GDPR Compliance

System Vulnerabilities Are an Issue for Everyone in the Cloud Environment

System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud services. Given the nature of the cloud as a shared-resource environment, threats that infiltrate the system of a single provider
/
Mark Casey Apcela

Why CloudHubs are an Important Ingredient to Optimizing Performance of Cloud-based Applications

CloudHubs - Optimizing Application Performance It may seem hard to believe, but even in this day and age, there are still some enterprises that are cloud-averse. For whatever reason, they are hesitant to have their applications or data in the cloud and prefer to host
/
Kelly Potter

How the Oil Industry Can Benefit from IoT Technology

Oil Industry Can Benefit from IoT

In 2010, the Deepwater Horizon oil tragedy struck and took the nation’s attention for months.

Two-hundred million gallons of oil spilled, 16,000 miles is the range it spread across the coastline from Florida to Texas, 8,000 animals were killed, and 11 workers were killed due to the explosion. Communities around the Gulf of Mexico came to a halt, but lurking underneath this disaster was an older spill spewing from an oil platform that was damaged six years earlier.

CNN recently reportedThe Taylor oil spill is still surging after all this time; dumping what’s believed to be tens of thousands of gallons into the Gulf per day since 2004.

By some estimates, the chronic leak could soon be larger, cumulatively, than the Deepwater disaster. That would also make the Taylor spill one of the largest offshore environmental disasters in U.S. history.

In September, the Department of Justice submitted an independent study into the nature and volume of the spill that claims previous evaluations of the damage, submitted by the platform’s owner Taylor Energy Co. and compiled by the Coast Guard, significantly underestimated the amount of oil being let loose.

According to the filing, “the Taylor spill is spewing anywhere from 10,000 to 30,000 gallons of oil a day.”

As for how much oil has been leaked since the beginning of the spill, it’s hard to say. An estimate from SkyTruth, a satellite organization, put the total at “855,000 to 4 million gallons by the end of 2017. If you do the math from the DOJ’s filing, the number comes out astronomically higher: More than 153 million gallons over 14 years.

It’s still unclear how the Taylor oil spill is being addressed by officials regarding an action plan for cleanup, current and future prevention, and ways to better detect these incidents occur.

So the questions become:

  • How can we continue to grow and learn from these incidents?
  • What new technologies are out there to enhance detection?
  • What preventive measures should the oil industry be implementing that aren’t currently in place?

5 Preventive Measures Currently in the Oil Industry 

Since the BP oil spill, several preventive maintenance measures have been put in place for the oil industry; these measures should be coupled with an effective maintenance management system to allow managers to track & monitor asset functionality, locate work history, and plan for replacement/repair on said assets based on operating capabilities. 

Preventive maintenance steps being performed today:

  1. Stress tests performed to assess accuracy and tracking through management documentation
  2. Better documentation of work orders and training crew members on new practices
  3. Blue print creation- Allows users to use existing technology to respond quickly to oil spills and better assess the situation
  4. New equipment that allows rigs to communicate with plans and ships more freely and coordinate response efforts to future spills
  5. Remote operated vehicles- Robots that assist crew members as backup in disaster situation

These measures coupled with an EAM CMMS solution can help managers and engineers execute tasks properly and efficiently. 

However, over the last nine years, technology has advanced in areas such as IoT, Augmented Reality, Virtual Reality, and even Drone maintenance. It is said that in “2020, approximately 50 billion machines will be connected to the internet,” making it easier for technology to guide the way engineers/workers interact and do their jobs on a day to day basis. 

The oil industry could benefit from new innovations in the IoT realm in regards to underwater communication systems. 

Internet of Things and Underwater Communications

The benefits of IoT (the Internet of Things) to a number of industries are obvious – mainly the ability to remotely monitor machines in real-time while ensuring safety and anticipating breakdowns. However, there are technical challenges when it comes to monitoring and communicating underwater which is where IoT Underwater comes into play. 

IoT Underwater is a system made of unmanned vehicles that scour the sea while communicating with underwater sensors and sending the information to networks on the surface. 

This information can be used to detect:

  • Early signs of tsunamis
  • Surveying shipwrecks and crashes
  • Health of animals
  • Salinity and temperature changes 

This kind of IoT that senses and transmits data through water would be important in the protection of oceans and lakes. This type of technology could alert oil rigs and engineers of inadequacies under the shore alerting them something could be wrong before a catastrophe does occur and last for years. 

There are still challenges that scientists and engineers are facing when looking at the reality of IoT underwater, such as signal transmission, background noise, sensors come at a high cost, and the environment is ever-changing. 

Still, when looking into the future, companies are already looking for solutions to these challenges. There are underwater robots and prototypes being created to test out these roadblocks to see how communication is being translated from underwater to onshore devices.

It’s a step in the right direction and a direction that industries, such as oil & gas, should consider when looking at innovative and safe ways to protect oceans and humans.

By Kelly Potter

Kelly Potter

Kelly Potter, Marketing Associate for Transcendent Corporation. I’ve lived in Tampa for four years and graduated from the University of Central Florida with a B.A. in Communications and a Minor in English-Writing. I’ve written hundreds of blogs focusing around EAM CMMS technology and the use of these solutions within facilities around the world. In my spare time, I go to amusement parks, run half-marathons, write, and read.

View Website
Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access ...
Finding and Implementing Startup Tools

Finding and Implementing The Right Tools For Your Startup

Implementing Startup Tools Many startups believe implementing cloud tools help reduce operation costs as well as the time taken to enter a market, and so ...
Kayla Matthews

5 Cybersecurity Trends Defining 2019

5 Cybersecurity Trends The cybersecurity industry continually evolves to meet changing needs and adopt new technologies. As such, it's appropriate to take a look at ...
Reuters news

Equifax nears deal to pay about $700 million to settle U.S. data breach probes: WSJ

/
(Reuters) - Credit reporting company Equifax Inc (EFX.N) is close to a deal to pay around $700 million to settle data breach probes with U.S. regulators and states, the Wall ...
Wired

Everyone Wants Facebook’s Libra to Be Regulated. But How?

/
Everyone from President Trump to Representative Maxine Waters (D-California) says Libra, Facebook's planned cryptocurrency, should be heavily regulated. But nobody seems to know how—including Facebook. That much was clear in ...
MIT tech review

A new microchip aims to stump hackers with a constantly moving target

/
Morpheus repeatedly changes key parts of its code to foil cyberattacks Last year’s revelations of security holes that affect billions of chips have spurred researchers to seek more effective ways ...