Work on the 485-mile Gulf Coast Project pipeline has already progressed past the halfway point on all three of its spreads with TransCanada expecting the 36-inch pipe to be in service by the end of the year.

Pipeline corrosion has enormous financial and operational implications for gas suppliers and distributors. As a result, the question of how best to tackle corrosion is beset by both cost and technical issues. Businesses can achieve a great deal by implementing long-term corrosion- management strategies, but many are reluctant to spend money on projects that do not deliver an early return in investment.

Oil and gas pipelines play a critical role in delivering the energy resources needed to power communities around the world. In the United States alone, according to the U.S. Department of Transportation (DOT), more than 2.5 million miles of pipelines — enough pipeline to circle the earth approximately 100 times — deliver oil and gas to homes and businesses.

People usually laugh when I tell them I chase pigs for a living. But the truth is that it’s very serious business - one which I have been perfecting for more than 25 years. I’ve tracked pigs in all kinds of pipelines, all over the world, and over the years I have seen all kinds of crazy things happen with pigs in pipelines. Probably the most important thing I’ve learned would be to expect the unexpected.

Thinking about cyber and energy goes back to a great myth, which may or may not be true. It has long been rumored that agents of the Soviet government illegally obtained an industrial control computer by clandestine means from a Canadian manufacturer in the 1980s.

Canadian Natural Resources Limited (CNRL), founded in 1989 and headquartered in Calgary, possesses a diversified combination of assets in North America, the North Sea and offshore Africa and is the largest independent crude oil and natural gas producer in Canada.

Oil and gas pipelines provide a significant amount of America’s energy demands. Like most energy infrastructure, pipelines rely on Industrial Control Systems (ICS), including Supervisory Control And Data Acquisition (SCADA) systems, that function on computerized and communication networks. As a result, these networks present vulnerability and can be targets of cyber threats.

Good Human Machine Interface (HMI) design is essential to maximizing the value of a Supervisory Control and Data Acquisition (SCADA) system. As SCADA and instrumentation technology has advanced, it has become easier and less costly to add information to the displays.

The Secret War: Stuxnet, Duqu And Flame
The highly complex computer worm called Stuxnet, targeted at sophisticated industrial control systems, was first identified in July 2010. The arrival of Stuxnet changed everything . . . it was a harbinger of the shape of things to come.

Your geologists found natural gas hiding thousands of feet underground. Your legal team negotiated rights of way with landowners. Your drilling team went down a mile or so, made a horizontal turn and “fracked” the shale bed, releasing the gas. Your well is producing. So now what?

Syndicate content