Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

January/February 2020

OFFICIAL PUBLICATION OF THE INTERNATIONAL SOCIETY OF AUTOMATION

Predictive maintenance analytics


Data science for HAZOP studies
IIoT edge computing
Track and trace systems
Industrial cybersecurity
product spotlight

www.isa.org/intech
Don’t Take Safety Lightly...
get reliable signal towers, audible devices and industrial lighting
for all of your machines, systems and processes.

STARTING AT
$402.00
(LKEH-102FEUL-R)
STARTING AT
$190.00
(HSST-3M2-RYG)

HSST Series - 50mm Manual Control


Signal Tower Stations LKEH Series - 100mm Combination
• Low-cost kit to control signal tower manually
Large Light Tower and Horn
• Three-tier light with red, amber, and green modules • Ultra-bright continuous or flashing LEDs
• Includes three-button switch box and power adapter • Alarm volume up to 105 dB
• Tower meets IP54 standards • 32 alarm tones
• Conforms to RoHS2 CE directive • 1 to 4 LED tiers (modules)
• Direct-mounted • Meets IP53 standards
• Various accessories available • Optional field configuration SD card (sold separately)
www.automationdirect.com/stacklights
Industrial LED Lighting
Models available include: STARTING AT
Audible Signal Horns and Buzzers
• Indoor / Outdoor models $76.00
Models available include:
• Up to 2100lx illuminance (CWF3S-24-CD)
• Many sizes for a variety of applications • Indoor / Outdoor
models
• AC / DC versions
• Up to 110dB Horns and
• Various construction types to meet up to 90dB Buzzers
environmental and installation needs
• Selectable alarm STARTING AT
• IP69K models available tones
$32.00
www.automationdirect.com/industrial-lighting • AC / DC versions (BM-212H)

Also Available www.automationdirect.com/audible-alarms


Patlite pre-assembled stack light units and
accessories featuring:
• 25mm, 30mm, 40mm and 70mm units STARTING AT
• IP69K models available (WC9 models) $65.00
• All high-intensity LED units with prism-cut (LR4-202WJNW-RG)
lenses designed for enhanced visibility
• Superior impact and heat resistance

Order Today, Ships Today!


* See our Web site for details and restrictions. © Copyright 2019 AutomationDirect, Cumming, GA USA. All rights reserved. 1-800-633-0405 the #1 value in automation
The Plant Floor in Your Pocket
Get an overview of your process at a glance.
Control your SCADA with a swipe.

See the live demo now.


Scan this QR code with your phone
or visit demo.ia.io/tech
January/February 2020 | Vol. 67, Issue 1 www.isa.org

CONTINUOUS AND BATCH PROCESSING

18 Analytics for predictive,


preventative maintenance
By Michael Risse

With advanced analytics, companies can use predictive


and preventative maintenance to increase productivity,
uptime, and profits.

DISCRETE MANUFACTURING

24 Better performance
begins at the edge
By Rich Carpenter

IoT advanced computing begins on the factory floor.


Data analytics provide valuable feedback to optimize
maintenance, increase uptime, and improve real-
time control.

COVER STORY
12 OPERATIONS AND MANAGEMENT

Cyber-related 30 Traceability improves food


process hazard and beverage production
analysis
By Steve Winski

Errors in the packaging process can be avoided with


By Larry O’Brien and Mark Duck a modular sensor and software solution that enables
more effective package and product monitoring and
Shell integrates cybersecurity risk assessment into the control setup.
functional safety life cycle using cyber process hazard
analysis (PHA) assessments based on ISA-TR84.00.09.

DATA SCIENCE

36 Applying data science to


hazard analysis
By Edward M. Marszal

Internet technology can unite process hazards analysis,


hazards and operability studies, layer of protection
analysis, and hazard registers.

4 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


Setting the Standard for Automation™

www.isa.org/InTech
DEPARTMENTS
InTech FOCUS is ISA’s six-times-per-year digital magazine
8 Industry News
(or ebook) that delivers long-form educational articles on
ISA celebrates 75 years, ISA Global MARCH 2019
An InTech e-edition covering the
automation and instrumentation fundamentals from a variety
Cybersecurity Alliance starts 2020
fundamentals of automation

Flow
Preventive
Maintenance of industry experts. Single-issue topics include Flow & Level,
with expanded membership, Digital Flow of Incompressible

Temperature & Pressure, Controls, Process Safety, and Final


Fluids

transformation, and more


Two-wire Flow
Transmitters Keep Up

Control Elements.
With Technology

The Excitation
Frequency of Magnetic
Flowmeters

42 Association News InTech Plus is ISA’s twice-monthly digital newsletter, providing


Local learning: Gruhn to speak news, technical content, and professional development
on safety, HMIs, more; Milestones tools and resources. Both InTech FOCUS and InTech Plus are powered
of industrial transformation; New by Automation.com, global publisher of automation content and a
CAPs and CCSTs; Certification subsidiary of the International Society of Automation. Subscribe to InTech
FOCUS, InTech Plus, and more at www.automation.com/subscribe.
45 Standards
Charting a new era of ISA/IEC Are you up to date on instrument calibration, cybersecurity, system
cybersecurity standards migration, and industrial communications? Would you like to find out
more about ISA events, training, membership, and more? ISA’s YouTube
46 Products and Resources channel is your resource for how-to videos on all facets of automation
Spotlight on industrial cybersecurity and control, and a great way to hear members talk about their real-life plant
experiences and membership networking benefits. www.isa.org/isa-youtube
COLUMNS
© 2020 InTech ISSN 0192-303X
7 Talk to Me
InTech, USPS # 0192-303X, is published bimonthly in Research Triangle Park, NC by the International
How has ISA changed your
Society of Automation (ISA), 67 T.W. Alexander Drive, P.O. Box 12277, Research Triangle Park, NC
professional life? 27709. Vol. 67, Issue 1.
Editorial and advertising offices are at 67 T.W. Alexander Drive, P.O. Box 12277, Research Triangle Park, NC
10 IIoT Insights 27709; phone 919-549-8411; fax 919-549-8288; email info@isa.org. InTech and the ISA logo are registered
trademarks of ISA. InTech is indexed in Engineering Index Service and Applied Science & Technology Index
Security at the edge with
and is microfilmed by NA Publishing, Inc., 4750 Venture Drive, Suite 400, P.O. Box 998, Ann Arbor, MI 48106.
microsegmentation
Subscriptions: For ISA members, 8.65% of annual membership dues is the nondeductible portion allocated
to the InTech subscription. Other subscribers: $175 in North America; $235 outside North America. Multi-year
11 Executive Corner rates available on request. Single copy and back issues: $20 + shipping.
Blockchain, AR changing food Opinions expressed or implied are those of persons or organizations contributing the information and are not to be
and beverage operations construed as those of ISA Services Inc. or ISA.

Postmaster: Send Form 3579 to InTech, 67 T.W. Alexander Drive, P.O. Box 12277, Research Triangle Park, NC
50 The Final Say 27709. Periodicals postage paid at Durham and at additional mailing office.

Completely automate and Printed in the U.S.A.

eliminate operators? Publications mail agreement: No. 40012611. Return undeliverable Canadian addresses to P.O. Box
503, RPO West Beaver Creek, Richmond Hill, Ontario, L48 4RG

For permission to make copies of articles beyond that permitted by Sections 107 and 108 of U.S.
RESOURCES Copyright Law, contact Copyright Clearance Center at www.copyright.com. For permission to copy articles
in quantity or for use in other publications, contact ISA. Articles published before 1980 may be copied for a
48 Index of Advertisers per-copy fee of $2.50.

To order REPRINTS from InTech, contact Jill Kaletha at 219-878-6068 or jillk@fosterprinting.com.


49 Datafiles
List Rentals: For information, contact ISA at info@isa.org or call 919-549-8411.
49 Classified Advertising InTech magazine incorporates Industrial Computing® magazine.

InTech provides the most thought-provoking and authoritative coverage of automation


technologies, applications, and strategies to enhance automation professionals’ on-the-job
success. Published by the industry’s leading organization, ISA, InTech addresses the most
critical issues facing the rapidly changing automation industry.

INTECH JANUARY/FEBRUARY 2020 5


Perspectives from the Editor | talk to me ISA INTECH STAFF

CHIEF EDITOR
Renee Bassett
rbassett@isa.org
How has ISA changed CONTRIBUTING EDITOR

your professional life? Bill Lydon


blydon@isa.org

CONTRIBUTING EDITOR
Charley Robinson
By Renee Bassett, InTech Chief Editor crobinson@isa.org

PUBLISHER
Rick Zabel

T
he International Society of Auto- of the three industrial communications rzabel@isa.org
mation is a septuagenarian. protocols he developed: HART, Founda-
PRODUCTION EDITOR
This year marks the 75th anni- tion Fieldbus, and OPC. What do you Lynne Franke
versary of ISA—formerly the Instrument think industrial automation will look like lfranke@isa.org
Society of America. For 75 years, this in the next 25, 50, or 75 years? More ART DIRECTOR
nonprofit organization has set the stan- importantly, what skills will automation Colleen Casper
dard for those who apply engineering professionals need? ccasper@isa.org
and technology to improve the manage- Throughout the six issues of InTech
SENIOR GRAPHIC DESIGNER
ment, safety, and cybersecurity of mod- magazine in 2020, but especially in Pam King
ern automation and control systems in our September/October 75th Anni- pking@isa.org
industry and critical infrastructure. versary Commemorative Issue, we will
GRAPHIC DESIGNER
Even if you’ve never been a member, celebrate and reminisce and look to-
Lisa Starck
ISA has likely been a part of your profes- ward the future. We will ask volunteer lstarck@isa.org
sional life. So, this is the year to tell your leaders to share their insights, and
story and listen to the stories of others. ask the people working to transform
Maybe you are one of the 400,000 peo- industrial automation within or adja- ISA PRESIDENT
ple around the world who have bought cent to ISA to help identify the trends Eric Cosman
an ISA book, attended an ISA confer- shaping automation. We’ll review the PUBLICATIONS VICE PRESIDENT
ence, or enhanced your professional technological milestones, starting in Joao Miguel Bassa
standing with an ISA accreditation, cer- 1945 when the then-fledgling Instru-
EDITORIAL ADVISORY BOARD
tification, or training course. What do ment Society of America was found-
CHAIRMAN
you remember about the people you ed, shine a spotlight on the technolo-
Steve Valdez
met, or the lessons learned? gies of the most-recent 25 years, as
GE Sensing
Maybe you stood on the shoulders of the third industrial revolution has giv-
those who came before by creating sys- en way to Industry 4.0, and speculate Joseph S. Alford PhD, PE, CAP
tems or solving problems using ISA-95, on the needs for the next 25. Eli Lilly (retired)
ISA-88, or other standards as your foun- Victor S. Finkel, CAP
dation and guide. How did that affect We want to hear from Independent Consultant
your career? Maybe the ISA Automation
Conference and Exhibition was the first
people working to transform Eoin Ó Riain
Read-out, Ireland
professional event you ever attended? industrial automation within Guilherme Rocha Lovisi
Whether it was in Abu Dhabi or Atlanta,
who brought you there, and what did
or adjacent to ISA over the Bayer Technology Services

you discover? past 75 years. David W. Spitzer, PE


Spitzer and Boyes, LLC
Maybe you were around when Mike
Marlowe worked to get the ISA-99 And we’ll celebrate 75 years of in- Dean Ford, CAP
Westin Engineering
standard adopted by the U.S. govern- dustrial automation evolution and pro-
ment as the foundational standard in fessional development. Member lead- David Hobart
Hobart Automation Engineering
the cybersecurity of critical infrastruc- ers will celebrate together at the ISA
ture. Or maybe you’re a current mem- Annual Leadership Conference in San Smitha Gogineni
ber of the newly formed ISA Global Juan, Puerto Rico, USA this October. In Midstream & Terminal Services
Cybersecurity Alliance. What are you the meantime, consider renewing your James F. Tatera
hoping to contribute to our industry? membership (visit https://ISA.org/mem- Tatera & Associates
Maybe you’re John Berra, president bership) and adding your voice to the
of Emerson Process Management and celebration of ISA’s 75 years of setting
recipient of an ISA Lifetime Achievement the standard for automation. Email your
Award, or you have a story about one stories to 75in2020@isa.org. n

INTECH JANUARY/FEBRUARY 2020 7


industry news | News from

ISA celebrates 75 years of support for automation


people and technology

T
he International Society of Auto- milestones of the automation evolution, by providing consistent terminology and
mation (www.isa.org) celebrates said InTech chief editor Renee Bassett. object models and bridging information
75 years of industrial automation “We will shine a spotlight especially on technology and operational technology
evolution and professional development the technologies of the most recent 25 systems. B2MML expresses ISA-95 (IEC/
in 2020. The anniversary is an occasion to years, as the third industrial revolution has ISO 62264) data models in a standard set
not just look to the past but to provide a given way to Industry 4.0,” she said. of XML schemas written using the World
view into the future. Wide Web Consortium’s XML Schema
ISA was founded in 1945 as the Instru- language (XSD). It is an open-source XML
ment Society of America, and much has implementation of the ISA-95 and IEC
changed over 75 years, including the 62264 standards. There is a joint initiative
association’s name. Now the International to bring B2MML into the OPC UA frame-
Society of Automation, ISA still “sets the work, which provides a secure and reliable
standard for those who apply engineering architecture for manufacturing industries.”
and technology to improve the manage- The Sep/Oct issue of InTech will include
ment, safety, and cybersecurity of mod- the 75th anniversary commemorative
ern automation and control systems used supplement. In it, ISA members, custom-
across industry and critical infrastructure,” Automation.com’s Bill Lydon will share ers, and supporters will celebrate, remi-
says ISA executive director Mary Ramsey. his insights on technological developments nisce, and attempt to predict the future,
ISA develops widely used global stan- that have enabled manufacturing and said Bassett. “We will call on the people
dards, certifies industry professionals, process applications to increase quality, who have been working to improve and
provides education and training, pub- productivity, and profits over the years. An transform industrial automation within or
lishes books and technical articles, hosts example is the ISA-95 (ANSI/ISA-95) Enter- adjacent to ISA over the years. We want
conferences and exhibits, and provides prise-Control System Integration standard. to know how the standards and trainings
networking and career development pro- “The latest development of [ISA-95], have influenced them and their compa-
grams for 40,000 members and 400,000 B2MML [business to manufacturing mark- nies, and what new skills are becoming
customers around the world. up language], creates compatibility with important as automation evolves.” The
Throughout the year, both online and enterprise computing, cloud computing, anniversary celebration will culminate for
in print through its InTech brand publica- Internet of Things, and Industry 4.0,” says ISA members at the association’s Annual
tions, ISA will review the technological Lydon. “B2MML adds value to ISA-95 Leadership Conference in October. n

For digital transformation, learn from peers, says ARC council


C
ompanies in all industries are engaged in transforma- ciency, and cost within a specific industry or process.”
tional initiatives, but true digital wisdom still eludes many. ARC’s Digital Transformation Council, formed in January 2018,
“I’m struck by the mound of evidence of how hard it has is a peer group that cuts across vertical industries and opera-
been to achieve success,” says Mike Guilfoyle, vice president tional processes. This member-driven community serves industry,
of consulting and research firm ARC Advisory Group. “Despite energy, and public-sector professionals, and today more than
monumental efforts and resources, data is still hard to access, 200 global professionals across nine industries participate.
organize, and use. Companies continue to organize around tech By expanding their peer network beyond those they know well,
stacks, getting lost in fruitless technology comparisons. Leaders members of the Digital Transformation Council are “naturally forced
struggle to connect strategy and execution.” to bring a more open perspective,” says Guilfoyle. “This can help
Workforce and organizational culture barriers to digital transfor- them quickly learn ‘why’ others do things, more than simply ‘how’
mation remain in part because “the digital wisdom necessary to they are done. Instead of simply seeking to imitate, they learn how to
transform simply isn’t being accumulated,” says Guilfoyle. “In my problem solve better when it comes to digital transformation. Armed
opinion, that reality should neither surprise nor, frankly, scare any- with that wisdom, they are much more willing and able to tackle
one off.” But it should cause you to look to your peers for support. entrenched issues around data, organizational culture, and the like.”
“I’ve seen a recent spike in how often I’m asked by executives The Digital Transformation Council holds its third Annual
for benchmarks or competitive comparisons,” says Guilfoyle. Meeting on 3 February 2020 at the Renaissance Orlando Hotel at
“Often, these questions tend to focus on use cases, data, or SeaWorld in Orlando in conjunction with the 24th Annual ARC
technology around things like asset performance, process effi- Industry Forum. For more information, email dtc@arcweb.com. n

8 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


News from | industry news

ISA Global Cybersecurity Alliance starts Add your Voice to the


Celebration
2020 with expanded membership 75 years of
setting the

T
he ISA Global Cybersecurity Alliance (ISAGCA) is starting the new year with new standard for
projects and new members. ISAGCA is organized into four focus areas: aware- automation
ness & outreach, compliance & prevention, education & training, and advocacy &
adoption. These focus areas are collectively working on the following projects in 2020: The Sep/Oct 2020 issue of InTech
n A condensed guide to implementing the ISA/IEC 62443 series of standards. will include the 75th Anniversary
n A consolidated matrix that cross references all cybersecurity-related standards to ISA/ Commemorative Supplement.
IEC 62443 principles. In addition to technology time-
n A road map for expanded cooperation with worldwide governments that are currently lines, Automation Innovator Profiles,
referencing the standards in their regulatory requirements or recommended practices. and predictions for the future, the
n A multidimensional reference guide that will map system life-cycle phases and stake- supplement provides ways for sup-
holder roles to specific automation cybersecurity knowledge, skills, and abilities needed porters to buy ads, share stories of
to manage each phase. ISA history, or position their compa-
n Industry vertical overlays to the ISA/IEC 62443 standards for building automation, nies as part of the Industrial Auto-
medical devices, and other sectors. mation Innovators Showcase.
n A database of expert speakers for speaking opportunities at industry events. Show your support for the orga-
“Unifying and intensifying the work of experts around the world, regardless of affilia- nization that supports your people,
tion, is a key part of ISAGCA’s mission,” said ISA executive director Mary Ramsey. “We be- products, and customers. Email
lieve that automation providers, cybersecurity vendors, asset owners, government agen- stories, congratulations, and ques-
cies, research groups, and others involved in cybersecurity efforts are stronger together.” tions to 75in2020@isa.org.

