Professional Documents
Culture Documents
Revista Intech Janeiro de 2020
Revista Intech Janeiro de 2020
www.isa.org/intech
Don’t Take Safety Lightly...
get reliable signal towers, audible devices and industrial lighting
for all of your machines, systems and processes.
STARTING AT
$402.00
(LKEH-102FEUL-R)
STARTING AT
$190.00
(HSST-3M2-RYG)
DISCRETE MANUFACTURING
24 Better performance
begins at the edge
By Rich Carpenter
COVER STORY
12 OPERATIONS AND MANAGEMENT
DATA SCIENCE
www.isa.org/InTech
DEPARTMENTS
InTech FOCUS is ISA’s six-times-per-year digital magazine
8 Industry News
(or ebook) that delivers long-form educational articles on
ISA celebrates 75 years, ISA Global MARCH 2019
An InTech e-edition covering the
automation and instrumentation fundamentals from a variety
Cybersecurity Alliance starts 2020
fundamentals of automation
Flow
Preventive
Maintenance of industry experts. Single-issue topics include Flow & Level,
with expanded membership, Digital Flow of Incompressible
Control Elements.
With Technology
The Excitation
Frequency of Magnetic
Flowmeters
Postmaster: Send Form 3579 to InTech, 67 T.W. Alexander Drive, P.O. Box 12277, Research Triangle Park, NC
50 The Final Say 27709. Periodicals postage paid at Durham and at additional mailing office.
eliminate operators? Publications mail agreement: No. 40012611. Return undeliverable Canadian addresses to P.O. Box
503, RPO West Beaver Creek, Richmond Hill, Ontario, L48 4RG
For permission to make copies of articles beyond that permitted by Sections 107 and 108 of U.S.
RESOURCES Copyright Law, contact Copyright Clearance Center at www.copyright.com. For permission to copy articles
in quantity or for use in other publications, contact ISA. Articles published before 1980 may be copied for a
48 Index of Advertisers per-copy fee of $2.50.
CHIEF EDITOR
Renee Bassett
rbassett@isa.org
How has ISA changed CONTRIBUTING EDITOR
CONTRIBUTING EDITOR
Charley Robinson
By Renee Bassett, InTech Chief Editor crobinson@isa.org
PUBLISHER
Rick Zabel
T
he International Society of Auto- of the three industrial communications rzabel@isa.org
mation is a septuagenarian. protocols he developed: HART, Founda-
PRODUCTION EDITOR
This year marks the 75th anni- tion Fieldbus, and OPC. What do you Lynne Franke
versary of ISA—formerly the Instrument think industrial automation will look like lfranke@isa.org
Society of America. For 75 years, this in the next 25, 50, or 75 years? More ART DIRECTOR
nonprofit organization has set the stan- importantly, what skills will automation Colleen Casper
dard for those who apply engineering professionals need? ccasper@isa.org
and technology to improve the manage- Throughout the six issues of InTech
SENIOR GRAPHIC DESIGNER
ment, safety, and cybersecurity of mod- magazine in 2020, but especially in Pam King
ern automation and control systems in our September/October 75th Anni- pking@isa.org
industry and critical infrastructure. versary Commemorative Issue, we will
GRAPHIC DESIGNER
Even if you’ve never been a member, celebrate and reminisce and look to-
Lisa Starck
ISA has likely been a part of your profes- ward the future. We will ask volunteer lstarck@isa.org
sional life. So, this is the year to tell your leaders to share their insights, and
story and listen to the stories of others. ask the people working to transform
Maybe you are one of the 400,000 peo- industrial automation within or adja- ISA PRESIDENT
ple around the world who have bought cent to ISA to help identify the trends Eric Cosman
an ISA book, attended an ISA confer- shaping automation. We’ll review the PUBLICATIONS VICE PRESIDENT
ence, or enhanced your professional technological milestones, starting in Joao Miguel Bassa
standing with an ISA accreditation, cer- 1945 when the then-fledgling Instru-
EDITORIAL ADVISORY BOARD
tification, or training course. What do ment Society of America was found-
CHAIRMAN
you remember about the people you ed, shine a spotlight on the technolo-
Steve Valdez
met, or the lessons learned? gies of the most-recent 25 years, as
GE Sensing
Maybe you stood on the shoulders of the third industrial revolution has giv-
those who came before by creating sys- en way to Industry 4.0, and speculate Joseph S. Alford PhD, PE, CAP
tems or solving problems using ISA-95, on the needs for the next 25. Eli Lilly (retired)
ISA-88, or other standards as your foun- Victor S. Finkel, CAP
dation and guide. How did that affect We want to hear from Independent Consultant
your career? Maybe the ISA Automation
Conference and Exhibition was the first
people working to transform Eoin Ó Riain
Read-out, Ireland
professional event you ever attended? industrial automation within Guilherme Rocha Lovisi
Whether it was in Abu Dhabi or Atlanta,
who brought you there, and what did
or adjacent to ISA over the Bayer Technology Services
T
he International Society of Auto- milestones of the automation evolution, by providing consistent terminology and
mation (www.isa.org) celebrates said InTech chief editor Renee Bassett. object models and bridging information
75 years of industrial automation “We will shine a spotlight especially on technology and operational technology
evolution and professional development the technologies of the most recent 25 systems. B2MML expresses ISA-95 (IEC/
in 2020. The anniversary is an occasion to years, as the third industrial revolution has ISO 62264) data models in a standard set
not just look to the past but to provide a given way to Industry 4.0,” she said. of XML schemas written using the World
view into the future. Wide Web Consortium’s XML Schema
ISA was founded in 1945 as the Instru- language (XSD). It is an open-source XML
ment Society of America, and much has implementation of the ISA-95 and IEC
changed over 75 years, including the 62264 standards. There is a joint initiative
association’s name. Now the International to bring B2MML into the OPC UA frame-
Society of Automation, ISA still “sets the work, which provides a secure and reliable
standard for those who apply engineering architecture for manufacturing industries.”
and technology to improve the manage- The Sep/Oct issue of InTech will include
ment, safety, and cybersecurity of mod- the 75th anniversary commemorative
ern automation and control systems used supplement. In it, ISA members, custom-
across industry and critical infrastructure,” Automation.com’s Bill Lydon will share ers, and supporters will celebrate, remi-
says ISA executive director Mary Ramsey. his insights on technological developments nisce, and attempt to predict the future,
ISA develops widely used global stan- that have enabled manufacturing and said Bassett. “We will call on the people
dards, certifies industry professionals, process applications to increase quality, who have been working to improve and
provides education and training, pub- productivity, and profits over the years. An transform industrial automation within or
lishes books and technical articles, hosts example is the ISA-95 (ANSI/ISA-95) Enter- adjacent to ISA over the years. We want
conferences and exhibits, and provides prise-Control System Integration standard. to know how the standards and trainings
networking and career development pro- “The latest development of [ISA-95], have influenced them and their compa-
grams for 40,000 members and 400,000 B2MML [business to manufacturing mark- nies, and what new skills are becoming
customers around the world. up language], creates compatibility with important as automation evolves.” The
Throughout the year, both online and enterprise computing, cloud computing, anniversary celebration will culminate for
in print through its InTech brand publica- Internet of Things, and Industry 4.0,” says ISA members at the association’s Annual
tions, ISA will review the technological Lydon. “B2MML adds value to ISA-95 Leadership Conference in October. n
T
he ISA Global Cybersecurity Alliance (ISAGCA) is starting the new year with new standard for
projects and new members. ISAGCA is organized into four focus areas: aware- automation
ness & outreach, compliance & prevention, education & training, and advocacy &
adoption. These focus areas are collectively working on the following projects in 2020: The Sep/Oct 2020 issue of InTech
n A condensed guide to implementing the ISA/IEC 62443 series of standards. will include the 75th Anniversary
n A consolidated matrix that cross references all cybersecurity-related standards to ISA/ Commemorative Supplement.
IEC 62443 principles. In addition to technology time-
n A road map for expanded cooperation with worldwide governments that are currently lines, Automation Innovator Profiles,
referencing the standards in their regulatory requirements or recommended practices. and predictions for the future, the
n A multidimensional reference guide that will map system life-cycle phases and stake- supplement provides ways for sup-
holder roles to specific automation cybersecurity knowledge, skills, and abilities needed porters to buy ads, share stories of
to manage each phase. ISA history, or position their compa-
n Industry vertical overlays to the ISA/IEC 62443 standards for building automation, nies as part of the Industrial Auto-
medical devices, and other sectors. mation Innovators Showcase.
n A database of expert speakers for speaking opportunities at industry events. Show your support for the orga-
“Unifying and intensifying the work of experts around the world, regardless of affilia- nization that supports your people,
tion, is a key part of ISAGCA’s mission,” said ISA executive director Mary Ramsey. “We be- products, and customers. Email
lieve that automation providers, cybersecurity vendors, asset owners, government agen- stories, congratulations, and ques-
cies, research groups, and others involved in cybersecurity efforts are stronger together.” tions to 75in2020@isa.org.
I
n Munio Security
ndustrial Internet of Things (IIoT) has emerged as a major technology with a big
n PAS Global
impact on industrial automation systems—and on the automation professionals
n Radiflow
involved with the design and maintenance of such systems. Make plans to be in
n Senhasegura (supporting member)
Texas in April for the 2020 ISA IIoT & Smart Manufacturing Conference and learn how
n Tenable
automation is the foundation of IIoT and why it is useful to understand the difference
n TiSafe
between edge, fog, platform, and hybrid architectures. Held 15–16 April at the Moody
n Tripwire
Gardens Hotel in Galveston, Texas, with a day of focused training on 14 April, this con-
n WisePlant
ference’s topics encompass advances in connectivity, automation, and security within the
n Wallix Group
context of hybrid manufacturing operations across multiple vertical industries.
n Xage Security
For more information and to register, visit https://isaautomation.isa.org/2020-iiot-
smart-manufacturing-conference. n
I
ndustrial and Industrial Internet of Things (IIoT) promise. Worst-case physical consequences might
networks almost always represent engineering include flooding, washouts, and physical damage
risks, as well as conventional “business” risks. to irrigation canals.
IIoT is the ultimate mind meld of information technol- If monitor-only IIoT edge devices are connected to
ogy (IT) and operational technology (OT) networks. conventional control networks, we have a different
The IIoT connects edge devices in OT networks direct- problem. For example, what if the monitor-only rain-
ly to the Internet to enhance operational efficiencies. fall sensors that are deployed inside the boundaries
What confuses security designs for IIoT deployments of a large water-treatment facility were connected
is differing kinds of risk.
