[Oil & Gas Webinar] Ensuring Safety and Efficiency: Advanced Explosion-Proof Solutions for the Oil and Gas Industry

Discover how advanced explosion-proof solutions enhance safety and efficiency in the oil and gas industry. This video explores cutting-edge technologies designed to protect critical operations in hazardous environments. Watch now to learn more!
Industry: Energy & Environment
Audience Type: General, Technical, Business/Executive
Created Date: 2025/03/20
Speaker
Frank Kuo
Business Development Manager, Advantech
Kevin Chu
Product Manager, Advantech
Ethan Wang
Senior Product Manager, Advantech
Carey Wu
Product Manager, Advantech
Baris Ozdemir
Business Development Manager, GSL
Related Videos
Read Transcript
어드밴텍 IEC 62443 인증 솔루션 – 산업 보안을 위한 완벽한 해답
Industry: Energy & Environment
Audience Type: General, Technical, Business/Executive
Created Date: Apr 2025
Unlocking Advantech IEC 62443 Certification Solution - Secure a Competitive Edge with Ease
Industry: Energy & Environment
Audience Type: General, Technical, Business/Executive
Created Date: Apr 2025
왜 어드밴텍 TPC-100WX가 에너지 및 야외 환경에 최적화된 최고의 패널 PC인지 알아보세요!
Industry: Energy & Environment
Audience Type: General, Technical, Business/Executive
Created Date: Apr 2025
Why Advantech TPC-100WX is the Best Panel PC for Energy & Outdoor Operations!
Industry: Energy & Environment
Audience Type: General, Technical, Business/Executive
Created Date: Apr 2025
어드밴텍 산업용 L3 스위치 적용 사례
Speaker: 백원석
Industry: Energy & Environment
Audience Type: General, Technical, Business/Executive
Created Date: Mar 2025

Introduction to Oil and Gas Market Trends Hello, everybody. This is Frank from IIOT, ICWG department. Today, we are very happy to share with you some of the, latest standard and market trend, for the oil and gas markets. Okay. We know that oil and gas is very important in the Middle East and some of the countries. And, a lot of locations that require more and more for the security. So that today, we will share with you more for those kinds of things. Okay. First of all, we know that the oil and gas, there's a different kind of applications, especially from the upstream, midstream, and downstream. For the upstream, everybody know that the the upstream, we need to, do the, the, like, detecting or need to do the underground, kind of earthquake check, checking. And also, we do a lot of things, in order to get the crude oil. Okay? And of course, the the upstream, we have the, the wellhead monitoring. We have pipeline assistance, no matter onshore, offshore. And for the midstream, we have a lot of things, including the plumbing station, gas to liquid, those kind of plants. And for the downstream, we have the the refining plan, cracker plan. Of course, we need to dispute to all the users. So that no matter from upstream, midstream, and downstream, we have a lot of important asset and, investment. So that the potential most important, asset is very important. Okay. Alright. Chapter Geopolitical and Environmental Challenges Several years ago, I think, around the world, everybody know that the the Rosenwald getting more and more seriously. And also the geopolitical is getting more and more serious, no matter the occurring war and some other things. Everywhere, we got a lot of more troubles around the world. And of course, with the the global warming happens, so a lot of natural disaster happens around the world. So that, in order to protect our asset, protect our investment for the oil and gas, we do need a lot more security and safety protection for the our, asset. So regarding to those kind of standards, we know that, we have some basic requirement for all the equipments, no matter the wind, temperature, no matter the EMC protection. And, of course, we need a lot of, certification. For example, like, IEC, EX. Okay. URL class one, Debian two. Those kind of, hard of that location certification. So with those kind of hard of that location, certifications, we can make sure that our equipment can, perform well and, use use in those kind of applications. And of course, ladies, everybody talk about the security. With those kind of Rosenwale, the the the threat, the kind of a threat from the markets, We need have some activities to prevent those things happen. As that we have more and more connections from Internet to our systems. Okay. Chapter Growing Market for Cybersecurity Solutions So the IEC sixty two four four three is very important nowadays. Okay. And we know that the market share, for the security is getting bigger and bigger. Now the forecast is around two hundred billion. So it's a huge numbers. And, of course, traditionally, there's a lot of vendors from IT. They are very good at the security, kind of a software and the equipment providing. But now we're talking about automation because automation people, in the past time, we enjoyed a lot for those kind of, the system. Because in the past, when we implement those kind of automation system, that is mostly independence from everywhere. So it means that inside the factories is not connected to outside, but now everything changed because we need to access remotely. We want to connect to Internet. We want to