What is PROFIsafe and how does it work?
“The condition of being safe; freedom from danger, risk, or
injury.”
In the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially
Explosive Atmospheres Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
Cryptography is the practice and study of techniques for conveying information security.
The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
The most famous algorithm used today is RSA algorithm
Basically a summary attempt of "Data Movement Instructions" , chapter#4 of the book entitled "The Intel Microprocessors: Architecture, Programming, and Interfacing" by Barry B. Brey.
Cryptography is the practice and study of techniques for conveying information security.
The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
The most famous algorithm used today is RSA algorithm
Basically a summary attempt of "Data Movement Instructions" , chapter#4 of the book entitled "The Intel Microprocessors: Architecture, Programming, and Interfacing" by Barry B. Brey.
Design and Simulation of Radix-8 Booth Encoder Multiplier for Signed and Unsi...ijsrd.com
This paper presents the design and simulation of signed-unsigned Radix-8 Booth Encoding multiplier. The Radix-8 Booth Encoder circuit generates n/3 the partial products in parallel. By extending sign bit of the operands and generating an additional partial product the signed of unsigned Radix-8 BE multiplier is obtained. The Carry Save Adder (CSA) tree and the final Carry Look ahead (CLA) adder used to speed up the multiplier operation. Since signed and unsigned multiplication operation is performed by the same multiplier unit the required hardware and the chip area reduces and this in turn reduces power dissipation and cost of a system. The simulation is done through Verilog on xiling13.3 platform which provide diversity in calculating the various parameters.
The BINARY to GRAY CODE CONVERTER is a digital circuit that is used to convert the binary input into the corresponding equivalent gray code at its output
IKE is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKEv2 is the
second and latest version of the IKE protocol. Adoption for this protocol started as early as 2006.
IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication - either
pre-shared or distributed using DNS (preferably with DNSSEC) and a Diffie–Hellman key exchange - to
set up a shared session secret from which cryptographic keys are derived.
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSShahrukh Javed
DESCRIPTION
Cell Phone Detector this handy, pocket-size mobile transmission detector can sense the presence of an activated mobile cell phone from a distance of one and-a-half meters.
The circuit can detect the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the Bug detects RF (radio frequency transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases. This project provides a simple circuit to detect the presence of an activated cell phone by detecting these signals.
NOTE Circuit will not detect if the mobile is switched off.
TEAM MEMBER
SHAHRUKH JAVED
SYED MOULA
For more log on to: http://shahrukhjaved.webs.com/apps/blog/
E-mial: shahrukh.tjit14@gmail.com
The traffic light sequence works on the specific switching of Red, Green and Yellow lights in a particular way with stipulated time form. The normal function of traffic lights requires sophisticated control and coordination to ensure that traffic moves as smoothly and safely as possible and that pedestrians are protected when they cross the roads [1].This Traffic Light sequence is generated using a specific switching mechanism which will help to control a traffic light system on a road in a specified sequence. This paper focuses on the fact that the traffic lights can be varied in the day and night mode depending on the intensity of the traffic. It plays a vital role in supervising and running the metropolitan traffic and evade the possibilities of any unfortunate mishaps happening in and around the cities. It is a sequential machine to be scrutinized as per the requirements and programmed through a multistep development process. The methods that are used in this project are proposing the circuit, write a code, simulate, synthesis and implement on the hardware [8]. In this project, XILINX Software was chosen to devise a schematic using schematic edit, write a code using Verilog HDL (Hardware Description Language) text editor and implements the circuit on Programmable Logic Device [PLD].The system has been successfully tested and implemented in hardware using Nexys 2 Digilent FPGA.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
What is PROFIsafe and how does it work?
Q. What do we mean by “Safety”?
A. “The condition of being safe; freedom from danger, risk, or
injury.”