GLOBAL “Unifying and intensifying the work of experts


CYBERSECURITY around the world, regardless of affiliation,
ALLIANCE is a key part of ISAGCA’s mission.” ISAGCA additions as of the
The ISA Global Cybersecurity Alliance has more than tripled the number of its founding
end of 2019
members with the addition of 22 new companies and organizations (see box). At the end n aeSolutions
of July, ISAGCA announced Schneider Electric, Rockwell Automation, Honeywell, Johnson n Bayshore Networks
Controls, Claroty, and Nozomi Networks as its initial founding members. n Beijing Winicssec Technologies
End users, asset owners, government agencies, and other cybersecurity-focused or- Co. Ltd.
ganizations are also encouraged to join ISAGCA. Notable members include Chevron, n Digital Immunity
ExxonMobil, Honeywell, Schneider Electric, Yokogawa, exida, Control System Security n Dragos
Center, YPF, Japan Information Technology Promotion Agency, Royal Dutch Shell plc, TÜV n exida
Rheinland, DNV GL, and TÜV SÜD. Current members of LOGIIC include BP, Chevron, n ISA Security Compliance Institute
ExxonMobil, Shell, Total, ConocoPhillips, and other large oil and gas companies. To learn n ISA99 Committee
more, visit www.isa.org/isagca. n n Idaho National Laboratory
n LOGIIC (Linking the Oil and Gas

Attendees to discuss Industrial IoT and n


Industry to Improve Cybersecurity)
Mission Secure, Inc.
smart manufacturing n Mocana Corporation

I
n Munio Security
ndustrial Internet of Things (IIoT) has emerged as a major technology with a big
n PAS Global
impact on industrial automation systems—and on the automation professionals
n Radiflow
involved with the design and maintenance of such systems. Make plans to be in
n Senhasegura (supporting member)
Texas in April for the 2020 ISA IIoT & Smart Manufacturing Conference and learn how
n Tenable
automation is the foundation of IIoT and why it is useful to understand the difference
n TiSafe
between edge, fog, platform, and hybrid architectures. Held 15–16 April at the Moody
n Tripwire
Gardens Hotel in Galveston, Texas, with a day of focused training on 14 April, this con-
n WisePlant
ference’s topics encompass advances in connectivity, automation, and security within the
n Wallix Group
context of hybrid manufacturing operations across multiple vertical industries.
n Xage Security
For more information and to register, visit https://isaautomation.isa.org/2020-iiot-
smart-manufacturing-conference. n

INTECH JANUARY/FEBRUARY 2020 9


IIoT Insights | Where the Internet meets industry

Security at the edge with microsegmentation


by Courtney Schneider

I
ndustrial and Industrial Internet of Things (IIoT) promise. Worst-case physical consequences might
networks almost always represent engineering include flooding, washouts, and physical damage
risks, as well as conventional “business” risks. to irrigation canals.
IIoT is the ultimate mind meld of information technol- If monitor-only IIoT edge devices are connected to
ogy (IT) and operational technology (OT) networks. conventional control networks, we have a different
The IIoT connects edge devices in OT networks direct- problem. For example, what if the monitor-only rain-
ly to the Internet to enhance operational efficiencies. fall sensors that are deployed inside the boundaries
What confuses security designs for IIoT deployments of a large water-treatment facility were connected
is differing kinds of risk.
ABOUT THE AUTHOR
OT practitioners and engineers plot risk on a Unidirectional gateways provide
spectrum from unacceptable physical consequenc- protection to edge devices when
Courtney Schneider
es to safe, correct, continuous, and efficient physi-
is cyber-policy research endpoint protections in those
cal operations. Conventional security practitioners,
manager for Water-
however, focus on protecting information, cyberre- devices are not sufficient.
fall Security Solutions,
silience, incident response, data recovery, and busi-
(https://waterfall-se-
ness continuity. Conventional cyberassets are part to the facility’s OT network? These connections ex-
curity.com), a global
of a sea of networks, some needing more protec- ist because that water-treatment OT network is the
industrial cybersecurity
tion than others, managed for business risk. easiest one for the IIoT sensors to access. In such an
company, protecting
What then of IIoT security, which basically melds example, compromised monitor-only sensors give
critical industrial net-
these two concepts of physical and business risk attackers an opportunity to pivot their attacks into
works since 2007. This
together: the ubiquity of IT networks layered on the facility’s control-critical network.
article first appeared
physical control and industrial networks? How do
as a blog post of the
we implement a security program to simultane- Microsegmentation
Industrial Internet Con-
ously satisfy these very different needs from IT, OT, When unacceptable physical consequences of
sortium.
and engineering teams? compromise are possible for IIoT deployments, we
need strong protections for the edge devices. In
Physical and business risk these scenarios, a good place to start is microse-
IIoT security planning starts with a cyberrisk assess- gment control-critical sets of equipment or net-
ment. Not all IIoT deployments pose nefarious threats works using unidirectional gateway technology.
to the physical world. When deploying hardware Unidirectional gateways are described in section 9.2.6
that is only physically able to monitor but not control of the Industrial Internet Consortium Industrial Internet
anything, we generally face only conventional busi- Security Framework (https://www.iiconsortium.org/IISF.
ness risks. Conventional enterprise security principles htm). These gateways are the strongest of the network
apply, and direct connectivity to enterprise and even segmentation options described in the framework. Uni-
cellular and Internet networks is appropriate. directional gateways provide additional protections to
For example, consider a system of thousands of edge devices when endpoint protections in those devices
solar-powered rainwater measurement devices dis- are not sufficient. They enable safe flows of monitoring
tributed throughout a watershed as part of a water information to enterprise and cloud systems for big data
treatment flow prediction system. If the switches analysis and other benefits, while physically preventing
are compromised, or for that matter physically any information flow back into the edge devices.
kicked under a rock by passing tourists, there are Where to deploy the gateways is the question—
no grave consequences to the water system. The in complex OT networks, unidirectional gateways
system is massively redundant, and device inputs are may be deployed close to the edge devices, close to
constantly correlated with external inputs, such as the connection to enterprise or Internet networks,
official meteorological reports of rainfall in an area. or anywhere in between. What has emerged as
But suppose the rainfall-monitoring devices can a best practice is perhaps obvious in hindsight—
also control switches that are connected to, say, an enterprise security teams need to sit down with
irrigation system to activate or deactivate irrigation engineering teams and work out a strategy. Both
in an area based on the rainfall it receives. Now teams need to agree on where to deploy at least
there are potential physical consequences of com- one layer of unidirectional protections. n

10 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


Tips and Strategies for Managers | executive corner

Blockchain, AR changing food and beverage operations


By Darcy Simonis

M
any factors affect the way food and bev- lion this year. But it is also making its way into the
erage manufacturers handle their pro- food and beverage sector.
cesses. Whether it is the need for more One German company is using 3D printing
efficient processing, the growing population, or technology to create printed jelly meals for elderly
evolving consumer preferences and attitudes, food care-home residents who have difficulty chewing
and beverage manufacturers must constantly look or swallowing solid foods. As the potential uses
for ways to stay ahead. New technologies that are of 3D printing are developed, the benefits of this
part of Industry 4.0 can help, allowing automation technology are becoming more understood. Food
professionals to have a positive impact throughout that is 3D printed can produce precise results and
the supply chain. Three innovations that are chang- save time and effort. ABOUT THE AUTHOR
ing the way food and beverage makers operate While 3D printing has the potential to provide
Darcy Simonis is in-
are augmented reality (AR), three-dimensional (3D) innovative food to the growing population much
dustry network leader
printing, and blockchain technology. faster than traditional methods of manufacturing,
for ABB’s Food and
it also provides options for the industry to be more
Beverage division. Find
Food through AR environmentally sustainable. 3D printing only uses
out more at https://
For many consumers, AR is a normal part of ev- the required amount of raw materials to make a
new.abb.com/food-
eryday life. Since the boom of Snapchat filters and finished product, and the hydrocolloid cartridges
beverage.
lenses, AR has become extremely popular and is that are used in 3D printers form a gel when mixed
now more commercially accessible than ever. With with water and leave minimal waste.
the AR market in Europe alone estimated to hit
$12 billion by 2024, industries are finding many Blockchain technology
ways to integrate this cutting-edge technology Consumer attitudes to food have also changed.
into daily practice—and the food and beverage Whether it is ensuring that produce is grown sus-
industry is no different. tainably or that plastic waste is kept to a minimum,
Staff working in a food and beverage facility can consumers now want to know every detail about
be trained through virtual instructions and sce- the product they are buying—and blockchain tech-
narios in which it is possible to virtually visualize nology can provide just that.
working and operating in the facility. This method Through blockchain, consumers can verify the
could enable a more productive workforce to be history, origin, and quality of a product. Blockchain
trained at a quicker rate compared to traditional is benefitting the industry as it builds trust between
and manual training. the supplier, manufacturer, and consumer, which in
AR can also enhance the consumer experi- turn can increase brand loyalty. It can also reduce
ence. Some manufacturers have designed prod- food waste by identifying problems along the way,
ucts with labels displaying nutritional or recipe such as contamination or storage issues. If problems
information with AR. However, some suppliers are detected at an early stage of the production pro-
are taking this one step further. An online New cess, they can be resolved before the product hits
York bakery, for instance, uses AR to display a the shelves. This could help reduce food waste and
3D view of its products for customers to view eliminate the need for product recalls.
before they place an order. Using AR in ways Although blockchain technology is a new ap-
like this could increase sales, as it means the proach, most food manufacturers should already
customers can see the food or finished product have software installed that monitors, records, and
before they commit to a purchase. traces product ingredient details. Software like the
800xA distributed control system or the ABB Ability
3D printing food manufacturing operations management system can
Another technology that is being increasingly used trace and record an ingredient and log the data in
in the food and beverage industry is 3D printing. a database for manufacturers to refer to. The Abso-
Currently, 3D printing technology is being applied lut Company, for example, uses System 800xAat its
to industries such as automotive, aerospace, and Nöbbelöv distillery in the south of Sweden to help
packaging, and it is predicted that the global rev- operators see and correct key process deviations in
enue for the 3D printing market will reach $21 bil- the sensitive fermentation process. n

INTECH JANUARY/FEBRUARY 2020 11


Cyber-related
process hazard
analysis
How Shell conducts cyber
PHA assessments based
on ISA-TR84.00.09
By Larry O’Brien and Mark Duck

12 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


COVER STORY

T
he introduction of process safety system–
FAST FORWARD
specific malware into the manufacturing ● A bow-tie model and the concept of escalation factors help explain
world in 2017 intensified the discussion how cybersecurity vulnerabilities can affect safety barriers in the oil
around the convergence of safety and cybersecu- and gas industry.
rity. If a cyberattack could compromise safety in ● To integrate cybersecurity risk assessment into the functional safety
the physical world, we must view cybersecurity in life cycle, ISA and IEC cybersecurity standards have embraced the
the context of safety. Similarly, approaches taken concept of cybersecurity process hazard analysis (PHA).
in the safety world to evaluate risk and to design ● Shell learned several lessons when undergoing its own cyber PHA
safer systems must consider cybersecurity- (based on ISA-TR84.00.09) assessments.
related threats to the integrity of safety systems.
Key end user companies from the oil and gas, degrade the integrity of safety barriers, and (2)
marine transportation, and offshore exploration a standard methodology to assess this risk. In
and production industries discussed these and the first case, using a bow-tie model and the
related issues in a session at the 2019 ARC In- concept of escalation factors can help frame
dustry Forum in Orlando. In that session, Mark where cybersecurity threats and vulnerabilities
Duck, who is with the Shell Projects & Technol- can affect safety barriers. In the second case, the
ogy organization, talked about an approach industry has already taken steps to address how
Shell is exploring to integrate cybersecurity cybersecurity risk assessment can be integrated
risk assessment into traditional process hazard into the functional safety life cycle.
analysis (PHA) methods.
For example, hazard and operability (HAZOP) Cyberrisk viewed as a safety concern
studies could be used to determine the impact The International Electrotechnical Commis-
of cybersecurity threats and vulnerabilities on sion (IEC) 61511 Functional Safety standard
the safety of plant operations. Similarly, meth- now requires a safety instrumented system (SIS)
ods like HAZOP should be adapted to consider security risk assessment. ISA has published a
the cybersecurity risk to the integrity of the technical report (ISA-TR84.00.09-2017) that
selected safety barriers for each specific hazard documents a SIS cybersecurity risk assessment
risk scenario. procedure, called cybersecurity PHA or cyber
These approaches are not limited to the oil PHA. The link to PHA is a step in the cybersecu-
and gas industry. They could be applied to an rity risk assessment process to: (1) review the
even wider range of industries, including those output of the PHA to identify worst-case health,
that are not the primary users of process safety safety, security, and environment (HSSE) conse-
systems. quences for the asset, and (2) identify any haz-
The industry needs: (1) a clear way to think ard scenarios where the initiating event and all
about how cybersecurity risk, if realized, could control barriers are “hackable.”