ABOUT THE AUTHOR
OT practitioners and engineers plot risk on a Unidirectional gateways provide
spectrum from unacceptable physical consequenc- protection to edge devices when
Courtney Schneider
es to safe, correct, continuous, and efficient physi-
is cyber-policy research endpoint protections in those
cal operations. Conventional security practitioners,
manager for Water-
however, focus on protecting information, cyberre- devices are not sufficient.
fall Security Solutions,
silience, incident response, data recovery, and busi-
(https://waterfall-se-
ness continuity. Conventional cyberassets are part to the facility’s OT network? These connections ex-
curity.com), a global
of a sea of networks, some needing more protec- ist because that water-treatment OT network is the
industrial cybersecurity
tion than others, managed for business risk. easiest one for the IIoT sensors to access. In such an
company, protecting
What then of IIoT security, which basically melds example, compromised monitor-only sensors give
critical industrial net-
these two concepts of physical and business risk attackers an opportunity to pivot their attacks into
works since 2007. This
together: the ubiquity of IT networks layered on the facility’s control-critical network.
article first appeared
physical control and industrial networks? How do
as a blog post of the
we implement a security program to simultane- Microsegmentation
Industrial Internet Con-
ously satisfy these very different needs from IT, OT, When unacceptable physical consequences of
sortium.
and engineering teams? compromise are possible for IIoT deployments, we
need strong protections for the edge devices. In
Physical and business risk these scenarios, a good place to start is microse-
IIoT security planning starts with a cyberrisk assess- gment control-critical sets of equipment or net-
ment. Not all IIoT deployments pose nefarious threats works using unidirectional gateway technology.
to the physical world. When deploying hardware Unidirectional gateways are described in section 9.2.6
that is only physically able to monitor but not control of the Industrial Internet Consortium Industrial Internet
anything, we generally face only conventional busi- Security Framework (https://www.iiconsortium.org/IISF.
ness risks. Conventional enterprise security principles htm). These gateways are the strongest of the network
apply, and direct connectivity to enterprise and even segmentation options described in the framework. Uni-
cellular and Internet networks is appropriate. directional gateways provide additional protections to
For example, consider a system of thousands of edge devices when endpoint protections in those devices
solar-powered rainwater measurement devices dis- are not sufficient. They enable safe flows of monitoring
tributed throughout a watershed as part of a water information to enterprise and cloud systems for big data
treatment flow prediction system. If the switches analysis and other benefits, while physically preventing
are compromised, or for that matter physically any information flow back into the edge devices.
kicked under a rock by passing tourists, there are Where to deploy the gateways is the question—
no grave consequences to the water system. The in complex OT networks, unidirectional gateways
system is massively redundant, and device inputs are may be deployed close to the edge devices, close to
constantly correlated with external inputs, such as the connection to enterprise or Internet networks,
official meteorological reports of rainfall in an area. or anywhere in between. What has emerged as
But suppose the rainfall-monitoring devices can a best practice is perhaps obvious in hindsight—
also control switches that are connected to, say, an enterprise security teams need to sit down with
irrigation system to activate or deactivate irrigation engineering teams and work out a strategy. Both
in an area based on the rainfall it receives. Now teams need to agree on where to deploy at least
there are potential physical consequences of com- one layer of unidirectional protections. n
M
any factors affect the way food and bev- lion this year. But it is also making its way into the
erage manufacturers handle their pro- food and beverage sector.
cesses. Whether it is the need for more One German company is using 3D printing
efficient processing, the growing population, or technology to create printed jelly meals for elderly
evolving consumer preferences and attitudes, food care-home residents who have difficulty chewing
and beverage manufacturers must constantly look or swallowing solid foods. As the potential uses
for ways to stay ahead. New technologies that are of 3D printing are developed, the benefits of this
part of Industry 4.0 can help, allowing automation technology are becoming more understood. Food
professionals to have a positive impact throughout that is 3D printed can produce precise results and
the supply chain. Three innovations that are chang- save time and effort. ABOUT THE AUTHOR
ing the way food and beverage makers operate While 3D printing has the potential to provide
Darcy Simonis is in-
are augmented reality (AR), three-dimensional (3D) innovative food to the growing population much
dustry network leader
printing, and blockchain technology. faster than traditional methods of manufacturing,
for ABB’s Food and
it also provides options for the industry to be more
Beverage division. Find
Food through AR environmentally sustainable. 3D printing only uses
out more at https://
For many consumers, AR is a normal part of ev- the required amount of raw materials to make a
new.abb.com/food-
eryday life. Since the boom of Snapchat filters and finished product, and the hydrocolloid cartridges
beverage.
lenses, AR has become extremely popular and is that are used in 3D printers form a gel when mixed
now more commercially accessible than ever. With with water and leave minimal waste.
the AR market in Europe alone estimated to hit
$12 billion by 2024, industries are finding many Blockchain technology
ways to integrate this cutting-edge technology Consumer attitudes to food have also changed.
into daily practice—and the food and beverage Whether it is ensuring that produce is grown sus-
industry is no different. tainably or that plastic waste is kept to a minimum,
Staff working in a food and beverage facility can consumers now want to know every detail about
be trained through virtual instructions and sce- the product they are buying—and blockchain tech-
narios in which it is possible to virtually visualize nology can provide just that.
working and operating in the facility. This method Through blockchain, consumers can verify the
could enable a more productive workforce to be history, origin, and quality of a product. Blockchain
trained at a quicker rate compared to traditional is benefitting the industry as it builds trust between
and manual training. the supplier, manufacturer, and consumer, which in
AR can also enhance the consumer experi- turn can increase brand loyalty. It can also reduce
ence. Some manufacturers have designed prod- food waste by identifying problems along the way,
ucts with labels displaying nutritional or recipe such as contamination or storage issues. If problems
information with AR. However, some suppliers are detected at an early stage of the production pro-
are taking this one step further. An online New cess, they can be resolved before the product hits
York bakery, for instance, uses AR to display a the shelves. This could help reduce food waste and
3D view of its products for customers to view eliminate the need for product recalls.
before they place an order. Using AR in ways Although blockchain technology is a new ap-
like this could increase sales, as it means the proach, most food manufacturers should already
customers can see the food or finished product have software installed that monitors, records, and
before they commit to a purchase. traces product ingredient details. Software like the
800xA distributed control system or the ABB Ability
3D printing food manufacturing operations management system can
Another technology that is being increasingly used trace and record an ingredient and log the data in
in the food and beverage industry is 3D printing. a database for manufacturers to refer to. The Abso-
Currently, 3D printing technology is being applied lut Company, for example, uses System 800xAat its
to industries such as automotive, aerospace, and Nöbbelöv distillery in the south of Sweden to help
packaging, and it is predicted that the global rev- operators see and correct key process deviations in
enue for the 3D printing market will reach $21 bil- the sensitive fermentation process. n
T
he introduction of process safety system–
FAST FORWARD
specific malware into the manufacturing ● A bow-tie model and the concept of escalation factors help explain
world in 2017 intensified the discussion how cybersecurity vulnerabilities can affect safety barriers in the oil
around the convergence of safety and cybersecu- and gas industry.
rity. If a cyberattack could compromise safety in ● To integrate cybersecurity risk assessment into the functional safety
the physical world, we must view cybersecurity in life cycle, ISA and IEC cybersecurity standards have embraced the
the context of safety. Similarly, approaches taken concept of cybersecurity process hazard analysis (PHA).
in the safety world to evaluate risk and to design ● Shell learned several lessons when undergoing its own cyber PHA
safer systems must consider cybersecurity- (based on ISA-TR84.00.09) assessments.
related threats to the integrity of safety systems.
Key end user companies from the oil and gas, degrade the integrity of safety barriers, and (2)
marine transportation, and offshore exploration a standard methodology to assess this risk. In
and production industries discussed these and the first case, using a bow-tie model and the
related issues in a session at the 2019 ARC In- concept of escalation factors can help frame
dustry Forum in Orlando. In that session, Mark where cybersecurity threats and vulnerabilities
Duck, who is with the Shell Projects & Technol- can affect safety barriers. In the second case, the
ogy organization, talked about an approach industry has already taken steps to address how
Shell is exploring to integrate cybersecurity cybersecurity risk assessment can be integrated
risk assessment into traditional process hazard into the functional safety life cycle.
analysis (PHA) methods.
For example, hazard and operability (HAZOP) Cyberrisk viewed as a safety concern
studies could be used to determine the impact The International Electrotechnical Commis-
of cybersecurity threats and vulnerabilities on sion (IEC) 61511 Functional Safety standard
the safety of plant operations. Similarly, meth- now requires a safety instrumented system (SIS)
ods like HAZOP should be adapted to consider security risk assessment. ISA has published a
the cybersecurity risk to the integrity of the technical report (ISA-TR84.00.09-2017) that
selected safety barriers for each specific hazard documents a SIS cybersecurity risk assessment
risk scenario. procedure, called cybersecurity PHA or cyber
These approaches are not limited to the oil PHA. The link to PHA is a step in the cybersecu-
and gas industry. They could be applied to an rity risk assessment process to: (1) review the
even wider range of industries, including those output of the PHA to identify worst-case health,
that are not the primary users of process safety safety, security, and environment (HSSE) conse-
systems. quences for the asset, and (2) identify any haz-
The industry needs: (1) a clear way to think ard scenarios where the initiating event and all
about how cybersecurity risk, if realized, could control barriers are “hackable.”
Environmental
Consequencial
business loss
Reputation
People
Assets
Almost
Rare Unlikely Possible Likely
certain
SIF (SIL2)
Initiating event lation factor” is any situation, condi-
Alarm
BPCS
Barrier
Barrier
#2
#3
en
(PHA) (cyber PHA) Industry Stds tor this into the overall maintenance
tify
Respond
Supplier elements
System / IT capabilities strategy.