do the big data. We need to go to the cloud. So everything change. So security is getting more and more important nowadays. Alright. And, based on the market survey and the reports, we know that there's a lot of threat from Internet and from internally, externally. All those kind of threat, is very difficult to handle. And I think most of the people, they didn't aware for those kind of things. Okay. So those kind of things will happen a lot in your factories, now. So that, based on those kind of report, we need to, we need to come out some of the activities to handle those kind of threat, from our side. Okay. Chapter Industry Awareness of Security Threats And of course, for those kind of a global key account and global customers, everybody knows that, it's very important for security now. So all the big guys, no matter ABB Siemens, Arriva, Siemens, and, maybe, Yogawa, no matter from Japan, from US, from Europe, all the vendors are aware for the security. It's very important nowadays. So, also, at Venntag, we're aware for this kind of a market trend. Alright? So, if we talk about the, the protection or the security, okay, we need to consider about several targets and angles. The first of all is the software. And of course, the hardware from the function and from applications and from the system point of view. From all the angles, we need to consider about how we protect our asset, how we protect our system. So that is very important. So regarding to the software, I think everybody knows that, Event Tech is, a lot of we have a lot of computers. So that from the very bottom point of view, from the OS point of view, from the driver, from the bootloader point of view, even from application point of view, we need to offer different kind of quotation, strategy and also functions for you to choose. No matter using on the Windows or Ubuntu and all those kind of applications, we have a different strategy and function for you. And also, we have our own, design, the device on and also, like a web access and all the related software is to help you to understand the situation at your site and all the status of your equipment, make sure everything functions well. So this is a very basic from software point of view because we have, computing. We have a communication technology in Event Tech. Okay? And, of course, regarding to the computer and, networking products, we have a different software and, software functionalities. And not only from the software, basically, for the system point of view. Also, we have a software for the application and, usage point of view. So regarding to the computer and the networking, okay, we have different functionality to measure that the computer and the networking are in security situation, all in secure condition. Alright? So that is very important. Alright? So here we have a lot of function for you, including the software features, also the networking, security functions. Okay. And, nowadays, as I mentioned, I c six two four four three is getting more and more important. So from the different kind of level, from company company level, from the, component levels to system level. So we need to consider about all the things, including our communication and computing solutions altogether. And it all the things that we do is to make sure that, all our system can function in a well, protected environment. Okay? And, of course, we spend a lot of money to send our products to get a certification for the IC six two four four three. Alright? Okay. Chapter Application and System Security Strategies After we talk about the software and the hardware point of view, now we need to think about some other things. It's, which is, from application and system point of view. Take this case for example. We have a power plant, in the in the center. Okay? Then the no matter what kind of power plant, okay, we need to do, some we need to add some supportive system, to make sure that the the power plant can function very well. Okay? So the threat can be anything. It can be from internal employees. Okay. Maybe some guys get a USB dongle and probably there's, kind of a virus inside already. And the threat is probably from natural, disaster. Maybe tsunami, typhoon, or anything, or earthquake. And maybe the three is from Internet. So from the external to internal. So maybe some haters, they try to access the system and causing some damage. Alright? So So from our design point of view, we need to measure that all the parts, all the different layer need to consider in a well, secured rotation. Okay. So from network point of view, we can have LAN a, LAN b. From the operation point of view, we can have, control room a, control room b in different site, different location. And from the system point of view, we can have a tsunami, we can have leak detection, flotation or alert system. And also, we can have some, coverage by different kind of network technology. So by wired and wireless, we can have wired network. We can have a low light web. We can have a wireless technology no matter it's WiFi or four gs five gs. Even we can have drones or even we can have some, satellite communication. So all this kind of a