InTech

SEP-OCT 2017

Issue link: http://intechdigitalxp.isa.org/i/882230

Contents of this Issue

Navigation

Page 3 of 57

4 INTECH SEPTEMBER/OCTOBER 2017 WWW.ISA.ORG PROCESS AUTOMATION 14 From managing to optimizing alarms By Richard Slaugenhaupt Many critical and practical decisions must be made during the design and implementation phases of ANSI/ISA-18.2 to affect the success of your alarm system and the overall viability of your facility. FACTORY AUTOMATION 18 Radio frequency identifica- tion increases productivity and reliability in automa- tion applications By Ed Garstkiewicz RFID technology continues to expand in scope of application, substantially benefiting many industries. Using RFID technology can increase a company's pro - ductivity and reliability and generate real-time data. SYSTEM INTEGRATION 22 Virtual reality By Peter Richmond VR training has been used with excellent results for many years to train astronauts, pilots, and military per - sonnel. Advances in computer and graphical processing capabilities have made creating virtual worlds affordable and accessible to a broader range of process industries. AUTOMATION IT 26 Remotely analyzing gas processing data By Andy Young Pioneer Energy installs gas processing equipment at well sites and evaluates performance remotely with visual analytics application software. COVER STORY Are we seeing a pay plateau in automation? By Cory Fogg The results of the 2017 salary survey show that the global average salary of automation professionals increased, but not significantly. This year's survey also re - vealed some red flags that businesses need to acknowl- edge and address to move their organizations forward. September/October 2017 | Vol 64, Issue 5 www.isa.org 10 SPECIAL SECTION: CYBERSECURITY 30 Protecting the ICS from cyberthreats By Eddie Habibi Industrial control system cybersecurity threats are real, and ICS cyberattacks can have disastrous consequences, affecting industrial safety, profit - ability, and national security. Protecting ICS requires understanding the ICS threat landscape, imple - menting foundational ICS cybersecurity controls and "defense in depth," and fostering collabora - tive relationships.

Articles in this issue

Links on this page

Archives of this issue

view archives of InTech - SEP-OCT 2017