Consequences Increasing likelihood


Non-
HSSE
HSSE A B C D E
Severity rating

Environmental

Consequencial
business loss
Reputation
People

Assets

Almost
Rare Unlikely Possible Likely
certain

0 Zero injury No damage No effect No effect No loss

1 Slight injury Slight Slight Slight Slight


damage effect effect loss
2 Minor injury Minor Minor Minor Minor
damage effect effect loss
3 Major injury Moderate Moderate Moderate Moderate
damage effect effect loss
4 Single Major Major Major Major
fatality damage effect effect loss
5 Multiple Massive Massive Massive Massive
fatalities damage effect effect loss
Figure 1. Example risk assessment matrix.
Source: Shell

INTECH JANUARY/FEBRUARY 2020 13


COVER STORY

include the use of risk assessment ma-


Threat Hazard Consequence trices that consider likelihood; conse-
quence of risks to people, assets, com-
Initiating event Control Recovery munity, and environment; and severity
Initiating event Top of the consequence. The company also
barriers barriers
event uses bow-tie models (figure 2) to visu-
Threat Consequence alize the various elements of risk sce-
narios, such as hazards, top events, and
barriers, including escalation factors
Escalation Escalation
Escalation factor factor Escalation and escalation factor controls.
factor control control factor A “hazard” is an agent with poten-
tial to cause harm. A “top event” is an
Figure 2. Example bow-tie model. Source: Shell uncontrolled release of a hazard, such
Controller as hydrocarbons, toxic substances,
energy, or objects at height. An “esca-
Operator

SIF (SIL2)
Initiating event lation factor” is any situation, condi-
Alarm
BPCS

(BPCS) Hazard tion, or circumstance that may lead


to the partial or full failure of a barrier
Top (e.g., independent protection layer).
Barrier

Barrier

Barrier

Threat event An example of this is making un-


authorized trip setting changes to a
#1

#2

#3

safety instrumented function. This


escalation factor could be controlled
Non-SIF barriers by improving the logical and/or phys-
Figure 3. Partial bow-tie showing threat and barriers including SIF with SIL and top event. ical access controls for the safety in-
strumented system. Identification of
NAMUR has also published a work- etc., it would take to bring production escalation factors is part of the pro-
sheet (NA 163) titled “Security Risk back online in case of, for example, a cess of managing the integrity of in-
Assessment of SIS.” A cyber PHA ransomware attack that affects all serv- dependent protection layers. These
methodology can be used to assess ers and workstations in the industrial tools, among others, can be used to
the risk associated with identified automation and control system (IACS). start the journey of integrating the
cybersecurity-related escalation factors The cost is the value of lost and de- process safety and cybersecurity risk
and recommend mitigations to reduce ferred production plus the materials assessment processes.
the risk to an acceptable level. Linking and labor required to respond to the
concepts and tools used in the process incident. The list of systems required to The challenge
hazard analysis world with cybersecuri- bring production back online will likely Today’s challenge is to create an inter-
ty risk assessment can help bring these be a subset of all systems in the IACS. face between process safety risk assess-
two, traditionally separate, risk manage- From a cybersecurity risk scenario point ment methods and cybersecurity risk
ment processes together with a goal of of view, this list would be the critical sys- assessment methods. Historically, the
improving the robustness of our safety tems, including all safety systems. HSSE risk assessment process has not
systems against cybersecurity attacks. considered sabotage (cybersecurity
Most cybersecurity risk scenarios Shell’s process safety pedigree attacks are a form of sabotage). Given
only deliver a consequential business- Shell is well known for its emphasis on the level of sophistication seen in
loss consequence along with a poten- safety. The company takes a compre- recent cybersecurity attacks on indus-
tial impact on company reputation. hensive and multifaceted approach to trial control systems, the potential for
PHAs, on the other hand, typically do managing process safety risk includ- simultaneous cybersecurity attacks on
not consider consequential business ing managing the HSSE risk associated one or more independent layers of pro-
loss. But a cybersecurity risk assess- with the asset process (a particular tection must be considered during the
ment must include this consequence aspect of the chemical manufacturing HSSE risk assessment process.
category, as shown in the example risk process for example), integrity of safety Safety instrumented systems and
assessment matrix (figure 1). barriers, risk to production loss, and other control and recovery barriers have
This consequence category can be other factors. cybersecurity vulnerabilities that must
calibrated in terms of duration of pro- Shell uses many methods to evaluate be mitigated. These vulnerabilities rep-
duction loss. The worst-case severity risk in process safety that are consis- resent “escalation factors” in the bow-
is calibrated by determining the maxi- tent with those outlined in the IEC/ISA tie model that must be mitigated with
mum number of hours, days, weeks, 61511 process safety standards. These appropriate “escalation factor controls.”

14 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


COVER STORY

etc., because of the lower perceived


Management of functional safety Conceptual design and scope value. One way to resolve this issue is to
assign the cybersecurity controls used
Process safety Cybersecurity NIST Framework
to manage cybersecurity escalation
& cybersecurity

over factors a criticality rating based on the


Rec Id
Assessment Assessment barrier being protected, and then fac-

en
(PHA) (cyber PHA) Industry Stds tor this into the overall maintenance

tify
Respond
Supplier elements
System / IT capabilities strategy.
Performance tools
Design Design Useful life The need for doing cybersecurity risk
Sustainment elements

Pro
assessments for process safety is called

te
out in IEC 61511 Part 1 (2016). This re-
ct
Operate & Operate &
t
Detec
maintain maintain quires that “a security risk assessment
shall be carried out to identify the secu-
Figure 4. Cybersecurity integrated with process safety. rity vulnerabilities of the SIS.” The re-
quirement further specifies additional
One possible interface between the factor among many other types of es- details supporting the risk assessment.
cybersecurity risk assessment and calation factors that can degrade the Although this is a needed step, there
the HSSE risk assessment process is integrity of a safety barrier. are potentially many other safety sys-
to focus on cybersecurity escalation During a PHA, there is the possibil- tems, in addition to SISs, that are sub-
factors associated with barriers that ity that the initiating event and all the ject to cybersecurity vulnerabilities.
have cybersecurity vulnerabilities. One control barriers selected for a hazard The following are examples of other
advantage to this approach is that it is scenario have cybersecurity escalation programmable safety systems subject
already part of the existing HSSE risk factors. Where this is a high-conse- to cybersecurity vulnerabilities:
assessment process. quence scenario (e.g., potential fatal- l fire water pumps
ity), an effort should be made to add at l tanker loading systems

Historically, HSSE risk least one control barrier that does not l ballast management systems (exam-
have cybersecurity escalation factors, ple: offshore semi-submersibles)
assessments have not such as a pressure relief valve or non- l mooring systems (example: offshore

considered sabotage, programmable safety instrumented semi-submersibles)


function (SIF). If this is not possible, l helicopter refuels
but safety instrumented the cybersecurity risk assessment team l hazardous area ventilation

systems and other control should consider that a cybersecurity l deluge systems
attack on these specific control barri- l sprinkler systems
systems have cybersecurity ers has a higher likelihood of leading to l navigation aids

vulnerabilities—a type of the top event, and they should identify l collision avoidance systems
a robust set of cybersecurity counter- l communication systems
sabotage risk that must measures to manage this risk. The trend to integrate these pro-
be mitigated. grammable safety systems with basic
Maintenance and cybersecurity process control systems will likely con-
It is common for one or more of the Industrial assets typically have a main- tinue and must be considered in the
selected control or recovery barriers to tenance program to maintain the vari- context of the IEC 61511 safety life cycle,
be vulnerable to cybersecurity threats. ous components of the asset and must which includes ensuring cybersecurity
Some examples are safety instrument- often prioritize work based upon some risks are adequately addressed. Con-
ed systems, PLC-controlled fire water criteria. A common way to do this is to sidering these challenges, companies
pumps, and fire and gas systems— organize the assets in terms of system must make sure that cybersecurity
essentially any barrier based upon mi- criticality. If a backlog of maintenance risks to the availability of all barriers
croprocessors running firmware/soft- activities exists, then ensure the com- are understood, mitigated, and even
ware and, potentially, connected to a ponents with the highest criticality are “designed out,” where possible, during
network. taken care of first. the PHA process.
A cybersecurity escalation factor for A common issue with cybersecurity
these types of controls is the combina- controls in an industrial control system Emergence of cyber PHA
tion of cybersecurity threats and vul- (ICS) environment is the related main- This raises the question of how we de-
nerabilities associated with the equip- tenance required to sustain them over velop a cybersecurity risk assessment
ment used to implement the control. In time. Often, the maintenance associ- that meets the requirements of the
this context, cybersecurity escalation ated with cybersecurity controls is a world of process safety. The concept of
factors are just one type of escalation lower priority than instruments, valves, cybersecurity process hazard analysis

INTECH JANUARY/FEBRUARY 2020 15


COVER STORY

HMI S-EWS IAMS to use separation of duties to enable


bypasses along with an administra-
tive process that creates a record of
the bypass. Rigorous management (or
elimination) of remote access to safety
system engineering workstations and
instrument asset management systems
Network (IAMS) should also be employed. Peri-
odic audits of who has remote access
should be implemented. Remote ac-
SIS SIS cess by privileged users should be nor-
mally disabled, done under “permit to
work,” and monitored locally.
Unauthorized changes to SIS instru-
TI TI ment settings, such as sensor type,
Figure 5. Safety instrumented systems interface to HMI, engineering workstations, and scale, or range, can render a SIF inop-
instrument asset management systems. erable. This can potentially be done
from the IAMS or through handheld
(PHA) has emerged in the industry over mented systems have a hardware key devices used to interface with intel-
the past several years and is finding in- switch to manage the various modes ligent instrumentation. End users
creasing acceptance among end users. of operation, such as “run, program, should ensure some form of “instru-
ISA and IEC cybersecurity standards remote” modes. In cases where a ment lock” is in place, such as a hard-
have embraced this method. A meth- hardware-based key switch is not pro- ware jumper or software lock. This
odology (and supporting information) vided, consider using a “software” lock will let them use separation of duty to
for integrating process safety and to enforce separation of duties for the make changes to instruments. Some
cybersecurity risk assessment is docu- SIS. For example, the supervisor in the end users have employed data diodes
mented in the following: plant should unlock the SIS to allow for this purpose as well.
● ISA/IEC d62443-3-2 (draft) – Security
Risk Assessment and System Design
● ISA-TR84.00.09-2017 – Cybersecurity The trend to integrate programmable safety systems
Related to the Functional Safety Life-
cycle
with basic process control systems will likely continue
● NAMUR Worksheet NA 163 – Security and must be considered in the context of the IEC 61511
Risk Assessment of SIS
Several service providers have
safety life cycle.
emerged over the past few years that
have developed their own methodolo- the engineer to make configuration Run periodic audit reports to de-
gies for doing cyber PHA that are con- changes. Another example is making tect unauthorized downloads to SIS
sistent with the recommendations out- sure that critical SIS parameters such as or changes to instruments. Changes
lined in the standards. These companies “trip limit” cannot be changed online. should match corresponding adminis-
range from smaller software and engi- A download, using separation of duties, trative controls such as “permit to work
neering service providers to large, inte- should be required to change trip limits (PtW)” or “management of change
grated process automation suppliers. and other critical parameters. (MOC)” records. If user accounts for
End users should also pay attention the safety engineering workstation
Shell’s lessons learned to how the safety system engineer- (S-EWS), human-machine interface
Shell concluded its ARC Industry Forum ing workstation user roles and associ- (HMI), and IAMS are integrated with
presentation by sharing several lessons ated privileges are set up. Companies Microsoft Active Directory, risk assess
learned from undergoing its own cyber should ensure that the “principle of the implementation to make sure these
PHA (based on ISA-TR84.00.09) assess- least privilege” is enforced. In other credentials are properly protected.
ments. Although some are not strictly words, minimize the number of people Good password policy should also
cybersecurity related, they neverthe- with privileged accounts and set up be followed. Ensure that privileged
less emerged in a cybersecurity risk roles to support separation of duties. account passwords are not leaked or
assessment. Awareness of these issues Companies should also rigor- shared. Use administrative policies that
would benefit the ICS cybersecurity ously manage bypasses, and opera- state this. If passwords are “stored,” do
community. tors should have a real-time view of so in a secure manner. Do not pass
For example, not all safety instru- all active bypasses. A best practice is around files with passwords.

16 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


COVER STORY

Overall, companies should identify ABOUT THE AUTHORS


and address cybersecurity risks to safety
Larry O’Brien, vice president, research, ARC Advisory Group,
barriers during design. Using concepts
is part of the cybersecurity and smart cities and infrastruc-
such as cybersecurity escalation fac-
ture teams at ARC, with a 20-year background in process
tors and ensuring high-consequence
control, process safety, and field devices/field networks.
hazard scenarios are mitigated using
O’Brien is part of the cybersecurity and smart cities and in-
barriers without cybersecurity vulner-
frastructure teams at ARC and has supported many end-user
abilities can help achieve this goal. A
clients in the oil and gas and refining industries.
cyber PHA should be included as part
of any new project and as part of the
contract when designing an automa-
tion system. Companies should per-
Mark Duck, principal technical expert, ICS Security, Shell
form a cyber PHA for existing assets
Global Solutions, is a Certified Information Systems Security
when a change occurs that affects the
Professional and Global Industrial Cyber Security Profession-
safety system or when the cybersecu-
al with more than 30 years of experience in the aerospace,
rity threat landscape has changed.
manufacturing, and oil and gas industries. He has 11 years
There is still much to learn about
of experience with Shell working on capital projects related
the intersection of cybersecurity and
to industrial cybersecurity controls for automation systems.
safety. This requires collaboration be-
He has also been a key contributor to the development of
tween both communities for the con-
Shell’s global industrial cybersecurity standards.
tinued protection of assets, people,
and communities in today’s challeng-
ing cybersecurity environment. ■ View the online version at www.isa.org/intech/20200201.

AZ Series
Hybrid Control Systems AZ Series Family of Products

Rack & Pinion Systems Compact Electric Cylinders Electric Actuators Rotary Actuators

Open loop performance.


Closed loop control.
Now With

EtherNet/IP is a registered trademark of ODVA, Inc.

orientalmotor.com
sales@orientalmotor.com
800-468-3982

INTECH JANUARY/FEBRUARY 2020 17


Analytics for predictive,
preventative maintenance
After years of stagnation come sweeping
changes in technologies, users, expectations
By Michael Risse

18 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


CONTINUOUS AND BATCH PROCESSING

A
new year and decade provide an occasion the new concept of
FAST FORWARD
for predictions regarding the state of ana- prediction, and in- l There will be a sweeping transition from
lytics in the process industries. After three stead more about de- historical to predictive analytics.
decades of data generated by digitizing control mocratizing this capa- l There will be an expanded role for subject-
systems, stored in historians, and imported from bility. More assets will matter experts, typically process engineers,
ad hoc analytics in spreadsheets, the static and be involved, ones that in cutting-edge analytics efforts.
past tense model for analytics is getting long in certainly could not l Engineers will quickly create insights to
the tooth. The need for new and improved offer- have been justified in improve outcomes, empowering them to do
ings to actually achieve insights will only become the past due to the ex- the right thing.
more acute because industry data volumes are pense of sensors, data
accelerating. In fact, industry analyst IDC recently collection, storage, and traditional APM solu-
predicted that the average process manufactur- tions. Rather than best practices based on a fleet
ing plant will generate and store much more data of assets, preventative maintenance will be based
in 2025 as compared to today (figure 1). on a sample size of one. Broadly deployed, pre-
The big data era is far from over; indeed, we dictive analytics will enable early alerts to avoid
are only at the end of the beginning for process incidents, along with other warnings of develop-
industry data volumes, velocity, and variety. ing problems, with notice given well in advance.
This means there will be an even bigger discon- Figure 2 depicts how advanced analytics can be
nect between the opportunity and reality of used for predictive analytics.
advanced analytics in the process industries. To realize the benefits of prediction for more and
To address the increasing data volumes and
close the gap from sensors and data to insights Data generated and stored (terabytes per day)
and actions, three key improvements will
emerge over the next decade of analytics as the Industry 2019 2020 2021 2022 2023 2024 2025
past three decades of the historian/spreadsheet Power 1.15 1.34 1.61 1.98 2.48 3.19 4.52
era is left behind. These improvements will be Water 0.32 0.34 0.37 0.40 0.44 0.49 0.57
enabled by continuing advances in software
Gas 0.53 0.56 0.61 0.67 0.73 0.82 0.95
and computing technology, the driving force of
innovation for the past 30 years. Computing is Semi-con 1.73 2.18 2.89 3.97 5.58 8.11 13.54
ever more pervasive, inexpensive, and acces- Elec 1.26 1.47 1.77 2.18 2.73 3.50 4.97
sible. The question is, if it was free, what would assembly
an organization do with it? Med dev 2.01 2.28 2.64 3.14 3.77 4.63 6.18
Petrochem 1.26 1.47 1.77 2.18 2.73 3.50 4.97
From past to predictive maintenance
Oil and gas 1.00 1.14 1.32 1.57 1.89 2.31 3.09
The first improvement is a sweeping transition
from historical to predictive analytics. Most of the Pharma 1.27 1.35 1.46 1.60 1.76 1.96 2.29
common analytics terms used today reflect a bias Auto OEM 1.90 2.15 2.50 2.96 3.57 4.37 5.84
toward the past tense. Reports: what happened? Auto 1.20 1.31 1.47 1.68 1.94 2.27 2.83
Overall equipment effectiveness: what was the suppliers
equipment effectiveness? Root cause analysis:
Heavy 0.76 0.84 0.94 1.07 1.23 1.44 1.80
what caused this? This is historical and backward
industry
looking. Certainly, there are exceptions to this
view—dashboards and other forms of real-time Aerospace 0.89 1.01 1.18 1.39 1.68 2.06 2.75
monitoring for asset performance management Light 0.32 0.34 0.37 0.40 0.44 0.49 0.57
(APM) as an example—but most spreadsheet ana- industrial
lytics clearly are not a forward-looking exercise. Food and 0.85 0.90 0.98 1.07 1.18 1.31 1.53
Further, the use of APM solutions is typically beverage
limited by their cost and complexity to expen-
CPG 0.74 0.79 0.85 0.93 1.03 1.14 1.34
sive, mission-critical assets such as turbines
that can justify the resources and keep up with Chem 1.26 1.47 1.77 2.18 2.73 3.50 4.97
the “drift” in every plant due to changing prices, Paper and 1.12 1.26 1.47 1.74 2.10 2.57 3.43
conditions, formulas, and raw materials. And textiles
even dashboards are typically based on a pre- Metals 0.98 1.08 1.21 1.38 1.58 1.85 2.32
defined and not dynamic context, and as such Source: IDC
report on current data with past tense context. Figure 1. This table shows how the amount of data generated in the process
Thus, the future state of analytics is less about and other industries will increase dramatically over the next five years.