This presentation shows how PROFIsafe can help companies in many industries meet their safety obligations. For example, in the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially
Explosive Atmospheres Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
Design and Simulation of Radix-8 Booth Encoder Multiplier for Signed and Unsi...ijsrd.com
This paper presents the design and simulation of signed-unsigned Radix-8 Booth Encoding multiplier. The Radix-8 Booth Encoder circuit generates n/3 the partial products in parallel. By extending sign bit of the operands and generating an additional partial product the signed of unsigned Radix-8 BE multiplier is obtained. The Carry Save Adder (CSA) tree and the final Carry Look ahead (CLA) adder used to speed up the multiplier operation. Since signed and unsigned multiplication operation is performed by the same multiplier unit the required hardware and the chip area reduces and this in turn reduces power dissipation and cost of a system. The simulation is done through Verilog on xiling13.3 platform which provide diversity in calculating the various parameters.
The BINARY to GRAY CODE CONVERTER is a digital circuit that is used to convert the binary input into the corresponding equivalent gray code at its output
IKE is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKEv2 is the
second and latest version of the IKE protocol. Adoption for this protocol started as early as 2006.
IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication - either
pre-shared or distributed using DNS (preferably with DNSSEC) and a Diffie–Hellman key exchange - to
set up a shared session secret from which cryptographic keys are derived.
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSShahrukh Javed
DESCRIPTION
Cell Phone Detector this handy, pocket-size mobile transmission detector can sense the presence of an activated mobile cell phone from a distance of one and-a-half meters.
The circuit can detect the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the Bug detects RF (radio frequency transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases. This project provides a simple circuit to detect the presence of an activated cell phone by detecting these signals.
NOTE Circuit will not detect if the mobile is switched off.
TEAM MEMBER
SHAHRUKH JAVED
SYED MOULA
For more log on to: http://shahrukhjaved.webs.com/apps/blog/
E-mial: shahrukh.tjit14@gmail.com
The traffic light sequence works on the specific switching of Red, Green and Yellow lights in a particular way with stipulated time form. The normal function of traffic lights requires sophisticated control and coordination to ensure that traffic moves as smoothly and safely as possible and that pedestrians are protected when they cross the roads [1].This Traffic Light sequence is generated using a specific switching mechanism which will help to control a traffic light system on a road in a specified sequence. This paper focuses on the fact that the traffic lights can be varied in the day and night mode depending on the intensity of the traffic. It plays a vital role in supervising and running the metropolitan traffic and evade the possibilities of any unfortunate mishaps happening in and around the cities. It is a sequential machine to be scrutinized as per the requirements and programmed through a multistep development process. The methods that are used in this project are proposing the circuit, write a code, simulate, synthesis and implement on the hardware [8]. In this project, XILINX Software was chosen to devise a schematic using schematic edit, write a code using Verilog HDL (Hardware Description Language) text editor and implements the circuit on Programmable Logic Device [PLD].The system has been successfully tested and implemented in hardware using Nexys 2 Digilent FPGA.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
What is PROFIsafe and how does it work?
Q. What do we mean by “Safety”?
A. “The condition of being safe; freedom from danger, risk, or
injury.”
This presentation shows how PROFIsafe can help companies in many industries meet their safety obligations. For example, in the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially
Explosive Atmospheres Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
What is PROFIsafe and how does it work?
What do we mean by “Safety”?
“The condition of being safe; freedom from danger, risk, or injury.”
In the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially Explosive Atmospheres
Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
It is essential to have some form of risk assessment / risk analysis e.g. HAZAN / HAZID / HAZOP / RA to ISO 12100
System designers and project managers look at the project
procurement, installation and deployment costs when they
price a project.
However, the costs of an automation system spread over the
life cycle of the plant and should include maintenance, faultfinding and health-checking.
Perhaps most important is the cost in terms of loss of
production should faults develop during the lifetime of the
plant. Spending a little more at procurement time can repay
many times over.
Good fault tolerant design need not be more expensive.
Sometimes fault tolerance can be achieved with just a little
thought at no additional cost.
Industrial Ethernet Facts - The 5 major technologiesStephane Potier
Following the overwhelming success of "Industrial Ethernet Facts" and taking into account continued development of the protocols, this overview of the key features of the various systems has been revised. This third edition is taking into account the feedback submit by the Industrial Ethernet community and has been extended with a new chapter about OPC UA.
IEEE Information Technology Professional Conference 2014. As the Industrial Internet of Things gains acceptance, the physical layer needs to be addressed at the sensor level
What is PROFIsafe and how does it work? What do we mean by “Safety”?