method is helping us to doing the well protect for this power plant. So that is, by different angles point of view, to protect your assets. Chapter Total Protection for Industrial Sites Alright. So when we have a different kind of, projects or we have different site, No matter it's a refinery plant or it's a wellhead monitoring system. So all of us have to consider about what is the total potat total, protection, for the site. So no matter from IT point of view or OT point of view, from the aggregation from edge to access to core, then we can have different kind of solution. No matter there's at the site, we have edge computing, okay, And to go work together with our controller, PLC, and also some important, assets. And go to the network level. Okay? We have a well protected network, switches, routers, and even VPN fireworks in the middle layer. And go to upper layer, of course, we have a server, we have a controller, and we have a SCADA system. So that we need to implement, we need to install those kind of protection software and also the device management software then to help the system to, to operate in a well condition. So for OT and IT seamless integration is very important, important topic nowadays. So that, you can find from this diagram, it's combination. So if you have those kind of important assets, just need to, consider about different kind of, parameters and what kind of things we need to add to secure the system, secure your assets. So that is very important. Alright? Let me make a conclusion for today. Chapter Conclusion on Cybersecurity Importance I think cybersecurity is very important and a hot topic for everybody. And IEC sixty two thousand four hundred and forty three is the latest stand up. And, we need to follow these kinds of ideas to make sure that all our system is in a well protected, environment and, system point of view, everything in worse condition. Okay. Then I need to let you guys know that Event Hack is ready for the OT and IT integration. So if you have any question about the cybersecurity and all the things related to the IEC sixty two thousand four hundred and forty three, please feel free to let us know. We will give you the idea and the related product proposal to help you to make a security system and protect your assets. Alright. No time to wait. And, please, ready to jump into the cybersecurity world. And, thank you very much. Hello, my name is Kevin. I'm product lead of industrial HMI in Advantech. It's my great honor to give you presentation in this webinar. Today I'm going to talk about trends in explosion proof market specifically related to HMI device. I will also share with you some basic knowledge of explosion proof certifications. We all know modern industrial production, processing, transportation, storage and other processes produce various explosive substances. It is flooded around the environment in the form of gas, liquid, and dust. These dangerous substances have an impact on public safety. The potential crisis is huge and people aren't aware of. More specifically, oil and gas still process, petrochemical energy and power, food process, pharmaceutical process, mining energy and power, recycled batteries and other industrial have still, some explosive dangerous process. It is also a key industry with the mandatory requirements for explosion proof certifications. Chapter Safety in Hazardous Environments We have to realize not only oil and gas needs explosion proof devices, but also industries which has hazardous environments should put workers' safety for the first priority. In recent years, increasing energy and IoT requirement is a key factor driving the demand for the explosion, which we can say demands safety equipment in hazardous environment is more and more popular in recent years. The CAGR of explosion proof equipment is expected to twenty five percent and market size is more than, USD ten billion by twenty twenty eight. There has been a rise in the number of explosions in the extreme environment and manufacturing industries across virus regions because of the growing process of chemical toxins and other combustible dust. You can learn the market growth rates by region in the left picture. The increment of the explosion proof device is also caused by the demand of IoT solutions, such as dealing with an overwhelming amount of data, monitoring aging facilities, and deploying the hazardous environment. Advanced countries continue to form strong requirements for security through registrations, and this regulation blocks competition for other countries, forming the biggest trade barrier other than tariffs. If we need to enter these markets, the major challenge comes from the product design, product certification, specific familiarity, and industry evaluations. In order to fulfill our worldwide customer, Advantech has developed exposure proof HMI product line. We work with professional labs and provide reliable products to our customers. Today's topic attempts to guide the concept so that the beginners can quickly understand the relevance and specifications, and also we can learn explosion proof HMI we have in Advantech. Chapter