Performance tools
Design Design Useful life The need for doing cybersecurity risk
Sustainment elements
Pro
assessments for process safety is called
te
out in IEC 61511 Part 1 (2016). This re-
ct
Operate & Operate &
t
Detec
maintain maintain quires that “a security risk assessment
shall be carried out to identify the secu-
Figure 4. Cybersecurity integrated with process safety. rity vulnerabilities of the SIS.” The re-
quirement further specifies additional
One possible interface between the factor among many other types of es- details supporting the risk assessment.
cybersecurity risk assessment and calation factors that can degrade the Although this is a needed step, there
the HSSE risk assessment process is integrity of a safety barrier. are potentially many other safety sys-
to focus on cybersecurity escalation During a PHA, there is the possibil- tems, in addition to SISs, that are sub-
factors associated with barriers that ity that the initiating event and all the ject to cybersecurity vulnerabilities.
have cybersecurity vulnerabilities. One control barriers selected for a hazard The following are examples of other
advantage to this approach is that it is scenario have cybersecurity escalation programmable safety systems subject
already part of the existing HSSE risk factors. Where this is a high-conse- to cybersecurity vulnerabilities:
assessment process. quence scenario (e.g., potential fatal- l fire water pumps
ity), an effort should be made to add at l tanker loading systems
Historically, HSSE risk least one control barrier that does not l ballast management systems (exam-
have cybersecurity escalation factors, ple: offshore semi-submersibles)
assessments have not such as a pressure relief valve or non- l mooring systems (example: offshore
systems and other control should consider that a cybersecurity l deluge systems
attack on these specific control barri- l sprinkler systems
systems have cybersecurity ers has a higher likelihood of leading to l navigation aids
vulnerabilities—a type of the top event, and they should identify l collision avoidance systems
a robust set of cybersecurity counter- l communication systems
sabotage risk that must measures to manage this risk. The trend to integrate these pro-
be mitigated. grammable safety systems with basic
Maintenance and cybersecurity process control systems will likely con-
It is common for one or more of the Industrial assets typically have a main- tinue and must be considered in the
selected control or recovery barriers to tenance program to maintain the vari- context of the IEC 61511 safety life cycle,
be vulnerable to cybersecurity threats. ous components of the asset and must which includes ensuring cybersecurity
Some examples are safety instrument- often prioritize work based upon some risks are adequately addressed. Con-
ed systems, PLC-controlled fire water criteria. A common way to do this is to sidering these challenges, companies
pumps, and fire and gas systems— organize the assets in terms of system must make sure that cybersecurity
essentially any barrier based upon mi- criticality. If a backlog of maintenance risks to the availability of all barriers
croprocessors running firmware/soft- activities exists, then ensure the com- are understood, mitigated, and even
ware and, potentially, connected to a ponents with the highest criticality are “designed out,” where possible, during
network. taken care of first. the PHA process.
A cybersecurity escalation factor for A common issue with cybersecurity
these types of controls is the combina- controls in an industrial control system Emergence of cyber PHA
tion of cybersecurity threats and vul- (ICS) environment is the related main- This raises the question of how we de-
nerabilities associated with the equip- tenance required to sustain them over velop a cybersecurity risk assessment
ment used to implement the control. In time. Often, the maintenance associ- that meets the requirements of the
this context, cybersecurity escalation ated with cybersecurity controls is a world of process safety. The concept of
factors are just one type of escalation lower priority than instruments, valves, cybersecurity process hazard analysis
AZ Series
Hybrid Control Systems AZ Series Family of Products
Rack & Pinion Systems Compact Electric Cylinders Electric Actuators Rotary Actuators
orientalmotor.com
sales@orientalmotor.com
800-468-3982
A
new year and decade provide an occasion the new concept of
FAST FORWARD
for predictions regarding the state of ana- prediction, and in- l There will be a sweeping transition from
lytics in the process industries. After three stead more about de- historical to predictive analytics.
decades of data generated by digitizing control mocratizing this capa- l There will be an expanded role for subject-
systems, stored in historians, and imported from bility. More assets will matter experts, typically process engineers,
ad hoc analytics in spreadsheets, the static and be involved, ones that in cutting-edge analytics efforts.
past tense model for analytics is getting long in certainly could not l Engineers will quickly create insights to
the tooth. The need for new and improved offer- have been justified in improve outcomes, empowering them to do
ings to actually achieve insights will only become the past due to the ex- the right thing.
more acute because industry data volumes are pense of sensors, data
accelerating. In fact, industry analyst IDC recently collection, storage, and traditional APM solu-
predicted that the average process manufactur- tions. Rather than best practices based on a fleet
ing plant will generate and store much more data of assets, preventative maintenance will be based
in 2025 as compared to today (figure 1). on a sample size of one. Broadly deployed, pre-
The big data era is far from over; indeed, we dictive analytics will enable early alerts to avoid
are only at the end of the beginning for process incidents, along with other warnings of develop-
industry data volumes, velocity, and variety. ing problems, with notice given well in advance.
This means there will be an even bigger discon- Figure 2 depicts how advanced analytics can be
nect between the opportunity and reality of used for predictive analytics.
advanced analytics in the process industries. To realize the benefits of prediction for more and
To address the increasing data volumes and
close the gap from sensors and data to insights Data generated and stored (terabytes per day)
and actions, three key improvements will
emerge over the next decade of analytics as the Industry 2019 2020 2021 2022 2023 2024 2025
past three decades of the historian/spreadsheet Power 1.15 1.34 1.61 1.98 2.48 3.19 4.52
era is left behind. These improvements will be Water 0.32 0.34 0.37 0.40 0.44 0.49 0.57
enabled by continuing advances in software
Gas 0.53 0.56 0.61 0.67 0.73 0.82 0.95
and computing technology, the driving force of
innovation for the past 30 years. Computing is Semi-con 1.73 2.18 2.89 3.97 5.58 8.11 13.54
ever more pervasive, inexpensive, and acces- Elec 1.26 1.47 1.77 2.18 2.73 3.50 4.97
sible. The question is, if it was free, what would assembly
an organization do with it? Med dev 2.01 2.28 2.64 3.14 3.77 4.63 6.18
Petrochem 1.26 1.47 1.77 2.18 2.73 3.50 4.97
From past to predictive maintenance
Oil and gas 1.00 1.14 1.32 1.57 1.89 2.31 3.09
The first improvement is a sweeping transition
from historical to predictive analytics. Most of the Pharma 1.27 1.35 1.46 1.60 1.76 1.96 2.29
common analytics terms used today reflect a bias Auto OEM 1.90 2.15 2.50 2.96 3.57 4.37 5.84
toward the past tense. Reports: what happened? Auto 1.20 1.31 1.47 1.68 1.94 2.27 2.83
Overall equipment effectiveness: what was the suppliers
equipment effectiveness? Root cause analysis:
Heavy 0.76 0.84 0.94 1.07 1.23 1.44 1.80
what caused this? This is historical and backward
industry
looking. Certainly, there are exceptions to this
view—dashboards and other forms of real-time Aerospace 0.89 1.01 1.18 1.39 1.68 2.06 2.75
monitoring for asset performance management Light 0.32 0.34 0.37 0.40 0.44 0.49 0.57
(APM) as an example—but most spreadsheet ana- industrial
lytics clearly are not a forward-looking exercise. Food and 0.85 0.90 0.98 1.07 1.18 1.31 1.53
Further, the use of APM solutions is typically beverage
limited by their cost and complexity to expen-
CPG 0.74 0.79 0.85 0.93 1.03 1.14 1.34
sive, mission-critical assets such as turbines
that can justify the resources and keep up with Chem 1.26 1.47 1.77 2.18 2.73 3.50 4.97
the “drift” in every plant due to changing prices, Paper and 1.12 1.26 1.47 1.74 2.10 2.57 3.43
conditions, formulas, and raw materials. And textiles
even dashboards are typically based on a pre- Metals 0.98 1.08 1.21 1.38 1.58 1.85 2.32
defined and not dynamic context, and as such Source: IDC
report on current data with past tense context. Figure 1. This table shows how the amount of data generated in the process
Thus, the future state of analytics is less about and other industries will increase dramatically over the next five years.
Figure 2. This screenshot shows how advanced analytics was used to predict required maintenance for a heat exchanger.
more assets, engineers will move to the article back in 2012, more recent arti- and operations insights within the orga-
forefront of advanced analytics efforts. cles and anecdotes from end users tell nization. This may just sound like fancy
a different story. The fact is, while data language for dashboards and reports,
Engineers in the lead scientists know their algorithms, they but there is a critical difference, which is
The second improvement is an ex- do not know plant processes and con- maintaining a connection between the
panded role for subject-matter experts text, or first principles models and how created analysis and the underlying data
(SMEs), typically process engineers, in changes affect operations. and providing all users with click through
cutting-edge analytics efforts. These There has also been a more recent access to this data. Engineers, teams,
SMEs have the required education, spate of articles on the need for data managers, and organizations can use
expertise, and history with the plant translators or data liaisons to work these new capabilities to distribute ben-
and processes: they know what to look between data science and engineering efits throughout a plant and a company.
for and what it means. “Self-service” or teams. But all of this can be avoided
“ad hoc” are the terms used for these if advanced analytics vendors simply Insights in time
types of solutions, which ensure local close the gap and bring data science With more assets connected and con-
access to insights by putting the power innovation to SMEs by creating self- tributing to predictive plant mainte-
in the hands of SMEs. service features. Yes, machine learning nance, and tools in the hands of the
The future state is therefore not re- is a critical component for analytics engineer to participate in innovative
placement of SMEs, which is the mes- next, as described in the advanced ana- plant analytics, the third improvement
sage associated with machine learning lytics section below. But although these for the next generation of analytics is
and initiatives based on information and other algorithms are important, to do the right thing. In the context of
technology (IT), but to instead improve they are not sufficient. Application-spe- process manufacturing, the most data
the available tools so they can imple- cific expertise is critical and required. intensive and scientific of industries,
ment predictive and prescriptive ana- Furthermore, a new generation of ana- that may sound ridiculous, but it is a
lytics. Although there has been much lytics cannot end with SMEs. Self-service critical difference for future state ana-
excitement about data scientists and is what they have been doing for 30 years lytics. Predictive analytics will provide
their role in improving production out- with spreadsheets. Therefore, new so- a view into the future, with SMEs and
comes, such as the Harvard Business lutions must empower teams and net- others developing insights in time to
Review’s “Sexiest Job of the Century” works of employees to share production impact outcomes.
