By the end of this presentation the attendees will understand the need for an Infrastructure Reliability and Risk Assessment for their critical environment as well as what types of systems should be included in the evaluation, how the evaluation should be performed to ensure tangible results, how it should be reported and ultimately how to interpret and utilize the information presented in the assessment to their advantage.
Presentation Outline
1. What is an Infrastructure Reliability and Risk Assessment and what do I need one for?
2. Who should perform an Infrastructure Reliability and Risk Assessment.
3. What information should be included in an Infrastructure Reliability and Risk Assessment.
4. What building systems should be included. This will be an infrastructure system by system approach.
5. What are the key things to look for when my study is complete?
A. Reliability Level.
B. Single Points of Failure within Critical Systems.
C. Redundancy of Critical Systems.
D. System Integration.
E. Adequacy of Engineered Systems (Exhaust Points).
F. Adequacy of Operations, Maintenance and Testing Programs.
G. Benchmark Findings with Industry Standards.
6. Availability, MTBF Calculations and Probability of Failure Calculations. What are they, who does them, what do they mean?
7. Computational fluid dynamic modeling.
8. How long should a study like this take?
9. Review of a sample study.
This handout was provided at the OCNC Business Emergency Preparedness Series workshop hosted by the Orange County Emergency Services and The Chamber on April 11, 2019.
The document discusses auditing IT infrastructure including hardware, networks, and telecommunications devices. It provides details on objectives of IT audits such as assessing continuity, management/maintenance, and security of systems. It also discusses standards and guidelines for auditing such as CobiT, ISO 27001, and reviewing hardware assets, network design, security, backups, and telecommunication agreements and invoices.
This document provides an overview of several IT audit methodologies: CobiT, BS 7799, BSI, ITSEC, and Common Criteria. CobiT is a framework for IT governance and control developed by ISACA that defines 34 processes across 4 domains (planning, acquisition, delivery, and monitoring). BS 7799 is a British standard focused on IT security baseline controls across 10 categories. BSI is a German manual that describes 34 security modules, 420 security measures, and 209 threats. ITSEC and Common Criteria are methodologies for evaluating the security of IT systems and products at defined assurance levels. Each methodology has different strengths in areas like scope, structure, user-friendliness, and frequency of updates
Business continuity and disaster recovery are not the same but complement each other. Planning on BCP and DRP is necessary for all business. This slide contains information on how to achieve and maintain them.
Due to the dramatic increase of threats worldwide, there is a need for the companies to find ways how to increase the information security. Therefore, one solution is to implement the ISO/IEC 27001 in order to protect information both internally and externally.
Main points that will be covered are:
• The scope of ISO 27001 & associated other standards references
• Information Security and ISIM Terminologies
• ISIM auditing principles
• Managing audit program & audit activities
Presenter:
Eng. Kefah El-Ghobbas is a specialist in ‘Business Process Excellence' through ‘Business Process Re-engineering' with over 20 years of experience.
Link of the recorded session published on YouTube: https://youtu.be/rTxA8PVULUs
This document provides an overview of business continuity management (BCM). It discusses the objectives and composition of the Technical Committee on BCM in Malaysia, which develops BCM standards. The goals of the committee are outlined. BCM is defined and its importance explained from the perspectives of corporate governance, regulations, and business requirements. Key differences between BCM and disaster recovery planning are highlighted. The document provides guidance on establishing a BCM program, including identifying roles and selecting team members. An 8-module methodology for developing a BCM plan is also presented.
The document discusses ISO 27001 internal audit requirements and challenges with conducting internal audits. It proposes two approaches for outsourcing ISO 27001 audits to an external firm: 1) co-sourcing where the firm provides audit resources under the organization's direction, or 2) a managed assurance service where the firm develops and runs the entire audit program. The benefits cited include overcoming resourcing challenges, ensuring objectivity, and focusing internal resources on high risk areas.
This handout was provided at the OCNC Business Emergency Preparedness Series workshop hosted by the Orange County Emergency Services and The Chamber on April 11, 2019.
The document discusses auditing IT infrastructure including hardware, networks, and telecommunications devices. It provides details on objectives of IT audits such as assessing continuity, management/maintenance, and security of systems. It also discusses standards and guidelines for auditing such as CobiT, ISO 27001, and reviewing hardware assets, network design, security, backups, and telecommunication agreements and invoices.
This document provides an overview of several IT audit methodologies: CobiT, BS 7799, BSI, ITSEC, and Common Criteria. CobiT is a framework for IT governance and control developed by ISACA that defines 34 processes across 4 domains (planning, acquisition, delivery, and monitoring). BS 7799 is a British standard focused on IT security baseline controls across 10 categories. BSI is a German manual that describes 34 security modules, 420 security measures, and 209 threats. ITSEC and Common Criteria are methodologies for evaluating the security of IT systems and products at defined assurance levels. Each methodology has different strengths in areas like scope, structure, user-friendliness, and frequency of updates
Business continuity and disaster recovery are not the same but complement each other. Planning on BCP and DRP is necessary for all business. This slide contains information on how to achieve and maintain them.
Due to the dramatic increase of threats worldwide, there is a need for the companies to find ways how to increase the information security. Therefore, one solution is to implement the ISO/IEC 27001 in order to protect information both internally and externally.
Main points that will be covered are:
• The scope of ISO 27001 & associated other standards references
• Information Security and ISIM Terminologies
• ISIM auditing principles
• Managing audit program & audit activities
Presenter:
Eng. Kefah El-Ghobbas is a specialist in ‘Business Process Excellence' through ‘Business Process Re-engineering' with over 20 years of experience.