INTECH JANUARY/FEBRUARY 2020 19


CONTINUOUS AND BATCH PROCESSING

Figure 2. This screenshot shows how advanced analytics was used to predict required maintenance for a heat exchanger.

more assets, engineers will move to the article back in 2012, more recent arti- and operations insights within the orga-
forefront of advanced analytics efforts. cles and anecdotes from end users tell nization. This may just sound like fancy
a different story. The fact is, while data language for dashboards and reports,
Engineers in the lead scientists know their algorithms, they but there is a critical difference, which is
The second improvement is an ex- do not know plant processes and con- maintaining a connection between the
panded role for subject-matter experts text, or first principles models and how created analysis and the underlying data
(SMEs), typically process engineers, in changes affect operations. and providing all users with click through
cutting-edge analytics efforts. These There has also been a more recent access to this data. Engineers, teams,
SMEs have the required education, spate of articles on the need for data managers, and organizations can use
expertise, and history with the plant translators or data liaisons to work these new capabilities to distribute ben-
and processes: they know what to look between data science and engineering efits throughout a plant and a company.
for and what it means. “Self-service” or teams. But all of this can be avoided
“ad hoc” are the terms used for these if advanced analytics vendors simply Insights in time
types of solutions, which ensure local close the gap and bring data science With more assets connected and con-
access to insights by putting the power innovation to SMEs by creating self- tributing to predictive plant mainte-
in the hands of SMEs. service features. Yes, machine learning nance, and tools in the hands of the
The future state is therefore not re- is a critical component for analytics engineer to participate in innovative
placement of SMEs, which is the mes- next, as described in the advanced ana- plant analytics, the third improvement
sage associated with machine learning lytics section below. But although these for the next generation of analytics is
and initiatives based on information and other algorithms are important, to do the right thing. In the context of
technology (IT), but to instead improve they are not sufficient. Application-spe- process manufacturing, the most data
the available tools so they can imple- cific expertise is critical and required. intensive and scientific of industries,
ment predictive and prescriptive ana- Furthermore, a new generation of ana- that may sound ridiculous, but it is a
lytics. Although there has been much lytics cannot end with SMEs. Self-service critical difference for future state ana-
excitement about data scientists and is what they have been doing for 30 years lytics. Predictive analytics will provide
their role in improving production out- with spreadsheets. Therefore, new so- a view into the future, with SMEs and
comes, such as the Harvard Business lutions must empower teams and net- others developing insights in time to
Review’s “Sexiest Job of the Century” works of employees to share production impact outcomes.

20 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


CONTINUOUS AND BATCH PROCESSING

For example, with spreadsheet-based of the long times to insight associated analytics are possible. An example of
and other forms of traditional analytics, with spreadsheets. In speaking with these concepts is in the sidebar.
it often takes longer to do the analysis SMEs, this provides them with ability to Attaining these objectives will be
than the batch takes to complete. This do the right thing by quickly examining possible, as mentioned earlier, by the
means batches are discarded rather a given data set with context, data, and continuing innovation in software that
than fixed during the cycle time, so priorities as a framework for priorities. has defined every aspect of our person-
al and professional lives over the past
The end goal of future analytics: enable the right 30 years. Undermining the change are
decision in time to improve the outcome. paradigm shifts in where and how ana-
lytics will be executed.
the right thing—finding and fixing the Thus, the end goal of future analytics:
problem during the cycle—does not enable the right decision in time to Cloud and on-premise edge
have a chance to happen. Another improve the outcome. This is why the computing
example is where there is a question of previous points—a complete view of Analytics workloads are particularly
the right course of action for an asset plant health and requirements and an suited for the cloud because most use
versus a unit or overall plant objective, empowered engineer—are so impor- cases require the scalability, agility,
where it may be better to postpone a tant. Only with the full context of pri- quicker deployment, and lower costs
maintenance action to achieve a more orities, costs, and requirements can the associated with the cloud to analyze
important goal, such as continuing right decision be made on a consistent more assets and processes. Therefore,
production. basis. Rather than a “prescriptive” ap- companies of all types, including pro-
A SME should be able to see and proach that assumes all states, require- cess manufacturers, are moving their
identify the trade-offs and make the ments, and outcomes may be defined IT infrastructure and data to public and
right decision to optimize overall out- and known in advance, SMEs and other hybrid clouds to access on-demand
comes. This is transformative analytics: plant employees can analyze and make computing resources. And for those
a break from the past tense approach decisions in the moment because fast companies not willing to move their

Always get a
star performance
every time

Whether you’re designing control systems or programming PLCs,


you need to know the core products are going to perform like stars.
Fast Shipping Guaranteed!
Festo’s Stars of Automation offers you a one-stop solution for products, 24 hours 5 days or less
with over 4,000 quality-engineered, high-performance components.
For great value, look to the stars. Choose Festo.

Discover all the Stars that will brighten


your automation process at Festo.us/stars

INTECH JANUARY/FEBRUARY 2020 21


CONTINUOUS AND BATCH PROCESSING

Figure 3. Advanced analytics software empowers engineers and other experts to interact directly with data of interest, and to easily
share results across an organization.

data to the cloud, the cloud is coming model for big data storage in process What has happened is that vendors
to them in on-premise hardware solu- manufacturing—on premise, historian- have recognized there is too much data
tions with cloud platforms, such as based, and proprietary—is undergoing from too many sensors, and potentially
AWS Outpost or Microsoft Stack. Pro- a transition, enabling new alternatives of too many types, for one person to
cess manufacturers will therefore likely for how and where analytics are run. simply solve problems manually with a
use a mix of public and private cloud The new model might be a data lake for spreadsheet. Therefore, through the in-
offerings, as well as on-premise com- data aggregation, on-premise or in the troduction of machine learning or other
ponents, for analytics. cloud, or a comprehensive Industrial analytics techniques, engineers’ efforts
The trend is in its infancy, though Internet of Things solution, such as a are accelerated when seeking correla-
some industries are ahead in embracing next-generation data storage platform. tions, clustering, or any needle within
the cloud, for analytics as well as other At a minimum, current process histo- the haystack of process data. With these
use cases. Consequently, the big public rian vendors need to introduce road features built on multidimensional
cloud platforms are paying more atten- maps with safe passage for data from models and enabled by assembling
tion to the largest sources of data, with on-premise offerings to the cloud. data from different sources, engineers
manufacturing leading all sectors of the gain an order of magnitude in analytics
economy in terms of data volumes. Advanced analytics capabilities, akin to moving from pen
For example, Microsoft, Amazon, Spreadsheets lead the way in analytics and paper to the spreadsheet (figure 3).
and Google have specifically focused today, but this general-purpose tool is
on the oil and gas sector as a starting not suited to the task of implementing Engineer’s tool
point for their efforts. This is clearly a predictive and prescriptive analytics. Advanced analytics innovations are not
sign of market interest, and it is also a Replacing spreadsheets comes with a a black box replacement for the exper-
sign of the maturity of the cloud offer- new entry to the dictionary: “advanced tise of the engineers, but a complement
ings: Amazon brought out AWS in 2002, analytics.” Just as adding “smart” to and accelerator to their expertise, with
and then introduced S3 (storage) and a noun denotes a thing with sensors transparency to the underlying algo-
EC2 (virtual machines) in 2006. Cloud for telemetry and remote monitoring rithms to support a first principles ap-
computing competition then increased services (e.g., smart refrigerator, smart proach to investigations. It is a natural
with Microsoft’s and Google’s cloud parking lot), adding “advanced” to “ana- next step in the history of statistical and
platform introductions in 2008. lytics” brings analytics into a modern control processes, rather than a data
What this means is that the current framework to address today’s challenges. science approach to investigations.

22 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


CONTINUOUS AND BATCH PROCESSING

Predicting sewer spills

Municipalities use wastewater


treatment pump or lift stations
to keep waste flowing through
the system by increasing sew-
age pressure. Municipalities
monitor flow rates to determine
if there is too much wastewater
at a station, and to see if pumps
are cycling too frequently.
When the process goes awry,
raw sewage can spill out of man-
holes or other apertures. A field
team can of course be dispatched
to clean up the result, but the util-
ity is not always the first to know
about the spill. In fact, the first
notification of a wastewater spill
often comes from a member of
the public, hours and sometimes
days after the spill. This model was used to detect a blockage and potential sewage spill 13 hours before the event,
This can intensify public health giving personnel time to take corrective action.
and environmental effects and
the cost of clean-up efforts, including associated fines. Following an abnormality and possible blockage.
a sewage spill at an environmentally significant site, one mu- The blockage model gives the utility the opportunity to head
nicipality sought a way to reduce the likelihood and impact of off spillages, safeguarding the environment while improving
future spills. public perception. It is also an example of many of the concepts
The utility now uses Seeq for an online sewer blockage de- described in this article, including the democratization of assets
tection system. The team developed a blockage model based (predictive analytics on a lowly pump, not a massive turbine),
on data from a recent spill, and this model detects blockages engineer-led solution definition, and access to insights in time
much faster than previous methods. With advanced analytics, to affect outcomes. The figure shows monitoring of the waste-
the model identifies blockages by detecting the absence of water lift station pump operation to detect blockages in the
“normal fill and pump behavior” in near real time. The absence system, and it shows how repair crews are given sufficient time
of pump runs or extended fill time during peak times signifies to correct the problem before an overflow occurs. n

At the same time, advanced analytics status quo. Using advanced analytics, application companies, and prior to that
recognizes the path to quicker insights insights will be shared to enable the worked with Microsoft for 20 years. Risse
must leverage innovations in adjacent required collaboration among experts is a graduate of the University of Wiscon-
areas to address the scope of data avail- within a single process plant and across sin at Madison, and he lives in Seattle.
able for investigation. an entire organization. These develop-
View the online version at www.isa.org/intech/20200202.
Wrapping complex functionality in ments will work in concert to advance
easy-to-use interfaces is a common ex- analytics from backward to forward
RESOURCES
perience in our lives as consumers, for looking, enabling process plants and
example, the ability to search in Google. facilities to spot developing problems “Analytics next: Beyond spread-
These same approaches are now being and close control loops. n sheets”
adopted by analytics offerings for engi- www.isa.org/intech/20190802
neers in process manufacturing. ABOUT THE AUTHOR
“Empowering an effective PAT
Michael Risse (michael.risse@seeq.com) is
methodology”
Looking forward the CMO and vice president at Seeq Cor-
www.isa.org/intech/20190402
We are nearing the end of an era de- poration, a company building advanced
fined by on-premise data collection analytics applications for engineers and “What’s next for big data in process
and spreadsheet-based analytics as the analysts to accelerate insights into in- manufacturing”
next generation of predictive, engineer- dustrial process data. He was formerly www.isa.org/intech/20180601
led, and timely analytics replaces the a consultant with big data platform and

INTECH JANUARY/FEBRUARY 2020 23


Better performance
begins at the edge

IIoT advanced computing happens on the factory floor

D
By Rich Carpenter iscrete manufacturers and original Engineers and designers of manufacturing
equipment manufacturers (OEMs) are and OEM systems develop expertise integrat-
experts when it comes to operating ing the right automation platforms to obtain
their equipment. They run and develop these the necessary functionality, even though this
systems daily, always learning and improving. task may not be their core strength. They are
Once stable operation is established, these aware of the need for good operating metrics
companies must proceed to incorporate tech- and are looking for smart ways to add them to
nologies and methods, such as data analytics, an already functional system.
to improve performance. Cloud-based analyt- A lot can be learned by observing a system in
ics are an option, but many users have discov- operation and obtaining user feedback. How-
ered it is expensive or against established infor- ever, quantitative values, such as throughput
mation technology (IT) policy to move data for rates, failure counts, change-over frequency,
all analytics to the cloud. and other data, are usually needed to support

24 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


DISCRETE MANUFACTURING

FAST FORWARD
l Data analytics provide valuable feedback to optimize maintenance,
increase uptime, and improve real-time control.
l Industrial data sources include sensors, controllers, and smart devices
at the operating edge, so it makes sense to collect, preprocess, and
analyze data locally.
l Only transport data as appropriate to the cloud. Edge data can be
analyzed locally to make better control decisions and then cleansed,
transformed, and packaged for transmission to the cloud.

article addresses the value of analytics for in-


dustrial manufacturing applications and com-
pares edge processing solutions.

What are analytics?


Analytics projects require the historization of
vast amounts of raw data, but this alone does
not create business value. Instead, such value
is only realized through better comprehension
of how a system is currently running and how
it could operate better. Analytics are any evalu-
ation of raw data to improve it into useful infor-
mation, which in turn can give users insights to
help them increase throughput, improve qual-
ity, and optimize maintenance.
Acting based on analytics results may be a
procedural activity initiated by engineers or
operators. In some cases, it is now possible to
directly and programmatically use analytical
results to inform control platforms about im-
proved operating parameters.
Programs for applying analytical methods
can operate in many locations. They may run
Figure 4. Edge devices and controllers on edge-located controllers, on site-located sys-
can combine control platform data
tems, or in the cloud. Some analytics projects
with other externally sourced data,
analyzed in context with each other, to may operate in two or all three of these locations.
provide an informative HMI experience.
Edge data sources
Part of the reason analytics are becoming more
relevant is due to the increasing richness of
more in-depth analysis. Automating the data available data. For manufacturing and machine
gathering process is the most effective way to control applications, the data needed to support
obtain enough source information for analyz- analytics can come from any sort of edge-located
ing how a system is running and where it can be basic sensor, smart sensor, smart instrument,
improved. digital device, or more complex local system.
The need for improved operations, coupled Collectively, increasingly intelligent edge-located
with emerging types of powerful edge com- sensors and devices are generally known as
ponents, is driving more data processing, and Industrial Internet of Things (IIoT) devices.
sometimes analytics, to be performed at the A simple photo eye can indicate how many
edge. Where appropriate, the results may also times a machine cycles or a part is produced.
be sent to the cloud for comparison across mul- Instruments monitor pressures, flows, and
tiple plants or for OEMs who have equipment power consumption. Smarter subsystems may
distributed across a diverse customer base. This calculate uptime, energy use, and quality pa-

INTECH JANUARY/FEBRUARY 2020 25


DISCRETE MANUFACTURING

plant-level data analytics needs, the sources and can offer many benefits
cloud-only method is not usually the for processing and analyzing this data
best solution. There are examples of pre- closer to the edge.
dictive maintenance performed on high-
value equipment using data sampling Edge analytics advantages
techniques at the edge to provide early Due in part to the growing capability of
warning signs of failing equipment. industrialized hardware and associated
The edge of any industrial system software, it is more practical than ever
is the natural place to begin an ana- to perform advanced computing at
lytics initiative because that is where the factory floor with a range of edge-
the source data is created. Many data capable component options (figure 2).
points may be involved, and each point Some advantages of edge analytics are:
can potentially have a high sample rate. l improved data privacy
Common sense informs us it might l better data fidelity and responsiveness
be burdensome and perhaps costly l resilience against data transmission
to transmit all this data to the cloud. interruptions
Figure 1. Smart edge devices like this Emer- Edge-located preprocessing of the raw l reduced data communications
son PACMotion VFD can provide extensive
data about operation, energy consumption,
data refines it into more concise values. l a better opportunity to “close the

and diagnostics—if the right edge compo- Traditional analytics were based on loop” for control
nents are in place to obtain it. data obtained mainly from equipment Many companies are rightfully
control systems, because those digi- concerned with data privacy. Data ob-
tal systems were already connected to tained at the edge and analyzed at the
rameters. Smart manifolds offer early the sensors for command and control. edge is easier to secure, generally be-
indication of air leakage, which leads to Furthermore, the computing resources cause it is kept local. Even if the data
excess energy consumption and higher needed for storing data and analyzing must be transported to analytics ap-
operating costs. There are many other it were only available at the server or plications located elsewhere onsite, or
examples of smart edge devices like perhaps desktop computer level. in the cloud, the latest edge controllers
variable speed drives (VFDs), analyz- Today, many end users are embark- and devices use modern and secure IT-
ers, power meters, and intelligent valve ing on IIoT initiatives and taking ad- based protocols for communicating.
controllers (figure 1). vantage of IIoT devices to obtain rich Data generated using traditional op-
All of these may provide multiple new data streams, economically by- erational technology–based devices,
data streams using conventional wiring passing traditional control systems. A most commonly programmable logic
and networked signals or newer wire- new generation of edge-capable com- controllers (PLCs), may lack security
less connections. The data typically in- ponents are best suited to interface measures or may have added-on se-
cludes one or more near-real-time pro- with the growing number of IIoT data curity instead of built-in security. Con-
cess variables, and other less-real-time
extended configuration and diagnostic
information.
In addition, data sources can include
less traditional digital sources like the
Internet and company intranets, which
have information relevant to production
processes, such as raw material prices,
energy prices, weather conditions, and
demand for finished products. Gather-
ing the data effectively calls for install-
ing the right technologies in the right lo-
cations to obtaining it from many types
of sources on varying time scales.