For example, with spreadsheet-based of the long times to insight associated analytics are possible. An example of
and other forms of traditional analytics, with spreadsheets. In speaking with these concepts is in the sidebar.
it often takes longer to do the analysis SMEs, this provides them with ability to Attaining these objectives will be
than the batch takes to complete. This do the right thing by quickly examining possible, as mentioned earlier, by the
means batches are discarded rather a given data set with context, data, and continuing innovation in software that
than fixed during the cycle time, so priorities as a framework for priorities. has defined every aspect of our person-
al and professional lives over the past
The end goal of future analytics: enable the right 30 years. Undermining the change are
decision in time to improve the outcome. paradigm shifts in where and how ana-
lytics will be executed.
the right thing—finding and fixing the Thus, the end goal of future analytics:
problem during the cycle—does not enable the right decision in time to Cloud and on-premise edge
have a chance to happen. Another improve the outcome. This is why the computing
example is where there is a question of previous points—a complete view of Analytics workloads are particularly
the right course of action for an asset plant health and requirements and an suited for the cloud because most use
versus a unit or overall plant objective, empowered engineer—are so impor- cases require the scalability, agility,
where it may be better to postpone a tant. Only with the full context of pri- quicker deployment, and lower costs
maintenance action to achieve a more orities, costs, and requirements can the associated with the cloud to analyze
important goal, such as continuing right decision be made on a consistent more assets and processes. Therefore,
production. basis. Rather than a “prescriptive” ap- companies of all types, including pro-
A SME should be able to see and proach that assumes all states, require- cess manufacturers, are moving their
identify the trade-offs and make the ments, and outcomes may be defined IT infrastructure and data to public and
right decision to optimize overall out- and known in advance, SMEs and other hybrid clouds to access on-demand
comes. This is transformative analytics: plant employees can analyze and make computing resources. And for those
a break from the past tense approach decisions in the moment because fast companies not willing to move their
Always get a
star performance
every time
Figure 3. Advanced analytics software empowers engineers and other experts to interact directly with data of interest, and to easily
share results across an organization.
data to the cloud, the cloud is coming model for big data storage in process What has happened is that vendors
to them in on-premise hardware solu- manufacturing—on premise, historian- have recognized there is too much data
tions with cloud platforms, such as based, and proprietary—is undergoing from too many sensors, and potentially
AWS Outpost or Microsoft Stack. Pro- a transition, enabling new alternatives of too many types, for one person to
cess manufacturers will therefore likely for how and where analytics are run. simply solve problems manually with a
use a mix of public and private cloud The new model might be a data lake for spreadsheet. Therefore, through the in-
offerings, as well as on-premise com- data aggregation, on-premise or in the troduction of machine learning or other
ponents, for analytics. cloud, or a comprehensive Industrial analytics techniques, engineers’ efforts
The trend is in its infancy, though Internet of Things solution, such as a are accelerated when seeking correla-
some industries are ahead in embracing next-generation data storage platform. tions, clustering, or any needle within
the cloud, for analytics as well as other At a minimum, current process histo- the haystack of process data. With these
use cases. Consequently, the big public rian vendors need to introduce road features built on multidimensional
cloud platforms are paying more atten- maps with safe passage for data from models and enabled by assembling
tion to the largest sources of data, with on-premise offerings to the cloud. data from different sources, engineers
manufacturing leading all sectors of the gain an order of magnitude in analytics
economy in terms of data volumes. Advanced analytics capabilities, akin to moving from pen
For example, Microsoft, Amazon, Spreadsheets lead the way in analytics and paper to the spreadsheet (figure 3).
and Google have specifically focused today, but this general-purpose tool is
on the oil and gas sector as a starting not suited to the task of implementing Engineer’s tool
point for their efforts. This is clearly a predictive and prescriptive analytics. Advanced analytics innovations are not
sign of market interest, and it is also a Replacing spreadsheets comes with a a black box replacement for the exper-
sign of the maturity of the cloud offer- new entry to the dictionary: “advanced tise of the engineers, but a complement
ings: Amazon brought out AWS in 2002, analytics.” Just as adding “smart” to and accelerator to their expertise, with
and then introduced S3 (storage) and a noun denotes a thing with sensors transparency to the underlying algo-
EC2 (virtual machines) in 2006. Cloud for telemetry and remote monitoring rithms to support a first principles ap-
computing competition then increased services (e.g., smart refrigerator, smart proach to investigations. It is a natural
with Microsoft’s and Google’s cloud parking lot), adding “advanced” to “ana- next step in the history of statistical and
platform introductions in 2008. lytics” brings analytics into a modern control processes, rather than a data
What this means is that the current framework to address today’s challenges. science approach to investigations.
At the same time, advanced analytics status quo. Using advanced analytics, application companies, and prior to that
recognizes the path to quicker insights insights will be shared to enable the worked with Microsoft for 20 years. Risse
must leverage innovations in adjacent required collaboration among experts is a graduate of the University of Wiscon-
areas to address the scope of data avail- within a single process plant and across sin at Madison, and he lives in Seattle.
able for investigation. an entire organization. These develop-
View the online version at www.isa.org/intech/20200202.
Wrapping complex functionality in ments will work in concert to advance
easy-to-use interfaces is a common ex- analytics from backward to forward
RESOURCES
perience in our lives as consumers, for looking, enabling process plants and
example, the ability to search in Google. facilities to spot developing problems “Analytics next: Beyond spread-
These same approaches are now being and close control loops. n sheets”
adopted by analytics offerings for engi- www.isa.org/intech/20190802
neers in process manufacturing. ABOUT THE AUTHOR
“Empowering an effective PAT
Michael Risse (michael.risse@seeq.com) is
methodology”
Looking forward the CMO and vice president at Seeq Cor-
www.isa.org/intech/20190402
We are nearing the end of an era de- poration, a company building advanced
fined by on-premise data collection analytics applications for engineers and “What’s next for big data in process
and spreadsheet-based analytics as the analysts to accelerate insights into in- manufacturing”
next generation of predictive, engineer- dustrial process data. He was formerly www.isa.org/intech/20180601
led, and timely analytics replaces the a consultant with big data platform and
D
By Rich Carpenter iscrete manufacturers and original Engineers and designers of manufacturing
equipment manufacturers (OEMs) are and OEM systems develop expertise integrat-
experts when it comes to operating ing the right automation platforms to obtain
their equipment. They run and develop these the necessary functionality, even though this
systems daily, always learning and improving. task may not be their core strength. They are
Once stable operation is established, these aware of the need for good operating metrics
companies must proceed to incorporate tech- and are looking for smart ways to add them to
nologies and methods, such as data analytics, an already functional system.
to improve performance. Cloud-based analyt- A lot can be learned by observing a system in
ics are an option, but many users have discov- operation and obtaining user feedback. How-
ered it is expensive or against established infor- ever, quantitative values, such as throughput
mation technology (IT) policy to move data for rates, failure counts, change-over frequency,
all analytics to the cloud. and other data, are usually needed to support
FAST FORWARD
l Data analytics provide valuable feedback to optimize maintenance,
increase uptime, and improve real-time control.
l Industrial data sources include sensors, controllers, and smart devices
at the operating edge, so it makes sense to collect, preprocess, and
analyze data locally.
l Only transport data as appropriate to the cloud. Edge data can be
analyzed locally to make better control decisions and then cleansed,
transformed, and packaged for transmission to the cloud.
plant-level data analytics needs, the sources and can offer many benefits
cloud-only method is not usually the for processing and analyzing this data
best solution. There are examples of pre- closer to the edge.
dictive maintenance performed on high-
value equipment using data sampling Edge analytics advantages
techniques at the edge to provide early Due in part to the growing capability of
warning signs of failing equipment. industrialized hardware and associated
The edge of any industrial system software, it is more practical than ever
is the natural place to begin an ana- to perform advanced computing at
lytics initiative because that is where the factory floor with a range of edge-
the source data is created. Many data capable component options (figure 2).
points may be involved, and each point Some advantages of edge analytics are:
can potentially have a high sample rate. l improved data privacy
Common sense informs us it might l better data fidelity and responsiveness
be burdensome and perhaps costly l resilience against data transmission
to transmit all this data to the cloud. interruptions
Figure 1. Smart edge devices like this Emer- Edge-located preprocessing of the raw l reduced data communications
son PACMotion VFD can provide extensive
data about operation, energy consumption,
data refines it into more concise values. l a better opportunity to “close the
and diagnostics—if the right edge compo- Traditional analytics were based on loop” for control
nents are in place to obtain it. data obtained mainly from equipment Many companies are rightfully
control systems, because those digi- concerned with data privacy. Data ob-
tal systems were already connected to tained at the edge and analyzed at the
rameters. Smart manifolds offer early the sensors for command and control. edge is easier to secure, generally be-
indication of air leakage, which leads to Furthermore, the computing resources cause it is kept local. Even if the data
excess energy consumption and higher needed for storing data and analyzing must be transported to analytics ap-
operating costs. There are many other it were only available at the server or plications located elsewhere onsite, or
examples of smart edge devices like perhaps desktop computer level. in the cloud, the latest edge controllers
variable speed drives (VFDs), analyz- Today, many end users are embark- and devices use modern and secure IT-
ers, power meters, and intelligent valve ing on IIoT initiatives and taking ad- based protocols for communicating.
controllers (figure 1). vantage of IIoT devices to obtain rich Data generated using traditional op-
All of these may provide multiple new data streams, economically by- erational technology–based devices,
data streams using conventional wiring passing traditional control systems. A most commonly programmable logic
and networked signals or newer wire- new generation of edge-capable com- controllers (PLCs), may lack security
less connections. The data typically in- ponents are best suited to interface measures or may have added-on se-
cludes one or more near-real-time pro- with the growing number of IIoT data curity instead of built-in security. Con-
cess variables, and other less-real-time
extended configuration and diagnostic
information.
In addition, data sources can include
less traditional digital sources like the
Internet and company intranets, which
have information relevant to production
processes, such as raw material prices,
energy prices, weather conditions, and
demand for finished products. Gather-
ing the data effectively calls for install-
ing the right technologies in the right lo-
cations to obtaining it from many types
of sources on varying time scales.
procomsol.com
amounts of data, can be cost prohibitive. combined with
Edge analytics have also enabled a the high-speed
much better solution for “closed-loop” deterministic
operations by directly applying results control features
using them as PLCs but eventually ex- tributed set of assets. The edge gate- improvement, of their industrial sys-
panding their role to include analytics. way connects to the asset, packages tems. They also know there may be
Or, edge controllers can be retrofit into the data, and transports the data to a large quantities of untapped data in
brownfield systems to add analytical and cloud or hosted infrastructure. This IoT sensors, smart field devices, and
IIoT capabilities. consolidated data is often accessed in even existing OT systems. However, the
order to check the health of the equip- idea of creating an overarching cloud-
Edge alternatives ment, avoiding the significant expense based system to take advantage of the
Although edge controllers are the most of travelling to each site. data can be daunting.
complete option, other edge compo- Edge devices typically augment an The availability of powerful edge
nents like devices and gateways can be on-premise machine or plant by col- components enables another practi-
used as cost-effective alternatives or in lecting data from the device, aggregat- cal approach. Installing modern edge
conjunction with edge controllers in ing it with other information available, controllers and edge devices is a com-
some applications. Edge devices typi- and then analyzing this data to opti- paratively easy way to begin taking
cally support local applications with mize control decisions. For example, advantage of analytics. These edge
analytics on the device and can com- the edge device may combine pro- components can perform the analyti-
municate data like an edge gateway. duction data from a machine control cal role themselves or support future
They are a good fit for use in conjunc- system with data collected through cloud-based systems.
tion with an existing control system supplementary sensors added outside There are many reasons to keep ana-
that will remain in service, when it is of the control platform—such as for lytics close to the field, especially to ob-
desirable to add analytics capability. vibration, pressure, and temperature— tain the best data fidelity and commu-
An edge device might be used when and use this information in context to nications robustness. More compelling
the analytics require high-fidelity data, detect overall process problems and for some applications is the ability of
which can require too much network support a human-machine interface edge controllers to close the loop by di-
bandwidth to transfer to the cloud or (HMI) (figure 4). This processing, for rectly using analytical results to inform
where the cost of cloud systems and example, could observe an increase in the real-time control system of optimal
storage is too high to be practical. Be- air pressure required to manage ma- operational settings. n
cause they are installed local to the chine motion, which could indicate
source data, they are also a good ap- leaks in the system. ABOUT THE AUTHOR
proach when gaps in data collection An edge controller is more like a
Rich Carpenter
due to network connectivity issues modern car, where the driver still per-
(Richard.Carpen-
would otherwise significantly affect the forms direct control but is advised
ter@emerson.
quality of the analytics. by an onboard navigation system as
com) is the general
Edge gateways typically include pro- to the best route. A real-time operat-
manager for prod-
tocol drivers to connect to plant con- ing system (RTOS) portion of the edge
uct management
trollers as well as cloud connectors to controller manages the deterministic
for Emerson’s Ma-
connect to leading cloud infrastruc- control system, while a second general-
chine Automation
tures such as Microsoft Azure and the purpose operating system (OS) side
Solutions business unit and has respon-
Amazon IoT cloud. The purpose of the may be connected to IoT devices and
sibility for its portfolio of control system,
edge gateway is simply to collect data broader information available from
operator interface, industrial PC, and
from industrial devices, package it, and supervisory computing and even the
Industrial IOT software and hardware
send it to industrial clouds, whether Internet. The RTOS and the OS may
products for industrial automation.
public or private. constantly exchange information to
optimize production processes. For View the online version at www.isa.org/intech/20200203.