Link of the recorded session published on YouTube: https://youtu.be/rTxA8PVULUs
This document provides an overview of business continuity management (BCM). It discusses the objectives and composition of the Technical Committee on BCM in Malaysia, which develops BCM standards. The goals of the committee are outlined. BCM is defined and its importance explained from the perspectives of corporate governance, regulations, and business requirements. Key differences between BCM and disaster recovery planning are highlighted. The document provides guidance on establishing a BCM program, including identifying roles and selecting team members. An 8-module methodology for developing a BCM plan is also presented.
The document discusses ISO 27001 internal audit requirements and challenges with conducting internal audits. It proposes two approaches for outsourcing ISO 27001 audits to an external firm: 1) co-sourcing where the firm provides audit resources under the organization's direction, or 2) a managed assurance service where the firm develops and runs the entire audit program. The benefits cited include overcoming resourcing challenges, ensuring objectivity, and focusing internal resources on high risk areas.
This chapter provides an introduction to IT auditing. It discusses IT governance and the role of ensuring strategic alignment of IT with business objectives. It also covers the systems development life cycle (SDLC) process and phases. The chapter defines different types of information systems and the role of IT auditors in assessing risks and controls over IT resources. It outlines the skills and certifications needed for IT auditors and how IT audits are structured.
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPECB
In this session, we will go through ISO/IEC 27701 and ISO/IEC 27001 key practical implementation steps and how they can help you to be compliant with the GDPR.
Our presenters, Peter Geelen and Stefan Mathuvis, will guide you through the implementer tasks with practical hints and tips and show you how an auditor will look at your implementation, searching for evidence and compliance.
In addition, we will match the ISO/IEC 27(7)01 requirements to complete the GDPR obligations as far as possible.
Starting from executive management to privacy policies, handling notifications, setting up awareness programs, controlling user access requests, over vendor management to incident management (data breaches) and continuous updates.
The webinar will cover:
• Quick recap on general ISO components and approach
• Implementing ISO/IEC 27001 with the ISO/IEC 27701 extension for GDPR compliance
• Do's and don’ts for implementation and audit
• The importance of evidence in the audit
• Managing audit expectations and the never ending audit cycle
Recorded webinar: https://youtu.be/HL-VUiCj4Ew
The document discusses business continuity management and planning. It provides an overview of BCM and related concepts like business continuity planning and disaster recovery planning. It highlights the importance of having a comprehensive BCM framework that is tested. It also discusses risk management, planning considerations, the BCM planning and recovery process, and provides an assessment questionnaire to evaluate a BCM program.
An IT security audit involves independently examining an organization's IT systems, controls, policies and procedures. The document outlines the key steps in an IT audit including planning, testing and reporting. It also discusses defining auditors and their roles, preparing for an audit, and how audits are conducted at the application level to assess controls related to administration, security, disaster recovery and more. The goal of an audit is to evaluate security adequacy and recommend improvements.
Business Continuity And Disaster Recovery NotesAlan McSweeney
The document outlines options for implementing business continuity and disaster recovery plans. It discusses assessing requirements, reviewing statistics on data loss, outlining solution components like virtualization and offsite backups, and taking a structured approach to analysis, design, and implementation. The overall goal is to design a practical, cost-effective plan to protect the business from data loss and ensure continuity of operations.
This document discusses business continuity planning (BCP). It outlines the key steps in developing an effective BCP, including: project scope and planning, business impact assessment, continuity planning, and approval/implementation. The project scope and planning phase involves analyzing the business organization, selecting a BCP team, assessing resource needs, and analyzing legal requirements. The business impact assessment identifies critical business functions, resources they depend on, risks/vulnerabilities, and calculates downtime tolerances. Continuity planning develops strategies to address identified risks and minimize their impact. The overall goal is to maintain business operations during a disaster through preparedness and recovery planning.
This document discusses governance, risk, and compliance (GRC) management solutions. It outlines challenges organizations face with GRC such as siloed management, a reactive approach, and lack of integration with core processes. The document proposes moving from basic compliance programs to an optimized, holistic GRC approach supported by IT and business alignment. It presents Rishabh's GRC capabilities and services to help clients implement integrated GRC management.
The document discusses several IT audit methodologies: CobiT, BS 7799, BSI, ITSEC, and Common Criteria. It provides an overview of each methodology, including their main uses, structures, and summaries. CobiT is used for IT audits and governance and has 4 domains and 34 processes. BS 7799 focuses on information security management and lists 109 security controls. BSI is the German IT baseline protection manual with 34 security modules. ITSEC and Common Criteria are evaluation criteria used for security certification.
BCM is a structured approach that helps organizations continue operating during disruptions by ensuring critical operations can still function. An effective BCM framework includes understanding the organization, conducting risk assessments, developing response plans, and testing plans through exercises. Regularly reviewing and updating plans is important to account for organizational changes. Implementing a strong BCM program provides benefits like reduced financial impacts, protected reputation, and compliance.
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
Conducting regular security assessments on the organizational network and computer systems has become a vital part of protecting information-computing assets. Security assessments are a proactive and offensive posture towards information security as compared to the traditional reactive and defensive stance normally implemented with the use of Access Control-Lists (ACLs) and firewalls.
Too effectively conduct a security assessment so it is beneficial to an organization, a proven methodology must be followed so the assessors and assesses are on the same page.