Importance of edge processing and


analytics
In recent years, there has been an em-
phasis on cloud computing, which is
a good method for aggregating many Figure 2. The availability of increasingly powerful edge processing industrialized hard-
sources of data. However, for many ware and software means computing can easily be performed on the plant floor.

26 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


DISCRETE MANUFACTURING

to an operating process without requir- found in a typical PLC, including sup-


ing operator intervention. Analytics port of IEC 61131 languages.
performed closer to the edge, some- The architecture of modern edge con-
times onboard the same component as trollers includes support for open-source
the real-time controller, are more read- capabilities, allowing companies to rap-
ily integrated back into the automation idly incorporate IT-friendly languages,
control platforms, without the many protocols, and concepts like Python, OPC
interposing communication layers in- UA, web servers, and databases. Edge
volved with cloud-based solutions. controllers are analytic-friendly and can
host third-party applications to help end
Ways to integrate edge analytics users reach their analytics goals.
As noted previously, PLCs convention- Edge controllers have the capability to
ally have supplied much of the indus- run nondeterministic analytics or con-
trial edge data used for analysis. This nect to a cloud infrastructure for addi-
is changing as IIoT devices are more tional information, and the unique abil-
widely incorporated, and because edge ity to directly bring this information into
components are gaining better process- the deterministic control scan in order
ing and networking capabilities. to apply more informed decisions and
The three leading edge components optimize plant processes. This ability for
are controllers, devices, and gate- connected equipment, like connected
ways—each with varying capabilities people, to make more intelligent deci-
for gathering, transmitting, and pro- sions is driving a major transformation
Figure 3. Advanced edge controllers, cessing data for industrial systems. in the industrial space.
such as Emerson’s Outcome Optimizing Edge controllers can perform extensive Users can install edge controllers in
Controller, provide robust automation on data preprocessing and run analytics new greenfield applications, initially
a real-time operating system, with the applications, in
added advisory and analytical capabilities
addition to ex-
of Linux-based processing.
ecuting real-time
control (figure 3).
ventional systems can be preserved and Edge devices may PROComSol
Process Communications Solutions
interfaced by edge computing devices. perform local an-
They can secure them, perform analyt- alytics but are not
ics, and provide upstream connectivity. involved in con- Convert your mobile device into a
Another important reason to move trolling equip- full featured HART communicator.
analytics to the edge is because the ment. Gateways
data source is closer to the processing, perform little or
providing near-real-time fidelity and no data prepro-
responsiveness with minimal commu- cessing prior to
nications. Certain analytics require this transmission.
performance. While each
Cloud-based analytics, on the other of these com-
hand, must use data that is potentially ponents plays a
time delayed by transmission, suffering role, edge con-
from longer sample rates, and subject to trollers are the
transmission interruptions. Edge-based most capable of
analytics avoid most of these issues. the three. This
Even when data must be transferred new class of
to higher-level systems, edge analytical IIoT controller
ProComSol, Ltd is a leader in the design and manufacture of
results may be a much smaller data set includes all the
advanced, cost-effective, and reliable HART communication
than the entire amount of source data capabilities of products for the Process Control marketplace.
points. Moving data, especially at high edge devices and
216.221.1550 sales@procomsol.com
resolution, and cloud storage for large edge gateways,

procomsol.com
amounts of data, can be cost prohibitive. combined with
Edge analytics have also enabled a the high-speed
much better solution for “closed-loop” deterministic
operations by directly applying results control features

INTECH JANUARY/FEBRUARY 2020 27


DISCRETE MANUFACTURING

using them as PLCs but eventually ex- tributed set of assets. The edge gate- improvement, of their industrial sys-
panding their role to include analytics. way connects to the asset, packages tems. They also know there may be
Or, edge controllers can be retrofit into the data, and transports the data to a large quantities of untapped data in
brownfield systems to add analytical and cloud or hosted infrastructure. This IoT sensors, smart field devices, and
IIoT capabilities. consolidated data is often accessed in even existing OT systems. However, the
order to check the health of the equip- idea of creating an overarching cloud-
Edge alternatives ment, avoiding the significant expense based system to take advantage of the
Although edge controllers are the most of travelling to each site. data can be daunting.
complete option, other edge compo- Edge devices typically augment an The availability of powerful edge
nents like devices and gateways can be on-premise machine or plant by col- components enables another practi-
used as cost-effective alternatives or in lecting data from the device, aggregat- cal approach. Installing modern edge
conjunction with edge controllers in ing it with other information available, controllers and edge devices is a com-
some applications. Edge devices typi- and then analyzing this data to opti- paratively easy way to begin taking
cally support local applications with mize control decisions. For example, advantage of analytics. These edge
analytics on the device and can com- the edge device may combine pro- components can perform the analyti-
municate data like an edge gateway. duction data from a machine control cal role themselves or support future
They are a good fit for use in conjunc- system with data collected through cloud-based systems.
tion with an existing control system supplementary sensors added outside There are many reasons to keep ana-
that will remain in service, when it is of the control platform—such as for lytics close to the field, especially to ob-
desirable to add analytics capability. vibration, pressure, and temperature— tain the best data fidelity and commu-
An edge device might be used when and use this information in context to nications robustness. More compelling
the analytics require high-fidelity data, detect overall process problems and for some applications is the ability of
which can require too much network support a human-machine interface edge controllers to close the loop by di-
bandwidth to transfer to the cloud or (HMI) (figure 4). This processing, for rectly using analytical results to inform
where the cost of cloud systems and example, could observe an increase in the real-time control system of optimal
storage is too high to be practical. Be- air pressure required to manage ma- operational settings. n
cause they are installed local to the chine motion, which could indicate
source data, they are also a good ap- leaks in the system. ABOUT THE AUTHOR
proach when gaps in data collection An edge controller is more like a
Rich Carpenter
due to network connectivity issues modern car, where the driver still per-
(Richard.Carpen-
would otherwise significantly affect the forms direct control but is advised
ter@emerson.
quality of the analytics. by an onboard navigation system as
com) is the general
Edge gateways typically include pro- to the best route. A real-time operat-
manager for prod-
tocol drivers to connect to plant con- ing system (RTOS) portion of the edge
uct management
trollers as well as cloud connectors to controller manages the deterministic
for Emerson’s Ma-
connect to leading cloud infrastruc- control system, while a second general-
chine Automation
tures such as Microsoft Azure and the purpose operating system (OS) side
Solutions business unit and has respon-
Amazon IoT cloud. The purpose of the may be connected to IoT devices and
sibility for its portfolio of control system,
edge gateway is simply to collect data broader information available from
operator interface, industrial PC, and
from industrial devices, package it, and supervisory computing and even the
Industrial IOT software and hardware
send it to industrial clouds, whether Internet. The RTOS and the OS may
products for industrial automation.
public or private. constantly exchange information to
optimize production processes. For View the online version at www.isa.org/intech/20200203.
How companies are using edge example, the controller side may be
analytics managing reservoirs of water as they
RESOURCES
Manufacturers and OEMs are learning move through a purification process.
“AI equipment health monitoring
how to implement edge analytics, and The general-purpose side may be
and prediction technology”
it is not an all-or-nothing proposition. checking the forecasted energy prices
www.isa.org/intech/20181205
They can start in just one targeted area, and communicating to the control side
apply edge analytics concepts as sup- the optimal time to run equipment for “Digitalization delivers value and
plementary to already-operating con- energy savings. competitive advantage”
trols, or choose new platforms and use www.isa.org/intech/20190603
the available capabilities progressively Start with analytics at the edge
“Digital transformation creates new
as needed. End users are aware that analytics ini-
opportunities for system integrators”
Edge gateways are typically used to tiatives are an important avenue to
www.isa.org/intech/201904channel
get visibility to a geographically dis- better understanding, and therefore

28 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


GLOBAL
CYBERSECURITY
ALLIANCE

THE TIME IS NOW

Industrial Cybersecurity
is a Global Imperative
It’s time to join forces. We are stronger together.
The ISA Global Cybersecurity Alliance is an open, collaborative body.
We welcome members of all kinds:
• end-user companies • services providers
• asset owners • system integrators
• automation and control systems • industry organizations
vendors • government agencies
• cybersecurity technology vendors • insurance companies
• IT infrastructure vendors • other stakeholders

Founding Members:

ICS Cybersecurity. Safety. Compliance.

TM

STAY PRODUCTIVE, STAY SECURE

International Society of Automation


Setting the Standard for Automation™
Traceability improves
food and beverage
production
By Steve Winski
Systems combine to better monitor and control
product and packaging

A
s food safety becomes more and more labels, bar codes, date codes, and even nutri-
a concern, the ability to track products tional and allergen information. One answer to
within a facility is of vital importance this is a continued focus on traceability, which is
to manufacturers and consumers. In 2018, the a challenge many food and beverage companies
Food and Drug Administration (FDA) reported face. When you know where your product is and
137 product recalls due solely to misbranding what is happening around it at all times, you
and undeclared allergens. These are all classi- are able to better control the environment sur-
fied as Class 1 recalls where, under FDA regula- rounding it and avoid potential waste, rework,
tions, there is a significant risk to health. and even product recalls.
Not only do these recalls have significant con- And though traceability is a primary end
sequences to public health, they also put com- goal for many food and beverage companies,
panies at risk. A Deloitte study on recall execu- accomplishing it is not always easy. Many
tion effectiveness estimates that a food recall companies have track and trace systems in
can cost a company up to 10 million dollars. In place that monitor and control packages and
addition, a company’s stock price can decline products, but they are often incomplete. The
up to 22 percent within two weeks after a recall solution to this is finding a more comprehen-
is announced. sive software and sensor solution to provide
As consumers demand more accurate and a complete package and product monitoring
clear information on purchased products, it is and control system to track and trace products
up to manufacturers to improve packaging, throughout the facility.

30 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


OPERATIONS AND MANAGEMENT

FAST FORWARD
l Traceability in the food and beverage industry enables manufac-
turers to eliminate human error, improving efficiencies and increas-
ing productivity.
l Complete coding management and packaging verification solutions
are insurance against coding and packaging errors.
l With a modular sensor and software solution, manufacturers can
ensure their products will leave the factory in the right packaging
with the correct label and coding information.

What causes labeling and packaging errors print a poor-quality code that is illegible and
With the increasing complexity of packaging types, needs to be redone. Although eliminating these
it has become more challenging for food and bev- errors may seem impossible, it is really easier
erage manufacturers to reduce, if not eliminate, than you might think. When you catch these
errors in coding and packaging products. This is errors early, you can avoid significant produc-
particularly important in situations where mis- tion losses in time and money.
takes can cause a risk to consumer health. “One simple mistake on packaging lines can
Errors in the packaging process happen for a result in huge commercial damage to your busi-
number of reasons, but many of these errors are ness: both in financial loss and damage to brand
human error. For example, the wrong date code and customer confidence,” said Mike Hughes,
being entered into the printer can cause waste managing director of AutoCoding Systems.
and rework. “Even if you are lucky enough to identify an er-
One of the more common mistakes is be- ror before it enters the distribution chain, it’s
cause of the frequency of artwork changes and likely that you will still incur significant rework
promotional offers. It is increasingly difficult for or scrap costs to rectify the problem. And there’s
manufacturers to eliminate errors on packaging an added risk of shorting customer deliveries on
lines because of the sheer number of products shelf-life critical products.”
being produced in different packages, especial-
ly when temporary promotional packaging is Taking steps to remove human error
implemented. When the incorrect packaging is Sensor solutions play a large role in the pro-
selected, the entire batch needs to be scrapped, duction of food and beverage products. In ba-
producing significant waste. sic track and trace systems, sensors are needed
Other errors can occur from the printer or to identify one- and two-dimensional codes,
coder. A coder may fail to print, or a printer may read and write to radio frequency identification

INTECH JANUARY/FEBRUARY 2020 31


OPERATIONS AND MANAGEMENT

are avoided entirely. With these types of entered into a secure database, thereby
solutions, you gain better control over allowing validation before use. The
your packaging line and the integrity of stored data is used to set up and con-
your products. trol the relevant devices on the packag-
Job setup and changeover time is ing line. This removes the need for op-
also dramatically reduced. When man- erators to program the devices and, in
ually setting up a packaging line, it can turn, removes the risk of human error.
take up to 15 minutes, with quality pa- However, one challenge with some of
perwork adding another five minutes. these systems is they may require the
This 20-minute time frame can be re- use of a single manufacturer’s “network-
duced down to one minute or less with ing systems.” What is needed is a solu-
a comprehensive solution such as this. tion that works well with all equipment
“By automating the setup of your typically found in a packaging line. This
Vision sensors can verify the correct code coders and other packaging line devic- means you will not have to make costly
was used and that it actually printed. es, potentially to the point where you changes to your packaging line just to
can receive instructions directly from get it implemented but can use a single
(RFID) tags, and provide high-resolu- your ERP [enterprise resource plan- system to control multiple devices from
tion images for downstream processes. ning] or MES [manufacturing execution different vendors. The devices may
The most common solution used in system], you save on downtime and re- perform different functions—coding,
these systems is bar-code readers— duce the number of repetitive, low-val- inspection, labeling, and verification—
used primarily to identify markings ue tasks your staff would otherwise car- but they all exist on the same line. So,
and codes on packages. But a track ry out on a day-to-day basis,” Hughes for your convenience, you want to be
and trace system goes beyond just bar- said. “It’s also important to have the op- able to control them easily.
code readers. It also encompasses vi- tion to build on your chosen solution’s With a system like this, you can set
sion solutions, Ethernet, software data- core functionality to add features like up and control all types of packaging
bases, and more. Greater functionality OEE [overall equipment effectiveness] line equipment, including multiple
is possible when using a comprehen- reporting, paperless quality control, brands of printers, labelers, check-
sive software database that connects inspection reporting, and more.” weighers, metal detectors, and x-ray
with sensor technology. equipment. This increases your trace-
Complete coding management and Control the packaging line ability throughout the facility, as every-
packaging verification solutions are To keep up with a changing business thing can remain connected, regardless
insurance against potential coding environment, new technology, and de- of the supplier.
and packaging errors. You will gain in- manding consumers, food and bever- In addition, an automatic solution
creased speed, reliability of line setup, age manufacturers are acknowledging should manage the entire packaging
and reduction in job changeover time. that automation must play a signifi- workflow process. From making art-
Modular sensor and software prod- cant role in their factories to improve work changes in the system database
ucts can eliminate the risk of coding efficiency and reduce costs. As such, to equipment setup to retrieving prod-
and packaging errors that can lead to the need for equipment connectiv- uct information from the database, you
emergency food recalls. When imple- ity on the factory floor has never been want better access to all data on your
mented on packaging lines, companies more prominent. For equipment and
can effectively manage the deployment applications to work together with
of coding and data and the checking of minimal human intervention, they
packaging before products leave the need to be able to communicate, share
factory. data, and report back on performance
Essentially, software verifies that all and quality.
coding data and packaging is correct. A modular sensor and software pack-
Vision sensors then verify that the cor- age is very effective at helping to meet
rect code was used and that it actually a retailer’s code of practice related to
printed, helping to validate codes and coding and packaging verification.
prevent recalls for food safety before However, there are additional capabili-
products leave the facility. This leads to ties that can be rolled into packaging
increased traceability and accountabili- lines for process improvement reasons,
ty for food and beverage manufacturers. not just for compliance reasons.
By catching mistakes at the source, Information relating to a product Packaging verification solutions with an
significant changeover delays or re- (i.e., date coding rules, packaging art- image-based code reader can even detect
work to recode or correct the packaging work, bar codes, coding profiles) can be codes on shiny surfaces.