How companies are using edge example, the controller side may be
analytics managing reservoirs of water as they
RESOURCES
Manufacturers and OEMs are learning move through a purification process.
“AI equipment health monitoring
how to implement edge analytics, and The general-purpose side may be
and prediction technology”
it is not an all-or-nothing proposition. checking the forecasted energy prices
www.isa.org/intech/20181205
They can start in just one targeted area, and communicating to the control side
apply edge analytics concepts as sup- the optimal time to run equipment for “Digitalization delivers value and
plementary to already-operating con- energy savings. competitive advantage”
trols, or choose new platforms and use www.isa.org/intech/20190603
the available capabilities progressively Start with analytics at the edge
“Digital transformation creates new
as needed. End users are aware that analytics ini-
opportunities for system integrators”
Edge gateways are typically used to tiatives are an important avenue to
www.isa.org/intech/201904channel
get visibility to a geographically dis- better understanding, and therefore
Industrial Cybersecurity
is a Global Imperative
It’s time to join forces. We are stronger together.
The ISA Global Cybersecurity Alliance is an open, collaborative body.
We welcome members of all kinds:
• end-user companies • services providers
• asset owners • system integrators
• automation and control systems • industry organizations
vendors • government agencies
• cybersecurity technology vendors • insurance companies
• IT infrastructure vendors • other stakeholders
Founding Members:
TM
A
s food safety becomes more and more labels, bar codes, date codes, and even nutri-
a concern, the ability to track products tional and allergen information. One answer to
within a facility is of vital importance this is a continued focus on traceability, which is
to manufacturers and consumers. In 2018, the a challenge many food and beverage companies
Food and Drug Administration (FDA) reported face. When you know where your product is and
137 product recalls due solely to misbranding what is happening around it at all times, you
and undeclared allergens. These are all classi- are able to better control the environment sur-
fied as Class 1 recalls where, under FDA regula- rounding it and avoid potential waste, rework,
tions, there is a significant risk to health. and even product recalls.
Not only do these recalls have significant con- And though traceability is a primary end
sequences to public health, they also put com- goal for many food and beverage companies,
panies at risk. A Deloitte study on recall execu- accomplishing it is not always easy. Many
tion effectiveness estimates that a food recall companies have track and trace systems in
can cost a company up to 10 million dollars. In place that monitor and control packages and
addition, a company’s stock price can decline products, but they are often incomplete. The
up to 22 percent within two weeks after a recall solution to this is finding a more comprehen-
is announced. sive software and sensor solution to provide
As consumers demand more accurate and a complete package and product monitoring
clear information on purchased products, it is and control system to track and trace products
up to manufacturers to improve packaging, throughout the facility.
FAST FORWARD
l Traceability in the food and beverage industry enables manufac-
turers to eliminate human error, improving efficiencies and increas-
ing productivity.
l Complete coding management and packaging verification solutions
are insurance against coding and packaging errors.
l With a modular sensor and software solution, manufacturers can
ensure their products will leave the factory in the right packaging
with the correct label and coding information.
What causes labeling and packaging errors print a poor-quality code that is illegible and
With the increasing complexity of packaging types, needs to be redone. Although eliminating these
it has become more challenging for food and bev- errors may seem impossible, it is really easier
erage manufacturers to reduce, if not eliminate, than you might think. When you catch these
errors in coding and packaging products. This is errors early, you can avoid significant produc-
particularly important in situations where mis- tion losses in time and money.
takes can cause a risk to consumer health. “One simple mistake on packaging lines can
Errors in the packaging process happen for a result in huge commercial damage to your busi-
number of reasons, but many of these errors are ness: both in financial loss and damage to brand
human error. For example, the wrong date code and customer confidence,” said Mike Hughes,
being entered into the printer can cause waste managing director of AutoCoding Systems.
and rework. “Even if you are lucky enough to identify an er-
One of the more common mistakes is be- ror before it enters the distribution chain, it’s
cause of the frequency of artwork changes and likely that you will still incur significant rework
promotional offers. It is increasingly difficult for or scrap costs to rectify the problem. And there’s
manufacturers to eliminate errors on packaging an added risk of shorting customer deliveries on
lines because of the sheer number of products shelf-life critical products.”
being produced in different packages, especial-
ly when temporary promotional packaging is Taking steps to remove human error
implemented. When the incorrect packaging is Sensor solutions play a large role in the pro-
selected, the entire batch needs to be scrapped, duction of food and beverage products. In ba-
producing significant waste. sic track and trace systems, sensors are needed
Other errors can occur from the printer or to identify one- and two-dimensional codes,
coder. A coder may fail to print, or a printer may read and write to radio frequency identification
are avoided entirely. With these types of entered into a secure database, thereby
solutions, you gain better control over allowing validation before use. The
your packaging line and the integrity of stored data is used to set up and con-
your products. trol the relevant devices on the packag-
Job setup and changeover time is ing line. This removes the need for op-
also dramatically reduced. When man- erators to program the devices and, in
ually setting up a packaging line, it can turn, removes the risk of human error.
take up to 15 minutes, with quality pa- However, one challenge with some of
perwork adding another five minutes. these systems is they may require the
This 20-minute time frame can be re- use of a single manufacturer’s “network-
duced down to one minute or less with ing systems.” What is needed is a solu-
a comprehensive solution such as this. tion that works well with all equipment
“By automating the setup of your typically found in a packaging line. This
Vision sensors can verify the correct code coders and other packaging line devic- means you will not have to make costly
was used and that it actually printed. es, potentially to the point where you changes to your packaging line just to
can receive instructions directly from get it implemented but can use a single
(RFID) tags, and provide high-resolu- your ERP [enterprise resource plan- system to control multiple devices from
tion images for downstream processes. ning] or MES [manufacturing execution different vendors. The devices may
The most common solution used in system], you save on downtime and re- perform different functions—coding,
these systems is bar-code readers— duce the number of repetitive, low-val- inspection, labeling, and verification—
used primarily to identify markings ue tasks your staff would otherwise car- but they all exist on the same line. So,
and codes on packages. But a track ry out on a day-to-day basis,” Hughes for your convenience, you want to be
and trace system goes beyond just bar- said. “It’s also important to have the op- able to control them easily.
code readers. It also encompasses vi- tion to build on your chosen solution’s With a system like this, you can set
sion solutions, Ethernet, software data- core functionality to add features like up and control all types of packaging
bases, and more. Greater functionality OEE [overall equipment effectiveness] line equipment, including multiple
is possible when using a comprehen- reporting, paperless quality control, brands of printers, labelers, check-
sive software database that connects inspection reporting, and more.” weighers, metal detectors, and x-ray
with sensor technology. equipment. This increases your trace-
Complete coding management and Control the packaging line ability throughout the facility, as every-
packaging verification solutions are To keep up with a changing business thing can remain connected, regardless
insurance against potential coding environment, new technology, and de- of the supplier.
and packaging errors. You will gain in- manding consumers, food and bever- In addition, an automatic solution
creased speed, reliability of line setup, age manufacturers are acknowledging should manage the entire packaging
and reduction in job changeover time. that automation must play a signifi- workflow process. From making art-
Modular sensor and software prod- cant role in their factories to improve work changes in the system database
ucts can eliminate the risk of coding efficiency and reduce costs. As such, to equipment setup to retrieving prod-
and packaging errors that can lead to the need for equipment connectiv- uct information from the database, you
emergency food recalls. When imple- ity on the factory floor has never been want better access to all data on your
mented on packaging lines, companies more prominent. For equipment and
can effectively manage the deployment applications to work together with
of coding and data and the checking of minimal human intervention, they
packaging before products leave the need to be able to communicate, share
factory. data, and report back on performance
Essentially, software verifies that all and quality.
coding data and packaging is correct. A modular sensor and software pack-
Vision sensors then verify that the cor- age is very effective at helping to meet
rect code was used and that it actually a retailer’s code of practice related to
printed, helping to validate codes and coding and packaging verification.
prevent recalls for food safety before However, there are additional capabili-
products leave the facility. This leads to ties that can be rolled into packaging
increased traceability and accountabili- lines for process improvement reasons,
ty for food and beverage manufacturers. not just for compliance reasons.
By catching mistakes at the source, Information relating to a product Packaging verification solutions with an
significant changeover delays or re- (i.e., date coding rules, packaging art- image-based code reader can even detect
work to recode or correct the packaging work, bar codes, coding profiles) can be codes on shiny surfaces.
packaging line so you can make better al trend is that these compliance-driv-
decisions to remain competitive. en requirements are becoming more
A complete solution like this gives detailed and prescriptive,” Hughes
the consumer goods industry a way to said. “The audit regime, particularly
greatly reduce date-coding errors and if your business manufactures on mul-
downtime related to product change- tiple sites for multiple retailers, can
overs. You will have dynamic control become exhausting. One group tech-
of your packaging line, ensuring that it nical director recently told us that on
stops if a device malfunction is detect- average, one of his sites is being audited
ed or if there are too many misreads or somewhere, for something, every cou-
no-reads detected from a sensor. ple of days.”