Classification of Hazardous Areas Here comes the classifications of hazardous area. The class and divisions or zone defined by UL or IECEx. All of the explosion proof HMI applied to have the guides, vapors, and liquid area, which means class one under UAL regulation and group two under the IECX or AirTags. We only apply for the division two or zone two class certification panel PC. You should look at our newest HMI, which name is SPC618WE. For example, the oil, gas, and petrochemical industry is a highly competitive and asset having sector. In the process of oil and gas production, there are few challenges, that will core the industry and change how they work, like data acquisitions from the massive amount of facilities and upgrading the complex facilities and systems which require continuous monitoring and maintenance costs, a lot of manpower and financial resources. For each process, we have suitable HMI in order to fulfill IoT development. About the outdoor application of explosion proof HMI, we provide twelve inches and fifteen inches TPC for data acquisition and process operating. This successful case is located in Southeast Asia. The customer using the Kiaq stations to pay their gas online gas stations, which can process transactions and acquire customers' data. Temperature, valves, press, sensors are collected. They show in time on explosion proof, monitor in hazardous workplace. Sometimes you might think about a CPU is not strong enough for the big data analysis. Well, you can choice the optimized box PC in your control room and shows the data in time in hazardous areas. We have to change our mindset. Chapter Broader Applications of Explosion Proof Devices There is not only the oil and gas industry can deploy explosion proof device, every hazardous area or the dangerous process should choose the explosion proof certificate device, after all, safety is our first specifications. In this case, pharmaceutical, there are drug powders around the environment. This high density powder will become the flammable material. We can choose TPC 318Wh to fulfill the data centralization and acquisition in this power environment. We will launch a new product for the IEC EX and ATEC certified HMI called SPC618W, which will be available in June. The display size is eighteen point five inches and CPU is the Intel thirteenth generation Core i7. Suitable for the data centralization and visualization applications, If you need high performance explosion proof HMI, you should take a look on this and sample will be available shortly. In addition to explosion proof, we also offer cost effective outdoor use NXT I. MXH chip technology, web panel TPC100WX, with all extreme harsh environment features like wide temperature, operating temperature, high brightness and anti impact functions, in case there is no certification requirement for the projects, and fulfill customers' budget concern. This is the end of my presentation. HMI team provides comprehensive device for your IoT applications. Chapter Advantech's HMI Solutions Overview You can check our website for more detail. Thank you. Hello, everyone. Welcome to joining webinar today. This is Ethan from Advantech industrial communication team. Today, I'm going to share Advantech cybersecurity solutions, including IEC six two four four three and the long defense concept for cybersecurity. In today's webinar, I will start from the straight we are in content today, then I will briefly talk about the terms, some concept you need to know about cybersecurity, as well as the deployment strategy. Then I will introduce IEC six two four four three, the standard for industrial networks and systems. Then wrap up with Advantech communication product offerings. Those are the top ten threats identified by European Union Agency for Cybersecurity. The threat of cybersecurity comes from many aspects. The top one on the list is the supply chain vulnerability. You may learn there are some cases for data storage devices hacked for ransom. But actually, the operation shutdown will cause larger impact. Secondly, if we went through the list, you will find that cybersecurity is an inevitable side effect of digitalization. Digitalization and the RIOT increase the connectivity. But in the meanwhile, larger network also means it's worthwhile to attack. So we need to look into a systematic strategy to eliminate the threat for cybersecurity attack. Let's talk about the term security. There is a conceptual difference between security and safety. In short, security is not a malfunction of devices or systems. Cybersecurity attack is a deliberate attempt to exploit weakness in computer systems' networks to gain unauthorized access to sensitive information, cause damage or disruption, or steal resources. The term Litterate refers to the fact that the vulnerability is unknown to the developer or vendor, and therefore, there has been little time to fix or patch the flaw before it is exploited by the attacker. The hackers are seeking after the system vulnerability to attack until the fix released. There are numerous types of cyberattacks, including malware attacks. Malware is a malicious software that is