This presentation will evaluate the benefits of credential scanning, scanning in a virtual environment, distributed scanning as well as vulnerability management.
The document discusses developing a business continuity plan that goes beyond just disaster recovery. It covers understanding the components of a business continuity plan including conducting risk assessments and gap analyses, developing and implementing continuity plans, establishing disaster recovery plans, and testing plans. It emphasizes that having a business continuity plan can help ensure survival during disasters and support stability, reduce financial losses, and make good business sense. The document outlines critical steps in business continuity planning including assessments, risk and impact analyses, and developing recovery strategies and actions.
This disaster recovery plan outlines procedures for restoring the company's core information systems in the event of a disaster. It details practices for regular data backups, server administration, and system shutdown/startup. Full backups are taken weekly with incremental backups daily and are stored both onsite and offsite. In the event of a disaster, the plan provides guidelines for damage assessment, prioritizing critical services, and reconstituting IT systems through salvaging equipment and restoring from backups to return to normal operations.
Nowadays, IT operations are required to run on a tight budget and under constant watch. Compliance, security and mobile innovation are making proper auditing of IT systems absolutely necessary. Knowing the most fundamental facts, like who changed what, when, and where, will save hours of troubleshooting, satisfy compliance needs, and secure the environment. This white paper shows a methodical approach to IT infrastructure auditing. That includes proper planning, estimation of time needed to implement an effective IT auditing solution, and critical resources.
This slide provide various details regarding Information security. The Database its Advantage, Regarding DBMS, RDBMS, IS Design conderations. Various Cyber crime Techniques. Element of Information i.e Integrity, Availability , Classification of Threats. Information Security Risk Assessment. Four Stages of Risk Management. NIST Definition. Risk Assessment Methodologies. Security Risk Assessment Approach. Risk Mitigation Options. Categories of controls. Technical Controls etc.
Business continuity is an organization's ability to maintain essential functions during and after a disaster through risk management processes and procedures. It aims to prevent interruptions and enable quick recovery. Key components include resilience through redundant systems, rapid recovery of critical functions, and contingency plans for various scenarios. Developing a business continuity plan involves a business impact analysis, risk assessment, designating management, and ongoing testing and updates. It is important for minimizing downtime and its effects from unpredictable events.
Presentation on iso 27001-2013, Internal Auditing and BCMShantanu Rai
The document is a presentation summarizing an internship at an IT company working on three projects: 1) Creating a roadmap for transitioning to ISO 27001:2013 which involved gap analysis and updating controls. 2) Mapping the internal auditing process which involves scheduling, preparing, conducting, and reporting on audits. 3) Analyzing a specific business continuity scenario which included identifying critical processes, calculating response times, and planning infrastructure and response to incidents. The internship provided learning around differences in standards, assessing controls, conducting audits, and creating business continuity plans.
Reliability Maintenance Engineering Day 2 session 2 Reliability Techniques
day live course focused on reliability engineering for maintenance programs. Introductory material and discussion ranging from basic tools and techniques for data analysis to considerations when building or improving a program.
This document discusses Streamline Reliability Centered Maintenance (SRCM) which aims to ensure production equipment works optimally at all times through proper maintenance management. It outlines SRCM's objectives such as maintaining reliability and availability while controlling costs. The document also describes SRCM's main workflow which includes equipment grouping, criticality analysis, and predictive and preventative maintenance task selection and scheduling.
This chapter provides an introduction to IT auditing. It discusses IT governance and the role of ensuring strategic alignment of IT with business objectives. It also covers the systems development life cycle (SDLC) process and phases. The chapter defines different types of information systems and the role of IT auditors in assessing risks and controls over IT resources. It outlines the skills and certifications needed for IT auditors and how IT audits are structured.
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPECB
In this session, we will go through ISO/IEC 27701 and ISO/IEC 27001 key practical implementation steps and how they can help you to be compliant with the GDPR.
Our presenters, Peter Geelen and Stefan Mathuvis, will guide you through the implementer tasks with practical hints and tips and show you how an auditor will look at your implementation, searching for evidence and compliance.
In addition, we will match the ISO/IEC 27(7)01 requirements to complete the GDPR obligations as far as possible.
Starting from executive management to privacy policies, handling notifications, setting up awareness programs, controlling user access requests, over vendor management to incident management (data breaches) and continuous updates.
The webinar will cover:
• Quick recap on general ISO components and approach
• Implementing ISO/IEC 27001 with the ISO/IEC 27701 extension for GDPR compliance
• Do's and don’ts for implementation and audit
• The importance of evidence in the audit
• Managing audit expectations and the never ending audit cycle
Recorded webinar: https://youtu.be/HL-VUiCj4Ew
The document discusses business continuity management and planning. It provides an overview of BCM and related concepts like business continuity planning and disaster recovery planning. It highlights the importance of having a comprehensive BCM framework that is tested. It also discusses risk management, planning considerations, the BCM planning and recovery process, and provides an assessment questionnaire to evaluate a BCM program.
An IT security audit involves independently examining an organization's IT systems, controls, policies and procedures. The document outlines the key steps in an IT audit including planning, testing and reporting. It also discusses defining auditors and their roles, preparing for an audit, and how audits are conducted at the application level to assess controls related to administration, security, disaster recovery and more. The goal of an audit is to evaluate security adequacy and recommend improvements.
Business Continuity And Disaster Recovery NotesAlan McSweeney
The document outlines options for implementing business continuity and disaster recovery plans. It discusses assessing requirements, reviewing statistics on data loss, outlining solution components like virtualization and offsite backups, and taking a structured approach to analysis, design, and implementation. The overall goal is to design a practical, cost-effective plan to protect the business from data loss and ensure continuity of operations.
