SCADA systems play an indispensable role in efficiently operating Tenaga Nasional Berhad's (TNB) extensive power grid. As the largest electric utility in Malaysia, TNB relies on SCADA systems to monitor and control its transmission and distribution networks across Peninsular Malaysia, Sabah and Labuan. Implementation of SCADA across nearly all of TNB's primary substations has enabled remote monitoring and control, reducing power outage times. However, regular assessment and mitigation of cyber security threats is needed to ensure the continued success of TNB's SCADA operations.
How the Convergence of IT and OT Enables Smart Grid Development
The goal for any utility that invests in smart grid technology is to attain higher efficiency and reliable performance.
A smart grid platform implies the convergence of Operations Technology (OT) – the grid physical infrastructure assets and applications–and Information Technology (IT) – the human interface that enables rapid and informed decision making.
This paper describes best practices for migrating to a scalable, adaptable, smart grid network.
Get with the system - Rogerio Martins, Schneider Electric disucsses the advantages of modern distributed control systems in coal handling preparation plants.
How Service-Oriented Drive Deployments improve VSD Driveline Uptime
Variable Speed Drives (VSDs) have proliferated and are now installed in large numbers throughout various industries. However, since these technologies are relatively new, not much thought has been given to the proper integration of these drives, nor have their potential energy savings and business continuity entitlements been fully realized. This paper examines how the intelligence within VSDs can be leveraged to perform predictive maintenance so that plant uptime can improve.
Are your industrial networks protected...Ethernet Security Firewalls Schneider Electric
Security incidents rise at an alarming rate each year. As the complexity of the threats increases, so do the security measures required to protect industrial networks. Plant operations personnel need to understand security basics as plant processes integrate with outside networks. This paper reviews network security fundamentals, with an emphasis on firewalls specific to industry applications. The variety of firewalls is defined, explained, and compared.
Press Conference at Hannover Messe #HM15SE...As a leader in energy management and industrial automation our interconnected technologies, solutions and services help unlock unprecedented value and ensure Industry Is On everywhere
How the Convergence of IT and OT Enables Smart Grid DevelopmentSchneider Electric
The goal for any utility that invests in smart grid technology is to attain higher efficiency and reliable performance.
A smart grid platform implies the convergence of Operations Technology (OT) – the grid physical infrastructure assets and applications–and Information Technology (IT) – the human interface that enables rapid and informed decision making.
This paper describes best practices for migrating to a scalable, adaptable, smart grid network.
Get with the system - Rogerio Martins, Schneider Electric disucsses the advantages of modern distributed control systems in coal handling preparation plants.
How Service-Oriented Drive Deployments improve VSD Driveline UptimeSchneider Electric
Variable Speed Drives (VSDs) have proliferated and are now installed in large numbers throughout various industries. However, since these technologies are relatively new, not much thought has been given to the proper integration of these drives, nor have their potential energy savings and business continuity entitlements been fully realized. This paper examines how the intelligence within VSDs can be leveraged to perform predictive maintenance so that plant uptime can improve.
Creating a Reliable and Secure Advanced Distribution Management SystemSchneider Electric
The document discusses creating a reliable and secure Advanced Distribution Management System (ADMS) for utility companies. An ADMS integrates SCADA, DMS, and OMS technologies to optimize distribution network performance. As these systems increasingly connect to open networks, cyber security is paramount. The document outlines cyber security standards from organizations like NIST, NERC, ISO, and IEC that provide guidelines for securing ADMS implementations. Specifically, it discusses how following NERC's Critical Infrastructure Protection guidelines establishes best practices for security controls in areas like access control, logging, training, and auditing to ensure the safe and secure operation of modern ADMS solutions.
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Schneider Electric
Most utilities struggle to organize information about their distribution network assets. Operations, engineering, accounting, and other business functions all use different tools and systems, forcing grid operators to synchronize separate databases. This paper presents an improved approach to managing grid assets by establishing a ‘single source of the truth,’ eliminating special-purpose databases, utilizing spatial databases, and incorporating a workflow management tool to support database updates.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...Capgemini
This document discusses moving a Distribution Management System (DMS) to the cloud. Key points:
- DMS is used by distribution centers to efficiently operate distribution networks. It interfaces with GIS, OMS, SCADA and other systems.
- Integrating DMS with other applications eliminates information silos and enhances performance. Benefits include a single login, shared alarms/events.
- Moving DMS to the cloud reduces costs and improves scalability. It provides a fully functional, real-time solution while maintaining security and reliability.
- A "read-only" SCADA could initially interface with the cloud-based DMS. More advanced implementations may host additional applications like AMI, FEP in the
This document contains the questions and answers from a webinar on best practices for IT-OT convergence. The Q&A covers topics such as defining the line between IT and OT, how data analytics and cyber security will play a role in convergence, steps for developing an integrated IT-OT architecture, and questions specific to Burbank Water and Power's systems. Contact information is provided for Jeff Meyers, John Dirkman, and Fred Fletcher from Schneider Electric and Burbank Water and Power for any additional questions.
Dtech 2015 the distribution management system network modelSchneider Electric
The presentation will illustrate the methodology deployed to achieve an accurate Distribution Network Model at Duke Energy Carolinas. It will also dive in to the impact on various stakeholders in the organization, as well as the change management process that drives the successful implementation of the model.
The Cloud Computing model is replacing the traditional IT model for many organizations that have not been able to keep up with the tremendous rate at which technology is changing, the challenges of disparate IT systems inherited through acquisitions and mergers, and decreasing internal resources available for IT commitment.
Cloud Computing models range from public cloud services that bill companies for access to IT infrastructure; the private cloud provider that hosts resources for the sole use of its own organization; dedicated external hosting to non-shared resources; and hybrid hosting, a mixed solution of cloud computing and dedicated hosting.
Schneider Electric consulting experts use their Cloud Assessment Checklist to help potential clients identify the computer services needs that best meet their IT challenges. It is not uncommon to find that an organization would optimize operation with a hybrid hosting solution in which a secure, single-tenant database would be stored with a dedicated host and the front-end would be hosted in the public cloud. Similarly, cloud bursting functionality enables the organization to automatically deploy new applications within the public cloud as needed. Such hybrid hosting models allow scaling capability to accommodate an increase in the number of users in the organization and meet peak traffic demand.