32 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


OPERATIONS AND MANAGEMENT

packaging line so you can make better al trend is that these compliance-driv-
decisions to remain competitive. en requirements are becoming more
A complete solution like this gives detailed and prescriptive,” Hughes
the consumer goods industry a way to said. “The audit regime, particularly
greatly reduce date-coding errors and if your business manufactures on mul-
downtime related to product change- tiple sites for multiple retailers, can
overs. You will have dynamic control become exhausting. One group tech-
of your packaging line, ensuring that it nical director recently told us that on
stops if a device malfunction is detect- average, one of his sites is being audited
ed or if there are too many misreads or somewhere, for something, every cou-
no-reads detected from a sensor. ple of days.”
With a paperless system, product
Add modules for functionality traceability is at an all-time high. Infor-
Any automated system should be mation becomes available to anyone in Capabilities can be rolled into packaging
scalable with the potential to add ad- the system, instead of just those who lines for process improvement reasons,
ditional functionality as required. A have access to the paper. not just for compliance reasons.
modular sensor and software solution
can provide additional features that Packaging line problems A multitouch human-machine-inter-
address very specific challenges man- A modular sensor and software system face was implemented, using a hand
ufacturers face. that can verify packaging and cod- scanner and RFID reader for user login.
Extensive reporting is available from ing issues has value in many different This gave operators a robust and reli-
inspection devices like checkweighers industries. In one instance, a major able interaction point with the system.
or metal detectors to provide access global manufacturer of pet food re- In addition, the software faithfully elim-
to more data on your packaging line. quired a solution that would address a inated coding and packaging errors.
You can also receive line performance number of issues it was experiencing. On the company’s primary packag-
reporting to capture real-time manu- ing lines, secure deployment of the ex-
facturing data with accurate reports. USER EXAMPLE piration date and other data was sent to
These reports display your packaging Print correct date codes the coders. The printer is automatically
lines, devices, and product perfor- The manufacturer’s main pain points set up with the correct coding informa-
mance. This helps improve your over- were printing the wrong date code on tion. The line also stops entirely if the
all equipment effectiveness to drive products, not printing date codes on printer goes into a fault state.
gains in throughput and efficiency to products, and selecting incorrect pri- The sensors on the system detect
increase profitability. mary and secondary packaging for whether or not a code is present. If one
Additionally, a pallet labeling sys- the products. As a result, it looked to “No Read” is detected, it will reject the
tem is available for auditable and con- a modular solution for software and product, but not stop the line. If more
trolled labeling of pallets from differ- sensors to solve all of these problems. than three “No Reads” are detected, the
ent lines with information like batch
code, order ID, line ID, stock keeping
unit (SKU), and SSCC18 (serial ship-
ping container code) information.
Better reporting allows for more ef-
fective coding automation and the
automatic generation of batch codes
and best by dates. This all drives line
availability and improves the overall
packaging process.
Finally, you can make your quality
control process paperless. Digitizing
quality checks allows you to incorpo-
rate in-line and off-line quality control
processes into a workflow control. Data
is then recorded in the audit trail to
utilize electronic reporting.
“A purely manual, paper-based sys-
tem is becoming challenging for many
manufacturers to maintain. The gener- Accurate detection of codes on packaging of all shapes and sizes is essential.

INTECH JANUARY/FEBRUARY 2020 33


OPERATIONS AND MANAGEMENT

entire line will stop until the problem Coding management and packaging verification
is fixed. This means the company can
Coding and Scanning and Metal detection
get ahead of the problem before it re- labeling inspection and checkweigher
sults in significant waste and potential
recalls.
For packaging errors, a verification
process was put in place. Expiration
dates and other data is sent to the car-
ton printers. Sensors verify correct
packaging using inline checking of bar Line interlocks via
codes. They also verify that the correct I/O controller
code is placed on the box. Reporting Quality Data
control

USER EXAMPLE Value-add modules for increased functionality


Identify similar packaging
In another example, a major prepared
meals company needed to differen-
tiate between products with similar Coding and Scanning and Metal detection
labeling inspection and checkweigher
packaging. The company manufac-
tured a number of different soups and Packaging line activity can
sauces, all of which used very similar be viewed remotely via a
web browser on a PC,
tablet, or smartphone
packaging. As a result, incorrect pots
were often used with products. In ad-
dition, numerous product change-
overs led to increased downtime while Line interlocks via
waiting to manually set up the equip- I/O controller
ment. Reporting Quality Data
All this was solved with a modular control
approach. Various bar-code scanners
now scan every spinning soup pot to How a coding management and packaging verification solution works.
confirm the correct one is being used.
Expiration dates and other data are a significant amount of time to retrace label and coding information. This
sent to the printers and then verified by the problem to where it started. The comprehensive package and prod-
sensors. Packaging errors were greatly manufacturer was fortunately able to uct monitoring and control setup can
reduced, if not entirely eliminated, and save the product, but workers had to eliminate these errors.
the system was better able to accom- remove the incorrect labels and run Additionally, by automating the
modate the various product change- them down the line again to replace setup of printers and other packag-
overs, leading to increased uptime. them. To avoid high labor costs for ing line devices, with the potential to
quality control, the company decided link directly to an MES or ERP system,
USER EXAMPLE on a vision sensor and software pack- there is a significant reduction in job
Prevent incorrect labels age that more reliably detects mistakes setup and changeover time. By reduc-
Another company utilizes a modular and avoids rework. ing downtime, the packaging line can
system to ensure the correct labels are run for longer periods with improved
used for each product. The company Future-proof traceability efficiency and increased productivity. ■
uses similar packaging for all products, Packaging and coding mistakes ac-
but each product type needs a differ- count for a high proportion of food ABOUT THE AUTHOR
ent side label, top label, and bottom product recalls, having a devastating
Steve Winski (Steve.Winski@sick.com) is
label attached. Because the packaging impact on food manufacturers’ brand
the national sales manager for consumer
and each individual product look very and business costs. Taking appropri-
goods at SICK, Inc., based in Minneapolis.
similar to one another, the manufac- ate measures to prevent such a recall
He holds a BS in computer and electrical
turer was running the wrong labels on has to be a priority for food and drink
engineering from Purdue University and
packaging. suppliers.
has more than 35 years of experience in
When this happened, the entire With a modular sensor and software
controls, automation, and manufacturing
line had to stop and then workers solution, manufacturers can ensure
software.
needed to backtrack and find where their products will leave the factory in
the incorrect labeling started. It took the right packaging with the correct View the online version at www.isa.org/intech/20200204.

34 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


Training: 14 April 2020
Conference: 15–16 April 2020
Moody Gardens Hotel
Galveston, TX, USA

ISA is proud to introduce a new conference Conference topics include:


focused on the vast world of Industry 4.0. Dive • Navigating the IIoT Landscape
into the technologies transforming almost every • System Design & Architecture
vertical industry. Attend thought-provoking • Cybersecurity & Safety
keynotes and technical sessions and enjoy • Implementation & Management
unique networking opportunities with industry • Smart Manufacturing
experts from areas including connectivity, • Digital Transformation
cybersecurity, and much more. • AI/Edge Computing
• Industrial Communications/Network
www.isa.org/iiot Technologies

International Society of Automation


Setting the Standard for Automation™
DATA SCIENCE

Applying data science to hazard analysis the information developed during PHA.
It would seem that you should be able to
Pump seal simply press a button, and switch from
Pump failure – viewing the data as a PHA to viewing it as
discharge Leakage a LOPA, then a hazard register, and finally
valve fails of process Pool fire as a bow-tie diagram. Further, it seems
closed like you should be able to make edits to
the bow-tie diagram and have them cas-
Operator SIS – Ignition cade back to the LOPA study, and then
action based Low flow control – you should also be able to view the quan-
on LAL shutdown Probability titative aspects of the LOPA while you are
of ignition viewing the bow-tie diagram.
Unfortunately, this is not currently
the case. At the current moment, each
of these different uses of PHA data use
Inadvertent Toxic vapor different software applications, each
closure of exposure of which use different data structures
discharge to represent data. Even worse, the data
valve SIS – structures in the different applications
Low flow for different study types are completely
shutdown and irreconcilably different from each
other such that data cannot be shared
Figure 1. Typical bow-tie diagram.
between applications.
To address this situation and maxi-
properly designed, implemented, and riers.” Barriers are events, systems, or mize the utility of the data that the pro-
maintained. These lists of significant situations that prevent the cause from cess industries are investing in, a few
hazards and information relating to resulting in the loss of containment changes need to be made in how PHA
them are typically referred to as haz- scenario—which in bow-tie analysis is performed and documented. First, a
ard registers. While hazard registers jargon is typically referred to as the change in the mindset about how PHA
became a powerful tool for manag- hazard or hazardous event. Barriers facilitators document studies will be re-
ing risk, understanding the hazards between the cause and the loss of con- quired. Facilitators must be willing to
and communicating them throughout tainment are referred to as “preventive” document studies based on where the
the organization and even to external barriers as their successful operation hazard manifests itself as opposed to the
stakeholders was difficult due to the prevents the loss of containment from location of the cause of the hazardous
highly technical nature of the infor- occurring. event. But most importantly, industry
mation and the dense use of acronyms On the right side of the bow-tie knot is needs to move to a common, consistent,
and jargon. the description of what occurs after the standardized data structure for PHA: the
loss of containment. This consists of a unified hazard assessment.
Bow-tie diagrams series of consequences that can occur as
To aid in the understanding of hazard a result of the loss of containment event, Basics of structuring data
scenarios, the visualization technique with lines drawn from the “knot” to the Before delving specifically into the
of bow-tie diagrams was developed. consequences. As with the causes, all problem of defining a consistent struc-
When a hazard scenario is visualized as of the consequences may have barriers ture for PHA data, we should begin by
a bow-tie diagram, it is a graphical repre- that will either prevent or mitigate (i.e., discussing how data is structured in
sentation of the development of the sce- reduce the magnitude of) the conse- general. Although this section will rely
nario. The bow-tie diagram reads from quence if they operate effectively. on terminology that was developed for
left to right (figure 1). On the left a series The key benefit of the presentation relational databases, it is applicable to
of causes of the hazardous event are list- of a risk scenario as a bow-tie diagram other methods of data storage and re-
ed. A line is drawn from each cause to the is that the visualization accelerates trieval that are vastly superior to the
“knot” in the bow tie. and facilitates understanding of the use of traditional relational databases
The knot in the bow tie represents scenario. The combination of the vi- for hazard analysis studies.
the realization of the hazardous event. sual cues and textual information is a The primary concepts of relational
In the process industries the “knot” is much richer representation of the haz- databases for storing data are tables,
typically a loss of containment of pro- ard scenario information. records, fields, relationships, and iden-
cess chemicals. Along each line from The preceding discussion clearly shows tifiers (IDs). A table is a structured list
the cause to the bow-tie knot are “bar- that there are myriad valuable uses for of data that all describe a given item;

38 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


DATA SCIENCE

for instance, a PHA study will gener- This activity is referred to as cause of these structures combined together
ally have a table that describes all of indexing. What the PHA software does result in the overall database structure.
the study nodes. The best way to think in order to display that view that most
about a data table is by visualizing a of us are familiar with is to first display Relational database challenges
spreadsheet. A table contains many the deviation from the deviation table The discussion in the preceding sec-
rows and columns of information and subsequently search the causes tion used terminology that is consis-
where each column of information is a table to find all of the causes that are tent with relational database technol-
specific piece of information, such as a associated with a given deviation. It ogy, which is commonly used to store
node number or a node description. does this by comparing a “Deviation PHA data. However, use of relational
A database generally contains ID” field in each cause record with the databases is becoming obsolete in ap-
many different tables that describe ID of the deviation that is currently be- plications like PHA studies, as Internet
the different aspects of a system. For ing displayed. technology and cloud computing of-
example, a PHA database might con- A many-to-one relationship is the fer better ways to store and work with
tain a table for nodes, deviations, opposite of one-to-many and works data. All of industry, and all of society,
and causes. The reason that different
tables are required is because, often,
there are multiple instances of one
type of item that all relate to a single
PHA software first displays the deviation from the deviation
instance of another. With PHA, for in- table and subsequently searches the causes table to find all
stance, a single node will have many
different deviations associated with it,
the causes that are associated with a given deviation.
and a single deviation can have many
causes. To address this phenomenon,
we set up multiple tables of informa- very similarly. A many-to-many rela- is migrating to a paradigm where in-
tion, and organize the linking between tionship between tables is the most formation is stored in the cloud, and
the tables using relationships. complex situation. Here, a single record all knowledge work will be performed
In database science there are three in the primary table can have multiple by interacting with the cloud, gener-
types of relationships: one-to-many, associated records in the secondary ally through a web browser. Even when
many-to-one, and many-to-many. A table, but, individual items in the sec- desktop applications are developed to-
one-to-many relationship means that ondary table can also have relation- day, they are generally a thin wrapper
for a single item in the primary table, ships with multiple records in the pri- that essentially holds a web page.
there can be many items in the second- mary table. The best example of this in Relational databases accessed through
ary table that are associated. In other PHA is recommendations. Each PHA the cloud work great when the user
words, the primary table, the “parent” cause (scenario) can have multiple rec- would like to interact with a single re-
in the relationship, can have many ommendations associated with it, but cord of a single table in a database.
“children” in the secondary table. In a each of those recommendations can But, when a user desires to work with
typical PHA, a single node has many also be associated with multiple causes. and view multiple different records of
deviations, and each deviation has In this complex case, an entirely sep- multiple different tables, the result is a
many causes. A relational database arate table needs to be created simply dreadful and slow user experience, as
manages these relationships first by un- to store the relationships between the the web page tries to kludge up a concat-
derstanding how they are defined, and primary and secondary table. As al- enation of all the requested information
then by tracking the IDs of the records. luded to earlier, each table contains in a single form. This form then updates
multiple records. Each record is like a every time the user shifts focus from one
Cause indexing row on a spreadsheet and contains all element to another—especially if any-
When you look at a PHA report, a sin- of the different attributes of a specific thing was edited, because that is what
gle deviation contains multiple rows entry on the table. Each record then is is required to maintain contact with the
that contain causes of the deviation. composed of multiple different fields. database server.
Although it looks like a single table Each field is a specific data entry of a The primary problem is the trans-
to the viewer, in reality the software given data type. actional nature of a relational database.
is combining the two different tables For instance, if a PHA study contains When a user requests a piece of informa-
into one visualization. The deviation a table of safeguards, that table might tion, the database must know specifically
table, in fact, does not actually con- contain individual fields for tag (text what table, record, and field to get. It then
tain any information about causes at string), description (text string), prob- grabs that piece of information, transfers
all! Instead, each cause contains the ability of failure on demand (floating the data between server and client, and
identifier (ID) of the deviation that it point number), effectiveness determi- the client processes the information by
is associated with. nation (Boolean), and ID (GUID). All presenting it on the screen.

INTECH JANUARY/FEBRUARY 2020 39


DATA SCIENCE

“CauselD” “1”
“Cause Description” “Pump Failure”
“Safeguards”
“ID” “1” “Tag” “LFL-01” “PFD” “0.1”
“ID” “2” “Tag” “FZC-02” “PFD” “0.1”

Figure 2. PHA data in JavaScript Object Notation (JSON).

