Latest Oil & Gas Technical Articles

Categories

Measuring Flow Rate: An Introduction to Flow Gauges

Measuring Flow Rate: An Introduction to Flow Gauges

For many manufacturing processes, it is extremely important to measure the exact rate at which fluid is moving or flowing. We turn to flow gauges to provide these measurements, and there is a great diversity in operating principle as well as proper application to the fluid that is being measured.


How Does Motion Planning for Autonomous Robot Manipulation Work?

How Does Motion Planning for Autonomous Robot Manipulation Work?

Learn all about visual servoing and motion planning to create an autonomous robot!


Barg vs Bara: Understanding Absolute and Gauge Pressure

Barg vs Bara: Understanding Absolute and Gauge Pressure

A common difference of terms arises when referring to air or pneumatic pressure, and those are gauge (BarG) pressure and absolute (BarA) pressure. Both can accurately describe a system, but when performing calculations and tests, it’s important to distinguish the difference.


An Introduction to User Requirement Specifications (URS)

An Introduction to User Requirement Specifications (URS)

Learn all about user requirement specifications (URS), including what should and should not be included and their importance for organizations planning to purchase new equipment.


The Importance of Grounding Equipment for Safety

The Importance of Grounding Equipment for Safety

When it comes to electrical grounding, many strategies are employed to accomplish different tasks. One of the main reasons for grounding equipment is for the safety of users and equipment while maintaining strict adherence to regulations.


What is Automated Drilling? A Look Into the Benefits and Practices

What is Automated Drilling? A Look Into the Benefits and Practices

This article discusses the definition of automated drilling and a look into some of the key features and best practices.


Why Being Smart Can Be Dangerous: Tips to Make Your Facility Smart and Safe

Why Being Smart Can Be Dangerous: Tips to Make Your Facility Smart and Safe

Are smart devices opening production to attacks? This article provides several tips to ensure your facility is staying smart and safe.


Troubleshooting Solid State Relays

Troubleshooting Solid State Relays

This article discusses some methods for troubleshooting solid-state relays and input/output terminals.


Introduction to Codes and Standards for Instrumentation and Controls Engineers

Introduction to Codes and Standards for Instrumentation and Controls Engineers

Regardless of industry, codes and standards developed by organizations including ISO, ANSI, and IEEE are an integral part of the environment in which we work and have a major influence on engineering and design.


Introduction and Common Uses for Distance and Proximity Sensors

Introduction and Common Uses for Distance and Proximity Sensors

This article provides an introduction to proximity and distance sensors and common uses for them.


Introduction to Pneumatic, Hydraulic, and Electric Actuators

Introduction to Pneumatic, Hydraulic, and Electric Actuators

In this article, we take a look at hydraulic, pneumatic, and electric actuators and how they are used in different scenarios.


Connecting Remote Input and Output Devices Using Computer Networking Technologies

Connecting Remote Input and Output Devices Using Computer Networking Technologies

Networked remote I/O allows us to work with a machine center separately from the rest of the system, and drop the solution right in place.


Building Cyber Resilience In Industrial Control Systems

Building Cyber Resilience In Industrial Control Systems

Industrial control system cybersecurity can be a matter of vital corporate and national interest. What are the operational risks, and how are they assessed?


Cyber Resilience in Industrial Control Systems

Cyber Resilience in Industrial Control Systems

Take a look at the concept of cyber resilience in control systems and how it relates to cybersecurity for critical infrastructure in the age of security vulnerabilities