This document discusses business continuity planning (BCP). It outlines the key steps in developing an effective BCP, including: project scope and planning, business impact assessment, continuity planning, and approval/implementation. The project scope and planning phase involves analyzing the business organization, selecting a BCP team, assessing resource needs, and analyzing legal requirements. The business impact assessment identifies critical business functions, resources they depend on, risks/vulnerabilities, and calculates downtime tolerances. Continuity planning develops strategies to address identified risks and minimize their impact. The overall goal is to maintain business operations during a disaster through preparedness and recovery planning.
This document discusses governance, risk, and compliance (GRC) management solutions. It outlines challenges organizations face with GRC such as siloed management, a reactive approach, and lack of integration with core processes. The document proposes moving from basic compliance programs to an optimized, holistic GRC approach supported by IT and business alignment. It presents Rishabh's GRC capabilities and services to help clients implement integrated GRC management.
The document discusses several IT audit methodologies: CobiT, BS 7799, BSI, ITSEC, and Common Criteria. It provides an overview of each methodology, including their main uses, structures, and summaries. CobiT is used for IT audits and governance and has 4 domains and 34 processes. BS 7799 focuses on information security management and lists 109 security controls. BSI is the German IT baseline protection manual with 34 security modules. ITSEC and Common Criteria are evaluation criteria used for security certification.
BCM is a structured approach that helps organizations continue operating during disruptions by ensuring critical operations can still function. An effective BCM framework includes understanding the organization, conducting risk assessments, developing response plans, and testing plans through exercises. Regularly reviewing and updating plans is important to account for organizational changes. Implementing a strong BCM program provides benefits like reduced financial impacts, protected reputation, and compliance.
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
Conducting regular security assessments on the organizational network and computer systems has become a vital part of protecting information-computing assets. Security assessments are a proactive and offensive posture towards information security as compared to the traditional reactive and defensive stance normally implemented with the use of Access Control-Lists (ACLs) and firewalls.
Too effectively conduct a security assessment so it is beneficial to an organization, a proven methodology must be followed so the assessors and assesses are on the same page.
This presentation will evaluate the benefits of credential scanning, scanning in a virtual environment, distributed scanning as well as vulnerability management.
The document discusses developing a business continuity plan that goes beyond just disaster recovery. It covers understanding the components of a business continuity plan including conducting risk assessments and gap analyses, developing and implementing continuity plans, establishing disaster recovery plans, and testing plans. It emphasizes that having a business continuity plan can help ensure survival during disasters and support stability, reduce financial losses, and make good business sense. The document outlines critical steps in business continuity planning including assessments, risk and impact analyses, and developing recovery strategies and actions.
This disaster recovery plan outlines procedures for restoring the company's core information systems in the event of a disaster. It details practices for regular data backups, server administration, and system shutdown/startup. Full backups are taken weekly with incremental backups daily and are stored both onsite and offsite. In the event of a disaster, the plan provides guidelines for damage assessment, prioritizing critical services, and reconstituting IT systems through salvaging equipment and restoring from backups to return to normal operations.
Nowadays, IT operations are required to run on a tight budget and under constant watch. Compliance, security and mobile innovation are making proper auditing of IT systems absolutely necessary. Knowing the most fundamental facts, like who changed what, when, and where, will save hours of troubleshooting, satisfy compliance needs, and secure the environment. This white paper shows a methodical approach to IT infrastructure auditing. That includes proper planning, estimation of time needed to implement an effective IT auditing solution, and critical resources.
This slide provide various details regarding Information security. The Database its Advantage, Regarding DBMS, RDBMS, IS Design conderations. Various Cyber crime Techniques. Element of Information i.e Integrity, Availability , Classification of Threats. Information Security Risk Assessment. Four Stages of Risk Management. NIST Definition. Risk Assessment Methodologies. Security Risk Assessment Approach. Risk Mitigation Options. Categories of controls. Technical Controls etc.
Business continuity is an organization's ability to maintain essential functions during and after a disaster through risk management processes and procedures. It aims to prevent interruptions and enable quick recovery. Key components include resilience through redundant systems, rapid recovery of critical functions, and contingency plans for various scenarios. Developing a business continuity plan involves a business impact analysis, risk assessment, designating management, and ongoing testing and updates. It is important for minimizing downtime and its effects from unpredictable events.
Presentation on iso 27001-2013, Internal Auditing and BCMShantanu Rai
The document is a presentation summarizing an internship at an IT company working on three projects: 1) Creating a roadmap for transitioning to ISO 27001:2013 which involved gap analysis and updating controls. 2) Mapping the internal auditing process which involves scheduling, preparing, conducting, and reporting on audits. 3) Analyzing a specific business continuity scenario which included identifying critical processes, calculating response times, and planning infrastructure and response to incidents. The internship provided learning around differences in standards, assessing controls, conducting audits, and creating business continuity plans.
Reliability Maintenance Engineering Day 2 session 2 Reliability Techniques
day live course focused on reliability engineering for maintenance programs. Introductory material and discussion ranging from basic tools and techniques for data analysis to considerations when building or improving a program.
This document discusses Streamline Reliability Centered Maintenance (SRCM) which aims to ensure production equipment works optimally at all times through proper maintenance management. It outlines SRCM's objectives such as maintaining reliability and availability while controlling costs. The document also describes SRCM's main workflow which includes equipment grouping, criticality analysis, and predictive and preventative maintenance task selection and scheduling.
Reducing Product Development Risk with Reliability Engineering MethodsWilde Analysis Ltd.
Overview of how reliability engineering methodology and software tools can help companies manage risk during product development and improve performance.
Presented at the Interplas'2011 exhibition and conference at the NEC on 27th October 2011 by Mike McCarthy.
This presentation looks at how ‘Reliability Engineering’ tools and methods are used to reduce risk in a typical product development lifecycle involving both plastic and metallic components. These tools range in complexity from simple approaches to managing product reliability data to the application of sophisticated simulation methods on large systems with complex duty cycles. Three examples are:
- Failure Mode Effects (and Criticality) Analysis (FMECA) to identify, manage and reuse information on what could go wrong with a design or manufacturing process and how to avoid it
- Design of Experiments for optimising performance through a structured and efficient study of parameters that affect the product or manufacturing process (e.g. injection moulding)
- Accelerated Life Testing to identify potential long term failure modes of products released to market within a shortened development time.
We will explore how gathering enough of the right kind of data and applying it in an intelligent way can reduce risk, not only in plastic product design and manufacture, but also in managing the associated supply chain and in the ‘Whole Life Management’ of products (including warranties). Furthermore, we will show how ‘sparse’ data gathered from previous or similar products, such as field/warranty reports, engineering testing data and supplier data sheets, as well as FEA, CFD and injection moulding/extrusion simulation, can inform and positively influence new product design processes from concept stage onwards.
In 2016, Susan Fowler released the 'Production Ready Microservices' book. This book sets an industry benchmark on explaining how microservices should be conceived, all the way through to documentation. So how does this translate for Python applications? This session will explore how to expertly deploy your Python micro-service to production.
The FMEA relates to a very broad spectrum on how effective this tool can be utilized as solver aid in dealing with the histories/pattern of failure in the product.
And how well can it be hierarchically deal with analysis the root cause of the problem.
This methodology is widely adopted in almost all manufacturing branch industries, due to its efficiency is tracking down all the possibilities occurrence in failure with the severity, occurrence, etc and other parameters to define the intensity of the failure being occurred.
To understand the tools usage a bit further, I have enumerated a case study via a example in this slides.
Mike Marshall, PE (mtmarshall.llc@gmail.com) is an Oil & Gas industry consultant who has recently developed an EAM loss prevention and asset optimization software product derived from various spreadsheet-based tools (consisting of business methods, practices, KPIs, scorecards, reports, data maps/views, etc.) which were central to the actual asset performance optimization/management and process safety improvement metrics and methodologies he implemented while working for both Marathon (23 years) and Chevron (10 years).
The Mercer Engineering Research Center (MERC) provides engineering research and development services. Located in Warner Robins, GA, MERC has over 175 technical staff with expertise across various engineering disciplines. It operates as the applied research arm of Mercer University. MERC has extensive facilities including labs for mechanical testing, electronics, and computational fluid dynamics. It supports various government agencies and contractors through contract vehicles like GSA schedules and OTA agreements. MERC specializes in areas like software engineering, energy management, and electronic warfare systems.
Reliability Program Approval Presentation_Chad Broussard
This document discusses implementing a reliability centered maintenance (RCM) program at CPPL. It states that condition-based failures account for 77-92% of equipment failures, and implementing RCM technologies like vibration monitoring and oil analysis can help reduce maintenance costs. The goals are to reduce annual maintenance spending from around $3.2 million to $1.2 million within 5 years through preventative maintenance focused on critical equipment. Implementing RCM is expected to improve equipment reliability, operator safety, and free up resources.
Managing your OnStream Inspection Program and External vs Internal inspectionsEdwin A Merrick
API 510 recognizes the need to be able to obtain valid inspection results from conducting and external inspection in-lieu of an internal inspection of Pressure Vessels.
Reliability centered maintenance (RCM) integrates different maintenance strategies including reactive, preventive, predictive testing and inspection, and proactive maintenance. The goal of RCM is to maximize reliability and minimize maintenance costs and downtime. RCM involves analyzing systems to understand failures, prioritizing failures based on consequences, and determining the best strategy to address each failure. Common applications of RCM include the aviation, spacecraft, nuclear, and defense industries where minimizing downtime is critical.
Reliability Engineering in Biomanufacturing - Presentation by Michael AndrewsWPICPE
Reliability engineering in biomanufacturing aims to identify, manage, and mitigate risks that could negatively impact plant or business operations through a focus on risk management, loss elimination, and life cycle asset management. The need for reliability engineering has grown as manufacturing costs rise, regulations expand, and skills shortages emerge. However, many companies struggle with reliability due to a lack of culture and vision connecting it to business strategy, insufficient dedication of resources, and an inability to overcome myths. Effective reliability principles can reduce costs by avoiding unnecessary expenses and improving asset utilization, but they must be applied throughout the entire asset life cycle starting in the design phase.
This document provides an overview of risk-based inspection (RBI) methodology. It defines RBI and compares it to other inspection methods. It outlines the key elements and benefits of an RBI program, including optimizing inspection costs, improving safety, and increasing availability. The document discusses international RBI standards and outlines the RBI planning process, including collecting equipment data, identifying damage mechanisms, analyzing risk, developing inspection plans, and reassessing over time. It also briefly introduces some RBI software options.