As described in the previous section, computing. Specifically, the data trans- tables, in all formats, the same way that
in order to present a PHA worksheet action speed problem was solved using relational databases do. Figure 2 pres-
on a computer screen, data needs to Extensible Markup Language (XML) ents an example of some PHA data be-
be obtained from multiple fields, in and subsequently its even lighter cousin ing stored as a JSON object.
multiple records, of multiple tables. JavaScript Object Notation (JSON). While some applications are built
Furthermore, drawing the information In the new paradigm, when a web with a relational database server that
on the screen is complicated by the fact page wants to get data from a database serves up the data to build a web page
that the application needs to change server, it does not request a single field and then stores the results after the
the view as a function of how many at a time, it requests that a large collec- page is edited, more and more, the re-
records in secondary tables are associ- tion of data is “serialized” into a JSON lational database is not used at all. The
ated with a given record in a primary object, and that single object is con- JSON objects are simply stored on the
table. This requires thousands (or even veyed from server to client in a single server as the end result.
tens of thousands) of individual data- transaction. As a result, a best-in-class,
base transactions to occur between the cloud-based PHA application only Unified hazard assessment
client and server to obtain the informa- communicates with the server twice A single data structure cannot be both
tion for a single screen view. per worksheet—once to load the data cause indexed, as is the most common
The problem is usually further exac-
erbated by third-party “controls” used
during the programming process. Many
software vendors do not have the talent
The state-of-the art approach is to eschew traditional
to directly access the database, and in- relational database technology in favor of the flexible data
stead rely on third-party controls that
they configure to access the desired
object models that were born in cloud computing.
data. Unfortunately, these controls—
such as text boxes and grids—have
bloated and slow code, because they are from the server, and then once again to approach for HAZOP, and also conse-
designed to be flexible, not fast. return the edited data back to the serv- quence indexed, as is the most com-
er. In the interim, the web page keeps mon approach for LOPA. Furthermore,
A new paradigm the entire data object in memory on neither of these data structures is suit-
The elite companies in Silicon Valley the client. When users interact with the able for hazard registers or bow-tie dia-
have developed better ways to handle data, they are interacting with the data grams. But the latter two are indexed by
this problem and are using them fre- on the client—at lightning speed—not a “hazard” or a “hazard scenario”— the
quently and widely in their software and the data on the server. approach that also underlies a unified
web sites. Unfortunately, most PHA soft- New data structures like XML and hazard assessment data structure.
ware has not caught up with the times. JSON have all the advantages of a rela- The unified hazard assessment data
The state-of-the art approach is to tional database. They can easily store structure provides a platform that
eschew traditional relational database multiple tables, each with multiple allows a single data set to be used for
technology in favor of the flexible data records and multiple fields. They can multiple purposes. HAZOP studies can
object models that were born in cloud also manage relationships between generally be performed using the same

40 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


DATA SCIENCE

workflow as always, but you need to ard scenario record should include safeguard probability of failure on
take some additional care where things a Boolean variable that indicates demand, and the overall scenario fre-
are documented. Also, at least one ad- whether or not the hazard scenario quency and risk ranking. This will en-
ditional data field will need to be com- requires a LOPA. In this way, when able performing a HAZOP or LOPA us-
ing the graphical format of the bow-tie
diagram (figure 3).
The last information presentation
The data transaction speed problem was solved using format that needs to be addressed is the
Extensible Markup Language (XML) and its even lighter hazard register. This is the easiest of all
the problems to solve after the develop-
cousin JavaScript Object Notation (JSON). ment of the unified hazard assessment
data structure. Basically, the data that
is developed in a HAZOP worksheet is
pleted, or at least separated out of the the user starts by viewing the HAZOP sufficient to meet this need, as long as
cause or consequence description, study, he or she should be able to click it is hazard-scenario indexed. In fact,
where it usually resides. With regard to on a single tab or button and have the one might want to limit the data pre-
data structure, the HAZOP worksheet software automatically redraw the sented to even less than what is shown
needs to show, for each deviation, one user interface for LOPA. in a HAZOP worksheet.
or more hazard scenarios. Each haz- There is an even more powerful as- Unified hazard assessment is a
ard scenario can show multiple causes pect to bow-tie diagrams using the method to restructure and optimize
and multiple consequences. Other unified PHA format. Currently, most PHA data so that it can be used for
than that, the PHA worksheet will look bow-tie diagrams are simply a visual more than just process safety man-
essentially the same. representation of a hazard scenario, agement compliance. A standard-
Once the HAZOP has been docu- but with an underpinning of a uni- ized unified hazard assessment data
mented using the unified hazard as- fied hazard assessment data structure, structure and complaint methods for
sessment approach, development the bow-tie diagram can include all documenting PHA data allow a single
of the LOPA is dramatically simpli- the quantitative aspects, such as the data set and a single software tool to
fied. The data structure for each haz- frequency of the initiating event, the be able to seamlessly present data as
PHA (HAZOP), LOPA, hazard register,
and bow-tie diagrams. n
Tolerable: No
Pump seal This article was adapted from a paper
Tag: XV-01 failure – Leakage originally published for the Texas A&M
of process CAT 5: Moderate Engineering Experiment Station’s Mary
Pump
discharge valve Pool fire Kay O’Connor Process Safety Center
fails closed 22nd annual international symposium,
TMEL: 1E-3
F: 0.1/yr F:1E-4 held 22 – 24 October 2019. Read this ar-
Tag: IC-U2C1 FACT: 1.1E-5
ticle online for a link to the full paper.
Tag: LAL-01 Tag: UZC-02 Ignition control Tolerable: Yes
Operator SIS – Low flow – Probability of
action based shutdown ignition ABOUT THE AUTHOR
on LAL PFD: 0.1 Edward M. Marszal (edward.marszal@
PFD: 0.01 Typ: SIS
PFD: 0.1 Typ: Alm SIL: 2 kenexis.com) is president and chief exec-
utive officer of Kenexis, an independent
F:1E-5 consulting engineering firm that provides
Tag: XV-01(OP) CAT 5: Severe technical safety services for process in-
Inadvertent F Total: 1,1E-4 Toxic vapor dustries and other industries that man-
closure of exposure age risks related to chemicals or stored
discharge valve
energy. The company is helping change
Tag: UZC-02 TMEL: 1E 4
F: 0.001/yr the way that safety and security are incor-
SIS – Low flow FACT: 1.1E+
shutdown porated into industrial business practices
Tolerable: No
by providing best-in-class software tools,
PFD: 0.01 Typ: SIS
associated training, and comprehensive
SIL: 2
technical support.

View the online version at www.isa.org/intech/20200205.


Figure 3. Bowtie diagram including quantitative LOPA data.

INTECH JANUARY/FEBRUARY 2020 41


association news | Highlights & Updates

Volunteers in action

Local learning:
Gruhn to speak
on safety, HMIs, more
these issues came together to cause the worst industrial disaster
in history. We need this awareness to prevent major industrial di-
sasters and the more frequent “minor” process safety events that
precede them today. This was the topic at the ISA Toledo, Ohio, sec-
tion (14 January) and ISA Brazos (Freeport, Texas) 6 February talks.

Human-machine interface (HMI) design


Poor HMI designs have been identified as factors contributing to
abnormal situations, accidents, fatalities, and billions of dollars of
lost production. HMIs often impede rather than assist operators.
Although decades of research have identified better implementa-
tion methods, change is difficult, and people continue to follow
poor design practices. Just as a computer is not a typewriter, new
HMI designs should not mimic those of old. The problem is that
many designers simply do not know any better. This presentation

I
SA past president Paul Gruhn, PE, CFSE, will be presenting at will review why certain HMI designs are poor (with many exam-
local meetings around the country during the first quarter of ples) and show how they can be improved. This was the topic at
2020. As a global functional safety consultant with aeSolu- the ISA Manchester, Conn., (29 January) talk.
tions, a process control and process safety consulting, engineer-
ing, and integration services company based in Greenville, S.C., Process industry accidents
Gruhn has gained extensive experience consulting with sites Using a collection of videos, photographs, and stories, this presen-
around the world. tation covers lessons learned from a variety of process accidents.
Gruhn presented at the ISA Toledo, Ohio, section meeting on Topics include: Do not hire low bid (you get what you pay for);
14 January; the ISA Manchester, Conn., meeting on 29 January; everyone needs training (yet they often do not get it or accept
the ISSS Northeast Chapter (Plantsville, Conn.) meeting on 30 Jan- it); even trained people make mistakes (and sometimes they do
uary; and the ISA Brazos (Freeport, Texas) meeting on 6 February. really stupid things); we are not as immune or indestructible as we
He will speak at the ISA Wilmington (Newark, Del.) meeting on 25 may think; reuse of software is not always successful; near misses
February. Contact the meeting manager to attend. are often not followed up; the past is often ignored (and history
If your group would like Gruhn to speak in your area, just ask. definitely repeats itself). This was the topic at the ISSS Northeast
Gruhn says he has a long list of possible speaking topics he is Chapter, Plantsville, Conn., (30 January) talk.
happy to share. Below are the topics of his first six talks of 2020.
Process safety management
The Next Bhopal Subtitled “Jenga, Drift, and Preventing Process Industry Acci-
Preventing disasters—and the incidents of lesser consequence dents,” this talk covers many well-publicized process industry acci-
leading up to them—requires probing beneath their seemingly dents over the past several decades. Much has been written about
superficial, distracting, and highly visible exteriors. Doing so shows them, and many lessons learned have been proposed. However,
how similar all industrial disasters are. The patterns that led to the evidence indicates that the number of industry accidents has not
Bhopal disaster are in many of the processes that we operate to- decreased. More recent realizations of the complexity of mod-
day. This presentation summarizes fundamentals of a portion of the ern processes, and the organizations responsible for designing,
Bhopal plant’s process design, changes that were made contrary to building, running, and maintaining them, has brought a broader
the original specifications, problems encountered, and the numer- understanding of accident causation, and what can be done to
ous design and operational changes that were made (with the best prevent further incidents. This will be the topic at the ISA Wilm-
of intentions) that simply led to further problems. It also covers how ington, Newark, Del., (25 February) talk. ■

42 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


Highlights & Updates | association news

Scenes from the 2019 Anniversary


Leadership Conference snapshot:
ISA volunteer leaders gained new skills and new friends at the
annual leadership conference held in San Diego in October
Milestones of
2019. The 2020 conference in San Juan, Puerto Rico, 23–26 industrial transformation
October, will mark ISA’s 75th birthday.
1945
– Instrument Society of America (ISA) founded

1950s
– Mechanical systems give way to electronics

1960s
– 4–20 mA standard settles signal controversy
– Adaptive control introduced

1970s
– Microprocessors invade measurement and control
– Births of the DCS, PLC, and process modeling
– ISA accredited by ANSI

1980s
– Rise of the personal computer, Microsoft Windows,
HMIs, and Fieldbus standards
– Birth of historian software

1990s
– Fieldbus Wars, IS88 Batch and IS95 Enterprise Control
System standards developed
– Rise of the Internet

2000s
– OPC UA developed
– Germany introduces Industrie 4.0
– Wireless 802.15 standard enables WirelessHART
and ISA100a
– Birth of the Internet of Things
– Rise of process optimization

2010s
– ISA becomes the International Society of Automation
– Rise of Industrial Internet of Things, edge and cloud
computing, machine learning and artificial intelligence,
autonomous vehicles and drones, industrial virtual reality
– Birth of 5G communications
egic
trat ting
ISA S
er M 020
Lead March 2 s
ee 2020s and beyond
6–8 tin, Texa lm . . . to be continued
Aus a.org/s
.is
www
INTECH JANUARY/FEBRUARY 2020 43
association news | Certification review

Certification
ISA Certified Automation Congratulations
Professional (CAP) program new certification
Certified Automation Professionals (CAPs) are responsible for the direction, design, holders!
and deployment of systems and equipment for manufacturing and control systems. Below is a list of individuals who have
CAP question recently passed either our Certified Auto-
The branch of automation that deals with the design and implementation of a central- mation Professional (CAP) or one of the
ized control system for heating, air conditioning, and ventilation is: three levels of our Certified Control System
Technician (CCST) exam. For more informa-
A. atmospheric environmental automation engineering (AEAE)
tion about the ISA CAP and CCST certifi-
B. building automation engineering (BAS)
cation programs, please visit www.isa.org/
C. air flow engineering (AFE)
training-and-certifications/isa-certification.
D. heating, ventilation, and air conditioning (HVAC) engineering
Certified Control System
CAP answer
Technicians
The answer is B, “building automation engineering (BAS).” BAS has become a very impor-
Level 1
tant branch of automation in many industries, especially those that require sterile access
Neal Andrews Thomas Whitehead
areas or the need for pressurized gradients from room to room to control particulates. Boston Scientific,
Andeavor, U.S.
HVAC (mechanical) engineers design the equipment and ductwork, but BAS engi- U.S.
Michael Bouse
neers design and implement the control systems that help regulate fresh air intakes, U.S. Nicholas Fiddler
room pressure, temperature and humidity, and recirculation. BAS engineers also aid U.S.
David Brant
with placement of smoke detectors and dampers and interfaces to the fire alarm and University of Florida, Michael Gaskin
protection systems. U.S. U.S.
Todd Braun Martin Plym
Reference: Sands, Nicholas P. & Verhappen, Ian, A Guide to the Automation Body of U.S. U.S.
Knowledge, Third Edition, ISA Press, 2019. Peder Winkel
Daryl Buschmann
U.S. University of Florida,

ISA Certified Control Systems Nicholas Carlson


U.S.
U.S.
Jeffrey Hyder
Technician (CCST) program Andrew
U.S.
Hildenbrandt James McShane
Certified Control System Technicians (CCSTs) calibrate, document, troubleshoot, and U.S. Inland Empire
repair/replace instrumentation for systems that measure and control level, tempera- Utilities Agency, U.S.
Keith Kuehn
ture, pressure, flow, and other process variables. U.S. Federico Sordo
Mendo
CCST question Daniel Malinowski U.S.
U.S.
If a flow sensor is connected to the DCS system and the flow is displayed in volumetric Yassir
units, what calculation would need to be performed in the control system to display the Antonio Mar Sheikhaldeen
U.S. U.S.
flow rate as a mass flow rate?
Kevin Martin Daniel Ellis
A. mass flow rate = volumetric flow rate × pipe cross-sectional area U.S. IIS Inc., U.S.
B. mass flow rate = volumetric flow rate × sensor input in mA Clifford Standridge Richard
C. mass flow rate = volumetric flow rate × fluid density Facility Services Roggenkamp
University of Florida, U.S.
D. mass flow rate = volumetric flow rate / pipe cross-sectional area U.S.
David Trumbull
CCST answer Daniel Whitacre U.S.
SABIC, U.S.
The answer is C, mass flow rate = volumetric flow rate × fluid density.
Certified Automation
To calculate mass flow rate, perform this calculation:
Professionals
volumetric flow rate × fluid density Thomas Jerry Pablico
Quattlebaum U.S.
For example, using gallons for volume and LB for mass: U.S. Muhammad Asad
Edward Johansen Ghaffar
= gallons/min × LB/gallon Intech Process
Ascend Performance
= LB/min Materials Automation,
U.S. Pakistan
Reference: Goettsche, L. D. (Editor), Maintenance of Instruments and Systems, Second
Bryan Salmon Dheeraj Kumar
Edition, ISA, 2005. Chevron, U.S. Saudi Arabia

44 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


New Benchmarks & Metrics | standards

Charting a new era of ISA/IEC cybersecurity standards

T
he widely used ISA/IEC 62443 se- embedded devices, network compo- dards that make up the series.
ries of standards, developed pri- nents, host components, and soft- This stage will be evident in a new
marily by the ISA99 committee, ware applications. revision of ISA/IEC 62443-1-1, Models
Industrial Automation and Control Sys- Looking ahead in 2020, an important and Concepts, for which a first update
tems Security, with simultaneous review standard expected to be completed in draft has been prepared for review by
and adoption by the International Elec- the coming months is ISA/IEC 62443- the committee. This foundational stan-
trotechnical Commission (IEC), provides
a flexible framework to address and
mitigate current and future security vul-
An important standard expected to be completed soon is
nerabilities in industrial automation and ISA/IEC 62443-3-2, Security Risk Assessment for System
control systems (IACS). The committee
draws on the input and knowledge of
Design, which is based on the understanding that IACS
IACS security experts from across the security is a matter of risk management.
globe to develop consensus standards
that are applicable to all industry sectors 3-2, Security Risk Assessment for Sys- dard established the context for all of
and critical infrastructure. tem Design, which is based on the the other standards in the series.
At a year-end meeting in Mannheim, understanding that IACS security is a Among other updates underway,
Germany, the committee took stock of matter of risk management. That is, ISA99 is also working on converting ISA/
where it is and where it wants to go as each IACS presents a different risk to IEC TR62443-2-3, Patch Management in
a new decade unfolds. There is much an organization depending upon the the IACS Environment, into a standard
the committee can build on as it closed threats it is exposed to, the likelihood by adding normative language. The
out the final years of the past decade of those threats arising, the inherent current technical report addresses the
with several notable successes. This in- vulnerabilities in the system, and the installation of patches, also called soft-
cluded a decision by the United Nations consequences if the system were to be ware updates, software upgrades, firm-
(UN) Economic Commission for Europe compromised. Further, each organiza- ware upgrades, service packs, hotfixes,
to integrate the widely used standards tion that owns and operates an IACS basic input/output system updates, and
into its Common Regulatory Frame- has its own tolerance for risk. For these other digital electronic program updates
work on Cybersecurity, which serves as reasons, ISA/IEC 62443-3-2 will define that resolve bug fixes, operability, reli-
an official UN policy position statement a set of engineering measures to guide ability, and cybersecurity vulnerabilities.
for Europe. It also included completion organizations through the process of It covers many of the problems and in-
of several key standards in the series, assessing the risk of a particular IACS dustry concerns associated with IACS
including: and identifying and applying security patch management for asset owners
n ISA/IEC 62443-4-1, Product Secu- countermeasures to reduce that risk to and IACS product suppliers.
rity Development Life-Cycle Re- tolerable levels.
quirements, which specifies process The new year will also likely see the 2020 meetings
requirements for the secure devel- publication of a revision of ISA/IEC Details are still being worked out, but
opment of products used in an IACS 62443-2-1, with the revised title Security ISA99 and its partner IEC committee,
and defines a secure development life Program Requirements for IACS Asset TC65 WG10, are planning to meet just
cycle for developing and maintain- Owners. This standard specifies asset outside of Houston in Galveston, Texas,
ing secure products. The life cycle owner security program requirements in conjunction with the ISA Cyberse-
includes security requirements defini- for an IACS. An asset owner, in the con- curity Standards Implementation Con-
tion, secure design, secure implemen- text of the standard, also includes the ference, during the week of 11 May,
tation (including coding guidelines), operator of an IACS. and then tentatively in September near
verification and validation, defect The revision of ISA/IEC 62443-2-1 Schiphol Airport in Amsterdam.
management, patch management, reflects a new stage in ISA99’s growth For information on viewing or
and product end-of-life. and progression in which much of the obtaining any of the ISA/IEC 62443
n ISA/IEC 62443-4-2, Technical Security important content has been defined, standards, visit www.isa.org/findstan-
Requirements for IACS Components, but there is a continual need to review dards. For information on ISA99, its
which provides the cybersecurity tech- and update material while identifying meeting plans, or other related mat-
nical requirements for components and correcting gaps and inconsisten- ters, contact Eliana Brazda, ISA Stan-
that make up an IACS, specifically the cies that may exist in the various stan- dards, ebrazda@isa.org. n