designed to harm a computer system or network. This includes virus, worms, ransomware, and spyware. Another example, man in the middle attacks. That is an attempt to intercept communications between two parties to steal information. DoS denial of service is another common threat. Okay. A DoS attack is an attempt to disrupt a system or network by overwhelming it with traffic. So a DDoS attack is a more sophisticated version of DoS attack that involves multiple computers flooding a target with traffic. These are just few examples of many types of cyberattacks that can occur. It is important to take steps to protect against cyberattacks, such as using strong passwords, keeping software up to date and being cautious when clicking on links, or opening attachments in emails. Chapter IEC 62443: A Cybersecurity Standard IEC sixty two thousand four hundred and forty three was developed to address the unique cybersecurity challenges facing industrial control systems, such as the need to maintain the availability and the reliability of critical infrastructure while also protecting against cyberattacks. The standard has gained widespread adoption in the industrial sector and is often used as a basis for developing cybersecurity policies and the practices in manufacturing, energy, transportation, and other critical infrastructure sectors. The asset owner must identify what is the key asset to protect, identify potential threats as addressed by the security union, and then investigate system vulnerability. Last, develop the principles for system deployment and defense strategy. Let's take a further look into the IEC sixty two thousand four hundred and forty three, the IT security for industrial networks and Systems. IEC sixty two thousand four hundred and forty three consists of several parts, each covering a specific aspect of industrial cybersecurity, such as risk assessment, security management, network security, and system development. The standard is based on a defense in-depth approach, which involves implementing multiple layers of security controls to protect against cyber threats. So the compliance of IEC sixty two thousand four hundred and forty three is not from one single product, a console system, including software applications, embedded devices, host devices, network devices. Each device should comply component level certification of six two four four three. Defense in-depth is a security concept mentioned in IEC six two four four three. The concept involves implementing multiple layers of security controls to protect against various types of cyber threats. This approach is based on the assumption that no single security measure can provide complete protection against all types of attacks, and, therefore, multiple layers of protection are needed. The left side of the slide shows a wrong within wrong approach. The inner wrong is system level integrity, then network level security, and they're all covered under plant level security. Right hand side shows the approach to implement different approaches on different components. You can implement the account management in the host side. On the switch side, you can implement the segmentated data flows. So this slide shows two types of defense in-depth approach, one from system level and one from component level. Chapter Conduit and Security Roles in Cybersecurity Next, I will introduce another security concept, conduit and the wrongs. Conduct and the wrongs are cybersecurity concepts that are often used in industrial control systems to manage the security risks and protect critical assets. Conducts are pathways that connect different security roles within an industrial control system. These pathways may include wired or wireless networks, data links or other communication channels. Security roles, on the other hand, are areas within the industrial control system that have similar security requirements and risk profiles. By using a combination of conduit and security roles, organizations can segment their industrial control systems into smaller, more manageable components, each with its own security controls and the risk profile. This helps to dim it the impact of a security breach. By containing the attack within a single long overdue, and preventing it from spreading to other parts of the industrial control systems. Chapter Cybersecurity Solutions for Industrial Communication Next, I'd like to talk about our offering for cybersecurity from communication product team. At the Vantec a t seven thousand series managed switch is a IEC six two four four three certified in component level. AK seven thousand series manages switch comes in different can fulfill your different industrial deployment requirement, including tunnel, solar power, CCTV, and the ETC. It is a start product of a communication team. The selling quantity actually tripled in the past four years. Last, I'd like to talk about a feature, IXM. That's a fast deployment function of industrial managed switch. So you need to only you need only to config IP and the configuration for the first device, then it will auto synchronize the same devices in the network, which will largely reduce your