Careful examination of business and security characteristics can determine the proper cloud and hosting model that meets the needs of any particular enterprise and, as a result, help increase the organization’s IT capabilities and productivity while adding value to the business.
Digital Grid Technologies for Smooth Integration of Renewable Energy ResourcesMoustafa Shahin
- Digital grid technologies are needed to address challenges from increasing distributed renewable energy resources, such as voltage regulation impacts and changes to network reliability and protection.
- Solutions include active network management, virtual power plants, adaptive protection schemes, and developing the neural grid of the future through grid digitalization.
- A digital twin is a dynamic digital model of a real-world asset that combines mathematical and statistical models with machine learning and real-time data from sensors to enable simulation and forecasting over the asset's lifecycle.
- Digital twins, along with technologies like distributed intelligence, two-way communications, and real-time data analytics can help develop more autonomous, self-optimizing neural grids of the future.
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Weather, especially severe weather, can substantially impact your utility’s operations. Lightning can strike substations, high winds can bring down branches, ice can snap lines, and hurricanes in particular can be catastrophic. What’s more, each has the potential to leave thousands without power.
At Schneider Electric, we offer MxVision WeatherSentry Web Services to provide your utility with highly accurate weather observations and forecasts that support strategic operational decisions. This proven information is relied on by organizations worldwide to protect people, resources, and profitability. In addition, our forecasts have been ranked the most accurate in the industry for the last seven consecutive years, in an independent study.
The Mine Central Control Room: From Concept to Reality Schneider Electric
Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). The main concept of a central control room is the ability to gather and automatically transform information from different sources and mines into business decisions, centralizing and monitoring them from a single location. This central control room also acts as a complete repository of all business operations including mine planning, metrics, asset management, quality and process control, surveillance, sustainability data, emissions, energy efficiency projects, weather and more.
Wood-Mizer in Indianapolis, IN, one of the world’s
leading industrial sawmill manufacturers, has developed
the next generation of industrial sawmills by combining
a thin-kerf blade and advanced automation technology
for maximum log yield and profitability.
This document discusses the cyber security risks of smart grids and proposes an integrated security framework to address these risks. Smart grids integrate information infrastructure with electrical infrastructure, improving performance but also increasing vulnerability to cyber attacks. The framework features security agents, managed security switches, and a security manager to provide layered protection, intrusion detection, and access control across the power automation network in a scalable and extensible manner. This integrated approach is needed as power systems have different security needs than traditional IT networks.
This document provides an overview of a fastrack distribution management system (DMS) pilot implementation approach for utilities. The approach involves four phases: Build, where a subset of the utility's network is modeled; Learn, where the model is evaluated; Plan, where future goals and strategies are identified; and Execute, where the DMS software is deployed. The pilot helps utilities demonstrate DMS benefits, better understand their data needs, and build support for further smart grid projects.
This document discusses security challenges for SCADA (Supervisory Control and Data Acquisition) systems. It provides an overview of SCADA basics and common threats like accidents, vandalism, insiders, and advanced persistent threats. Specific challenges are outlined, such as long lifecycles making systems difficult to upgrade and default/shared passwords. Recommendations include strategies for access control, software patching, and regular auditing. The ScadaScan tool is introduced as an open source scanner to identify SCADA devices and vulnerabilities.
Eclipse SCADA is an open source SCADA (Supervisory Control and Data Acquisition) platform built on Java. It allows monitoring and control of industrial processes through a computer system. Eclipse SCADA acquires data from devices using various protocols, enriches the data with additional functionality, and exports it for storage, alarming, and display in client GUIs. It provides features for data acquisition, alarms and events, historical data storage, configuration, and visualization interfaces.
The document provides an overview of Eclipse NeoSCADA, an open source SCADA platform based on Java. It describes that NeoSCADA allows monitoring and control of industrial processes via protocols like Modbus and OPC, and features including data acquisition, alarms and events, historical data storage, and an Eclipse-based graphical user interface. The document outlines the data flow from field devices to the user interface via drivers, a master server, and clients.
The document discusses the Malaysian Code on Corporate Governance 2012 (MCCG 2012) and principles of corporate governance at Tenaga Nasional Berhad (TNB).
It outlines 8 principles and 26 recommendations in MCCG 2012 relating to clear roles of the board, board composition, independence of directors, commitment of directors, and integrity in financial reporting. It also compares provisions in MCCG 2012 to the previous 2007 Code.
Dr. Philip Hadcroft challenges conventional views of China as merely a low-cost outsourcing destination. He argues that China will become the largest buyer of outsourced services in the world as the government aggressively grows the domestic services industry to transform China's economy. Within five years, Chinese service providers will be very large in scale and able to offer highly competitive costs due to massive scale. Hadcroft advises viewing China not as a sourcing market but as a massive growth opportunity for both customers and talent in its rapidly expanding services industry. Executives should focus on understanding China's direction and finding Chinese partners and customers, rather than approaching Chinese firms as suppliers.
Abstract:
Corporate governance is very important in our business world today, especially after the frequent non-stop worldwide financial crises. Strong corporate governance is now considered a basic condition to accept and register an organization in most of the Stock Exchange Markets all over the world. The audit committee plays a major role in corporate governance regarding the organization’s direction, control, and accountability. As a representative of the board of directors and main part of the corporate governance mechanism, the audit committee is involved in the organization’s both internal and external audits, internal control, accounting and financial reporting, regulatory compliance, and risk management. This paper focuses on the audit committee’s powers, functions, responsibilities, and relationships within the framework of corporate governance.
Compliance in the framework of corporate governance (side panel 2) - Oliver O...e-Democracy Conference
The CCO should be a senior executive with direct access to the
board and independence from business lines to ensure objectivity and
authority to implement an effective compliance program.
Compliance in the Framework of
Corporate Governance 15
The Malaysian Code on Corporate Governance was developed by the Working Group on Best Practices in Corporate Governance (JPK1) and approved by the Finance Committee on Corporate Governance. JPK1 was chaired by the Chairman of the Federation of Public Listed Companies and comprised representatives from private and public sectors. The Code aims to set out principles and best practices on corporate governance structures and processes at the micro-level, such as board composition and procedures. It allows for a more flexible approach to raising governance standards than regulation. Investor confidence in Malaysia was affected during the 1997/98 Asian Financial Crisis and the Code was issued in 2000 to strengthen corporate governance.