“The condition of being safe; freedom from danger, risk, or injury.”
In the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially
Explosive Atmospheres Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
Therefore:
Coexistence of standard and failsafe communication
What do we mean by “Safety”
“The condition of being safe; freedom from danger, risk, or injury.”
In the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially Explosive Atmospheres
Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
PROFIBUS - the world's most successful fieldbus. Easy, flexible, consistent.
PROFINET - the leading Industrial Ethernet Standard. Open, versatile, safe.
IO-Link - the new standard in the lower field level. Universal, smart, easy.
Why functional safety is important for modern control systems.
The presentation will firstly discuss why functional safety is important for modern control systems and industrial equipment and then explain how PROFIsafe can be used in delivering functional safety. It will also briefly discuss the requirements for IT Security in modern controls and how this can impact and affect decisions made for functional safety.
The presentation will conclude with a quick look into the future to discuss how ‘Industry 4.0’, the’ Internet of Things’ and ‘Big Data’ could impact the functional safety world.
What do we mean by “Safety”?
“The condition of being safe; freedom from danger, risk, or injury.”
In the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially Explosive Atmospheres Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
This presentation will discuss the basics of how we should approach a safety-related control project and discuss how networking supports the implementation of the safety system using PROFIsafe as an example of a black channel safety-related control solution.
Key Tips for Using and Operating Safety NetworksDesign World
Safety networks are increasingly used in industrial applications. In this webinar, presenters from B&R and Siemens go over key issues and design considerations of the more popular safety networks.
In this webinar you will learn:
-How safety networks work
-How they behave
-How they communicate
-Key installation tips
This paper will firstly discuss PROFIsafe, why we have the solution, what should be planned out, elements to be aware of and what PROFIsafe does well. This paper will then spend a little time covering the basics of legislation and responsibilities for safety and functional safety. The paper will then go on to quickly consider basic Cybersecurity aspects for Industrial Automation in the UK market.
Introduction to PROFIBUS and associated benefits
Connection options and rules
Other cabling issues : grounding and interference
Design Considerations
Implementation issues
Essential training
PROFIBUS is a very reliable and cost effective
technology.
It is common to find extensive installations
comprising thousands of PROFIBUS devices
operating on complex networks which are connected
together via industrial Ethernet.
The reliable operation of these networks is essential
to maintaining plant productivity.
So, what can go wrong?
PROFIBUS is a very reliable and cost effective technology.
It is common to find extensive installations comprising thousands of PROFIBUS devices operating on complex networks which are connected together via industrial Ethernet.
The reliable operation of these networks is essential to maintaining plant productivity.
So, what can go wrong? And how do you find out? And avoid recurrance?
This presentation looks at the tools and techniques that are available for engineering activities such as health checking and fault finding. In particular the presentation will explore some of the devices that are now available for automated network condition monitoring. These devices can provide 24/7 remote monitoring of your networks to provide rapid reporting of network problems and provide indication of performance degradation and give pre-warning of impending failure. The presentation will include a practical demonstration of some of the available tools.
An overview of the Group’s structure and global representation, taking a look at the protocol basics and their differences, plus showing the progress of the number of installed devices from the group’s supported technologies and relating these figures to their market share.
Towards a certification scheme for IoT security evaluationAxel Rennoch
Many European and international standardization bodies and industrial organizations do provide more or less detailed specification catalogues addressing IoT product security requirements, test cases and evaluation methods. In this contribution, a dedicated set of relevant standards, guides and recommendations which recently have been recognized by the European Union Agency for Cybersecurity (ENISA) will be introduced. Special attention is given to their contribution for the security evaluation process and the product quality itself, including the level of details regarding their suitability for test definition and execution.
PROFIBUS is a very reliable and cost effective
technology.
It is common to find extensive installations
comprising thousands of PROFIBUS devices
operating on complex networks which are connected
together via industrial Ethernet.
The reliable operation of these networks is essential
to maintaining plant productivity.
So, what can go wrong?
