enough when they describe the procedure or the timing on when to conduct the pH calibration and maintenance. Inversely, the procedures may be too specific, detailing many more procedures and operations than are actually required.
In practical terms, users must develop their own maintenance and calibration schedule. This schedule is accomplished by taking the pH sensor out of the process after a set amount of time, perhaps after a day or two to perform a visual inspection of the sensor. If after inspection you find no debris or fouling on the electrode and reference surfaces with the naked eye, rinse the sensor off in distilled water and perform a buffer check.02/27/2012
There is an upside for forward-thinking manufacturers regarding EPA blueprint for the way state and local regulatory agencies use the Clean Air Act permitting process to regulate greenhouse gas emissions in the United States.
U.S. Environmental Protection Agency blueprint for the way state and local regulatory agencies use the Clean Air Act permit process to regulate greenhouse gas emissions in the United States is defined in their November 17 document: PSD and Title V Permitting Guidance for Greenhouse Gases.
The greenhouse gases that will be regulated include carbon dioxide, methane, nitrous oxide, sulfur hexafluoride and a number of refrigerants.
The Agency believes that these compounds are responsible for changing the planet's climate and is thus taking steps to reduce emissions of the gases throughout the nation. In taking this action, EPA is breaking new ground, by not only defining a broad new class of air pollutants, but by changing the way that the Agency regulates emissions of those pollutants.
Traditionally, EPA has set definitive, measurable goals when seeking to reduce air pollutant emissions, both in terms of how much a compound a facility is allowed to emit and in terms of the maximum amount of the pollutant that can be in the air we breathe. The Agency will not take the same approach when it comes to greenhouse gases. Instead, they will be asking facilities to reduce emissions to the greatest extent possible and economically feasible.
And, yes, there is upside for forward-thinking manufacturers.01/21/2011
Portal technology is invigorating todays corporate environments. The business world began to take portal technology seriously when the price to acquire start-up portal sites, such as My Space and Flickr, exceeded all anticipated market values. Today, portals are big business. Corporations ranging from SAP to Microsoft are investing millions of dollars in portal technology. New technology frameworks and architecture have changed the direction of portal solutions from recreational portals to the enterprise. Networking technology enables users to access portal-based web sites from anywhere and through any device that can connect to the internet. The purpose of this paper is to help you determine how your company can benefit from a portal environment, and from the OSIsoft suite of visualization components. For the first time, you can combine data stored in PI with enterprise systems and other data sources into easily accessible information, visible to individuals, teams, sites, and the enterprise.03/12/2009
Balluff experts explain the three fundamental qualities that determine if RFID systems will perform reliably in demanding production environments. It answers three main questions: Will the RFID system integrate seamlessly with industrial control systems? Will it provide the reliability and speed that production and information systems require? Can it maintain uptime and performance long-term?03/11/2014
The Surge-Trap is a branded surge protection device (SPD)that utilizes Mersen's patented thermally protected metal oxide varistor (TPMOV) technology. This technology eliminates the need for fuses to be installed in series with the Surge-Trap SPD.
which saves money and panel space. Surge-Trap SPD is typically installed in industrial control panels to protect sensitive electrical equipment from harmful voltage transients. Nearly 80% of all transients are caused by equipment or power disturbances within a facility.
What Types of Ratings Do SPDs Have?
Do SPDs have a current rating? This is a trick question! They do not have a continuous current rating however they do have other important current-based ratings. They are required to have a short circuit current rating (SCCR), which is the maximum rms current at a specified voltage the SPD can withstand.
The nominal discharge current (In) is new to UL 1449 Third Edition (effective 9/29/09). This is the peak value of the current (20kA maximum) through the SPD (8/20μs waveform) where the SPD remains functional after 15 surges.
There are two main voltage ratings for an SPD, the first is maximum continuous operating voltage (MCOV) which is the maximum rms voltage that may be applied to the SPD per each connected mode.
Voltage protection rating (VPR) is determined as the nearest high value (from a list of preferred values) to the measured limiting voltage determined during the transient-voltage surge suppression test using the combination wave generator at a setting of 6kV, 3kA.
How Do I Select The Correct SPD?05/24/2011