time to deployment the network. So the AK seven thousand series with a complete product portfolio and a powerful software features that will make it a best choice for your industrial communication infra. Chapter Data Monitoring in Oil and Gas Industry Hello, everyone. I'm Pierre Carey from ISENSING device product division. Today, I'm going to talk about the application for remote IO modules and serial USB communication solutions in oil and gas energy saving industry. K. So what's the importance for data monitoring in oil and gas industry? I believe everyone should agree that safety is the most important thing in oil and gas industry. Data monitoring helps to ensure safety for everyone By monitoring the leakage of chemical substance or, machine purpose, accidents can be prevented. For the environment, monitoring the energy consumption and waste emission data help companies to meet the industry regulation and protect the environment. Then operation, the operation data help increase data efficiency, reduce operation risk, and save operation cost. And maintenance. Maintenance is also important to companies with, equipment data. Any damage or malfunction can be detected at early stage so that equipment life cycle can be extended and also reduce the maintenance cost and rates. Data is the foundation of all industrial IoT. Remote IO modules provide various remote data to optimize productivity and, ensure the operation of build devices. So when do you need remote IO? With the following condition, remote IO modules, other choices for you. So first, when the sensors and, scholar in many places, and it is not possible to configure a set of controllers at each location, which will be too expensive and not efficient. Or the distance between the controllers and sensors are low. The signals will be easily disturbed by noise, resulting in increased data errors. Therefore, deploying remote IO close to sensors to trans transmit data to controllers can greatly reduce the cost and time. This diagram shows added remote IO module application in oil pilot monitoring. Oil pilots from China to Russia, over thousands of miles. It is difficult to collect over long distance. It is difficult to collect data over long distance. However, Adam remote IO modules, help to proceed, process the and transmit data of temperature, pressure, floor, or vibration, to the central control room miles away. So for example, Adam six eighteen is a temperature data acquisition module for eight thermocouple input channels. And Adam, six seventeen is designed with eight analog inputs and two, digital outputs to satisfy industrial in, requirement. Each analog channel can configure individual range for many of applications. And the remote IO functions to collect the transmit real time data. Over long distance, it benefits include simple and quick configuration without programming and, reliable with low maintenance. That is, they're offering, complete IO completion for diverse needs and various industrial applications. Okay. So this slide shows the Adam IO modules product overview. So this introduction is focused on Adam four and Adam six series. The Adam four series features robust, I s four eighty five mobiles with easy configuration and diagnostics. The n n six series is an Ethernet IO used for IoT applications such as SNMP, MQTT, web service, web service interfaces. And n n six pound six three hundred series is industrial OPC UA Ethernet IO modules, with mobile protocol converged by OT IT with security, and they can do, scatter with the cloud for remote monitoring. Here shows, six Adam models which are certified with ULC one t two. Two models are, for Adam four series, which are, serial converters and repeaters. Four models for LM six are Ethernet IO modules. Okay. Moving forward, I'm going to introduce UE series. UE series is a serial and USB communication solution, that helps to bridge the connectivity gap. Commit legacy devices to IT system. So the, we have the there are three brand, branches to the UNI family, UNI two hundred, our serial products, UNI three hundred, our USB to serial products, and UNI four hundred. They are USB hubs and USB isolators. U is a complete product series with multiple, interfaces. Features from, light industrial level to heavy duty level, connecting legacy serial access to IoT world. Our product with, various phone factors. They decide to ring rail mounted in a cabinet for demanding industrial application or pull power of pocket size, form factor. K. So the poor power, devices without requiring external power adapters for field service. Some model, some models offering white applet operation temperature range and four kV isolation protection. Some even support high level certification. Here's a quick reference for, higher level certification which comply with ULC one d two and I c six one eight five o dash three. This products can use in hazardous environments such as oil and gas. So the production level and product operation temperature of the product is valued. I list the models that need to, that meet the regulations for the for your reference, which is, zero to fiber converters and zero to serial