Mechanical integrity and reliability centered maintenance programs are important to ensure critical process equipment functions properly and operates safely. A reliability centered maintenance program was presented that examines equipment functions and failure modes to prioritize maintenance tasks. Hazard and operability studies and risk based inspections are other programs that identify risks. Risk based inspection involves assessing the probability and consequences of equipment failures to determine inspection intervals and methods needed to mitigate risks.
Reliability Engineering 101 : Tonex TrainingBryan Len
Reliability Engineering 101 training is a 2-day basic reliability engineering training course for electrical, mechanical, software, maintenance, reliability and quality assurance engineers, project managers and technicians covering the fundamentals of reliability.
Learning Objectives:
Describe basic concepts of reliability engineering
List the motivations for reliability and reliability engineering
List the various reliability benefits applied to process, design, products and systems
Explain different reliability terms and concepts such as MTBF, MTTR and MTTF
Discuss differences and similarities between failure rate, reliability, availability and unavailability
Discuss reliability of a repairable vs.a non-repairable system
Discuss different reliability predictions models including MIL-217, Telcordia,
Explain the role of design tools for reliability predictions
Describe FMEA, FMECA, Process FMEA, Design FMEA, FTA, RDB, Markov, and Event Tree Analysis (ETA)
Course Content:
What is Reliability?
What is Reliability Engineering?
Reliability Management
Reliability Modeling and Predictions
Reliability Engineering 101 course is intended for anyone interested in understanding what reliability and reliability engineering are and how it will transform their products and systems development to the desired state.
Learn more about reliability engineering 101. Visit Tonex.com link below
Reliability Engineering 101
https://www.tonex.com/training-courses/reliability-engineering-101/
Res Technical recruitment & training profile Alaa Thabet
RES is an engineering recruitment and technical training company that specializes in placing engineering and technical candidates in permanent, contract, and interim positions. It sources high-caliber international professionals for companies worldwide. RES provides a range of technical training programs covering various engineering disciplines, as well as soft skills and management training. The company has experience serving clients in industries such as industrial manufacturing, construction, FMCG, utilities, cement, oil and gas, and energy.
This document discusses risk informed design and test approaches used on NASA's Constellation Program. The key points are:
1) The Constellation Program aimed to develop exploration systems to support ISS and lunar missions within budget and schedule while managing safety and mission risk.
2) A risk informed design approach was used to identify optimal designs that considered risk as a design commodity along with factors like mass and power. This included probabilistic requirements and risk assessments to inform trades.
3) A "zero based design" approach started with minimal designs and prioritized adding elements and redundancies based on their ability to reduce loss of crew and mission risk most cost effectively.
This document discusses risk informed design and test approaches being used on NASA's Constellation Program (CxP). It provides the following key points:
1. CxP aims to develop exploration systems to support ISS and lunar missions using a risk informed design approach to optimize safety and mission success within costs and schedules.
2. Risk informed design incorporates probabilistic risk analyses into the design process to inform trades and identify optimal risk reduction strategies. This includes a "zero based design" approach.
3. Initial results show the risk informed design process has led to significant improvements in safety for Orion and Ares projects while resolving design challenges. Ongoing work includes further maturing risk models and analysis methods.
FMEA is a methodical, proactive strategy for assessing a process to determine where and how it might fail as well as to gauge the relative impact of various failures in order to pinpoint the areas of the process that require the greatest improvement. Teams utilise FMEA to assess processes for potential failures and to prevent them by making proactive process corrections as opposed to responding to unfavourable occurrences after failures have happened. With a focus on prevention, there may be a lower chance of injury to patients and staff. FMEA is particularly helpful in assessing the impact of a proposed change to an existing process and in evaluating a new process prior to implementation.
Risk leadership perspectives Risk Manager of the YearKarl Davey
1) Leighton Contractors is one of Australia and New Zealand's largest contractors, operating across construction, resources, telecommunications, energy, infrastructure, and facilities management.
2) The document outlines Leighton Contractors' enterprise risk management objectives, which include implementing a robust risk management approach and developing a proactive risk culture.
3) Leighton Contractors' enterprise risk management scope covers all aspects of the business from project safety to strategic risks. The vision is to retain risk knowledge for business benefits like improved tendering and contract valuation.
Similar to Risk Assessments and Reliability, What You Need To Know (20)
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
2. WHAT YOU NEED TO KNOW
AGENDA
• RISK ASSESSMENT
• INFRASTRUCTURE RELIABILITY
COOLING POWER
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
3. RISK ASSESSMENTS
• WHY
• SITE EVALUATION
• METRICS
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
4. Causes of Critical Failures
• Location
• Design
• Redundancy level
• Construction
• Quality of equipment
• Age Lurking Vulnerabilities
• Operations & Maintenance program
• Personnel training
• Level of operator coverage
• Thoroughness of the commissioning program
5
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
WHY
6. Causes of Critical Failures
• Root cause not always easy to ascertain
• Combination of factors (Cascading Failures)
• Latent failures
• Most occur during change of state events
• More maintenance does not necessarily mean higher availability
• Non-Fault tolerant systems
WHY
FILURES Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
7. Causes of Critical Failures
Commissioning or
Test Deficiency
4%
System Design Equipment
Natural Disaster 20% Design
3% 13%
Maintenance
Oversight
4%
Equipment Failure
28%
Installation Error
10% Human Error
18%
WHY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessment
8. WHY DO RISK ASSESSMENT
• Alignment of business mission and facility performance expectation
• Quantifies the risk and exposure of the critical facilities to failure
• Identifies vulnerabilities and single points of failure
• First step in creating an action plan for site hardening
• Benchmark against the industry
• Assists in developing business case for capital expenditures
RISK ASSESSMENT Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
10. SITE EVALUATION
STEP 2
• Develop PRA model (Probabilistic Risk Assessment)
• Identify Single Points of Failure within critical systems
• Evaluate redundancy of critical systems
• Capacity and expendability analysis
• Adequacy of Engineered Systems
• Operation and maintenance policies, practices and procedures
• Adequacy of maintenance and testing programs
• Evaluate risks associated with site location
• Overall Risk Analysis
• Evaluate the adequacy of operations and maintenance programs
RISK ASSESSMENT Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
11. SITE EVALUATION
STEP 2 cont.