Malaysian Code on Corporate Governance (MCCG)nabaz4u
The document summarizes the Malaysian Code on Corporate Governance (MCCG), including its origins, revisions over time, and key principles in the 2012 version. The MCCG was introduced in 2000 based on the British model and revised several times to improve directors' roles, foster commitment, promote board effectiveness, and establish principles like clear board responsibilities, independent oversight, risk management, and shareholder engagement. The 2012 principles focused on strengthening independence, composition, disclosure and relationships between companies and stakeholders.
The journey of Corporate Governance in Malaysia, So FarNik Hasyudeen
The document summarizes the journey of corporate governance in Malaysia over time. It discusses key events like the Asian Financial Crisis and releases of the Malaysian Code of Corporate Governance in 2000, 2007, 2012, and a proposed 2016 version. The 2000 and 2007 codes established principles and best practices around board responsibilities, financial reporting, and shareholder rights. Later versions strengthened board independence and oversight of risk. A reality check highlighted both improvements and ongoing issues. The way forward emphasizes strengthening ethics, culture, and the societal value placed on good governance.
The document discusses Enron's rise and fall and the causes of its corporate scandal. It summarizes how Enron grew rapidly through the 1990s by evolving its business model to focus on energy trading and contracts. However, cracks began to emerge in 2001 as Enron restated earnings and losses came to light. Enron filed for bankruptcy in December 2001 after it was revealed that special purpose entities were used to hide debt and losses. The failures of corporate governance mechanisms like the board, executives, and auditors allowed improper accounting practices that inflated financial reports and hid Enron's true financial situation.
GlaxoSmithKline (GSK) has a strong code of conduct that emphasizes honesty, integrity, and compliance with all legal and regulatory requirements. GSK provides guidance and support for employees, backed by rigorous auditing and disciplinary action for misconduct. The code promotes ethical business practices that benefit stakeholders, and employees are encouraged to seek advice regarding ethical situations.
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu
Conference on Electricity Power Supply Industry (CEPSI) 2012, Bali, Indonesia
(Accepted for presentation but not published due to unforeseen withdrawal of author)
SCADA Courses, SCADA is maybe the most imperative and ordinarily utilized modern control framework design on the planet. SCADA remains for Supervisory Control and Data Acquisition, a PC arrange framework for social affair and dissecting ongoing information. SCADA frameworks are utilized to screen and control a plant or gear in businesses, for example, broadcast communications, water and waste control, vitality, oil and gas refining and transportation.
The key property of a SCADA framework is its capacity to play out a supervisory task over an assortment of other restrictive gadgets. Additionally, SCADA frameworks are imperative as a result of mechanization. It enables an association to precisely contemplate and envision the ideal reaction to estimated conditions and execute those reactions consequently inevitably. Depending on exact machine control for checking gear and procedures for all intents and purposes wipes out human mistake.
SCADA frameworks were first utilized as a part of the 1960s. They can be moderately straightforward, for example, one that screens ecological states of a little place of business, or inconceivably unpredictable, for example, a framework that screens all the movement in an atomic power plant or the action of a city water framework.
Some of the major benefits from using SCADA include:
Reduced time consumption
Optimized human resource consumption
Increased product/project revenue
Greater remote accessibility
Implementation of user access levels for enhanced security
Instantaneous alert on alarms or events
Organized data records and automatic report generation
Real-time data analysis
Ensure system availability at all times
Easy user interfaces for interaction through a quality HMI
Automated calculation
Energy Field Applications:
SCADA frameworks have ended up being particularly valuable in vitality related ventures where continuous data is critical, for example, in circumstances where there's revelation of an oil or gas spill.
SCADA Training:
Tonex has been putting forth SCADA training since 2001. As of now Tonex offers a few SCADA Training courses including an essential course, Solar SCADA Training, Wind Energy SCADA Training, ICS Cybersecurity Training and SCADA Security Training.
Why Choose Tonex?
Presenting exceptionally modified learning arrangements is our specialty. For more than 30 years Tonex has worked with associations in enhancing their comprehension and capacities in themes regularly with new improvement, plan, enhancement, directions and compliances that, to be honest, can be hard to fathom.
For more data, questions, remarks, Contact us.
SCADA Training Courses
https://www.tonex.com/scada-training-courses/
Graduates of our PLC SCADA Training Institute in Noida program can look forward to a multitude of career opportunities in sectors like manufacturing, oil and gas, power generation, and many more. Roles such as Automation Engineer, Control System Engineer, SCADA Programmer, and PLC Technician become accessible, offering a promising career path in industrial automation.
https://aptronsolutions.com/best-PLC-SCADA-Training-in-Noida.html
SCADA Systems Vulnerabilities and Blockchain Technologyijtsrd
SCADA systems are one of the most important part of industrial operations. Before SCADA, plant personnel had to monitor and control industrial process via selector switches, pushbuttons and dials for analog signals. As manufacturing grew and sites became more remote, relays and timers were used to assist supervision. With the onset of technology and advent of network based protocols, these systems became more reliable, fast and it became easy to troubleshoot problems. Indeed progress also brings vulnerabilities, which was no new for SCADA. The IP protocols brought threat to the security of these systems. The devastation that cyber predators on SCADA can inflict, could be illustrated by the Stuxnet virus attack. This paper discusses what SCADA systems are, their uses, protocols being used by these systems, vulnerabilities and ways to combat those vulnerabilities. It focusses on the use of Blockchain Technology as a step in security of such systems. Diksha Chhonkar | Garima Pandey "SCADA Systems: Vulnerabilities and Blockchain Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31586.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31586/scada-systems-vulnerabilities-and-blockchain-technology/diksha-chhonkar
SCADA systems are used to monitor and control equipment and processes in industries like oil/gas, water treatment, and manufacturing. They gather data in real-time from remote locations and send control commands back. SCADA has evolved through 3 generations from standalone monolithic systems to distributed systems on local networks to today's networked systems using open standards and wide area networks. Security issues need to be addressed like encrypting communications, securing devices, auditing networks, and implementing threat protection. The future of SCADA involves more sophisticated systems that can handle huge data volumes and territories with some having artificial intelligence capabilities.