converters. And, also, include the serial repeaters, isolators, and USB hub with four KB isolation. This slide shows an application about power plant data transmission. Customer face about data transmission over a long distance between the power plant and the substations and, try to integrate different communication system from multiple vendors. UE serial to fiber converters help to create a large integrated communication network across, substations with noise immunity, over long distance up to four kilometers. Okay. Here's my sharing today. Hello, everyone. I'm Burso Ozdemir from GSL Engineering Turkey. Chapter Investments and Innovations in Turkey's Oil and Gas Sector Firstly, I would like to thank Advantage for inviting me as a speaker to this event that's connecting all the industry experts together. I'm going to be talking about, some investments and innovations in Turkey for oil and gas markets, and I'm going to introduce you an a successful application to which we contributed with our advantage industrial panel PCs. But before moving on to the, main part of my speech, I'd like to take a moment and, introduce you our company, GSL First. GSL is a thirty six years old company located in Ankara, and we also have a branch office in Istanbul as well. We have been focusing on industrial communication and automation solutions, for more than twenty years. So mission critical applications like power, factory automation, transportation, as well as oil and gas are our main focused sectors. We have a complete product portfolio, to address the needs of these specific demanding applications, and, we have recently become an advantic oil and gas partner too to strengthen our oil and gas offerings. And, we have an expert team consisting of network and automation engineers so that we can offer consultancy, commissioning, technical support services as well. So I'd like to move on to the, main part of my presentation now. I'll start with this basic, oil and gas ecosystem, slide that you've probably, seen in previous oil and gas events as well. But this is a really nice, simple and clear way of talking about individual processes. This, upstream, midstream, downstream, terminology is also applicable in Turkey as well. There are some, government, corporations like Turkish Oil Exploration Company and Botash that are in charge of upstream and midstream part, and then there are also some, private companies like refineries or gas distribution companies as well. But, all in all, ministry of energy and government, regulates, the whole, sector, and, they require the highest level of standardization, in the projects. When we look at the last decade, we have seen some major oil and gas, projects taking place in Turkey. I can exemplify, the underground and underwater, gas deposition projects, intercountry pipelines, like transcontinental pipeline, for example, Turkakumar, and also, pipeline stations, modernization projects, pipeline security projects that are covering the entire country. So there has been major projects. And in all of these projects, we have seen the highest level of safety, cybersecurity, and reliability, requirements. And even in the recent challenging economical, situation, our government is still prioritizing these investments and allocating some considerable, budget for the upcoming investments as well. And, as you all know, Advantech has some really nice, industrial PC and connectivity offerings targeting each of these, sections. I have compiled some, examples, and, also, I'll be talking about some subsystems that we're also working on. In downstream part, for example, advantage panel PCs are ideal fit to be used in oil tanker, fleet management and also, pump stations, kiosk, applications. In the midstream in the midstream part, the pipeline authority has valve stations and pressure regulation stations in which they constantly collect a lot of signals, a lot of sensor data, low computer data to analyze the gas characteristics. And, they need local scatter solutions and also HMIs, to, you you know, form up and manage this industrial automation, system. And, Advantech, panel PCs and WOP HMIs, for example, are great fit as, these HMIs can support, the desired, PRC protocols such as DNP three, Modbus, MDRC, and so on. And, we'll be closely following up these kinds of applications, for example. Pipeline security is also a hot topic, and, the authorities are handling this as a linear assets, monitoring applications. And in our opinion, advanteck vibration sensors, LoRa connectivity, and SCADA, all in one, total solution could be an ideal way of addressing this, application requirements. But these are just examples from, various, components of the ecosystem. Today, I'm going to be sharing the details of an upstream, application, an onshore, oil exploration project to be more specific. Chapter Case Study: Digital Transformation in Oil Exploration The credit goes to Atlantic Turkey team for convincing the end customer, technically, for sure. Now here are some more details about this, success case. So, in this, photo, you are looking at the TPIC oil exploration break. There's a nice Photoshop done in this image