INTECH JANUARY/FEBRUARY 2020 45


product spotlight | Industrial Cybersecurity

Industrial router with firewall


The Lock 150 is an industrial router with firewall sharing access that secures remote
connections and protects all devices behind it, in order to build, manage, and scale
remote IoT control operations. With modular technology, networks and IoT
infrastructures can be scaled from one object to thousands for a secure inter-
nal and external IoT ecosystem.
The Lock 150 can be installed in fewer than five minutes without the
need for software installations, network configurations, or special IT skills. It
has the capacity for up to 10 concurrent VPN connections. Integrated Wi-Fi
is an alternate connectivity method and doubles as a wireless device access
point. The router is compatible with all existing company products and includes
end-to-end encryption between the company’s devices.
Tosibox, www.tosibox.com/product/lock-150

Industrial asset monitoring, risk assessment


A new joint solution expands industrial management technology manages PLC, normal network access or asset changes
asset monitoring, change management, DCS, and HMI/SCADA software assets and changes in the sequence of SCADA
and risk assessment capabilities for indus- and provides a single point of reference processes.
trial enterprises. Asset Guardian change- for current asset information, including In this integrated solution, iSID’s asset
operational status, loca- inventory now incorporates the asset infor-
tion, and controller logic mation stored in the Asset Guardian data-
versions. It has been com- base, including detailed asset information
bined with the iSID indus- that is not available from traffic monitoring.
trial threat detection sys- This detailed information, such as logic ver-
tem for real-time visibility sion, ownership, and geolocation, produces
of networked industrial a more granular risk score calculated by iSID
assets, ports, and proto- for each asset. Changes to assets, such as
cols on an OT network. new firmware or PLC logic, are detected on
By passively analyzing all the network in real-time by iSID and sent
data traffic, iSID can de- to Asset Guardian for verification, authori-
tect and counteract ab- zation, and validation against the “golden
normal network activity image” of the binary stored in its database.
in real-time, such as ab- Radiflow, https://radiflow.com

Industrial network cyber defense Modbus-filtering firewall


A new hardware/software joint offering helps utilities, oil and A developer of Modbus firewalls for industrial control networks
gas facilities, and other industrial manufacturing sites to identify has released PortBloque E, adding Ethernet firewall functionality
and defend against cyberattacks. The solution is a joint venture and Modbus TCP/UDP deep packet inspection to filter and block
between Ixia, a Keysight Technologies business, and Nozomi harmful and unwanted Modbus traffic. These capabilities make
Networks. The Ixia Vision network packet broker (NPB) collects the PortBloque E suitable for automation, utility, and energy opera-
data from all locations connected to an operational network and tors who want to protect serial Modbus devices from Internet
delivers it to Nozomi Networks Guardian for real-time processing attacks. The browser-based interface gives operators customiza-
and analysis. tion flexibility. Operators can control Modbus traffic by slave IDs,
Aggregating traffic removes duplicate packets and unwanted function codes, and block commands that
traffic to improve performance and visibility into critical systems repeat too soon. Additionally, opera-
and processes to secure connected operational environments. tors can define a permissible range of
The joint solution can also be integrated with security informa- slave registers and values to prevent
tion and event management, as well as other systems, to estab- malicious memory access. The of-
lish an automated threat response. In addition, the NPBs inte- fering also provides bidirectional
grate with tools such as firewalls to improve policy enforcement conversion between Modbus
and mitigate unwanted traffic. RTU/ASCII and Modbus TCP/UDP.
Nozomi Networks, www.nozominetworks.com Sequi, https://sequi.com/portbloque-e

46 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


Thank You to Our
2019 and 2020 Sponsors
ISA Corporate Sponsors

ISA Promotional Sponsor

International Society of Automation


Setting the Standard for Automation™
ad index

InTech advertisers are pleased to provide Advertiser Page # Advertiser Page #


additional information about their products Endress + Hauser .............................Cover 4 MAVERICK...................................... Covertip
and services. To obtain further informa- www.us.endress.com www.mavtechglobal.com
tion, please contact the advertiser using the
Festo..........................................................21 Moore Industries ........................................6
contact information contained in their ads
www.festo.com www.miinet.com
or the web address shown here.
Inductive Automation.............Bellyband, 3 Oriental Motor .........................................17
Advertiser Page # www.inductiveautomation.com www.orientalmotor.com

ARC Advisory Group ................................48 ISA ........................................35, 47, Cover 3 ProComSol, Ltd. ........................................27
www.arcweb.com www.isa.org www.procomsol.com

Automation Direct ..........................Cover 2


intech0713-island-ol.pdf 1 7/11/2013 9:28:28 AM
ISA Global Cybersecurity Alliance...........29
www.automationdirect.com www.isa.org/isagca

The Sep/Oct 2020 issue of InTech


will include the 75th Anniversary
Commemorative Supplement. Show
your support for the organization
that supports your people, products,
and customers. Contact your sales
rep for details.

Contact InTech today:


C
Richard T. Simpson
M Advertising Sales Representative
Advertising, Classifieds Section
Y
Phone: +1 919-414-7395
CM Email: rsimpson@automation.com
MY
Chris Nelson
CY
Advertising Sales Representative
CMY Phone: +1 612-508-8593
Email: chris@automation.com
K

Chris Hayworth
Advertising Materials Coordinator
Phone: +1 919-990-9435
Email: chayworth@ISA.org

View and download the InTech media


planner at www.isa.org/intechadkit

Reprints
Foster Reprints will work with you to
create a customized reprint package,
including hard copy reprints, eprints,
and mobile-friendly products.
Contact Jill Kaletha at 219-878-6068
or jillk@fosterprinting.com.

48 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


classifieds

datafile Maintenance Management


Software/ CMMS
Datafiles list useful literature on products and services that are available FastMaint CMMS
from manufacturers in the instrumentation and process-control industry. Your FAST TRACK to maintenance management™
For Utilities, Manufacturing Plants,
To receive free copies of this literature, please contact each manufacturer
Industrial & Commercial Facilities
via their provided contact information. Fast to setup. Easy to use. From US$ 995
Download 30-Day Trial/ Web Demo
USB HART MODEM
www.smglobal.com (919) 647-9440
The HM-USB-ISO USB HART modem meets
SMGlobal Inc, 5448 Apex Peakway #308
industry standards for USB and HART
connectivity. The small size, light weight,
Apex, NC 27502 USA
and durability of the HM-USB-ISO make it Plus Maintenance Books,
ideal for portable use. Operating power is Tips & Training
NER ISA Intech Controls Ad 2015_FINAL.pdf 1 3/12/2015 10:08:55 AM

derived from the USB connection. An easily


installed Virtual Serial Port driver allows use
in any Windows-based application.
It is the lowest cost USB Modem certified by the FieldComm Group
to meet the HART communication specifications.
ProComSol, Ltd, Process Communications Solutions
Tel. 216.221.1550; Fax 216.221.1554
sales@procomsol.com; www.procomsol.com
Toll Free 877.221.1551

Sample of Jobs Available at Jobs.isa.org


See more at Jobs.isa.org, where you can search for available jobs or advertise positions available within your company. ISA Members
post resumes at no charge.

Electrical engineer Lead UI engineer – Sensors


Central Arizona Project: The engineer will help guide the Central Arizona Medidata Solutions: In this New York City position, the engineer will
Project (CAP), a 336-mile system that brings Colorado River water to cen- provide technology leadership to a diverse, remote engineering team,
tral and southern Arizona, in identifying and designing solutions to tech- perform research to define user personas, communicate and collabo-
nical engineering problems. Responsibilities include providing complete rate with stakeholders to test and refine user personas and design con-
and professional design services and technical leadership for planning and cepts, and manage the UX design workflow in the context of a larger
constructing new features of the CAP and modifying, operating, and main- project development project. The successful candidate will be able to
taining existing features through engineering expertise and coordination of establish, articulate, and drive a user-focused vision, communicate effec-
related disciplines. This includes the preparation of plans and specifications, tively across technical and nontechnical teams, organize and present
internal work packages, and materials and cost estimates. The position re- complex data in a simple and compelling way, evaluate the usability of
quires five years of applicable electrical engineering experience with a BS in competing interface designs, and analyze and document user needs.
a related computer or engineering field . . . see more at Jobs.isa.org. The position typically requires a minimum of 12 years of related experi-
ence with a bachelor’s degree, eights years and a master’s degree, or
Manager, plant quality five years and a PhD . . . see more at Jobs.isa.org.
Lennox International: The plant quality manager in Grenada, Miss., will
lead a team that creates and manages processes, training, standards, and Lead cybersecurity attack and penetration tester
goals to increase factory capability and quality. He or she will collaborate Pfizer: This position in Groton, Conn., is for the technical lead for at-
with cross-functional teams to introduce and implement new technology, tack and penetration testing and red team assessments within Pfizer
quality tools, and manufacturing processes. A bachelor’s degree and eight Digital Global Information Security. Responsibilities include performing
or more years of related experience or an equivalent combination of educa- and coordinating manual attack and penetration testing using the lat-
tion and experience is required. Additional qualifications include experience est technologies, leading and performing assessments, researching new
with quality testing and quality systems management, Six Sigma Green or security threats, managing and maintaining security testing frameworks,
Black Belt certification, and experience in multishift operation . . . see more and mentoring newer team members. A bachelor’s degree in a technical
at Jobs.isa.org. field, five or more years of experience managing security and operational
services, and three or more years in pharmaceutical or another regulated
Instrumentation/calibration technician industry is required. ITILv3 certification and security certifications (CISSP,
NanoString Technologies: The technician is responsible for installations, GIAC, CEH) are preferred . . . see more at Jobs.isa.org.
preventive maintenance, calibration testing, troubleshooting, and general
repairs on a variety of components, analytical equipment, and instrumenta- Senior software engineer
tion intended for laboratory and manufacturing use. This individual will also HSBC: This engineer in Pune, India, will develop a technical platform to
maintain the environmental monitoring system and temperature mapping support the adoption of quality engineering initiatives across global IT,
of lab cold storage units. The ideal candidate has excellent organizational work collaboratively with various stakeholders in the evaluation and im-
skills and will assist management in communication. This Tuesday-through- plementation of emerging group standard tooling, and provide consulting
Saturday position will be trained for the first three months in the Seattle support to IT teams across the group on quality engineering practices.
office and then transfer to the Bothell, Wash., office. The position requires The position requires hands-on experience in designing and developing
three or more years of equipment management–related experience and a platforms and process automation, especially for large-scale and complex
BS in a relevant science or engineering field . . . see more at Jobs.isa.org. banking applications and architectures . . . see more at Jobs.isa.org.

INTECH JANUARY/FEBRUARY 2020 49


the final say | views from Automation Leaders and

Completely automate and eliminate operators?


By Bill Lydon

C
ompletely automate and eliminate opera- to operate a system and are critical components
tors? I believe the answer is obviously “no,” of continuous operations. Historically, procedures
because well-trained operators provide an have been executed by humans reading from a
advantage by ensuring efficient and safe opera- manual, checklist document, or a static display.
tions of complex process plants. The majority of The ISA 106 technical report describes the con-
those in operations management agree good cepts by which procedures are integrated into the
operating people are valuable. basic process control system (BPCS).
Automating and clearly documenting functions The intended audience for the document is techni-
that are well defined and deterministic enable op- cal and operations managers and engineering per-
erators to focus on the most important tasks, prob- sonnel who are responsible for the operation or auto-
ABOUT THE AUTHOR lems, exceptions, and unexpected issues. Automa- mation of continuous process operations, members
Bill Lydon (blydon@ tion professionals can take advantage of ISA 106 of engineering departments of owner/operators, en-
isa.org) is an InTech to achieve these goals. gineering personnel of engineering and procurement
contributing editor with The ISA 106 models define how to capture infor- companies, automation vendors and system integra-
more than 25 years of mation about physical assets, from the enterprise tors, and other process engineering practitioners.
industry experience. level down to an individual device, and the require-
He travels globally to ments that define a procedure. They establish the Safety
attend automation functional requirement for the automated procedure Safety statistics show the majority of incidents not
events and regularly and tie these requirements directly to objects in the related to outright mechanical failures happen dur-
provides news reports, physical model. The implementation module defines ing abnormal situations, primarily unit startups and
observations, and in- a set of ordered tasks, which may have their own shutdowns. For example, the Kern Oil Refinery fire
sights here and on Au- subtasks to perform step-by-step actions in a defined in January 2005 occurred during a crude unit start-
tomation.com. order. There are three elements contained within up, and the BP Texas City disaster in March 2005
each task: (1) command: something to trigger the took place during the restarting of a hydrocarbon
individual action; (2) perform: do the action(s); and isomerization unit. Unfortunately, there are many
(3) verify: confirm successful completion of the task. more examples.
Each task’s command-perform-verify sequence The recipe for disaster is when an infrequent op-
can include a mix of automated and human opera- eration is required, but the key individuals are not
tions as appropriate for the specific assignment. For available, leaving inexperienced operators to follow
example, a human may need to verify if an automat- inadequate or incorrect instructions. Something can
ed task has been performed correctly, or vice versa. get out of control, leading to an abnormal condition
After each command has been performed and veri- with the undesirable outcomes of equipment dam-
fied, notification is sent to the next task in sequence. age, environmental release, injuries and fatalities.
Larger activities, such as plant startup or shut- Procedural automation benefits are:
down, are important, but the same tools can be • improved safety
used for more routine procedures, such as isolat- • improved startups and shutdowns to improve
ing and starting up a redundant pump system, efficiency and throughput
performing online maintenance of a piece of • efficient transitions to increase production and
equipment, or even something as “simple” as per- quality
forming an in-line valve performance test; all of • improved disturbance recovery
which normally require communication with some- • capture and retention of “tribal” knowledge
one physically at the asset to verify, or in some cas- • improved communications with common defini-
es manually intervene in, the process. tions and terminology
Procedural automation can be used to capture and By applying ISA 106, a single process plant, a com-
share corporate knowledge, including best practices, plete facility, or even an entire company can achieve
and to minimize errors with a resulting decrease in significant improvements in operational efficiency
incidents, improved safety, and higher throughput. and safety.
This is particularly important with an aging workforce For more information, visit www.isa.org/isa106. For
and the difficulty in finding experienced operators. information about the ISA106 committee, contact
Procedures represent the knowledge necessary Charley Robinson, ISA standards, crobinson@isa.org. n

50 INTECH JANUARY/FEBRUARY 2020 WWW.ISA.ORG


2020 Analysis Division Symposium
26−30 April

Training: 26 & 30 • Conference: 27-29


This annual event is recognized as the outstanding forum for discussions of
new and innovative analytical techniques, developments, and applications.

Topic areas include: Venue:


• Chemical Analyzers Long Beach Convention &
• Gas Detectors Entertainment Center
Long Beach, CA, USA
• Systems Integration
• Sampling Systems
• Physical Properties

International Society of Automation


Setting the Standard for Automation™
www.isa.org/ad
We understand how important it is to find the
right expertise for your industry application needs.

KNOWLEDGE
+ KNOW-HOW
You are assured to get the best-fit products, solutions
and services for your specific requirements.

Customers
Customers around
aroundthe world
the worldtrust
trustususwhen
whenititcomes
comestotoprocess
automation. Our shared
process automation. goal
Our is plant
shared goalsafety, availability
is plant and e�ciency.
safety, availability
Weand
areefficiency.
with you Weevery
areday,
witheverywhere.
you every day, everywhere.

People forfor
People Process Automation
Process Automation

Do you want to learn more?


www.us.endress.com

Do you want to learn more?


www.us.endress.com
The Unlimited SCADA Platform
of the Future is Here

Download the free trial today at


inductiveautomation.com
With unlimited high-performance tags,
instant web-deployment, and tools for
building pure-web applications in HTML5,
Ignition 8 will revolutionize the way you
control your industrial processes.

Download the free trial today at


inductiveautomation.com
January/February 2020

OFFICIAL PUBLICATION OF THE INTERNATIONAL SOCIETY OF AUTOMATION

Predictive maintenance analytics


Data science for HAZOP studies
IIoT edge computing
Track and trace systems
Industrial cybersecurity
product spotlight

www.isa.org/intech

You might also like