This document discusses developments in automation and IT solutions for India's power sector. It highlights challenges like the demand-supply gap in power generation and low per capita consumption. Industry experts discuss how greater adoption of automation and information technologies can help address these challenges and enable more efficient power plant operations and management. The discussion centers around trends like integrated plant automation, smart grids, Internet of Things, big data analytics, and modernizing older power plants through automated devices and control systems. Training of power sector engineers is also emphasized as important for effective utilization of new technologies.
The document discusses India's power grid network and the transition to a smart grid system. It provides information on:
- India's existing regional power grids and their interconnections.
- The definition and key characteristics of a smart grid, including its use of digital technology, smart meters, and two-way communication.
- The advantages of a smart grid like enabling renewable energy integration, demand response programs, and modernizing transmission and distribution systems.
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
Cloud assisted io t-based scada systems security- a review of the state of the art and future challenges.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Supervisory Control And Data Acquisition (SCADA) networks are used to control large industrial machines and systems remotely. SCADA systems were designed for efficiency, not security, so they are vulnerable to exploitation. There are numerous entry points for attackers, including wireless networks connecting SCADA systems, gateways between computer and SCADA networks, and modifying unencrypted command traffic. Organizations need to implement controls separating SCADA networks, monitor for abnormalities, regularly upgrade firmware, and consider the human element for securely controlling SCADA systems.
SDN architecture for Scalable Resource Management for Big Data Governance in ...IRJET Journal
This document discusses using SDN architecture for scalable resource management of big data in cyber security governance. It proposes using SDN to balance flows across controllers in a proactive manner to optimize resource usage. SDN can securely distribute and manage big data across different organizations for information sharing. The document also discusses using SDN to secure data at various layers while distributing across the SDN architecture. It provides background on big data, flow balancing schemes, Hadoop and MapReduce techniques, and how big data governance relates to cyber security. Related works exploring integrating SDN and Hadoop to improve performance are also summarized.
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
This document discusses the design and implementation of a SCADA system to control an induction motor. It begins with an introduction to SCADA technology and its applications. It then describes the hardware components used, including the induction motor, PLC, and other electrical components. The document outlines the working of the overall control system, with the PLC controlling the motor based on inputs to the SCADA interface. It also discusses the development of the SCADA interface and screens to monitor and control the motor remotely. Screenshots are provided of the SCADA screens under different operating conditions of the induction motor.
SCADA (supervisory control and data acquisition) systems are used to monitor and control industrial processes in many industries. SCADA systems gather data from sensors and input devices, then process and analyze the data to monitor processes, detect issues, and enable control of machines and devices. Modern SCADA systems use technologies like SQL databases and web-based applications to improve security, productivity, efficiency and access to real-time data from anywhere. Ignition is a SCADA software platform that uses modern IT practices and has a unique pricing structure, enabling more cost-effective and higher performing SCADA systems.
SCADA (supervisory control and data acquisition) systems are used to monitor and control industrial processes in many industries. SCADA systems gather data from sensors and input devices, then process and analyze the data to monitor processes, detect issues, and enable control of machines and devices. Modern SCADA systems use technologies like SQL databases and web-based applications to improve security, productivity, efficiency and access to real-time data from anywhere. Ignition is a SCADA software platform that uses modern IT practices and has a unique pricing structure, enabling more cost-effective and higher performing SCADA systems.
Press Release SELDON SYSTEMS ANNOUNCES AVAILABILITY OF CONTINUITY MOBILE APIMichael Shaw
Seldon Systems announces the availability of their new Continuity Mobile API, which allows cable operators to integrate data and functionality from their Continuity power monitoring software into mobile applications. This gives field service technicians real-time access to power supply status and alerts from their mobile devices. The API is customizable and aims to improve efficiency, response times, and safety for technicians working in the field.
Asset Utilization Metrics Propel a Revival in Safety SolutionsARC Advisory Group
Asset Utilization Metrics Propel a Revival in Safety Solutions
Health and safety in the workplace has not always been a primary consideration
in manufacturing environments. However, there is a renewed
interest in safety emanating from Europe, highlighted by the European
Norm standard EN 954-1, which is garnering interest
in Japan and North America. Safety
technology has progressed considerably since the
first emergency stop relay appeared on the market,
and the future will bring new developments
to this technology. Improvement in the implementation
of current safety standards is mutually
beneficial for the protection of both man and machine
with the reduction of workplace accidents, lost output, damage to
machinery, and insurance premiums while resulting in an increase in Overall
Equipment Effectiveness (OEE). Manufacturers are currently reevaluating
the safety aspects of their machines and devices so as to provide
the safest possible workplace environment.
A new generation of safety solutions have
emerged that are more effective in
preventing accidents, less costly to
implement, more easily to adapt, more
reliable than existing hard wired systems,
and results in an increase in Overall
Equipment Effectiveness.
Supervisory Control and Data Acquisition (SCADA) System in Power System.pdfMd. Zawadul Ali
A short brief on SCADA system in Power System.
SCADA systems are used in power systems to monitor and control the generation, transmission, and distribution of electricity. They provide operators with real-time information about the state of the grid, which helps to improve reliability, efficiency, and safety.
SCADA systems are essential for the operation of modern power grids, which are becoming increasingly complex and interconnected.
Demand Side management of smart grid using IoTIRJET Journal
This document summarizes a research paper that proposes a demand side management system for smart grids using IoT technology. The system aims to monitor and control household appliance power consumption to manage demand below a threshold. It uses an energy sensor to measure voltage, current and power for each user. Total power consumption is calculated and compared to a decision value limit. If power exceeds the limit, loads will be curtailed to meet the limit. Readings are sent to a cloud-based web server for remote monitoring and control. The system provides an affordable and user-friendly way to implement demand side management for smart grids using IoT.
Case Study - Smart SCADA And The Use of Digital Twins In Renewable Energy PlantsIngeteam Wind Energy
Deploying a data-driven digital twin for the monitoring of a multi-technology asset portfolio in Latin America.
A leading asset owner in Latin America needed to unify the large and complex set of SCADA data generated in order to improve decision-making processes and create more value.
Discover how!
