Electronic Logbook. Hedgehog-2. version 2.7. Quick Start. Revision 1.3 of 10/31/2012



Similar documents
PowerLogic ION Enterprise 5.6

Outlook 2010 Essentials

S m a r t M a s t e B T E C O R P O R A T I O N USER MANUAL

Changing Your Cameleon Server IP

138 Configuration Wizards

Microsoft Office Live Meeting Events User s Guide

Table of Contents. Manual for Core Staff - Equipment/Scheduling Core Facilities

KPN SMS mail. Send SMS as fast as !

Asset Track Getting Started Guide. An Introduction to Asset Track

NETWORK PRINT MONITOR User Guide

The Reporting Console

Microsoft Office Access 2007 which I refer to as Access throughout this book

B2W Maintain. Setup and Preventive Maintenance

Fleet Manager Quick Guide (Non Maintenance Mode)

Outlook Web Access (OWA) User Guide

Abstract. For notes detailing the changes in each release, see the MySQL for Excel Release Notes. For legal information, see the Legal Notices.

Introduction to Microsoft Access 2003

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) , option 1. Access Methods:

PowerLogic ION Enterprise 6.0

Logi Ad Hoc Reporting System Administration Guide

TestManager Administration Guide

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

IT HELP Desk Dashboard ManageEngine Service Desk Plus User Guide

Colligo Manager 6.2. Offline Mode - User Guide

Project Management WalkThrough

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

WatchDox Administrator's Guide. Application Version 3.7.5

Installing LearningBay Enterprise Part 2

How to create and personalize a PDF portfolio

Cisco Jabber for Windows

Using SSH Secure Shell Client for FTP

User Guide. SysMan Utilities. By Sysgem AG

DiskBoss. File & Disk Manager. Version 2.0. Dec Flexense Ltd. info@flexense.com. File Integrity Monitor

Getting Started. A Getting Started Guide for Locum RealTime Monitor. Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED

Utilities ComCash

New Features in Primavera P6 EPPM 16.1

User Manual for Web. Help Desk Authority 9.0

Project Management WalkThrough

Colligo Manager 6.0. Offline Mode - User Guide

Cluster to Cluster Failover Using Double-Take

Application Note Room Alert

Bare Bones Guide to Using Outlook 2010 for

VMware Mirage Web Manager Guide

Contents Overview... 5 Configuring Project Management Bridge after Installation... 9 The Project Management Bridge Menu... 14

Online Sharing User Manual

Scheduling Software User s Guide

Microsoft Access 2010 handout

MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE

Table of Contents INTRODUCTION... 2 HOME PAGE Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Results CRM 2012 User Manual

Outlook . User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA

Document Services Online Customer Guide

Central Management System

Hosting Users Guide 2011

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6

Vodafone PC SMS (Software version 4.7.1) User Manual

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

Behavioral Health System

ESET REMOTE ADMINISTRATOR. Migration guide

Migrating MSDE to Microsoft SQL 2008 R2 Express

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

CMS Training. Prepared for the Nature Conservancy. March 2012

Webmail Instruction Guide

ShoreTel Enterprise Contact Center 8 Using Agent Toolbar

Installation and Program Essentials

Toolbar User Guide. Release 17.0

Table of Contents. CHAPTER 1 About This Guide CHAPTER 2 Introduction CHAPTER 3 Database Backup and Restoration... 15

Chapter 3 Application Monitors

Lenovo Online Data Backup User Guide Version

Outlook 2007 EXPLORE THE OUTLOOK USER INTERFACE. Microsoft. Basic Tasks

OWA - Outlook Web App

Core Essentials. Outlook Module 1. Diocese of St. Petersburg Office of Training

Comodo LoginPro Software Version 1.5

Active Directory Change Notifier Quick Start Guide

Quick Start Guide. Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve.

Telephony Toolbar Corporate. User Guide

User Guidance. CimTrak Integrity & Compliance Suite

Hyperoo 2.0 A (Very) Quick Start

ithenticate User Manual

ShoreTel Enterprise Contact Center 9 Supervisor Guide

Reconfiguring VMware vsphere Update Manager

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Job Scheduler User Guide IGSS Version 11.0

Magaya Software Installation Guide

Module One: Getting Started Opening Outlook Setting Up Outlook for the First Time Understanding the Interface...

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC , revision 2.029, May 2012.

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

Microsoft 311 Service Center accelerator Demo Script

New Features in Outlook Web Access

Help Desk Web User Guide

MySphere Assistant User Guide

Non-ThinManager Components

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

History Explorer. View and Export Logged Print Job Information WHITE PAPER

BCSD WebMail Documentation

Time & Expense Entry WalkThrough

Transcription:

Electronic Logbook Hedgehog-2 version 2.7 Quick Start Revision 1.3 of 10/31/2012 Monitor Electric, 2012

2 CONTENTS Introduction 3 Entry List 4 Event Entry 4 Filtering and Sorting 6 Chaining 7 Attachments, Notes, Authorization 7 Overwriting and Editing 8 Printing, Exporting, Emailing and Texting 9 External Program Interaction 9 Shift Turnover 10 Logbook Configuration 10 Other Features 11

3 Introduction Electronic logbook Hedgehog-2 is designed for operational record entry, safe storage and analysis by dispatchers and managers at electric power utilities control centers. The client-server architecture of the logbook allows it be used on a network of computers as well as on a single machine. A logbook client may be installed on every operator, engineer and manager console. The logbook clients connect to the logbook server that centralizes data entry and keeps it in the database. Despite multiple concurrent data entry points, the logbook contains a single database whose entries can be searched, examined and processed at any of the client machines. This way, the logbook presents a single point of access for the operational information record keeping. A SCADA/EMS or any other external application may be designed to automatically create logbook entries. To protect against hardware failure, a backup logbook server with a copy of the database may be run concurrently with the primary server. Control Center operator console automatic entries primary logbook server logbook database entries logbook desktop client SCADA/ EMS replication backup logbook server logbook database engineer console logbook desktop client The major item of logbook manipulation is an operational entry. The philosophy of the logbook is to reliably record the entries; then make them available for searching, printing and dissemination. To ensure the permanency of the record, once the entry is input, it cannot be accidentally or willfully erased. This guide focuses on activities to be done with these entries in Hedgehog-2. The guide is organized as follows.

4 We describe the Entry List the main window of the logbook and entry manipulation related to this list.. We then cover several supporting programs: shift turnover, logbook configuration. Some of the programs and features are too detailed for this guide. We quickly introduce them at the end of this guide without going into the specifics of their operation. Entry List Entry List is the main record processing window of the logbook. The entries are shown as lines in a table. On the left of the entry line, there is a flag area to visually denote specific properties of the entry. The flags are followed by entry fields. You can configure which fields are displayed and in what order. Commonly used fields are: time of receiving notification of the event, time of occurrence, the category of event, the facility or equipment where the event occurred, the detailed description of the event, the person who made the entry and the person who communicated the event. Event Entry To create a new event entry, select Entry New from the pull-down menu or click on the New icon of the toolbar. The Logbook Entry dialog box appears. This dialog box lets you enter the information associated with the event. The information is as follows:

5 The first field in the dialog box contains a list of categories and subcategories to be associated with the event. For example, switching off a reactor may be classified under System state management/voltage regulation. These categories are customizable to the needs of the control center. This customization is done using Logbook Configuration tool. The Facility/Equipment field allows you to specify the location of the event. For example, if there is an outage, it may be associated with a facility such as a substation or a power plant. The event location may be narrowed to a particular piece of equipment such as a generator or a transformer. The facility and equipment that appear as options for the event may be determined by already selected category/subcategory. For example, if the category is voltage regulation, the facility/equipment may present the list of all generators, reactors and batteries available in the power system. Such association simplifies event entry. This association is also configured in Logbook Configuration tool. The recorded entry may be about operator communication: either notification given to the operator or directive issued by the operator. For example, the operator may give a directive to substation personnel to manually disconnect a reactor. The other communicating party can be selected from the list of the personnel. The list of personnel is configured through the Logbook Configuration. Note that the communicating party may be at a facility that is different from the location of the incident. For example, an outage at a substation may need to be reported to a reliability coordinator control center. Each entry has two timestamps. The time of event occurrence of the event is manually entered by the operator. Local time of the computer where logbook is installed is automatically added as the time of entry recording.

6 The event description field is to hold the narrative of the event entry. For routine event description entry, each event category can be configured with associated keywords (standard phrases). Click on the keyword to insert it into the event description. For ease of visual identification, an icon can be selected for the entry. The list of icons is configured in Logbook Configuration. Once the entry is made, this icon appears in the icon field of the flag area of this entry s row. It may be necessary to enter several similar entries. In this case, check Duplicate entry field. If this field is checked, once the entry is created, the entry dialog box remains open with all the fields filled exactly as in the already recorded entry. To record a similar entry, you just need to modify the fields that are different. In case such similar entries are made frequently, the entry may be saved as a template. Such a template can be quickly invoked by selecting template button in the toolbar in the entry list window. Filtering and Sorting The number of entries in a typical logbook quickly grows into thousands and becomes a challenge to navigate. Hedgehog-2 simplifies dealing with such a large list of entries through filtering and sorting.

7 To the left of the entry list, there is a filtering and sorting configuration pane. You can toggle displaying of this pane by clicking on the configuration button in the entry list toolbar at the top of the entry list window. Entries can be filtered by various timing parameters and records. A filter can be temporarily created for quick entry lookup or named and saved for repeated use. The named filters are listed below the filter toolbar. The toolbar gives you access to filter manipulation functions. Some of the common functions are as follows: To create or modify a filter, click on the filter editing button ; To apply already created filter, click this button. Chaining Several entries may be related to the same incident. For example, first, there may be an abnormal state and operator mitigating actions entry. Then, the entry that establishes the cause, a faulty transformer, is recorded. It then may be followed by a maintenance request entry, granting of the request, taking the transformer offline, a successful repair, testing and bringing the transformer back online. For quick filtering and display such related events can be linked in a chain. To view chained entries or to add chains, click on the chain icon in the filtering pane or right-click on the entry row in the entry list and select link from the dropdown menu. If the entry is chained, the chain icon appears in the flags area of the entry row. Attachments, Notes, Authorization Once the entry is made, you can add attachments related to this entry. The attachments can be in a variety of formats: scanned documents, communication transcripts, photographs, audio and video recordings. The attachments are stored in the same database as the entries themselves. Hence, the

8 attachments are subject to the same protections and security. There are several ways to add an attachment to an entry. You can double-click on the attachment field of the entry s row, right-click on the row and select Attachments from the dropdown menu or select Entry Attachments form the pulldown menu. Once at least one attachment is added to the entry, the attachment icon is displayed in the flag area of this entry row. A note with a commentary can be attached to the entry. In fact, several different users may attach notes to form a mini-discussion regarding this entry. To attach a note, double click on the note field of the entry row. You can also select this option from the pull-down or drop-down right-click menu. An authorization is a specialized note for providing feedback to the entry author. For example, a head dispatcher would like to leave a comment to the operator who made the entry and make sure that the operator reads it. To leave an authorization, double-click on the authorization field of the entry row. If the authorization is attached to the record, the corresponding icon is displayed in the flag area of the entry. The icon is displayed in red to alert the entry author. The red color is removed once the entry author double clicks on the authorization icon and reads the entry. Overwriting and Editing There are two ways to correct an erroneous entry: to overwrite it or to edit it. However, in order to prevent the information loss, the old entry is retained in the logbook database. The old entry is shown in gray with overstrike font. Old entries are read-only and cannot be further modified. Overwriting allows you to comment on the entry and remove it. The commentary may contain the reason for entry removal. That is, overwriting is a way to strike out an erroneous entry. To overwrite an entry, select Overwrite from either the Entry option of the pulldown menu or from the right-click dropdown menu. The old entry cannot be overwritten again. By default, the old and the new entries are displayed next to each other in the list of entries with overwriting flag entry. The flag is blue for the new entry and red for the old one. in the flag field of each Editing allows you to modify an entry in an arbitrary manner. To edit an entry, select Edit from the pulldown menu or from the right-click dropdown menu. Similar to overwriting, the new and old entries are listed next to each other and denoted by edited flag.

9 Each time an entry is edited, the old entry is saved. Revision navigation buttons list toolbar may be used go back and forth between these revisions of the entry. in the entry Printing, Exporting, Emailing and Texting Hedgehog-2 contains a number of functions for entry printing and dissemination. The functions are available in the Tools section of the pulldown menu. Logbook entries can be exported to a Microsoft Excel spreadsheet, printed or emailed. In each case, the active filter is used to select entries for dissemination. In other words, the entries currently shown in the Entry List window will be printed or exported. Printing is done according to pre-configured printing template. One particular printing report is Shift Log. This report lists all the entries made during current shift. The shift log s is intended to be printed as a part of shift turnover protocol. To print this report, select Tools Print Shift Log option from the pull-down menu. The logbook may be configured to send text-message or email notifications if events of certain categories or related to certain locations occur. For example, a powerplant owner may wish to be notified in case there is an incident in the owner s facility or a reliability engineer may need to be kept appraised of the entries in the power system state category. External Program Interaction Hedgehog-2 stores record entries in a Microsoft SQL database. However, due to logbook security and integrity concerns, direct modification of database records is prohibited. Instead, the logbook has an open application programming interface (API) for logbook entry manipulation. This allows external programs to access the logbook. Frequently, the logbook is integrated with a SCADA/EMS system installed in the control center and this SCADA/EMS automatically makes entries in the logbook. For example, an operator entry in SCADA/EMS about a certain field devices supplying incorrect

10 measurement may be copied to the logbook. For another example, scheduled power interchanges or maintenance events can also migrate to the logbook from SCADA/EMS. Shift Turnover Shift turnover is a logbook component for recording the beginning and ending of the shift and the name of the new shift operator who will be making entries in the logbook. The shift turnover process should happen at each operator workstation. The ending shift operator hands over the shift by entering his password. The new shift operator selects his name and provides the password to confirm the turnover. The logbook automatically makes two records about the turnover: shift provider and shift receiver. Logbook Configuration Hedgehog-2 is made to be easily customizable to the needs of a particular control center. Logbook Configuration program gives access to Hedgehog-2 parameters.

11 Other Features We would like to mention several other logbook features whose detailed description is beyond the scope of this guide. The login authorization system of the networked version of the logbook is integrated into Microsoft Windows Active Directory. This way, there is a single place for login, password, and privilege configuration across multiple workstations and servers. In a single machine version, the logbook uses local Microsoft Windows accounts for authorization. To prevent data loss in case of hardware failure, a backup logbook server may be running concurrently with the primary server. The backup maintains an up-to-date copy of the database. The data may be further backed up on backup media for storage. Replication Manager of the logbook is a tool used to configure the logbook server configuration,

12 replication parameters, depth of database entry storage (how long the old entries need to be stored online before they are moved to backup media) and other parameters. To prevent unauthorized tampering with the database, the logbook implements a security system. This system contains a separate security log that records all database access sessions, entry manipulation events, parameter changes, account creation and other service information. Security Manger is a configuration tool for this system.