With a paperless system, product
Add modules for functionality traceability is at an all-time high. Infor-
Any automated system should be mation becomes available to anyone in Capabilities can be rolled into packaging
scalable with the potential to add ad- the system, instead of just those who lines for process improvement reasons,
ditional functionality as required. A have access to the paper. not just for compliance reasons.
modular sensor and software solution
can provide additional features that Packaging line problems A multitouch human-machine-inter-
address very specific challenges man- A modular sensor and software system face was implemented, using a hand
ufacturers face. that can verify packaging and cod- scanner and RFID reader for user login.
Extensive reporting is available from ing issues has value in many different This gave operators a robust and reli-
inspection devices like checkweighers industries. In one instance, a major able interaction point with the system.
or metal detectors to provide access global manufacturer of pet food re- In addition, the software faithfully elim-
to more data on your packaging line. quired a solution that would address a inated coding and packaging errors.
You can also receive line performance number of issues it was experiencing. On the company’s primary packag-
reporting to capture real-time manu- ing lines, secure deployment of the ex-
facturing data with accurate reports. USER EXAMPLE piration date and other data was sent to
These reports display your packaging Print correct date codes the coders. The printer is automatically
lines, devices, and product perfor- The manufacturer’s main pain points set up with the correct coding informa-
mance. This helps improve your over- were printing the wrong date code on tion. The line also stops entirely if the
all equipment effectiveness to drive products, not printing date codes on printer goes into a fault state.
gains in throughput and efficiency to products, and selecting incorrect pri- The sensors on the system detect
increase profitability. mary and secondary packaging for whether or not a code is present. If one
Additionally, a pallet labeling sys- the products. As a result, it looked to “No Read” is detected, it will reject the
tem is available for auditable and con- a modular solution for software and product, but not stop the line. If more
trolled labeling of pallets from differ- sensors to solve all of these problems. than three “No Reads” are detected, the
ent lines with information like batch
code, order ID, line ID, stock keeping
unit (SKU), and SSCC18 (serial ship-
ping container code) information.
Better reporting allows for more ef-
fective coding automation and the
automatic generation of batch codes
and best by dates. This all drives line
availability and improves the overall
packaging process.
Finally, you can make your quality
control process paperless. Digitizing
quality checks allows you to incorpo-
rate in-line and off-line quality control
processes into a workflow control. Data
is then recorded in the audit trail to
utilize electronic reporting.
“A purely manual, paper-based sys-
tem is becoming challenging for many
manufacturers to maintain. The gener- Accurate detection of codes on packaging of all shapes and sizes is essential.
entire line will stop until the problem Coding management and packaging verification
is fixed. This means the company can
Coding and Scanning and Metal detection
get ahead of the problem before it re- labeling inspection and checkweigher
sults in significant waste and potential
recalls.
For packaging errors, a verification
process was put in place. Expiration
dates and other data is sent to the car-
ton printers. Sensors verify correct
packaging using inline checking of bar Line interlocks via
codes. They also verify that the correct I/O controller
code is placed on the box. Reporting Quality Data
control
Applying data science to hazard analysis the information developed during PHA.
It would seem that you should be able to
Pump seal simply press a button, and switch from
Pump failure – viewing the data as a PHA to viewing it as
discharge Leakage a LOPA, then a hazard register, and finally
valve fails of process Pool fire as a bow-tie diagram. Further, it seems
closed like you should be able to make edits to
the bow-tie diagram and have them cas-
Operator SIS – Ignition cade back to the LOPA study, and then
action based Low flow control – you should also be able to view the quan-
on LAL shutdown Probability titative aspects of the LOPA while you are
of ignition viewing the bow-tie diagram.
Unfortunately, this is not currently
the case. At the current moment, each
of these different uses of PHA data use
Inadvertent Toxic vapor different software applications, each
closure of exposure of which use different data structures
discharge to represent data. Even worse, the data
valve SIS – structures in the different applications
Low flow for different study types are completely
shutdown and irreconcilably different from each
other such that data cannot be shared
Figure 1. Typical bow-tie diagram.
between applications.
To address this situation and maxi-
properly designed, implemented, and riers.” Barriers are events, systems, or mize the utility of the data that the pro-
maintained. These lists of significant situations that prevent the cause from cess industries are investing in, a few
hazards and information relating to resulting in the loss of containment changes need to be made in how PHA
them are typically referred to as haz- scenario—which in bow-tie analysis is performed and documented. First, a
ard registers. While hazard registers jargon is typically referred to as the change in the mindset about how PHA
became a powerful tool for manag- hazard or hazardous event. Barriers facilitators document studies will be re-
ing risk, understanding the hazards between the cause and the loss of con- quired. Facilitators must be willing to
and communicating them throughout tainment are referred to as “preventive” document studies based on where the
the organization and even to external barriers as their successful operation hazard manifests itself as opposed to the
stakeholders was difficult due to the prevents the loss of containment from location of the cause of the hazardous
highly technical nature of the infor- occurring. event. But most importantly, industry
mation and the dense use of acronyms On the right side of the bow-tie knot is needs to move to a common, consistent,
and jargon. the description of what occurs after the standardized data structure for PHA: the
loss of containment. This consists of a unified hazard assessment.
Bow-tie diagrams series of consequences that can occur as
To aid in the understanding of hazard a result of the loss of containment event, Basics of structuring data
scenarios, the visualization technique with lines drawn from the “knot” to the Before delving specifically into the
of bow-tie diagrams was developed. consequences. As with the causes, all problem of defining a consistent struc-
When a hazard scenario is visualized as of the consequences may have barriers ture for PHA data, we should begin by
a bow-tie diagram, it is a graphical repre- that will either prevent or mitigate (i.e., discussing how data is structured in
sentation of the development of the sce- reduce the magnitude of) the conse- general. Although this section will rely
nario. The bow-tie diagram reads from quence if they operate effectively. on terminology that was developed for
left to right (figure 1). On the left a series The key benefit of the presentation relational databases, it is applicable to
of causes of the hazardous event are list- of a risk scenario as a bow-tie diagram other methods of data storage and re-
ed. A line is drawn from each cause to the is that the visualization accelerates trieval that are vastly superior to the
“knot” in the bow tie. and facilitates understanding of the use of traditional relational databases
The knot in the bow tie represents scenario. The combination of the vi- for hazard analysis studies.
the realization of the hazardous event. sual cues and textual information is a The primary concepts of relational
In the process industries the “knot” is much richer representation of the haz- databases for storing data are tables,
typically a loss of containment of pro- ard scenario information. records, fields, relationships, and iden-
cess chemicals. Along each line from The preceding discussion clearly shows tifiers (IDs). A table is a structured list
the cause to the bow-tie knot are “bar- that there are myriad valuable uses for of data that all describe a given item;
for instance, a PHA study will gener- This activity is referred to as cause of these structures combined together
ally have a table that describes all of indexing. What the PHA software does result in the overall database structure.
the study nodes. The best way to think in order to display that view that most
about a data table is by visualizing a of us are familiar with is to first display Relational database challenges
spreadsheet. A table contains many the deviation from the deviation table The discussion in the preceding sec-
rows and columns of information and subsequently search the causes tion used terminology that is consis-
where each column of information is a table to find all of the causes that are tent with relational database technol-
specific piece of information, such as a associated with a given deviation. It ogy, which is commonly used to store
node number or a node description. does this by comparing a “Deviation PHA data. However, use of relational
A database generally contains ID” field in each cause record with the databases is becoming obsolete in ap-
many different tables that describe ID of the deviation that is currently be- plications like PHA studies, as Internet
the different aspects of a system. For ing displayed. technology and cloud computing of-
example, a PHA database might con- A many-to-one relationship is the fer better ways to store and work with
tain a table for nodes, deviations, opposite of one-to-many and works data. All of industry, and all of society,
and causes. The reason that different
tables are required is because, often,
there are multiple instances of one
type of item that all relate to a single
PHA software first displays the deviation from the deviation
instance of another. With PHA, for in- table and subsequently searches the causes table to find all
stance, a single node will have many
different deviations associated with it,
the causes that are associated with a given deviation.
and a single deviation can have many
causes. To address this phenomenon,
we set up multiple tables of informa- very similarly. A many-to-many rela- is migrating to a paradigm where in-
tion, and organize the linking between tionship between tables is the most formation is stored in the cloud, and
the tables using relationships. complex situation. Here, a single record all knowledge work will be performed
In database science there are three in the primary table can have multiple by interacting with the cloud, gener-
types of relationships: one-to-many, associated records in the secondary ally through a web browser. Even when
many-to-one, and many-to-many. A table, but, individual items in the sec- desktop applications are developed to-
one-to-many relationship means that ondary table can also have relation- day, they are generally a thin wrapper
for a single item in the primary table, ships with multiple records in the pri- that essentially holds a web page.
there can be many items in the second- mary table. The best example of this in Relational databases accessed through
ary table that are associated. In other PHA is recommendations. Each PHA the cloud work great when the user
words, the primary table, the “parent” cause (scenario) can have multiple rec- would like to interact with a single re-
in the relationship, can have many ommendations associated with it, but cord of a single table in a database.
“children” in the secondary table. In a each of those recommendations can But, when a user desires to work with
typical PHA, a single node has many also be associated with multiple causes. and view multiple different records of
deviations, and each deviation has In this complex case, an entirely sep- multiple different tables, the result is a
many causes. A relational database arate table needs to be created simply dreadful and slow user experience, as
manages these relationships first by un- to store the relationships between the the web page tries to kludge up a concat-
derstanding how they are defined, and primary and secondary table. As al- enation of all the requested information
then by tracking the IDs of the records. luded to earlier, each table contains in a single form. This form then updates
multiple records. Each record is like a every time the user shifts focus from one
Cause indexing row on a spreadsheet and contains all element to another—especially if any-
When you look at a PHA report, a sin- of the different attributes of a specific thing was edited, because that is what
gle deviation contains multiple rows entry on the table. Each record then is is required to maintain contact with the
that contain causes of the deviation. composed of multiple different fields. database server.
Although it looks like a single table Each field is a specific data entry of a The primary problem is the trans-
to the viewer, in reality the software given data type. actional nature of a relational database.
is combining the two different tables For instance, if a PHA study contains When a user requests a piece of informa-
into one visualization. The deviation a table of safeguards, that table might tion, the database must know specifically
table, in fact, does not actually con- contain individual fields for tag (text what table, record, and field to get. It then
tain any information about causes at string), description (text string), prob- grabs that piece of information, transfers
all! Instead, each cause contains the ability of failure on demand (floating the data between server and client, and
identifier (ID) of the deviation that it point number), effectiveness determi- the client processes the information by
is associated with. nation (Boolean), and ID (GUID). All presenting it on the screen.