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments Orange Business Services
Sierra Wireless and Orange Business Services are ready to partner with OEMs and utilities
building the new generation of smart water metering technology. Providing fl exible hardware,
strong security, and a comprehensive device-to-cloud solution, a joint solution from Sierra
Wireless and Orange can help OEMs capitalize on this growing global market and help
optimize the world’s water supply.
The survey revealed that cash flow forecasting was identified as a primary challenge for treasurers in Asia Pacific. Only 14% of respondents indicated complete satisfaction with their cash flow forecasting processes, while the majority remained moderately satisfied, showing room for improvement. Key challenges included inaccurate data, lack of integration between systems, and inefficient processes. While spreadsheets were the most commonly used forecasting tool, they lack connectivity to other systems and can introduce operational risks. Adopting specialized treasury management systems was seen as a way to improve cash visibility and forecasting accuracy.
The document discusses India's business process outsourcing (BPO) industry. It notes that while other countries like China, Philippines, and Malaysia are gaining in the BPO industry, India remains the top outsourcing destination globally according to a recent report. This is due to factors like availability of English-speaking talent, lower costs, strong infrastructure, and high quality of services in India. Several Indian cities like Bangalore, Mumbai, and Delhi feature highly in the rankings of top outsourcing destinations worldwide. The document concludes that India is well-positioned to retain its leading position in the global outsourcing industry.
The Shanghai Tower has an ambitious design as the world's tallest double skin building. Its design aims to minimize energy usage through a "thermos bottle" approach of an inner and outer skin that can be opened or closed like a sweater. The double skin design allows for public amenity floors with atriums every 15-20 floors, making the tower accessible to both public and private users. The design and construction of the tower's two skins, especially the inner skin, presented complex technical challenges due to the tower's extreme height. Lessons learned included preparing for unexpected issues and being flexible to fabricator input to optimize aesthetics and return on investment.
The document discusses strategies for improving asset integrity management in the oil and gas industry. It covers the importance of asset integrity, especially as Asia Pacific's role in oil and gas production increases. It outlines some danger signs that integrity is lacking, such as staff not feeling concerns are addressed and procedures being bent rather than followed. The document advocates making staff a central part of integrity processes so they can help identify and address small issues. It also lists 24 pillars that contribute to a successful asset integrity and HSE strategy, including performance management, knowledge management, and regulatory compliance.
Aiming for Alpha - Opportunities and Challenges for ETF Investors in AsiaDarwin Jayson Mariano
The document provides an overview of exchange traded funds (ETFs) in Asia Pacific excluding Japan. It discusses the growth of the ETF market in the region from 2005 to May 2013, noting that ETF assets have grown from $10 billion to $88.9 billion over that period. It also examines some of the challenges for ETF investors in Asia, including counterparty risk associated with synthetic ETFs and exchange traded products that are not regulated as funds. The opportunities for ETFs in the region are significant but regulation will influence further growth.
6 Game-Changing Tips to Deal with Risk Management and Drug Safety AuditDarwin Jayson Mariano
There are unique challenges to pharmacovigilance in Asia, including a lack of trained personnel, unrealistic expectations from regulators, safety issues around traditional medicines, and poor reporting. To effectively address these challenges, companies must establish comprehensive drug safety and risk management strategies that consider all aspects of risk identification, analysis, and response. Key elements include monitoring programs to quickly identify drug risks, periodic safety reports, careful signal analysis accounting for demographic factors, and education initiatives for healthcare providers and patients.
The Shanghai Tower will be the tallest building in China and the second tallest in the world once completed in 2014. It has an ambitious design as the world's tallest double skin building. Some key highlights include its double skin facade system that functions like a thermos bottle to increase insulation and allow for enclosed atrium spaces. The facade encountered many complexities in its design due to the building's extreme height and need to account for various movements. The chief architect Marshall Strabala emphasizes that movement is one of the most important lessons in designing super tall skyscraper facades, as it can impact the facade design in many ways due to factors like the building's overall movement, structural changes, and concrete creep.
How effective is double skin façade in preventing building heat lossDarwin Jayson Mariano
Double-skin facades have advantages like natural ventilation, noise insulation, and reducing heating and cooling energy needs. However, they also have disadvantages like higher construction costs and requiring more maintenance. The chief architect of the Shanghai Tower, a supertall skyscraper with a double-skin facade, says it is very effective at preventing heat transfer through the facade. It uses cool air multiple times within the facade and interior before exhausting it, maintaining a temperature gradient that provides high insulation.
Nagging Dilemmas in Airport Expansion (and how to deal with them)Darwin Jayson Mariano
The document discusses key challenges facing airport operators regarding airport expansions. It notes that Asia Pacific is projected to overtake North America as the top region for air traffic by 2030 due to rapid urbanization and economic growth in developing countries. However, airport expansions require careful planning to address issues such as return on investment versus cost of capital, aligning infrastructure with airline fleet and passenger growth plans, implementing strong security measures while maintaining passenger experience, and balancing economic benefits with environmental concerns. The document promotes attending the Airfield Engineering and Asset Maintenance 2013 conference to learn best practices for ensuring operational efficiency and safety in airfield expansions and maintenance.
Edinburgh Airport is Scotland's busiest airport, serving over 9 million passengers annually on over 100 flight routes. To maintain its runways and pavements, the airport uses a three-tier inspection process involving daily inspections by operations staff, followed by manager inspections and weekly senior manager inspections. LED lighting and new pavement materials are emerging trends that can improve maintenance and reduce costs. The airport's chief operating officer discusses challenges like forecasting passenger growth and technological changes to ensure sufficient infrastructure.
Latin America vs Southeast Asia: The Race for Private Equity SupremacyDarwin Jayson Mariano
Private equity investing is growing rapidly in both Latin America and Southeast Asia as both regions compete for supremacy in the industry. In Latin America, PE and VC investing hit a 5-year high of $7.9 billion in 2012, a 21% increase over 2011, with Brazil receiving the majority of investments. Meanwhile, Southeast Asia saw $5.3 billion in PE deals in 2011, with continued strong interest from investors expected. Overall, both regions represent attractive opportunities for PE firms due to their economic growth and scale of companies, setting the stage for further competition between Latin America and Southeast Asia in future years.
