6 version control best practices

Posted by Tyler Bullock on February 23, 2015 @ 9:14 am

Team projects require shared documents and programs, but poor version control can slow progression. See six best practices for version control.

Anyone who has worked on a team project knows version control on programs and documents are vital to the overall project’s success. Although version control will probably not be identified as the major cause of a successful project, it can easily become a key contributor to why a project struggled or failed. Here are six best practices for version control: 1. Archive documents One of the most important aspects of document control is saving the files to a centralized location with a proper backup and recovery process. If a file is saved to a local hard drive and should that computer be damaged or stolen, that information will be lost. 2. Mark documents in progress Documents in progress should be marked to notify everyone th... Continue Reading

Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags:

Control system documentation: Don’t trust, field verify

Posted by Jay Griffin on February 20, 2015 @ 10:43 am

When referring to control systems, the only things that engineers can rely on are what is in the field and the live configuration running in a controller.

It would be nice if control system documentation could be trusted. It would also be nice if pigs could fly. Both scenarios are equally as likely.

There is an old Russian proverb that says “doveryai no proveryai” which means “trust, but verify.” U.S. President Ronald Reagan made this saying famous in the 1980’s when referring to the United States’ relationship with the Soviet Union.

When referring to control systems, the saying should be changed to “don’t trust, field verify.” Simply put, don’t trust any form of documentation that relates to a control system. The only things that can be relied on are what is in the field and the live configuration running in a controller. This is one ... Continue Reading

Continue ReadingView Comments (2)
VN:F [1.9.22_1171]
Tags:

Agile manifesto: Engineering, procurement, construction firm vs. systems integrator

Posted by Scott Hayes on February 16, 2015 @ 1:14 pm

The agility described in the “Manifesto for Agile Software Development” has clear advantages, but what does it mean for production facility automation?

In February 2001, a group of software developers met at the Snowbird resort in Utah to discuss lightweight development methods. They published the Manifesto for Agile Software Development. This agility that they describe has clear advantages for traditional software development, but what does it mean for the automation of a production facility? Automation as executed by an engineering, procurement, and construction firm (EPC) is often treated as just another department with a set of deliverables due at a specific time in the project. Just like the equipment specs and the piping des... Continue Reading

Continue ReadingView Comments (1)
VN:F [1.9.22_1171]
Tags:

Cyber security essentials: Part III

Posted by Josh Bozeman on January 21, 2015 @ 12:11 pm

The third and final installment of the Cyber Security Essentials series identifies best practices for protecting your internal and external networks, components of well-secured networks, and other dangers to be aware of.

ICourtesy: Maverick Technologiesn Parts I & II of this article, we outlined some of the most common cyber attacks, and got some great feedback from an ethical hacker on system architecture that can protect your network. In this final section we... Continue Reading

Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags:

Cyber security essentials: Part II

Posted by Josh Bozeman on January 9, 2015 @ 10:22 am

The second installment of the Cyber Security Essentials series looks at what a robust network security system looks like, with insights from an ethical, professional hacker.

Courtesy: Maverick TechnologiesIn Part I of this series, we outlined some of the most common cyber attacks and some of the simple ways a user can guard against them. I sat down with an ethical hacker to hash out what robust network security looks like. The interview: He’s a hacker, but it’s okay… A long-time friend of mine has a pretty unique job; he’s an ethical ... Continue Reading

Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags: