Information Management Strategies for Structural Integrity A Bentley White Paper Mark Biagi Solution Executive, Bentley Systems, Inc. Published: August, 2014 www.bentley.com Executive Summary An effective structural integrity management program is the single most important barrier against catastrophic failure in complex industrial facilities. Sadly, structural failures are still happening all too often, resulting in unplanned shutdowns, loss of production, financial impacts, loss of shareholder confidence and, sadly, even more tragic consequences. “Structural integrity management is actually an information technology challenge.” Throughout the energy industries, as inherently dangerous assets get increasingly large and complex, operating in harsh and ecologically sensitive environments, and aging assets’ lifespans are stretched and process conditions are being pushed to their limits, structural integrity envelopes are literally being stretched to their breaking point. • RusHydro Sayano-Shushenskaya Extensive fatigue damage due to running a high-vibration process and missing bolts. Seventy-four were people killed. • Chevron Richmond Refinery Integrity process failed to identify wall thinning in insulated pipework. 15,000 people were hospitalized. • San Bruno Pipeline Poor installation and testing resulted in pipes that are unable to cope with operating pressure. Eight were people killed and 38 homes were destroyed. For leading owner-operators, taking responsibility for their own integrity management is a top priority. For example, Shell’s simple mission statement is, “Our assets are safe. We know it, and we can show it.” This drives what is arguably the most sophisticated process safety and integrity management program of any operator in the world. However, many other operators take a different approach, preferring to rely on outsourcing to help keep their assets safe. Certainly, there are many contractors with a rich knowledge of corrosion mechanisms, inspection methods, and products. It is vitally important that the industry promotes competition in finding ever more effective and efficient inspection methods to support integrity management processes. The flip side, however, is that many specialist vendors that only have part of the solution, along with their own esoteric homegrown software tools, can often introduce risks into the integrity management process. This includes software products written by Ph.D. candidates to perform some specific calculation that only one individual understands. Products that are not in any way integrated into a wider enterprise context result in: •lack of consistency, •poor information flows, •lack of interoperability, and •dead-end data. Enterprise Information Strategies for Integrity Management 2 Conventional asset integrity management methods often involve multiple organizations across distributed enterprises (e.g., in-house, contractors, technicians, specialists) working in disconnected workflows with a wide variety of disparate, technical, esoteric, and non-graphical data sources in multiple specialist software systems that are relevant only to specific sub-asset types. This inconsistency and lack of clarity is a barrier to common understanding, introducing risk and inefficiency. Bentley’s approach is different. Dedicated to sustaining the world’s infrastructure, Bentley applies sophisticated engineering information management strategies to facilitate a consistent and auditable process of integrity management across distributed enterprises and multiple asset types. Introduction Bentley is widely recognized as being the leading vendor of structural engineering design and analysis software with global brand names such as STAAD, RAM, SACS, MOSES, AutoPIPE, and many more. Bentley is also a leader in software for structural integrity management (also sometimes referred to as mechanical integrity management) with major operators, including Shell, standardizing on Bentley’s strategies for corrosion inspection management of their pressurized systems. While there are countless companies specializing in technical aspects of structural integrity management (such as non-destructive testing, materials sciences, risk-based inspections, structural analysis) very few of them have the capabilities around engineering information and asset performance management to address the practical challenges of an enterprise-wide approach to structural integrity management. Bentley’s approach supports the whole integrity management process and the stakeholders involved, such as corrosion specialists, inspection contractors, technicians, installation managers, process engineers and so on. Structural integrity management is a subset of Bentley’s platform for asset performance management. The fact that structural integrity management is actually an enterprise information technology challenge is precisely what Shell realized and why it bought into Bentley’s approach. That is also the reason why this paper is more information technology (IT) focused than other papers on integrity management. While Bentley wouldn’t classify itself as a corrosion specialist, it has spent the past 30 years developing advanced IT concepts and technologies to address the specific challenges of designing, building, and maintaining complex infrastructure assets. This gives Bentley the unique capability of considering reliability and integrity across the full lifecycle of infrastructure assets, pushing reliability thinking earlier into the design process, and delivering the information management platforms to support lifecycle operations (see figure below). Bentley’s approach supports the whole integrity management process and the disciplines that support it. Enterprise Information Strategies for Integrity Management 3 Push reliability focus earlier in the lifecycle Plan Design Construct Commission Operate & Maintain Refine & Recycle Manage information to ensure operational readiness and asset performance Reliability-centered asset lifecycle. This paper introduces how a number of advanced concepts and proven technologies are applied to improve many common workflows and challenges of asset performance management, including: • information federation • information mobility • configuration management • immersive interfaces Bentley’s approach reduces the gap between an engineer’s or a manager’s mental model of a plant, its performance, and its representation in IT systems. This interactive environment facilitates a common platform for the various stakeholders involved in asset integrity management (e.g., corrosion engineering, process engineering, inspection, and RBI analysis) to collaborate effectively in a managed environment, streamlining processes, better supporting existing enterprise systems, providing consistency, and ultimately improving performance and reducing risk. Introduction to Asset Performance Management The term asset performance management (APM) is now becoming widely accepted in asset intensive industries. On the one hand, APM describes the subset of an asset management strategy that relates to risk-based and reliability-centered approaches to operations, as opposed to conventional reactive or time-based approaches. On the other hand, APM also defines a category of services and software products that can be applied tactically to plan and execute a program of improving asset integrity and reliability. Enterprise Information Strategies for Integrity Management 4 The principles of APM are also directly aligned with the new ISO 55000 standard, which sets a new benchmark for asset management best practice. This standard, released in January 2014, has gained the attention not only of owners and operators of infrastructure assets, but has also piqued the interest of shareholders, stakeholders, and the insurance industry, which are equally interested to know just how well their assets are being managed. Many infrastructure owner-operators are now engaging consultants to help them understand where on the scale of asset management maturity they currently reside, and what they need to be doing to get measurably closer to ISO 55000. Often the answer comes down to APM. By definition then, APM is a complex discipline that unites and adds value to many existing systems and processes that have become widely accepted across industrial facilities. All owner-operators understand the need and the value of having such tools as enterprise resource planning (ERP), enterprise asset management (EAM), maintenance management system (MMS), condition-based monitoring (CBM), document management systems (DMS), or some other common combination thereof. Management Strategy Asset Context Structural Integrity Management Asset Performance Risk Mitigation Risk Assessment The five elements of integrity management. So why does the industry need yet another TLA or “three-letter abbreviation” (not “acronym” since acronyms are those abbreviations that spell recognizable words)? The simple answer is that to shift from a reactive or time-based maintenance regime to a risk-based and reliability-centered approach requires the ability to straddle across the conventional boundaries of transactional (e.g., ERP) and time-series (e.g., condition monitoring) systems to drive better decision making. Enterprise Information Strategies for Integrity Management 5 Asset performance management unites the five fundamental elements of an asset management strategy shown in the figure above, namely: •Management Strategy – What are the business and performance requirements for the asset? •Asset Context – What and where is the asset? •Asset Performance – What is the asset’s condition and how is it performing? •Risk Assessment – How can failure occur? What is the likelihood? What are the consequences? •Risk Mitigation – How are scheduled and unscheduled maintenance (and incidents) managed? “For an organization to be effective to the standards of ISO 55000, all inspection and maintenance becomes risk mitigation.” There are countless reasons why organizations might not be managing their assets effectively, especially not to ISO 55000 standards. Business objectives might have changed over time such that the asset in its present condition is becoming a liability (for example, new emissions legislation changes business objectives). Likewise, the asset context might not be well understood, as an organization may have acquired assets that are poorly documented or that have been modified without updating the engineering information. The asset performance may not be well understood as sources of field information such as inspections or condition monitoring might be ineffective. Risk assessment may not have been adequately carried out to understand all the ways in which failure can occur, which applies not only to failure of physical assets but failure to meet the business objectives. Finally, the risk mitigation methods employed may not adequately address the present condition and potential failure modes. Notice carefully the figure on page 5 does not mention the word “maintenance.” For many organizations, maintenance is just something that has to be done, like housework. Maintenance tasks are often an aggregation and accumulation of all the individual tasks that are recommended by all the individual vendors of equipment that the asset employs. For an organization to be effective to the standards of ISO 55000, all inspection and maintenance becomes risk mitigation, namely that each inspection and maintenance activity should be aligned with the indicators of specific failure modes and driven by the likelihood and the consequence of those failure modes given the asset’s condition, operating context, and business objectives. This inter-relationship between conflicting requirements and disparate sources of information is fundamental to asset performance management. Structural Integrity Management – a Subset of APM Many organizations are recognizing the value of having a consistent risk-based and reliability-centered approach to asset performance management across all their disciplines and asset types, in order that a common language and culture of reliability permeates the whole enterprise. Enterprise Information Strategies for Integrity Management 6 Reliability-centered maintenance (RCM) is the generic strategy that supports asset performance management. In simple terms, RCM is a structured method for considering the ways in which assets can fail to meet the functions for which they are required, and ensuring that maintenance action plans, inspections and other indicators are directly aligned to monitoring these failure modes. Assets Reliability-centered Maintenance Functions Functional Failures Failure Modes Structural Integrity Management Maintenance Task Analysis Risk-based Inspection Action Plans Indicators Inspections Current Practice Review Risk-based approach to structural integrity management. When it comes to structures, the functions of the assets are relatively simple: either support or containment. Asset integrity management, as shown in the figure above, is therefore the subset of an overall RCM approach, applying the same process and methodology, but dedicated solely to the functions and functional failures of structures, which generally include: • Support structures such as bulk loading structures, topsides, decks, pipe-racks, bridges, cranes, hoists, civil structures, vessel supports, jetties, exhaust supports, walkways, jackets, foundations, joints/welds, towers, risers, caissons, subsea structures, wells, blades, and so on. • Containment structures such as flowlines, manifolds, pipes, vessels, joints, tanks, valves, joints/welds, pipelines, drains, vents, heat exchanger tubing, corrosion loops, and all other components involved in fluid transfer and storage. While the functions of structures are simple, the failure modes can be complex, including: • Corrosion – degradation of material properties due to reaction with environment • Erosion – reduction of material thickness due to wear from sand and gravel • Overloading – structures subjected to loads that exceed design specification • Creep/fatigue – degradation of material properties due to loading and vibrations • Fracture – cracks and other defects causing stress concentration • Resonance/aeroelastic effects – effects of fluids and wind loading • Construction quality – including welds and joint integrity Enterprise Information Strategies for Integrity Management 7 Typical corrosion mechanisms in a pipeline. While the failure modes may be known, monitoring and detection is another challenge because often failure modes take place inside the structures (e.g., wall thinning on the inside of a pipe) or the structures are inaccessible to allow for easy inspection (e.g., buried, subsea, embedded in concrete, etc.). Therefore owners need to be able to effectively and consistently prioritize when, how, and where inspections need to be carried out and take the appropriate corrective actions. The real challenge for owner-operators is that, by necessity, they need to outsource much of the activity relating to asset integrity management (specialist inspection methods and specialist analysis techniques). And yet it is the owner-operator that retains ultimate responsibility should disaster strike. The details of impending disaster can be hidden deep within some specialist application or esoteric report. Had it been presented in the right format capable of being understood by management, then that risk could have been mitigated. In the next section we explore these management challenges in more detail. Structural Integrity Management Processes Let’s explore the common business processes and information flows that exist around asset integrity management. Whether through formalized and integrated systems, procedures, or informal processes, any company that is serious about managing asset integrity should be able to identify with some of these processes. By considering the common processes and information flows we can begin to understand some of the challenges and where opportunities exist for improvement. Enterprise Information Strategies for Integrity Management 8 Management Systems Operational Conditions Maintenance Strategies Inspection Guidelines Corrosion Control Procedures Engineering Engineering Guidelines Standards & Specifications Design Construction Commissioning Operational Operations Maintenance Physician Modifications Proposed Engineering Revisions Inspections Inspection Methods Inspection Analyses Feedback Reports Non-physical Modifications Operating Practices Maintenance Plans Inspection Schedules Information flows for integrity management. This figure illustrates the basic information flow in an asset integrity management process – namely, how feedback from inspections and condition monitoring drives both physical modifications such as engineering changes as well as non-physical modifications such as changes to operating practices and inspection intervals. A more detailed explanation of the processes can be seen in the figure above, which can be explained as follows: • In the center is the fundamental plan, do, check, act cycle of continuous improvement, illustrating the ongoing process of feedback and modification. • The inner green circle represents the internally managed processes and software systems typically applied to asset integrity management, such as: » Engineering information management (EIM) for drawings, models, and plant documentation » Maintenance management system (MMS) for managing work orders » Data Historian for managing the large volumes of time series data from inspections and condition monitoring » Enterprise resource planning (ERP) for linking into purchasing, inventory, and spare parts » Asset performance management (APM) for managing the continuous improvement process and linking the transactional and time-series software systems • The outer ring represents the externally managed processes and software systems that exist outside of the core asset integrity management system and which are Enterprise Information Strategies for Integrity Management 9 commonly required to support each of the plan, do, check, and act cycles, such as: » Specialist analytical tools such as quantitative risk-based inspection » Tools to support specialist inspection methods » Analytical tools for taking bulk inspection results and crunching the numbers » Engineering design software for modifications and redesign The four cycles, one in each quadrant, represent the following activities: • Inspection planning – These are the office-based activities relating to work planning and detailed inspection planning, including things such as gathering specifications, corrosion loop definition, corrosion measurement location definition, inspection templates, procedures, regulatory obligations, lock-out/tag-out, spares optimization, work scheduling, inspection contracting, and generation of inspection work packages. Quantitative RBI, Inspection Templates, Procedures, etc. NDT, Ultrasonic, Pigging, ROV, Vibrations, Tank UT Scans, NII, etc. External Systems Inspection Planning Modification / Redesign Internal Systems Plan Do Act Check Inspection Methods Inspection Analyses Maintenance Strategy, Engineering Systems, etc. Defect Tracking, Statistical Analysis, Fitness for Service, etc. Detailed information flow in an asset integrity management process. • Inspection methods – This refers to the typically field-based inspection activities, often carried out by specialist contractors using a wide variety of inspection methods that generate large quantities of data (e.g., non-destructive testing, pigging, remotely operated vehicles, tank UT scans, non-intrusive inspections, etc.) and often carried out in remote locations disconnected from the management systems. • Inspection analyses – This refers to the office-based analysis of results from field inspections, to correlate the field inspection results against expected values, categorizing likelihood and consequence of failure, to track degradation over time, to monitor defects and third-party damage and to support decision making regarding fitness for service, corrosion allowances, and remaining life. Enterprise Information Strategies for Integrity Management 10 • Modification/redesign – This refers to the decision process around modification and redesign of both the physical asset (with everything ranging from design changes, replacements, repairs, insulation, coatings, barriers, inhibitors to complete redesign), taking account of and possible modification to processing conditions (e.g., reducing operating pressure), modifications to the inspection regime (e.g., changing inspection intervals, inspection methods) as well as modifications to the overall integrity management strategy. Having looked at the common processes and information flows, the next section considers some of the common challenges with integrity management. Common Asset Integrity Management Challenges While most owners are undoubtedly taking their asset integrity seriously, few have the kind of management systems to really support their aspirations, or that can provide them with a holistic view of their asset integrity. Many companies are highly reliant on outsourced expertise, on transferring their risks and responsibilities to suppliers, on trusting Ph.D.-written software, and on the tacit knowledge of a few key people that understand their systems. The common risks and inefficiencies in typical asset integrity management processes include: “While most owners are undoubtedly taking their asset integrity seriously, few have the kind of management systems to really support their aspirations.” • Inconsistency across disciplines, assets, and sites – Particularly for larger global operators, due to the often outsourced nature of many of the workflows, the wide range of asset types in multiple locations, specialist departments, and software platforms, very few companies have what could be termed a globally consistent integrity management approach across all their asset types. While individual disciplines or sites might not be particularly concerned how other departments manage their integrity, from an overall management perspective having a consistent and auditable overall indication of asset health is highly desirable (and consistent with ISO 55000). • Outsourcing risk – Many owners seek to outsource integrity management functions, with a lot of risk being transferred to specialist contractors using esoteric applications and a multitude of inspection methods, and yet it is the owner that must ultimately bear responsibility for any asset failure. • Interdependence with lack of interconnectedness »» This paper has brought attention to the fact that asset integrity management is a complex process that needs to interpolate between multiple systems, including: –– transactional systems (e.g., ERP, MMS, EIM, etc.) –– time-series data from the field (e.g., operations data, inspections, condition monitoring, etc.) –– disconnected sources of analysis data and results (e.g., RBI analysis, defect tracking software, analytics, etc.), and –– engineering systems (e.g. drawings, models, specs, etc.). Enterprise Information Strategies for Integrity Management 11 »» While the individual elements might be fine, it is clear that there is a complex level of coordination required to make this all work efficiently and effectively together, to coordinate suppliers and specialist analysis, to turn bulk inspection data into actionable knowledge, to enable decisions, and to manage change in a controlled and auditable way. »» A quick example would be to think about what happens if operations detects a feedstock with higher than expected hydrogen sulphide content. What is the impact on the quantitative RBI, what additional inspections or methods might be required to identify sulphide stress cracking, and what decisions might be required for processing conditions or physical modifications based on present condition? Or, what happens if a regulation changes? How can that be efficiently trickled through into operations such that they remain compliant? • Risk identification – Much of common asset integrity management comes down to dealing with lagging indicators, i.e., inspection results that show where the problems are. An effective integrity management program requires leading indicators as well. Also, understanding design limits and complex interactions (for example, wall thinning resulting in increased flexibility and therefore joint stress), and having an engineering resource space for design/field performance reconciliation. “Asset integrity management is a complex process that needs to interpolate between multiple systems.” • Engineering information – Effective asset integrity management is dependent on accurate as-built/as-maintained engineering records, fabrication records, modifications, and an understanding of how they relate to the original design basis and current regulatory obligations. Yet many assets (even new assets) have insufficient engineering information management processes. In particular, brownfield assets often have very limited records and engineering information to support an integrity management program. • Communication to generalists – Most of the components of asset integrity management systems are highly specialized, and very few are able to contextualize their information in the form of representations that generalists and managers can understand for clear communication. Information Strategies for Universal Asset Integrity As a commercial software company, which for the past 30 years has been dedicated to providing comprehensive solutions for the design, construction, and operations of the world’s building, plant, civil, and geospatial infrastructure, Bentley has developed many capabilities that can be applied to asset integrity management. In general terms, Bentley Systems applies information mobility to improve asset performance by leveraging information modeling through integrated projects for intelligent infrastructure. Many of these capabilities have not been discussed in the context of asset integrity management until now, so many professionals involved in asset integrity are unlikely to be aware of how these capabilities can and should be applied to their asset integrity management systems. Enterprise Information Strategies for Integrity Management 12 One reason for this is that some of these capabilities have emerged from other infrastructure industries. These technologies were developed to address the challenges of one industry and are now being applied to another. While these technologies and capabilities are proven, they are new to asset integrity management. Another reason is that most asset integrity professionals and software vendors are focused on detailed inspections or analysis techniques and do not have the knowledge or interest to handle more fundamental IT concepts. This section explores these concepts, and explains how they are being applied to what could be termed “universal asset integrity management,” facilitating a consistent and auditable process of integrity management across distributed enterprises and multiple asset types. Documents People Organizations WBS Equipment Location Projects Requirements Integrity management requires an auditable process across distributed enterprises and multiple asset types. • Information federation1 » If a common challenge for asset integrity management is that essential information is distributed all over the place in diverse data sources and formats, then a method is required for effective, efficient, and controlled sharing and distribution of critical information regardless of the source and format. The conventional solution is to attempt to define everything and create the “mother of all databases” with hard-wired connectivity, but sooner or later this becomes unsustainable (especially for an industry where, as stated earlier, it is essential that vendors innovate new techniques and technologies). 1 Information federation and configuration management are covered in much more detail in separate white papers. Please see the “References” section at the end of this paper. Enterprise Information Strategies for Integrity Management 13 » Bentley offers a federated approach. Instead of creating a monolithic system, Bentley proposes an asset integrity management system that references and maintains the relationships between relevant data objects residing in distributed operational systems. Think of this as the Internet of things applied to this specific integrity management problem. Design Basis / Requirements / Regulations / Contracts / Permits / Licenses “What is allowed to be there” Change Management Information Management “What we say is there” Physical Configuration “What is there” A federated approach maintains the relationships between relevant data objects residing in distributed operational systems. • Configuration management » If a common challenge for asset integrity is managing the interdependency of all these disparate information sources, then a method is required for highlighting and managing change. This is exactly the same problem many other industries face where change management is essential, particularly the nuclear power industry. » Configuration management is a discipline that emerged from the nuclear power industry to manage the whole change process, ensuring that at all times the physical plant was aligned with the information asset, and these were both aligned with the design basis and regulations governing the asset. Once information is federated and configuration managed there are a host of additional services that are driven by the configuration management process including: – Transmittals, correspondence, reporting, and dashboards – Contracts administration Enterprise Information Strategies for Integrity Management 14 –– Asset information management »» Bentley provides these capabilities on some of the world’s largest infrastructure programs through a managed services environment. •Information mobility »» i-models 2 are Bentley’s currency for information exchange to enable information mobility within the federated workflows of asset integrity management. i-models are enablers of information mobility, ensuring the right information in the appropriate format and level of precision can be accessed by the right people at the right time. i-models enable information mobility. »» i-models are not only 3D, but also 2D, and 1D (i.e., data). They can have many properties including: –– provenance (i.e., audit trail of what and who has used them) –– portability (i.e., very lightweight, supporting mobile and off-network workflows) –– self-describing (i.e., don’t need the applications that created them to review) –– time-sensitive (i.e., can be imparted with self-destruct rules) »» Free iWare and mobile apps – are how Bentley makes freely available the techniques to generate i-models from non-Bentley software. These include i-model ODBC driver for Windows, i-model driver for Excel, publishing tools for iPad apps on the App Store, Navigator Mobile, and more. »» i-models, supported by managed services configuration control, facilitate the emerging subscription models for information technology as described in industry changing books such as Consumption Economics and B4B (Wood, Hewlin, and Lah, 2011, 2013). 2 i-models are the subject of detailed papers and presentations. Enterprise Information Strategies for Integrity Management 15 Information Strategies Applied to Integrity Management Workflows The following section provides a high-level description of how these enterprise information management strategies from Bentley (namely information federation, configuration management, and information mobility) can be applied to common integrity management workflows, and considers the implications and benefits of this approach. 2D/3D Visual Planning Mobile Inspections External Systems i-model Planning Packages Internal Systems i-model Overlay i-model Inspection Packages Inspection Data i-model Modification Packages Managed Service Design Management i-model Analysis Packages Fitness for Service i-models applied to the integrity management process. Consider the example in this figure that references the common asset integrity management workflows described earlier in this paper and that has now been overlaid with simple enhancements using the information management strategies and i-model capabilities, e.g. Enterprise Information Strategies for Integrity Management 16 Before Using i-models • Hand-drawn mark-ups on scanned paper isometrics After Using i-models • • • • Packaged drawings, models, point clouds Graphical corrosion loops and CMLs Links to inspection and calibration specs Links to CIMS and other operational systems i-model packages help to define a better program. Inspection planning – Using neutral, self-describing i-model packages to combine quantitative risk-based inspection results with plant schematics and models to define corrosion measurement locations and inspection techniques. For example: Where previously detailed inspection planning might involve marking up printed schematics by hand and circulating photocopied drawings to team members, Bentley now has the ability to support process engineers, corrosion engineers, and inspection technicians to produce and review packaged i-models containing schematics, models, and point clouds with intelligent graphical corrosion loops and corrosion measurement locations, each graphical element linking to data from relevant operational systems, enabling embedded links to engineering specifications, purchasing, and logistics, as well as the ability to visualize status based on important attributes such as corrosion rates, alarm states, and so on. i-models enable immersive asset performance management. Enterprise Information Strategies for Integrity Management 17 Inspection methods – Moving beyond inspection to “interactive inspection” by using i-models to support the transmittal of inspection packages to contractors with instructions, models, previous results, machine calibration data, and so on, and then supporting the returning field inspection data for detailed analysis. For example: Previously an inspection technician might receive an isometric marked up by hand showing what is to be inspected, which gives no context about the location, the complexities of the task, and might need to wait until they get into the field to understand the task complexity. Now the inspection technician receives an intelligent i-model that can be viewed on free apps installed on mobile devices, enabling the inspection technician to review the task in detail, get the physical context of the site as well as the historical context of previous inspection results and calibration settings. Furthermore, an i-model overlay file can be used to reference actual field inspection results and facilitate getting them back into the integrity management system for analysis and decision making. Analytical i-model Scenario Services Structural (STAAD) Offshore (SACS, MOSES) Fitness for Service (FFS) 3rd Party / Home Grown Pipeline Defect Other i-models take advantage of Bentley CONNECT for optimal data management. Inspection analyses – Using i-models to support the process of analyzing field inspection results. This might include transmitting analysis packages to specialist contractors, containing field inspection results, referencing calibration data, inspection techniques, measurement locations, and facilitating the process of crunching the numbers to make recommendations. This may also include using i-models to take advantage of Bentley CONNECT structural analysis services. For example: Bentley’s family of analysis products for structural analysis and pipe stress analysis can be used to provide decision support based on the recorded inspection data and modified analytical models. For example, a record of wall thinning on a jacket leg can feed back into a revised structural analysis model that can provide an accurate prediction of reduction in safety factor relative to allowable levels. i-models created from the analytical model can be archived alongside as-built models and compared throughout the lifecycle as revised models are created following each inspection. This provides a visual audit trail of how the structure evolves as corrosion degradation occurs. Enterprise Information Strategies for Integrity Management 18 Modification/redesign – As decisions are made about modifications required, i-models support the physical redesign and modification process, packaging details of existing as-built condition to support the full design process. For example: Even for a simple repair, an i-model package can be sent to the contractor to help them visualize exactly what needs to be done and where. For more complex redesign, i-models help support a wide variety of engineering and plant design systems including Bentley OpenPlant, doing things like performing clash detection on point clouds and other design workflows that are made more complex by the existing plant. Conclusion This paper began with the assertion that an effective structural integrity management program is the single most important barrier against catastrophic failure in complex industrial facilities. For owner-operators to be able to demonstrate exceptional standards of governance and stewardship of their assets across their lifespan, they need a mechanism to coordinate all the disparate sources and systems of asset information, performance data, and risk management to support more informed, consistent, and auditable decision making. This is an information management challenge. This paper described three enterprise information management strategies (information federation, configuration management, and information mobility) that have been developed to address precisely these complex, distributed, and multi-discipline engineering challenges. Lastly, the paper presented how these techniques can be applied to support common risk-based integrity management workflows. References Cleveland, A.B., Jr. “Interoperability Platform: i-models to Unlock the Value of Information Mobility.” March 2013. Wood, J.B., Hewlin, Todd, and Lah, Thomas. 2011. Consumption Economics: The New Rules of Tech. United States: Point B, Inc. Wood, J.B., Hewlin, Todd, and Lah, Thomas. 2013. B4B: How Technology and Big Data Are Reinventing the Customer-Supplier Relationship. United States: Point B, Inc. Enterprise Information Strategies for Integrity Management 19 About Bentley Systems Bentley Systems is the global leader dedicated to providing architects, engineers, geospatial professionals, constructors, and owner-operators with comprehensive software solutions for advancing the design, construction, and operations of infrastructure. Bentley users leverage information mobility across disciplines and throughout the infrastructure lifecycle to deliver better-performing projects and assets. Bentley solutions encompass MicroStation applications for information modeling, ProjectWise collaboration services to deliver integrated projects, and AssetWise operations services to achieve intelligent infrastructure – complemented by worldwide professional services and comprehensive managed services. Founded in 1984, Bentley has more than 3,000 colleagues in over 50 countries, more than $600 million in annual revenues, and since 2006 has invested more than $1 billion in research, development, and acquisitions. © 2014 Bentley Systems Incorporated. Bentley, the ‘B’ logo, STAAD, RAM, SACS, MOSES, AutoPIPE, Navigator Mobile, Bentley CONNECT, MicroStation, and ProjectWise are either registered or unregistered trademarks or service marks of Bentley Systems, Incorporated, or one of its direct or indirect wholly-owned subsidiaries. Other brands and product names are trademarks of their respective owners. CS9859 01/15 Enterprise Information Strategies for Integrity Management 20