• Harmonics analysis
• EMF studies
• Short circuit & coordination studies
• Air flow modeling-CFD
RISK ASSESSMENT Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
12. SITE EVALUATION
STEP 3
• Perform gap analysis
STEP 4
• Recommendations for upgrade/alteration to optimize facility
performance
• Budget and schedule development
• Assess risk during implementation
• Benchmark findings with industry standards
RISK ASSESSMENT Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
13. RISK ASSESSMENT METRICS
• Probability of Failure/Reliability
• Availability
• MTTF
• MTTR
• Susceptibility to natural disasters
• Fault tolerance
• Single Points of Failure
• Maintainability
• Operational readiness
• Maintenance program
RISK ASSESSMENT Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
15. RELIABILITY
• “Reliability” is used as an umbrella definition
• May Refer to Availability, Durability, Quality
• Five 9’s ????
• Reliability = Probability of Successful Operation
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
16. RELIABILITY AND AVAILABILITY
• Reliability predicts how likely is the system to fail.
• Availability is a measure (or a future prediction) of what percentage
of the time the system will operating properly
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
17. AVAILABILITY
Five 9’s refers to Availability
Availability (A) = Average fraction of time Something is in service
and performing intended function.
99.999% availability means:
• 5.3 minutes of downtime each year
or
• 1.77 hours of downtime every 20 years
Availability does not specify how often an outage occurs
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
18. AVAILABILITY
Availability (A) = MTBF/(MTBF + MTTR)
MTTF: Mean Time To Failure
MTBF: Mean Time Between Failures
MTTR: Mean Time to Repair or Downtime
MTBF=MTTF+MTTR
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
19. RELIABILITY BATHTUB CURVE
Failure Rate
early wear-out
life useful life period
0.5
Time (t) Years YEARS 12 14
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
20. RELIABILITY MODELING
• Used to compare system designs and assist in the evaluation of
risk versus the cost to mitigate the risk.
• Failure and Repair data comes from IEEE 493, Recommended
Practice for Design of Reliable Industrial and Commercial Power
Systems (IEEE Gold Book)
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
21. RELIABILITY MODELING
Components used for reliability modeling of the electrical system shown
here:
• Utility power
• Generator
• Circuit breakers
• Switchboards
• Cables
• Automatic Transfer Switch
• UPS module
• Battery
• Static Bypass Switch
• Rack Power
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
23. RELIABILITY MODELING
Shown below are the results of the calculations
Hours Hours
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
24. THE TRADITIONAL CLASSIFICATION SYSTEM
The Uptime Institute
Tier 1 – Basic Non-Redundant Data Center
Single path for power and cooling distribution without redundant
components
Tier 2 – Basic Redundant Data Center
Single path for power and cooling distribution with redundant
components
Tier 3 – Concurrently Maintainable Data Center
Multiple paths for power and cooling distribution with only one path
active and with redundant components
Tier 4 – Fault Tolerant Data Center
Multiple active power and cooling distribution paths with redundant
components and fault tolerant
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
25. Tier Definitions
TIER REQUIREMENTS
Tier I Tier II Tier III Tier IV
1 Active
Number of Delivery Paths 1 1 2 Active
1 Passive
Redundancy N N+1 N+1 2N Minimum
Compartmentalization No No No Yes
Concurrent Maintainability No No Yes Yes
Fault Tolerance No No No Yes
Availability 99.67 99.75 99.982 99.95
Downtime in Hr/Yr 28.8 22 1.6 0.4
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
26. Data Center Cost
From the UI
• Tier I - $10,000 US/kW of Useable UPS Power Output
• Tier II - $11,000 US/kW of Useable UPS Power Output
• Tier III - $20,000 US/kW of Useable UPS Power Output
• Tier IV - $22,000 US/kW of Useable UPS Power Output
• Plus $225 US/SF of Computer Room
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
27. HOW MUCH REDUNDANCY IS ENOUGH?
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
28. Reliability Considerations
Assumptions
• Various configurations examined for single or dual utility feeders, UPS,
Generators, STS’s, single or dual cords
• Compare Reliability at 2000 KW and 4000 KW Load
• 5 Year Probability of Failure
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
38. Reliability Considerations
Emergency Diesel Generators
fail to start
fail after ½ hour
fail after 8 hours
fail after 24 hours
Study Performed by Idaho National Engineering Laboratory – February 1996 at Nuclear Power Plants
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
39. Reliability Considerations
• 2(N+1) UPS/Generator with dual utility feeders - most reliable
topology
• 2(N+1) UPS > 2N UPS by small margin
• 2N > Distributed Redundant by small margin
• Significant improvement if a second utility feeder
is provided
• N+2 and/or 2N generator systems are more reliable than N+1
• Hybrid configuration in a hybrid facility is sometimes the best solution
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
40. Reliability Considerations
• Assess the condition of the mechanical plant in conjunction with the
electrical system
• The facility reliability will be driven by the least reliable component
(typically the electrical infrastructure)
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
41. System Reliability Block
Electrical System Electrical Mechanical
Electrical systempow ering the Mechanical systemsupporting critical
critical load load
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
42. System Reliability Block
MTBF Availability Pf (3 years)
Electrical system
alone 330,184 0.99999 8.10%
Mechanical system
alone 178,611 0.999943 11.70%
Electrical system
supporting mechanical 108,500 0.999985 21.40%
Overall mechanical
system 70,087 0.999931 29.20%
Combined electrical
mechanical system 57,819 0.999922 36.90%
Electrical System Electrical Mechanical
Electrical system powering the Mechanical system supporting critical
critical load load
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
43. The Cost of Reliability
Reliability
99.9999
99.999
99.99
99.9
99.0
.9
$ $$ $$$ $$$$ $$$$$
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
44. Key Takeaways – Risk Assessment
• What Reliability Level Do you Really Need Based on Your Business
Case?
