Intelligent information management
This paper will discuss how refiners can optimize their information management by changing their business processes and adding additional applications, while not putting any additional data collection or management burden on operations.
Securing an integrated SCADA system
This White Paper discusses some of the options available to companies concerned with the threat of cyber attack and unauthorized network access to SCADA systems that monitor and control critical infrastructure.
New technologies move fieldbus into next generation
The fieldbus industry has responded to the disparate or non-existent interfaces to control systems and configuration tools with the introduction of two new complementary technologies FDT and Enhanced EDDL.
The value proposition of Profibus in the process industries
This paper takes a look at the wide range of application profiles for Profibus that address specific manufacturing needs, and the fieldbus applications of four end-users who have realized benefits from using Profibus in typical process industry applications.
ARC Advisory Group
Suppressing nuisance alarms
This White Paper outlines the requirements for an alarm management system, provides a detailed description of the intelligent alarm management system, and offers results and conclusions for the improvement in nuisance alarm suppression.
University of Singapore
Security vulnerability assessment (SVA) revealed
Many industrial processing plants have already screened their facilities and operations for security vulnerability potential and are conducing SVA on the high priority concerns. So where do they go from here?
Do you really know how well your plant is running?
Everyone feels the effects of the intensely competitive global marketplace where improving plant performance is the only way to stay in the game, and where data contained withing your plant alarm systems is the key.
The Characteristics of PID controllers
This tutorial presented by the University of Michigan's School of Engineering will show you the characteristics of proportional (P), integral (I), and derivative (D) controls, and how to use them to obtain a desired response.
University of Michigan
On-line alarm auditing: A tool for greater efficiency
It seems like everyone is talking about alarm system rationalization or re-engineering projects these days. But sometimes these rationalization projects have trouble getting off the ground. This White Paper describes a way to justify the alarm rationalization project by installing an on-line alarm auditing tool.
Dual-homing: Bringing redundancy to the edge of the network
In the past, the choices for redundancy for edge-of-the-network devices were too limited, too expensive, or too complicated to be considered in most industrial systems. This White Paper, however, contends that today's dual-homing technology can changes all that. Read how.
Economic justification for alarm system reengineering
Restoring your alarm system to a useful state can eliminate duplicate and nuisance alarms, and ensure that the necessary alarms are properly prioritized and documented. This White Paper presents a model for justifying an alarm system reengineering project, and provides two case studies showing the application of the model.
Plant Automation Services
Process control, production control and alarm management
When you lift your hand to catch a ball it is very unlikely that your brain actually formulates or solves the equations of motion in working out when and where to place your hand to catch the ball. Its much more likely that you use, unconsciously, something thats much more akin to the geometrical methods underlying the all-new Geometric Process Control Technology described in this article.
System protection profile for industrial control systems
The first draft of the System Protection Profile for Industrial Control Systems, designed to present a cohesive, cross-industry, baseline set of security requirements for new industrial control systems, is available for download and review.
Patch management for control systems
This guideline provides suggestions for an effective cyber security patch management strategy for control systems, addresses potential risks that can apply to some electricity sector organizations, and provides practices that can help mitigate the risks.
Alarm reduction using Exaplog: A case study
By reducing the number of alarms and enabling the audible alarming function of its control system, GFS Computing was able to restore audible alarming on half of its operator consoles, leading to tangible, measurable improvements in productivity, safety, and cost-reduction.
Biweekly updates delivering feature articles, headlines with direct links to the top
news stories that are critical to staying up to date on the industry — company news,
product announcements, technical issues and more. Subscribe Today.
The purpose of this article is to improve the understanding of tray cables by defining them, describing the five different types of tray cables and providing accepted uses and standards, including environmental considerations, for each of those types.