While IPOs provide an attractive headline story, strategic acquisitions are viewed as a more reliable exit strategy for private equity investments in Southeast Asia. Strategic buyers understand the industry well and see value in acquiring companies, making them easier to convince than seeking a single buyer. However, finding the right strategic fit can still be challenging. Management buyouts are also considered but come with difficulties in obtaining financing. Overall, private equity investors are advised to have multiple exit options in mind and ensure management teams are aligned on clear exit strategies when investing in the region.
Polymer membranes have advantages over ceramic membranes for oil/water separation. Polymer membranes can provide similar water quality as ceramic membranes but at lower capital and operating costs. Recent developments show polymer membranes standing up better than expected in oil/water separation applications. This allows produced water to be treated to high qualities suitable for reinjection or enhanced oil recovery.
7 Most Significant Underground Projects in Asia Today [Infograph]Darwin Jayson Mariano
In this very exclusive report, we’ve compiled the 7 most significant underground projects in Asia today. Find out where are these projects located, what’s the scope, how much has been allocated and what kind of impact it will create to the stakeholders involved. Never have we seen anything quite like it.
Improving safety for organisations require mere technological solutions and fixes. Understanding processes and plant interactions are equally important. Oftentimes, “blind spots” are recognized as a significant contributor to a major accident. Are you aware of: The Project Execution Woe, The Safety Assessment Hitch, The Technology Squeeze and six other blind spots?
SKY HIGH - The 7 Most Remarkable Tall Building Projects in the WorldDarwin Jayson Mariano
This document discusses 7 of the most remarkable tall building projects around the world. It provides details on the Shanghai Tower in China, Burj Khalifa in Dubai, South Beach Development in Singapore, 1 Bligh Street in Australia, Signature Tower Jakarta in Indonesia, Tanjong Pagar Centre in Singapore, and Trump Tower Manila in the Philippines. For each project, it highlights key details like planned completion dates and heights, as well as design and sustainability features. The document also promotes attending the upcoming Tall Buildings Asia 2013 conference to learn lessons from these projects.
The explosion of information in almost all quarters of our lives has changed the way we make decisions. In a world that is rapidly evolving, how can modern day defence organizations take advantage of the latest technology in geo-spatial intelligence? What are the unique challenges that Asian defence organizations face and how are these challenges being addressed, now?
Battle of Mega Bridges - The 7 Highly Notable Mega Bridge Projects Darwin Jayson Mariano
Not your ordinary infrastructure project, mega bridge projects worth billions of dollars and tens of thousands of kilometres in length are highly complex and requires significant amount of technical skills. In this infograph, we’ve compiled the 7 Highly Notable Mega Bridge Projects you should know about and why it matters.
TRAILBLAZING: Shared Services and Outsourcing Trends in Asia 2013 Darwin Jayson Mariano
The trend lines are clear – Asian economies will outperform the rest of the world in 2013, at least according to the latest IMF, Standard Chartered research. But, how will this impact shared services and outsourcing organisations in Asia? What are the trends specific to this industry? The challenges, the demographics and the Asian advantage – this information is simply too difficult to ignore.
The growing fascination over the Chinese market is felt in almost all industries around – especially within the luxury sector. Study after study reveals that China is an important market that luxury brands shouldn’t – and couldn’t – ignore. However, confronting the realities on the ground could be challenging, albeit necessary for a brand to truly succeed in this market. What are the types of Chinese millionaires? Where do they live? How do they make their purchase decision? Take a look and find out.
Discover who your target audience is and reach themQuibble
This presentation goes through a number of elements you need to consider when going through the process of identifying your target audience in order to enable to you be able to reach them and sell to them. I go through the importance of customer profiling, along with a number of ways you can discover what they really want, and where they are.
Analyze the idea behind Binance KYC Bypass and compare it to the KYC policies of other cryptocurrency exchanges. Find out about the dangers of trying to bypass KYC and the verification procedure.
How AI is Disrupting Service Industry More Than Design ThinkingBody of Knowledge
Artificial Intelligence (AI) and Design Thinking are two powerful tools that, when used together, can revolutionize the service industry. By combining these approaches, businesses can develop innovative solutions that enhance customer experience, increase efficiency, and drive growth. Here's how AI and Design Thinking are disrupting the service industry
TPH Global Solutions Overview: Successful Strategies for Selling to Mass Merc...David Schmidt
TPH Global Solutions makes it easy to get your products to market, through the maze of retailer requirements and complex supply chain challenges that include missed deliveries, packaging errors, and shipping damage.
From pitch to profits, TPH delivers successful retail merchandising campaigns with custom point of purchase (POP) displays and custom packaging that meet the toughest demands of retailer buyers and customers at Costco, Sam’s Club, BJ’s, Walmart, Home Depot, Lowe’s, Walgreens, CVS, Kroger, Meijer, Petco, and more.
If you’re an established brand needing to take the pain out of your supply chain, TPH ensures global, on-time and on-budget delivery so you can focus on making great products instead of dealing with headaches.
If you’re an emerging brand needing to convert new retail opportunities, TPH will help you land and pass the test order – we know all major retailer requirements and provides you with total cost visibility, so you will negotiate with confidence and fly through the toughest approval process.
With deep expertise in retailer requirements and global supply chain management, we deliver confidence for brand managers – since 1965.
Innovative Full Stack Developer Crafting Seamless Web SolutionsHarwinder Singh
As an innovative full stack developer, I specialize in creating complete web solutions from front-end design to back-end functionality. With expertise in HTML, CSS, JavaScript, and server-side technologies like Node.js and Python, I build scalable, responsive, and user-friendly applications. My focus is on delivering high-quality, efficient, and impactful digital experiences.
Local SEO Strategies: Dominate Local Search with Effective SEO TacticsWoospers
Local SEO has grown in importance in today's digital environment for companies trying to draw clients from their target region. If you want to take your local SEO to the next level, work with Woosper to maximize the potential of your online presence.
The AI-Powered Side Hustle Transforming Lives: A Dad's Journey to Financial S...SOFTTECHHUB
Finding a balance between work, family, and personal well-being can be a daunting challenge. For Micah Johnny, a fitness instructor and father of four, this balance became even more precarious when he lost a significant contract that threatened his family's financial stability. However, through resilience and innovation, Johnny discovered a flexible, AI-powered side hustle that not only stabilized his income but also allowed him to maintain his hectic schedule. This article explores how this side hustle works, its benefits, and how others can leverage similar opportunities.