normally. These are really demanding applications requiring some, equipments that are, capable of sustaining, a seamless operation under, potentially explosive, harsh environments. These applications used to have a fully mechanical and manual process, So it wasn't, of course, it wasn't really efficient, and it wasn't safe enough, for modern standards. So that's why the end user decided to digitalize the whole system, and, establish a drill operations management, system, which is a critical data exchange, requiring, a top top level of certifications from the, you know, industrial automation equipments. So that's why, Advantech offering, industrial panel PC offering was a great match, addressing this, application requirements. When you look more closely, to this rig field, you will notice a container right next to the drilling machine. This is the, drill operator's cabinet, and you'll see another container that has a little distance on the other side of the drilling machine. That is the, mud logging unit. So I'll be giving you more details about these two, components of this total system and how a real time monitoring and control system, is established between these two. This is a closer look. These are images of mud logging unit and the, drill operator cabinet. Mud logging unit is basically a lab that is constantly receiving, drilling instantaneous instantaneous drilling parameters. And, also, the drilling fluid, they call it mud, and gas, samples constantly analyze, these data inputs. Some experts make assessments and also some they use also some, petroleum engineering software as well. And then they transmit the process data to the, drill operator, and there's a panel PC, right next to the drill operator receiving this, process data. And the drill operator is adjusting the system, according to the data that he receives. This is the basic, mechanism that's taking place. Obviously, this is this is like a basic definition of an x proof environment. The operator containers and the mud locking units are both strongly sealed rooms, with positive, pressure keeping out combustible gas and dust particles. However, in case of abnormal circumstances, all components of ignition equation could, you know, meet in one place and, could lead to a disaster. So that's why they, cannot use standard equipments. They certainly need to use, a a top level certified panel PC solution like ours. At least c one d two was required, from all equipments as well as, the panel PC. So I'd like to share a little bit more details about what kind of data exchange is happening between the two, you know, the drill operator cabinet and also the mud logging unit, so that this, how critical this application is would be better understood. The drill and the well contain a lot of sensors in order to constantly optimize the process, ensure that it's flowing, safely, and also to understand if the, estimations about, the reserve would be realized in the end or not. So they are logging drilling rates, pressure on the tip, rotary speed, strokes per minute, you you know, these kinds of parameters constantly. Also, they're constantly gathering geological data to avoid issues, and also constantly collecting mud samples and gas samples, to avoid dangerous gas formations, for example, or hydrocarbon content of the, samples as well. So these are the, critical data that's been processed and pushed or transmitted, to the, operator. So the end customer informed us that they had started looking into an ideal drill operator panel PC solution with the desired, high performance, reliability, safety, and cybersecurity features. And you can imagine how perfectly, our TPC three hundred and eighteen panel PC would fit to this description. The features that are highlighted about the TPC panel computer are c one d two certification to ensure safety, and the customer may even, consider the WE version in future, expansions and or future use as well. Chapter Importance of Cybersecurity in Industrial Applications The, performance criterias like Intel I five and the memory, that is listed here are were quite ideal. Having a long life, long lifespan touchscreen and, versatile in interfaces and expansion capabilities were, great, let's say, additional features that, the customer liked very much because although they are not using it at the moment, in the future, they are considering to have some additional use of SPC as well. And, also, as cybersecurity was also an important criteria for them, supporting TPM two dot o chipset was also, an important parameter in their evaluation. There was an elaboration of how TPM chipsets use was important for the customer. For example, it will protect the PC from unauthorized access or data tampering or data breach. It's an additional layer of protection to prevent malware access, to, encryption keys, credentials, and it enables secure boot feature so that, even in case of a malware, the encrypted, data would be in safety. And using some unique registries, PCR values, they can, ensure data integrity, with local assets or, remote entities as well. So all in all, having having, TPM to that core chipset is an important cybersecurity