For people responsible for the design, commissioning and support of PROFINET networks, explaining how to integrate existing PROFIBUS DP and PROFIBUS PA devices into that network. The webinar took the form of a presentation with demonstrations to aid understanding.
For people responsible for the commissioning and support of PROFIBUS networks. The webinar took the form of a presentation with demonstrations to aid understanding.
This 40-minute long webinar follows on from the PROFINET Network Design Webinar but is this time intended for people responsible for the commissioning and support of PROFINET networks. The webinar took the form of a presentation with demonstrations to aid understanding.
Particularly relevant to people responsible for the design of PROFINET networks, highlighting the common errors and assumptions made that could make on-going support of the network rather difficult.
More from PROFIBUS and PROFINET InternationaI - PI UK (20)
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. What do we mean by “Safety”
2
“The condition of being safe; freedom from danger, risk, or
injury.”
In the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially
Explosive Atmospheres Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
Important: It is essential to have some form of risk
assessment / risk analysis
e.g. HAZAN / HAZID / HAZOP / RA to ISO 12100
Peter Brown / What is PROFIsafe?
3. PROFIsafe – The Vision
3
F-I/O
F-Host/FPLC
Standard-Host/PLC
Standard-I/O
Profibus DP
Repeater
Coexistence of standard and failsafe communication
DP/PA
PG/ES with
secure access
e.g. Firewall
Standard-I/O
F-Gateway
TCP/IP
Engineering Tool
F = Failsafe
Peter Brown / What is PROFIsafe?
F-Sensor
F-FieldDevice
F-Actuator
other
SafetyBus
Master-Slave
Assignment
4. Cyclic Communication
4
F-Host / FPLC
Bus cycle
1
1:1 Communication relationship
between master and slave
2
Laserscanner
Peter Brown / What is PROFIsafe?
Standard-I/O
F-I/O
Drive with integrated
Safety
5. PROFIsafe – ISO/OSI Model
5
e.g.. Diagnostics
Safety
Input
Safety
Control
Safety
Output
Standard
Control
StandardI /O
Safety-Layer
Safety-Layer
Safety-Layer
7
7
7
7
7
2
2
2
2
2
1
1
1
1
1
"Black Channel": ASICs, Links, Cables, etc. Not safety relevant
Non safety critical functions, e.g. diagnostics
"PROFIsafe": Safety critical communications systems: Addressing, Watch Dog Timers,
Sequencing, Signature, etc.
Safety relevant, Not part of the PROFIsafe: Safety I/O / Safety Control Systems
Peter Brown / What is PROFIsafe?
6. PROFIsafe – Add-on Strategy
6
Standard
engineering
tool
STEP 7
Failsafe engineering
Tool
Distributed Safety
Standard
CPU
Failsafe
Application
Program
F-Hardware
Standard
Remote I/O
Standard
PROFIBUS DP
Peter Brown / What is PROFIsafe?
Failsafe
I/O Modules
PROFIsafe
7. PROFIsafe - Program
7
Coexistence of standard program and safetyrelated program on one CPU
Changes to the standard program have no
effect on the integrity of the safety-related
program section
Standard program
Safety program
Standard program
Peter Brown / What is PROFIsafe?
Back-up
8. PROFIsafe – Coded Processing
8
Coded Processing
Time redundancy and diversity replace
complete redundancy
Operators
A, B
Operation
C
Output
AND
Coding
Comparison
Stop
by D /C
OR
Diverse
Operators
/A, /B
Diverse
Operation
Time redundancy
Peter Brown / What is PROFIsafe?
D = /C
Diverse
Output
Time
9. PROFIsafe - Introduction
9
Safety-oriented communication via PROFIsafe
First standard of communication in accordance with safety
standard IEC 61508
PROFIsafe supports safe communication for the
open standard PROFIBUS and PROFINET
The PROFIsafe meets possible faults like address
error, delay, data loss with
Fail-safe
data
Standard
data
PROFIsafe
layer
PROFIBUS
PROFINET
Peter Brown / What is PROFIsafe?