The Strengths and Weaknesses of Each Zodiac Signmy Pandit
Explore the strengths and weaknesses of each Zodiac Sign to understand yourself and others better. Discover detailed insights with MyPandit and enhance your personal growth and relationships.
1. SCADA
Success
the Best Measure of
Darwin Jayson Mariano
With almost RM88 billion in assets, according to its 2012
Annual Report, Tenaga Nasional Berhad (TNB) is the largest
electric utility in Malaysia and selected as the No. 1 “Electric
Utilities in Asia” in the coveted Platts Top 250 Global Energy
Company Rankings for 2013. Employing more than 33,500
people group-wide, the company serves more than 8.3
million customers Peninsular Malaysia, Sabah and Labuan
and continues to provide reliable and efficient electricity
services for more than 60 years now.
2. Aside from its people, TNB’s success can also be attributed to their investment in
world-class infrastructure and top-notch systems and processes to support its growing
network of customers. And one of the key systems right at the heart of TNB’s operations
is SCADA.
SCADA or Supervisory Control and Data Acquisition is a type of Industrial Control
System (ICS) that monitors and controls industrial processes that exist in the physical
world. SCADA systems historically distinguish themselves from other ICS systems by
being large scale processes that can include multiple sites, and large distances.
When applied properly, SCADA can help industries eliminate the need for site visits
by personnel for inspection, data collection, etc. The software tool enables real time
monitoring of operations as well as make modifications to systems, troubleshoot and
generate reports automatically. The end result is tremendous savings in time and
money, not to mention enhanced operational efficiency, which could translate to
increased revenue and profits for the company.
However, implementing successful SCADA systems require detailed planning, not to
mention massive investments of time, people and financial resources. In going about
such a major undertaking, engineers and project managers have outlined the following
‘rules’ to observe during implementation and operations of SCADA systems:
Choose your system wisely
There are two main things that should be taken into consideration when purchasing
a SCADA system: a) Which provider to opt for: legacy providers, historical reputation
and peer preference are all factors that play a part in this; and b) Sector-specific
needs: making sure that the system you choose is aligned to the requirements of your
organisation and sector is key.
Get network integration right
Migrating from one system to another can often lead to significant downtime as well
as data loss, damaged data integrity and inaccurate data transfer. In an oil & gas or
petrochemical facility, such losses could be detrimental to consumers or potentially
catastrophic, so making sure that integration is carried out efficiently and with
contingency planning in play is vital.
Prepare for environmental hazards
If remote terminal units (RTUs) are based out in the open, extreme conditions will
eventually take their toll. Improving the durability of SCADA equipment is paramount
for regions such as Asia with scorching temperatures during the day, cold nights and
abrasive and inhospitable conditions.
For maximum performance, periodic maintenance should be carried out in-line with a
10 – 15 year equipment lifespan.
Plan for replacement of obsolete units
The obsolescence of integral parts of the SCADA framework is inevitable with the
march of time and quick-fire advancements in technology, so having a replacement
plan is a must to prevent loss of money and time. This downtime can also be minimized
by initially selecting a SCADA package that improves usability, maximises flexibility and
provides for future expansion.
3. Keep security threats at bay
Computer viruses evolve quickly as their uploaders are diligent, and threat profiles are
updated with frightening constancy. Having regular and thorough auditing strategies is
one way to make sure that security threats are always in check and your SCADA systems
are up to the task.
Assess your vulnerability regularly
Given the myriad threats that exist out there, it is still difficult to quantify exactly
how vulnerable a SCADA system is to an attack. Assessments can be made to reduce
the causes of vulnerability through threat simulation, and the most classic of these
methods is the use of attack trees. An attack tree may be an extremely complex analysis
of thousands of different potential pathways from root threat to attack completion,
yet it would be impossible to cover all the possible routes, so running regular checks is
absolutely necessary.
Ensure interoperability without sacrificing security
Many SCADA systems use their own dedicated and proprietary communication
protocols as opposed to shared and open systems. Within wide-ranging networks, the
interoperability of different systems is crucial to the smooth running of the framework
as a whole.
SCADA :
A TNB Case Study
For Tenaga Nasional, operational efficiency is clearly an
important aspect of the business – and one that TNB is
exceptionally good at. In an interview with Michael Khor,
TNB’s Deputy Chief Engineer for SCADA, he explained the
‘indispensable’ role of SCADA systems:
“SCADA systems bring significant value to organizations such as power utilities. It is the
indispensable technology that enables the safe, secure and economic operation of the
power grid.
Together with the relevant suite of power applications, SCADA is typically utilised in
the form of Energy Management Systems for transmission grids and as Distribution
4. Management Systems for the distribution system. The ultimate just-in-time supplydemand paradigm of power grids perhaps bring forth many folds of benefit, to more
than justify the direct cost of SCADA ownership. There is significant contribution to the
bottom line when operations are made more efficient, mistakes are reduced and costly
blackouts are averted,” he explains.
While the indispensable role of SCADA systems couldn’t be overemphasised, Mr. Khor
also noted that threats, in relation to SCADA systems, continue to exist and should be
managed on a regular basis. One of which is the threat on cyber security.
“Cyber security should be viewed in respect to how it can potentially disrupt business
continuity. Be it traditional hackers, careless or disgruntled employees, organisations
need to recognise the multi-dimensional security threats from both internal and
external sources.
“The risks associated with these threats can be mitigated by, for instance, carrying out
an assessment, which will provide the relevant directions and drive the strategies that
will best address the threats. Having adequate security does come at a cost, in terms of
procurement and also in terms of ownership. It certainly helps to procure from vendors
that have incorporated security features in their design. Better still are vendors that get
their SCADA system design security certified,” enthused Mr. Khor.
In its 2012 Annual Report, TNB revealed that it “has completed the installation of
the Supervisory Control and Data Acquisition (SCADA) system in 94% of its primary
substations. All primary distribution substations are targeted to be equipped with
SCADA by 2015.”
If further reveals that “secondary substations in prime areas are also equipped with
SCADA facilities.”
