Process Engineering White Papers

261-280 of 397 < first | | | last >
  • Cyber Security: A Perfect Storm

    As companies and industries increasingly rely on technology, security risks become greater. With growing numbers of Windows machines and increased scarcity of skilled technical resources, a “perfect storm” of cyber threats in production facilities is looming.

    Honeywell
    09/21/2012
  • Application Whitelisting: Extend Your Security Arsenal

    As the security threat landscape continues to evolve, so must your response. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, application whitelisting can be an important addition to your security arsenal.

    Honeywell
    09/21/2012
  • The Perils of a DIY Distributed Control System

    The debate over the virtues of DCS vs. PLC has been ongoing since these two architectures came into existence 40 years ago. For certain industries, a distributed control system (DCS) provides substantially more value as the basis for automating the plant than a programmable logic controller (PLC)-based system. As functionality differences narrow and price points align, the debate over these virtues is getting more intense and the arguments for and against each system are getting more and more murky. This white paper discusses the “Top Ten” issues to consider when evaluating a DCS vs. building your own “DIY” distributed control system using a PLC-based architecture.

    Download white paper now.

    Honeywell
    07/15/2014
  • Chemical Processing Special Report: Cyber Security

    The technology advances in control systems and open systems have afforded us improved efficiency, productivity and the ability to advance our operations. However, these improved technology advances have also come with risks that threaten these efficiencies. Viruses; an increased dependency on uptime, availability and reliability; operator errors and increased regulations are just some of the threats today's manufacturers need to contend with when managing their operations. In this Putman Media Special Report, we take a look at the cyber security issues today's manufacturers need to contend with; identify control systems vulnerabilities and offer a three-step approach for building better cyber security at your operations.

    Honeywell Process Solutions
    02/09/2012
  • How To Use Projects to Master Asset Management

    Learn why project management functionality that is tightly integrated with Enterprise Asset Management (EAM) and Asset Lifecycle Management (ALM) tools is essential to executives of asset-intensive industries. Without such integration, data needed for both strategic decision-making and tactical maintenance of plant assets is at risk.

    IFS
    07/01/2008
  • Designing Sustainable Products

    All of the benefits of Product Lifecycle Management can be erased by significant non-compliance events that impact a company through fines, penalties, negative publicity, or prohibition to sell a new product in key markets. Without a sustainability strategy, the PLM value proposition is at risk.

    IHS
    04/07/2011
  • SPECIAL REPORT: Condition Monitoring

    An exciting trend in the world of CMMS is the increasing sophistication of condition-based maintenance (CBM) features and functions vendors offer and maintenance professionals actually use. This Special Report covers:

    * Six steps to condition-based maintenance
    * Bolster your condition monitoring toolbox
    * Protect your condition-monitoring program from the recession guillotine
    * Go beyond condition monitoring

    Infor
    12/22/2009
  • Bearing isolators 101

    A bearing isolator is a non-contact, non-wearing, permanent bearing protection device. It has a rotor and a stator, and the two are unitized, so that they don’t separate from one another while in use. Typically, the rotor turns with a rotating shaft, while the stator is pressed into a bearing housing. The two components interact to keep contamination out of the bearing enclosure and the lubricant in.

    Inpro
    05/17/2005
  • Process Control Network Security - Reference Architecture

    This document describes best practices for the reference architecture for a process control system network and its interfaces to a corporate network. The paper’s objective is to give the reader an understanding of the techniques utilized to securely connect these networks.

    Invensys
    01/11/2006
  • Process Control Network Security

    This document provides an understanding of intrusion detection and prevention systems, why they are necessary, how and where they fit in the control system environment, and gives example scenarios.

    Invensys
    03/27/2006
  • The Path to Asset Performance & Reliability

    This white paper addresses the journey to achieve asset performance and reliability excellence. This begins with establishing sound fundamentals in terms of business practices, organization effectiveness and well deployed informational tools to support them.

    Invensys Systems, Inc.
    01/11/2007
  • Facility Major Risk Survey

    This 8-page primer describes a method for identification of major acute risks in existing process facilities that can potentially affect on-site and off-site populations and for prioritization of mitigation methods.

    ioMosaic
    12/02/2004
  • Why Process Safety Management Audits Fail

    Most companies have completed at least three process safety management(PSM) compliance audits of their covered facilities since the promulgation of the OSHA PSM standard. These companies, however, are not seeing noticeable improvements in their PSM programs. In fact, many companies feel that their PSM programs have become less effective. What has happened and why? Are there any lessons learned from the Enron collapse and its auditing program? What needs to be done?

    ioMosaic
    10/22/2004
  • Management of Change or Change of Management?

    Management of Change processes are subject to a variety of pitfalls. This paper highspots a variety of implementation issues that can frequently undermine the success of MOC processes.

    ioMosaic
    12/03/2004
  • Security vulnerability assessment revealed

    Plant security is a key priority at many plants. This 10-page paper provides background what the methodology for a plant vulnerability analysis involves. It covers topics such as how to get started, available tools, and risk assessment.

    ioMosiac
    04/21/2005
  • Improving Plant Production with Wireless Condition Monitoring

    Mechanical failure of motors, drives and other vital electromechanical equipment are among the most common reasons for production stoppages. Fortunately, recent advancements in vibration monitoring and data analysis have lead to condition monitoring systems that can accurately detect a problem before failure, thus reducing costly machine shutdowns and maximizing production output. These systems are installed on the monitored equipment and are typically networked back to a central computer for data analysis and alarm annunciation. Because the machines may be in remote locations where network infrastructure is not available, or on moving platforms where hardwired network connectivity is not practical, wireless communications is a networking alternative that offer installation cost savings, quicker deployment and even improved reliability in certain situations.

    Jim Ralston, Wireless Sales Engineer, ProSoft Technology
    09/30/2008
261-280 of 397 < first | | | last >