Standard
data
PROFIsafe
layer
Standard
bus
protocol
Standard
bus
protocol
PROFIsafe supports standard- and failsafe
Communication by one medium
Fail-safe
data
“Black channel"
Serial numeration
of PROFIsafe-telegram
Time monitoring
Authenticity monitoring
via unique addresses
Optimized CRC-checking
10. PROFIsafe - Introduction
10
Overview: Possible Errors and detection mechanism
Remedy:
Failure type:
Repetition
Deletion
Insertion
Resequencing
Data Corruption
Delay
Masquerade (standard
message mimics failsafe)
Revolving memory failure
within switches
Peter Brown / What is PROFIsafe?
Consecutive
Number
Time Out
with Receipt
Codename for
Sender and
Receiver
Data
Consistency
Check
11. PROFIsafe safety PDU
11
Standard PROFINET IO messages
S
F Input/Output Data
S
S
Status /
Control Byte
S
CRC2
across
F I/O data, Status or
Control Byte,
F-Parameter,
and Vconsnr_h
Max. 12 / 123 Bytes
1 Byte
PROFIsafe container =
Safety PDU
Peter Brown / What is PROFIsafe?
3/4 Bytes *)
*) 3 Bytes for a max. of
12 Byte F I/O data
4 Byte for a max. of
123 Bytes F I/O data
12. Extended Consecutive Number (24 Bit)
12
Synchronization via "Toggle Bit"
Example:
Status Byte
F Input data
CRC2
across
F Input data,
Status Byte,
F-Parameter,
and Vconsnr_d
Max. 12 / 123 Bytes
CRC1
Vconsnr_d
Toggle_h
(Bit 5 of the
Control Byte)
Increment
1
R_cons_nr
(Bit 2 of the
Control Byte)
Reset
.
(F-Device)
Consecutive
Number
(not transmitted)
0,1...0FFFFFFh
1 Byte
3 / 4 Bytes
Change Toggle_d
0 1or 1 0
when incremented
24/32 Bit CRC
Signature
include Vconsnr_d
within CRC2 calculation
(see calculation details)
3 3 Bytes
Bytes
24 Bit consecutive number
Virtual consecutive numbering = pa
Peter Brown / What is PROFIsafe?
13. PROFIsafe - Introduction
13
Which protocol must be supported ?
Encapsulation
IOC
Local bus
FHost
PROFINET
PROFINETSWITCH
Modular Device
PROFINET
-IO
Peter Brown / What is PROFIsafe?
PROFIBUS Device
F
D
O
Encapsulation
Encapsulation
Sensor
Fail-safe digital input
Fail-safe digital output
PROFINET IO-Controller
Link
F F
D D
I O
Device
F-DI
F-DO
IO-C
PROFIBUS.
PROFIBUS
Actuator
14. PROFIsafe - Introduction
14
Which protocol version applies when ?
Goal: 100% compatability
A PROFIsafe slave which supports the v2 mode must be able to replace an older
version of this PROFIsafe slave which only supports the v1 mode without the
need of any adaption
PROFIsafe V2
Slave used in
PROFIBUS
network only
PROFINET
network only
PROFIBUS /
PROFINET
network
Peter Brown / What is PROFIsafe?
Protocol with
8Bit-Counter
(= PROFIsafe
V1 mode)
Protocol with
24Bit-Counter
(= PROFIsafe
V2 mode)
mandatory
mandatory
-
mandatory
mandatory
mandatory
15. PROFIsafe - Introduction
15
Which protocol version applies when ?
PROFINET – PROFIsafe V2
Proxy
Only
DP Slave V2
I/OI/O-Device V2
DP Master
PROFIBUS – PROFIsafe V1 or V2
DP Slave V1
DP Slave V2
DP Slave V1
V1 = PROFIsafe Profil V1
V2 = PROFIsafe Profil V2
Peter Brown / What is PROFIsafe?
17. ‘Drivers’ for Safety
17
Legislation: “I need to do something.…..but
what?”
Fear: “What are my responsibilities and am I
doing enough…. Or too much?”
Compliance: “Can I prove I have done as
much as is reasonably practicable”
Operational Efficiency: “Can I produce
products safely with maximum efficiency?”
