Machine Safety: When workers use their own devices

Bring Your Own Device (BYOD) is the new rage. Articles describe BYOD and IT departments are scrambling. How can companies maintain control over machine safety and plant security?

10/04/2013


CFE Media, Control Engineering, Plant Engineering, and Consulting-Specifying Engineer, offers Apps for Engineers, an app of apps providing portable software tools for engineers. Courtesy: CFE MediaBring your own device (BYOD) is the new rage. Articles (see below) describe the practice and the IT departments are scrambling. How in the world will companies maintain control over safety and security?

Think of the situation this way. We now have had several years of technically based employees coming out of universities into industry, and most of their class work involved e-mail communication, electronic text books, smart phones allowed into class rooms, social media (Twitter, LinkedIn, or Facebook), and research via Google or Mozilla Firefox. Text books and conventional libraries are significantly less involved. These key employees are now in technical roles in industry, and their friends are iPhones, iPads, Nooks, Blackberries, Androids…and the list goes on.

Furthermore, matrix codes (including Quick Response, QR codes) are quickly gaining speed in adoption by these hand held devices via scanning apps. They are a new of 2D bar code that is often used to provide access to information through hand held devices that have embedded cameras. The codes, which are small squares with black and white patterns, began to appear in a variety of places, such as magazine and newspaper ads. However, engineers are quickly learning how to apply QR codes in industry.

A matrix code is used to encode some sort of information, such as text, machine drawings or a URL.

Control Engineering offered a video with its February 2013 cover. Courtesy: Control EngineeringHere’s the opportunity (and dilemma). This relatively new wave of technically based employee is anxious to BYOD to the factory floor for day-to-day use in performing their responsibilities. That potentially means using their own devices to access machine data, temporarily engage a machine for a quick repair and re-set, or to report critical data to a resource center. Isn’t this a nightmare for typical old-school IT managers? How can all these unauthorized devices have access to the company’s network while still maintaining safety and security? 

Wireless control panels are available and in use today around machines. Many of these wireless panels also have emergency stop devices meeting standards requirements. Will this mean that BYOD devices could take the place of wireless control panels? If so, will your iPad be compliant for controlling an emergency stop?

Where will BYOD take us?

J.B. Titus, CFSE

Has this presented you with any new perspectives? Add your comments or thoughts to the discussion by submitting your ideas, experiences, and challenges in the comments section below.

Related articles:

Machine Safety: Can hand held devices play a role

Machine Safety and Wireless Devices

How to choose wireless technology for industrial applications

Cableless (Wireless) Operator Panel Applications

Machine Safety – Cableless vs Wireless

iQagent for Holistic Data Display & Machine Optimization



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
Each year, a panel of Control Engineering editors and industry expert judges select the System Integrator of the Year Award winners.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Go deep: Automation tackles offshore oil challenges; Ethernet advice; Wireless robotics; Product exclusives; Digital edition exclusives
Lost in the gray scale? How to get effective HMIs; Best practices: Integrate old and new wireless systems; Smart software, networks; Service provider certifications
Fixing PID: Part 2: Tweaking controller strategy; Machine safety networks; Salary survey and career advice; Smart I/O architecture; Product exclusives
The Ask Control Engineering blog covers all aspects of automation, including motors, drives, sensors, motion control, machine control, and embedded systems.
Look at the basics of industrial wireless technologies, wireless concepts, wireless standards, and wireless best practices with Daniel E. Capano of Diversified Technical Services Inc.
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
This is a blog from the trenches – written by engineers who are implementing and upgrading control systems every day across every industry.
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Case Study Database

Case Study Database

Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.

These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.

Click here to visit the Case Study Database and upload your case study.