“CauselD” “1”
“Cause Description” “Pump Failure”
“Safeguards”
“ID” “1” “Tag” “LFL-01” “PFD” “0.1”
“ID” “2” “Tag” “FZC-02” “PFD” “0.1”
As described in the previous section, computing. Specifically, the data trans- tables, in all formats, the same way that
in order to present a PHA worksheet action speed problem was solved using relational databases do. Figure 2 pres-
on a computer screen, data needs to Extensible Markup Language (XML) ents an example of some PHA data be-
be obtained from multiple fields, in and subsequently its even lighter cousin ing stored as a JSON object.
multiple records, of multiple tables. JavaScript Object Notation (JSON). While some applications are built
Furthermore, drawing the information In the new paradigm, when a web with a relational database server that
on the screen is complicated by the fact page wants to get data from a database serves up the data to build a web page
that the application needs to change server, it does not request a single field and then stores the results after the
the view as a function of how many at a time, it requests that a large collec- page is edited, more and more, the re-
records in secondary tables are associ- tion of data is “serialized” into a JSON lational database is not used at all. The
ated with a given record in a primary object, and that single object is con- JSON objects are simply stored on the
table. This requires thousands (or even veyed from server to client in a single server as the end result.
tens of thousands) of individual data- transaction. As a result, a best-in-class,
base transactions to occur between the cloud-based PHA application only Unified hazard assessment
client and server to obtain the informa- communicates with the server twice A single data structure cannot be both
tion for a single screen view. per worksheet—once to load the data cause indexed, as is the most common
The problem is usually further exac-
erbated by third-party “controls” used
during the programming process. Many
software vendors do not have the talent
The state-of-the art approach is to eschew traditional
to directly access the database, and in- relational database technology in favor of the flexible data
stead rely on third-party controls that
they configure to access the desired
object models that were born in cloud computing.
data. Unfortunately, these controls—
such as text boxes and grids—have
bloated and slow code, because they are from the server, and then once again to approach for HAZOP, and also conse-
designed to be flexible, not fast. return the edited data back to the serv- quence indexed, as is the most com-
er. In the interim, the web page keeps mon approach for LOPA. Furthermore,
A new paradigm the entire data object in memory on neither of these data structures is suit-
The elite companies in Silicon Valley the client. When users interact with the able for hazard registers or bow-tie dia-
have developed better ways to handle data, they are interacting with the data grams. But the latter two are indexed by
this problem and are using them fre- on the client—at lightning speed—not a “hazard” or a “hazard scenario”— the
quently and widely in their software and the data on the server. approach that also underlies a unified
web sites. Unfortunately, most PHA soft- New data structures like XML and hazard assessment data structure.
ware has not caught up with the times. JSON have all the advantages of a rela- The unified hazard assessment data
The state-of-the art approach is to tional database. They can easily store structure provides a platform that
eschew traditional relational database multiple tables, each with multiple allows a single data set to be used for
technology in favor of the flexible data records and multiple fields. They can multiple purposes. HAZOP studies can
object models that were born in cloud also manage relationships between generally be performed using the same
workflow as always, but you need to ard scenario record should include safeguard probability of failure on
take some additional care where things a Boolean variable that indicates demand, and the overall scenario fre-
are documented. Also, at least one ad- whether or not the hazard scenario quency and risk ranking. This will en-
ditional data field will need to be com- requires a LOPA. In this way, when able performing a HAZOP or LOPA us-
ing the graphical format of the bow-tie
diagram (figure 3).
The last information presentation
The data transaction speed problem was solved using format that needs to be addressed is the
Extensible Markup Language (XML) and its even lighter hazard register. This is the easiest of all
the problems to solve after the develop-
cousin JavaScript Object Notation (JSON). ment of the unified hazard assessment
data structure. Basically, the data that
is developed in a HAZOP worksheet is
pleted, or at least separated out of the the user starts by viewing the HAZOP sufficient to meet this need, as long as
cause or consequence description, study, he or she should be able to click it is hazard-scenario indexed. In fact,
where it usually resides. With regard to on a single tab or button and have the one might want to limit the data pre-
data structure, the HAZOP worksheet software automatically redraw the sented to even less than what is shown
needs to show, for each deviation, one user interface for LOPA. in a HAZOP worksheet.
or more hazard scenarios. Each haz- There is an even more powerful as- Unified hazard assessment is a
ard scenario can show multiple causes pect to bow-tie diagrams using the method to restructure and optimize
and multiple consequences. Other unified PHA format. Currently, most PHA data so that it can be used for
than that, the PHA worksheet will look bow-tie diagrams are simply a visual more than just process safety man-
essentially the same. representation of a hazard scenario, agement compliance. A standard-
Once the HAZOP has been docu- but with an underpinning of a uni- ized unified hazard assessment data
mented using the unified hazard as- fied hazard assessment data structure, structure and complaint methods for
sessment approach, development the bow-tie diagram can include all documenting PHA data allow a single
of the LOPA is dramatically simpli- the quantitative aspects, such as the data set and a single software tool to
fied. The data structure for each haz- frequency of the initiating event, the be able to seamlessly present data as
PHA (HAZOP), LOPA, hazard register,
and bow-tie diagrams. n
Tolerable: No
Pump seal This article was adapted from a paper
Tag: XV-01 failure – Leakage originally published for the Texas A&M
of process CAT 5: Moderate Engineering Experiment Station’s Mary
Pump
discharge valve Pool fire Kay O’Connor Process Safety Center
fails closed 22nd annual international symposium,
TMEL: 1E-3
F: 0.1/yr F:1E-4 held 22 – 24 October 2019. Read this ar-
Tag: IC-U2C1 FACT: 1.1E-5
ticle online for a link to the full paper.
Tag: LAL-01 Tag: UZC-02 Ignition control Tolerable: Yes
Operator SIS – Low flow – Probability of
action based shutdown ignition ABOUT THE AUTHOR
on LAL PFD: 0.1 Edward M. Marszal (edward.marszal@
PFD: 0.01 Typ: SIS
PFD: 0.1 Typ: Alm SIL: 2 kenexis.com) is president and chief exec-
utive officer of Kenexis, an independent
F:1E-5 consulting engineering firm that provides
Tag: XV-01(OP) CAT 5: Severe technical safety services for process in-
Inadvertent F Total: 1,1E-4 Toxic vapor dustries and other industries that man-
closure of exposure age risks related to chemicals or stored
discharge valve
energy. The company is helping change
Tag: UZC-02 TMEL: 1E 4
F: 0.001/yr the way that safety and security are incor-
SIS – Low flow FACT: 1.1E+
shutdown porated into industrial business practices
Tolerable: No
by providing best-in-class software tools,
PFD: 0.01 Typ: SIS
associated training, and comprehensive
SIL: 2
technical support.
Volunteers in action
Local learning:
Gruhn to speak
on safety, HMIs, more
these issues came together to cause the worst industrial disaster
in history. We need this awareness to prevent major industrial di-
sasters and the more frequent “minor” process safety events that
precede them today. This was the topic at the ISA Toledo, Ohio, sec-
tion (14 January) and ISA Brazos (Freeport, Texas) 6 February talks.
I
SA past president Paul Gruhn, PE, CFSE, will be presenting at will review why certain HMI designs are poor (with many exam-
local meetings around the country during the first quarter of ples) and show how they can be improved. This was the topic at
2020. As a global functional safety consultant with aeSolu- the ISA Manchester, Conn., (29 January) talk.
tions, a process control and process safety consulting, engineer-
ing, and integration services company based in Greenville, S.C., Process industry accidents
Gruhn has gained extensive experience consulting with sites Using a collection of videos, photographs, and stories, this presen-
around the world. tation covers lessons learned from a variety of process accidents.
Gruhn presented at the ISA Toledo, Ohio, section meeting on Topics include: Do not hire low bid (you get what you pay for);
14 January; the ISA Manchester, Conn., meeting on 29 January; everyone needs training (yet they often do not get it or accept
the ISSS Northeast Chapter (Plantsville, Conn.) meeting on 30 Jan- it); even trained people make mistakes (and sometimes they do
uary; and the ISA Brazos (Freeport, Texas) meeting on 6 February. really stupid things); we are not as immune or indestructible as we
He will speak at the ISA Wilmington (Newark, Del.) meeting on 25 may think; reuse of software is not always successful; near misses
February. Contact the meeting manager to attend. are often not followed up; the past is often ignored (and history
If your group would like Gruhn to speak in your area, just ask. definitely repeats itself). This was the topic at the ISSS Northeast
Gruhn says he has a long list of possible speaking topics he is Chapter, Plantsville, Conn., (30 January) talk.
happy to share. Below are the topics of his first six talks of 2020.
Process safety management
The Next Bhopal Subtitled “Jenga, Drift, and Preventing Process Industry Acci-
Preventing disasters—and the incidents of lesser consequence dents,” this talk covers many well-publicized process industry acci-
leading up to them—requires probing beneath their seemingly dents over the past several decades. Much has been written about
superficial, distracting, and highly visible exteriors. Doing so shows them, and many lessons learned have been proposed. However,
how similar all industrial disasters are. The patterns that led to the evidence indicates that the number of industry accidents has not
Bhopal disaster are in many of the processes that we operate to- decreased. More recent realizations of the complexity of mod-
day. This presentation summarizes fundamentals of a portion of the ern processes, and the organizations responsible for designing,
Bhopal plant’s process design, changes that were made contrary to building, running, and maintaining them, has brought a broader
the original specifications, problems encountered, and the numer- understanding of accident causation, and what can be done to
ous design and operational changes that were made (with the best prevent further incidents. This will be the topic at the ISA Wilm-
of intentions) that simply led to further problems. It also covers how ington, Newark, Del., (25 February) talk. ■
1950s
– Mechanical systems give way to electronics
1960s
– 4–20 mA standard settles signal controversy
– Adaptive control introduced
1970s
– Microprocessors invade measurement and control
– Births of the DCS, PLC, and process modeling
– ISA accredited by ANSI
1980s
– Rise of the personal computer, Microsoft Windows,
HMIs, and Fieldbus standards
– Birth of historian software
1990s
– Fieldbus Wars, IS88 Batch and IS95 Enterprise Control
System standards developed
– Rise of the Internet
2000s
– OPC UA developed
– Germany introduces Industrie 4.0
– Wireless 802.15 standard enables WirelessHART
and ISA100a
– Birth of the Internet of Things
– Rise of process optimization
2010s
– ISA becomes the International Society of Automation
– Rise of Industrial Internet of Things, edge and cloud
computing, machine learning and artificial intelligence,
autonomous vehicles and drones, industrial virtual reality
– Birth of 5G communications
egic
trat ting
ISA S
er M 020
Lead March 2 s
ee 2020s and beyond
6–8 tin, Texa lm . . . to be continued
Aus a.org/s
.is
www
INTECH JANUARY/FEBRUARY 2020 43
association news | Certification review
Certification
ISA Certified Automation Congratulations
Professional (CAP) program new certification
Certified Automation Professionals (CAPs) are responsible for the direction, design, holders!
and deployment of systems and equipment for manufacturing and control systems. Below is a list of individuals who have
CAP question recently passed either our Certified Auto-
The branch of automation that deals with the design and implementation of a central- mation Professional (CAP) or one of the
ized control system for heating, air conditioning, and ventilation is: three levels of our Certified Control System
Technician (CCST) exam. For more informa-
A. atmospheric environmental automation engineering (AEAE)
tion about the ISA CAP and CCST certifi-
B. building automation engineering (BAS)
cation programs, please visit www.isa.org/
C. air flow engineering (AFE)
training-and-certifications/isa-certification.
D. heating, ventilation, and air conditioning (HVAC) engineering
Certified Control System
CAP answer
Technicians
The answer is B, “building automation engineering (BAS).” BAS has become a very impor-
Level 1
tant branch of automation in many industries, especially those that require sterile access
Neal Andrews Thomas Whitehead
areas or the need for pressurized gradients from room to room to control particulates. Boston Scientific,
Andeavor, U.S.
HVAC (mechanical) engineers design the equipment and ductwork, but BAS engi- U.S.
Michael Bouse
neers design and implement the control systems that help regulate fresh air intakes, U.S. Nicholas Fiddler
room pressure, temperature and humidity, and recirculation. BAS engineers also aid U.S.
David Brant
with placement of smoke detectors and dampers and interfaces to the fire alarm and University of Florida, Michael Gaskin
protection systems. U.S. U.S.
Todd Braun Martin Plym
Reference: Sands, Nicholas P. & Verhappen, Ian, A Guide to the Automation Body of U.S. U.S.
Knowledge, Third Edition, ISA Press, 2019. Peder Winkel
Daryl Buschmann
U.S. University of Florida,
T
he widely used ISA/IEC 62443 se- embedded devices, network compo- dards that make up the series.
ries of standards, developed pri- nents, host components, and soft- This stage will be evident in a new
marily by the ISA99 committee, ware applications. revision of ISA/IEC 62443-1-1, Models
Industrial Automation and Control Sys- Looking ahead in 2020, an important and Concepts, for which a first update
tems Security, with simultaneous review standard expected to be completed in draft has been prepared for review by
and adoption by the International Elec- the coming months is ISA/IEC 62443- the committee. This foundational stan-
trotechnical Commission (IEC), provides
a flexible framework to address and
mitigate current and future security vul-
An important standard expected to be completed soon is
nerabilities in industrial automation and ISA/IEC 62443-3-2, Security Risk Assessment for System
control systems (IACS). The committee
draws on the input and knowledge of
Design, which is based on the understanding that IACS
IACS security experts from across the security is a matter of risk management.
globe to develop consensus standards
that are applicable to all industry sectors 3-2, Security Risk Assessment for Sys- dard established the context for all of
and critical infrastructure. tem Design, which is based on the the other standards in the series.
At a year-end meeting in Mannheim, understanding that IACS security is a Among other updates underway,
Germany, the committee took stock of matter of risk management. That is, ISA99 is also working on converting ISA/
where it is and where it wants to go as each IACS presents a different risk to IEC TR62443-2-3, Patch Management in
a new decade unfolds. There is much an organization depending upon the the IACS Environment, into a standard
the committee can build on as it closed threats it is exposed to, the likelihood by adding normative language. The
out the final years of the past decade of those threats arising, the inherent current technical report addresses the
with several notable successes. This in- vulnerabilities in the system, and the installation of patches, also called soft-
cluded a decision by the United Nations consequences if the system were to be ware updates, software upgrades, firm-
(UN) Economic Commission for Europe compromised. Further, each organiza- ware upgrades, service packs, hotfixes,
to integrate the widely used standards tion that owns and operates an IACS basic input/output system updates, and
into its Common Regulatory Frame- has its own tolerance for risk. For these other digital electronic program updates
work on Cybersecurity, which serves as reasons, ISA/IEC 62443-3-2 will define that resolve bug fixes, operability, reli-
an official UN policy position statement a set of engineering measures to guide ability, and cybersecurity vulnerabilities.
for Europe. It also included completion organizations through the process of It covers many of the problems and in-
of several key standards in the series, assessing the risk of a particular IACS dustry concerns associated with IACS
including: and identifying and applying security patch management for asset owners
n ISA/IEC 62443-4-1, Product Secu- countermeasures to reduce that risk to and IACS product suppliers.
rity Development Life-Cycle Re- tolerable levels.
quirements, which specifies process The new year will also likely see the 2020 meetings
requirements for the secure devel- publication of a revision of ISA/IEC Details are still being worked out, but
opment of products used in an IACS 62443-2-1, with the revised title Security ISA99 and its partner IEC committee,
and defines a secure development life Program Requirements for IACS Asset TC65 WG10, are planning to meet just
cycle for developing and maintain- Owners. This standard specifies asset outside of Houston in Galveston, Texas,
ing secure products. The life cycle owner security program requirements in conjunction with the ISA Cyberse-
includes security requirements defini- for an IACS. An asset owner, in the con- curity Standards Implementation Con-
tion, secure design, secure implemen- text of the standard, also includes the ference, during the week of 11 May,
tation (including coding guidelines), operator of an IACS. and then tentatively in September near
verification and validation, defect The revision of ISA/IEC 62443-2-1 Schiphol Airport in Amsterdam.
management, patch management, reflects a new stage in ISA99’s growth For information on viewing or
and product end-of-life. and progression in which much of the obtaining any of the ISA/IEC 62443
n ISA/IEC 62443-4-2, Technical Security important content has been defined, standards, visit www.isa.org/findstan-
Requirements for IACS Components, but there is a continual need to review dards. For information on ISA99, its
which provides the cybersecurity tech- and update material while identifying meeting plans, or other related mat-
nical requirements for components and correcting gaps and inconsisten- ters, contact Eliana Brazda, ISA Stan-
that make up an IACS, specifically the cies that may exist in the various stan- dards, ebrazda@isa.org. n
ARC Advisory Group ................................48 ISA ........................................35, 47, Cover 3 ProComSol, Ltd. ........................................27
www.arcweb.com www.isa.org www.procomsol.com
Chris Hayworth
Advertising Materials Coordinator
Phone: +1 919-990-9435
Email: chayworth@ISA.org
Reprints
Foster Reprints will work with you to
create a customized reprint package,
including hard copy reprints, eprints,
and mobile-friendly products.
Contact Jill Kaletha at 219-878-6068
or jillk@fosterprinting.com.
C
ompletely automate and eliminate opera- to operate a system and are critical components
tors? I believe the answer is obviously “no,” of continuous operations. Historically, procedures
because well-trained operators provide an have been executed by humans reading from a
advantage by ensuring efficient and safe opera- manual, checklist document, or a static display.
tions of complex process plants. The majority of The ISA 106 technical report describes the con-
those in operations management agree good cepts by which procedures are integrated into the
operating people are valuable. basic process control system (BPCS).
Automating and clearly documenting functions The intended audience for the document is techni-
that are well defined and deterministic enable op- cal and operations managers and engineering per-
erators to focus on the most important tasks, prob- sonnel who are responsible for the operation or auto-
ABOUT THE AUTHOR lems, exceptions, and unexpected issues. Automa- mation of continuous process operations, members
Bill Lydon (blydon@ tion professionals can take advantage of ISA 106 of engineering departments of owner/operators, en-
isa.org) is an InTech to achieve these goals. gineering personnel of engineering and procurement
contributing editor with The ISA 106 models define how to capture infor- companies, automation vendors and system integra-
more than 25 years of mation about physical assets, from the enterprise tors, and other process engineering practitioners.
industry experience. level down to an individual device, and the require-
He travels globally to ments that define a procedure. They establish the Safety
attend automation functional requirement for the automated procedure Safety statistics show the majority of incidents not
events and regularly and tie these requirements directly to objects in the related to outright mechanical failures happen dur-
provides news reports, physical model. The implementation module defines ing abnormal situations, primarily unit startups and
observations, and in- a set of ordered tasks, which may have their own shutdowns. For example, the Kern Oil Refinery fire
sights here and on Au- subtasks to perform step-by-step actions in a defined in January 2005 occurred during a crude unit start-
tomation.com. order. There are three elements contained within up, and the BP Texas City disaster in March 2005
each task: (1) command: something to trigger the took place during the restarting of a hydrocarbon
individual action; (2) perform: do the action(s); and isomerization unit. Unfortunately, there are many
(3) verify: confirm successful completion of the task. more examples.
Each task’s command-perform-verify sequence The recipe for disaster is when an infrequent op-
can include a mix of automated and human opera- eration is required, but the key individuals are not
tions as appropriate for the specific assignment. For available, leaving inexperienced operators to follow
example, a human may need to verify if an automat- inadequate or incorrect instructions. Something can
ed task has been performed correctly, or vice versa. get out of control, leading to an abnormal condition
After each command has been performed and veri- with the undesirable outcomes of equipment dam-
fied, notification is sent to the next task in sequence. age, environmental release, injuries and fatalities.
Larger activities, such as plant startup or shut- Procedural automation benefits are:
down, are important, but the same tools can be • improved safety
used for more routine procedures, such as isolat- • improved startups and shutdowns to improve
ing and starting up a redundant pump system, efficiency and throughput
performing online maintenance of a piece of • efficient transitions to increase production and
equipment, or even something as “simple” as per- quality
forming an in-line valve performance test; all of • improved disturbance recovery
which normally require communication with some- • capture and retention of “tribal” knowledge
one physically at the asset to verify, or in some cas- • improved communications with common defini-
es manually intervene in, the process. tions and terminology
Procedural automation can be used to capture and By applying ISA 106, a single process plant, a com-
share corporate knowledge, including best practices, plete facility, or even an entire company can achieve
and to minimize errors with a resulting decrease in significant improvements in operational efficiency
incidents, improved safety, and higher throughput. and safety.
This is particularly important with an aging workforce For more information, visit www.isa.org/isa106. For
and the difficulty in finding experienced operators. information about the ISA106 committee, contact
Procedures represent the knowledge necessary Charley Robinson, ISA standards, crobinson@isa.org. n
KNOWLEDGE
+ KNOW-HOW
You are assured to get the best-fit products, solutions
and services for your specific requirements.
Customers
Customers around
aroundthe world
the worldtrust
trustususwhen
whenititcomes
comestotoprocess
automation. Our shared
process automation. goal
Our is plant
shared goalsafety, availability
is plant and e�ciency.
safety, availability
Weand
areefficiency.
with you Weevery
areday,
witheverywhere.
you every day, everywhere.
People forfor
People Process Automation
Process Automation
www.isa.org/intech