Cost: “Am I getting the best return on my
investment” (FFI)
Support: “I want advice based on solutions
not products”
Peter Brown / Handling Functional Safety
18. What is Functional Safety?
18
Functional safety is part of the overall safety that depends
on a system or equipment operating correctly in response
to its inputs. Functional safety is achieved when every
specified safety function is carried out and the level of
performance required of each safety function is met.
Functional safety relies on active systems.
Safety achieved by measures that rely on passive
systems is not functional safety.
Safety Instrumented
System (SIS)
Inputs
Outputs
Reactor
Peter Brown / Handling Functional Safety
Basic Process Control
System (BPCS)
Inputs
Outputs
19. Systematic Failures
19
Definition of a systematic failure:
failure related in a deterministic way to a certain
cause, which can only be eliminated by a
modification of the design or of the manufacturing
process, operational procedures,
documentation or other relevant factors
Examples of systematic failures include human error in:
The safety requirement specification;
The design, manufacture, installation or operation of the
hardware;
The design and / or implementation of the software.
Peter Brown / Handling Functional Safety
20. International Standards
20
Define / measure the functional safety required / achieved
using prescribed parameters
Manage the design process of the required functional
safety in a prescribed manner
Manage the design activities using a prescribed process
Realise the design using a prescribed design methodology
Produce and maintain prescribed documents relating to
the specification, realisation, verification, modification,
installation, commissioning and validation
Peter Brown / Handling Functional Safety
21. ‘Best Practice’
Focus
Product Manufacture
21
IEC 61508
Harmonized
standards
IEC 61511
Relevant good
practice
IEC 62061
ISO 13849
Focus
Integration
EN 954
(until 2011)
Process
Industry
Peter Brown / Handling Functional Safety
Manufacturing Industry
22. Basic Lifecycle Concept
22
Functional Safety
Control of dangerous
failures during
operation through
Robust Design
Control and avoidance
of systematic failures
through Robust
Processes
Safety Lifecycle Requirement
Engineering / Design
System Architecture
Failure Probability
Peter Brown / Handling Functional Safety
Planning / Processes
Safety Management
Verification / Responsibilities
23. Verification and Validation
23
Verification (in general) =
“Are you making it right?"
Verification is the process used to evaluate whether or not
a system complies with regulations / specifications /
conditions imposed at the start of a phase.
Validation (in general) =
"Are you making the right thing?“
Validation is the process of establishing evidence (including
functional testing) that provides a high degree of assurance
that a system accomplishes its intended requirements (Fit
for purpose).
Peter Brown / Handling Functional Safety
24. Simplified Safety Lifecycle
24
Hazard and Risk Assessment
Installation, Validation and Start-up
Operation and Maintenance
Modernisation and Upgrade
Peter Brown / Handling Functional Safety
Verification
Design and Engineering
25. Example Specific Requirements
25
Support in setting up management of functional safety
Support in designing or standardising a safety plan
(defining responsibilities)
Understanding the reliability calculations to ensure
they are correct
Defining suitable mission times for the safety functions
Understanding limitations of safety circuits and what
they mean (e.g. separate wiring)
Understanding fault exclusions and how they should be
used
Has a Failure Mode and Effect Analysis (FMEA) been
done (or similar)?
Have all the appropriate elements been verified?
Has validation been completed and all the appropriate
documentation created?
Peter Brown / Handling Functional Safety
26. Consultancy / Services
26
Process Industry
Manufacturing Industry
Manufacturing Industry
IEC 61511
IEC 62061
ISO 13849-1
Management and assessment
of functional safety and audits
Management and assessment
of functional safety
Management and assessment
of functional safety
Safety planning
Safety planning
Safety planning
Hazard and risk assessment
(HAZID / HAZOP)
Hazard and risk assessment
(ISO 12100)
Hazard and risk assessment
(ISO 12100)
Allocations of safety functions
to protection layers
SIL assessments
PL assessments
Safety requirement
specifications
Safety requirement
specifications
Assessment of safety-related
application code
Assessment of safety-related
application code
Verification & Validation
Verification & Validation
Modification
Modification
Training
Training
SIL assessments (risk graph,
LOPA)
Safety requirement
specifications
Assessment of safety-related
application code
Verification & Validation
Modification
Training
Peter Brown / Handling Functional Safety