The installation of SCADA across almost all primary substations gives TNB the ability to
have monitoring and control capabilities in even the most remote areas. This enables
“personnel at the control centres to restore electricity supply quickly in the event of an
unscheduled power outage, thereby reducing the duration of outage as measured by
SAIDI (System Average Interruption Duration Index).
The table below indicates a significant reduction in SAIDI over the last two
Financial Years.
Voltage
FY 2009/2010
FY 2010/11
% Reduction
33 kV
58.52
47.03
20%
22 kV
88.16
62.74
29%
11 kV
80.85
72.06
11%
Source: Tenaga Nasional Berhad Annual Report 2012
5. TNB’s Michael Khor couldn’t have said it more simply: “Having an effective SCADA
can be viewed perhaps as one of the more significant contributors to a power utility
keeping the lights ON.”
In its purest, most basic form, the best measure of SCADA success for utility firms
– electricity, gas, water and telecommunications – is not tied to the number of
installations done within a given period nor the percentage uptime per location/per
quarter. It is essentially the ability of utilities to deliver the promised service to the
consuming public in the most cost-effective and efficient manner.
Learning how to achieve this goal using industry best practices as well as
discovering the latest trends in SCADA implementation in your specific industries is
absolutely crucial.
SCADA :
Interview with Mr. Michael Khor
Q
A
Mr. Michael Khor, Deputy Chief Engineer - SCADA for Tenaga
Nasional Berhad (TNB) spoke to IQPC’s Darwin Jayson Mariano
and discussed how exactly a power utility company like TNB,
the largest energy and utility company in Malaysia, benefit
from SCADA.
Darwin Jayson Mariano: Please talk about some of the benefits of having a SCADA
system in place to Tenaga Nasional Berhad’s operations.
Michael Khor: SCADA systems bring significant value to organizations such as power
utilities. It is the indispensable technology that enables the safe, secure and economic
operations of the power grid. Together with the relevant suite of power applications,
SCADA is typically utilised in the form of Energy Management Systems for transmission
grids and as Distribution Management Systems for the distribution system. The
ultimate just-in-time supply-demand paradigm of power grids perhaps bring forth
many folds of benefit, to more than justify the direct cost of SCADA ownership. There is
significant contribution to the bottom line when operations are made more efficient,
mistakes are reduced and costly blackouts are averted. Essentially having an effective
SCADA can be viewed perhaps as one of the more significant contributors to a power
utility keeping the lights ON.
6. Q
A
Q
A
Q
A
DJM: Can you brief us on the key milestones of your SCADA Systems
implementation? What are the important lessons learned along the way?
Michael Khor: It is always quite important for the requirements analysis
phase to start by considering user requirements, so that they can derive the
optimum benefit when the new SCADA is implemented. Essentially the existing
weaknesses are addressed while the best features are maintained. This is
followed by translating these into specifications, followed by procurement; for
us this is normally by tender. Later once awarded, there is need to agree with
the proposed detail design and functional implementation. The acceptance
tests in the factory and later on site are major milestones before the SCADA
can commence commercial operations. Overall this is typically some 18 to 24
months from contract award.
DJM: Can you talk about cyber security threats in relation to SCADA systems
and what are the things that can be done in order to mitigate these threats?
Michael Khor: Cyber security should be viewed with respect to threats that
can potentially disrupt business continuity. Be it traditional hackers, careless
or disgruntled employees, organizations need to recognize the multidimensional security threats from both internal and external sources. The
risks associated with these threats can be mitigated by, for instance, carrying
out an assessment, the analysis of which will provide the relevant directions
and drive the strategies that will best address the threats. Having adequate
security does come at a cost, in terms of procurement and also in terms of
ownership. It certainly helps to procure from vendors that have incorporated
security features in their design; better still are vendors that get their SCADA
system design security certified. Consider too the vendors who have dedicated
teams tasked to review security vulnerabilities and address these via patches or
software revisions.
DJM: In your opinion, what is the typical lifecycle of a SCADA System?
Michael Khor: A while back, SCADA systems were like “married” to their
hardware. Then it was not uncommon to consider upgrades after some 10 or
even 20 years. While this is mostly no longer true, nevertheless the upgrade
path remains much less simplistic than desired. SCADA systems comprise
applications that typically reside on hardware developed for the increasing fast
evolving IT industry. This implies an increasingly shorter hardware lifecycle.
From a different perspective, consider the pairing of SCADA applications with
operating system versions, which in a way dictates the choice of hardware.
Consider also the typical 3 to 5 year procurement through implementation
period. Thus to seriously attain even a 10-year upgrade cycle, the activities
leading to the next upgrade need to commence perhaps almost back to back
with the just completed upgrade.
7. Q
A
DJM: What are the key considerations in upgrading or replacing obsolete
SCADA system?
Michael Khor: Just like aging, obsolescence is unavoidable, but can be managed. In
practice, some part of the SCADA is likely already to be superseded by newer versions
the very first day the operators get to use it. As it would neither be practical nor
economical to immediately replace any obsolete component, the strategy would be
to manage such circumstances. A key consideration is the availability of support. Thus
the so called drop dead upgrade by or replace by date is before end of support. It
would also make sense today to select vendors that can provide an upgrade strategy
or roadmap to steer through newer technology, in essence to as far as practical avoid
being caught in the obsolescence trap. Unless absolutely required, it is thus better to
avoid dependencies on proprietary technology or special customizations.
Michael Khor, Deputy Chief Engineer – SCADA
for Tenaga Nasional Berhad will be speaking
at the 6th Annual SCADA Asia happening on
26-27 February 2014 at the Grand Millennium
Kuala Lumpur, Malaysia. Discover the latest
trends in SCADA implementation for Oil & Gas
and Utilities and learn how to enhance security
while communicating efficiently across a
scalable SCADA network.
Visit www.scadasummit.com
Resources: Tenaga Nasional Berhad Annual Report 2012 (http://www.tnb.com.my/investorsmedia/annual-reports.html)
Disclaimer: Please note that we do all we can to ensure accuracy and timeliness of the information
presented herein but errors may still understandably occur in some cases. If you believe that a
serious inaccuracy has been made please let us know. This article is provided for information
purposes only. IQPC accepts no responsibility whatsoever for any direct or indirect losses arising
from the use of this report or its contents.