• Minimize Single Points of Failure
• Concurrent Maintainability?
• Fault Tolerance?
• Ensure Adequacy of Operations, Maintenance and Testing Programs
• How to justify the cost to upgrade from present state?
RISK ASSESSMENT Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
45. Key Takeaways – Reliability
• Design objective – find optimum compromise between cost and reliability
• Size matters – larger facilities yield lower reliability
• System architecture and design implementation is more important role
than equipment selection
• Segregate system in independent blocks
• Eliminate common source components to minimize fault propagation (i.e.
LBS, hot-tie, manual bus ties)
• Move single points of failures as close to the load as possible
• Always maintain two independent sources of power to the critical load
• Optimize the design of monitoring and controls circuits
• Keep it simple/minimize human intervention/Utilize Automation
RELIABILITY Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
46. Thank you and please feel
QUESTIONS? free to contact me
Steven Shapiro, PE, ATD
SShapiro@MorrisonHershfield.com
914.420.3213
http://www.linkedin.com/in/stevenshapirope
References:
Uptime Institute White Papers:
Tier Myths and Misconceptions
Data Center Site Infrastructure Tier Standard: Topology
47. Building Areas/Systems Reviewed
׀ General Construction
׀ Electrical
׀ Mechanical
׀ Plumbing And Fire Protection
׀ Operation and Maintenance
׀ Security
׀ Load Density
48
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
RISK ASSESSMENT
48. Site Reliability
• Is Project Compatible With Zoning
• Natural Environment Issues
׀ Seismic Zone
׀ Geo Technical Reports
׀ Sub Surface Conditions
׀ Tornado/hurricane Risk
׀ Site Flood Potential
׀ Fire Potential
׀ Site Topography
׀ Weather Extremes
• Man‐Made Environment Issues
׀ Power/Data and Communication/Water Supply/Sanitary Sewer Availability
׀ ISP Connectivity to Mirror and DR Sites
׀ Proximity of Hazardous Operational Facilities, i.e. Nuclear Power Plants, Military Bases,
Chemical Plants, Tank Farms, Water/Sewage Treatment Plants, Dams/Reservoirs, Gas
Stations, etc.
׀ Distance to Airports & Freeways
׀ Distance to Emergency Services, i.e. Fire and Police Departments, Hospital
49
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
RISK ASSESSMENT
49. Building Areas/Systems Reviewed
Building Utilities and Physical Issues
׀General building systems and area characteristics
׀Life safety and environmental
Electrical Systems
׀Utility feeders
׀Service entry
׀Base building electrical distribution system including busways, step‐down
transformers, switchgear and distribution panels
׀ Uninterruptible power supply (UPS) systems
׀ Battery systems
׀ Power Distribution System including the critical computer rooms
׀ Emergency/standby generator and fuel system
׀ Normal/standby power transfer switchgear
׀ Grounding
׀ Emergency Power Off Systems
׀ Lightning protection system
׀ Fire alarm and smoke detection systems
50
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
RISK ASSESSMENT
50. Building Areas/Systems Reviewed
• Mechanical Systems
׀ Critical Systems Chilled Water Plant: Chillers, pumps, piping distribution system,
controls, etc
׀ Critical Systems Condenser Water System: Cooling towers, pumps, piping, etc
׀ Critical Systems Air Handling Systems
׀ Critical Systems Air Distribution
׀ Critical Systems Secondary Chilled Water Loop
׀ Fuel Oil Systems
׀ Boiler Systems
׀ Compressed Air Systems
• Plumbing Systems
׀ Domestic Water Systems
׀ Natural Gas Systems
׀ Fire Suppression Systems (Water and Gaseous)
• Operation and Maintenance of the Critical Support Systems
׀ Maintenance procedures and programs
׀ Normal operating procedures
׀ Emergency operating procedures
׀ Training programs and methods
׀ Spare parts
51
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
RISK ASSESSMENT
51. Building Areas/Systems Reviewed
• Building Automation
׀ Building Automation Systems.
׀ Physical Security Systems.
׀ Access control
׀ Intrusion detection
׀ CCTV systems
׀ ID badging systems
׀ Intercom systems
׀ Smoke Purge Systems
• Technology Systems
׀ Entrance Facility Feeds.
׀ Telephone Company Services.
• Systems Integration:
׀ The integration, compatibility and interaction of the above systems with each
other, as well as with the other building elements will be reviewed to ensure that
the systems are compatible and fully integrated.
52
Morrison Hershfield Mission Critical – Infrastructure and Risk Assessments
RISK ASSESSMENT