Logo CAMS
Articles | 08.11.21

HOUSTON – Consolidated Asset Management Services (CAMS) supported Houston area families and students as part of the YMCA of Greater Houston’s 17th annual Operation Backpack, a drive that provides backpacks and school supplies for students in need.

CAMS employees organized a collection and filled new backpacks with the supplies to make a difference in the local community. The investment made by CAMS employees provides children the opportunity to return to learning with the tools to be successful.

“Many of us have kids of our own and know the importance of having the necessary supplies to excel in the classroom,” said Mona Johnson, CAMS Senior Vice President of Environmental, Health, Safety and Regulatory. “This drive directly addresses the needs of our local community, and it was wonderful to see our employees take the initiative to coordinate it.”

According to the YMCA of Greater Houston, 28.8 percent of Houston students age 17 and younger live below the poverty line. By distributing necessary school supplies, YMCA Operation Backpack’s mission is to fill students with hope for a brighter future as they start the school year. The YMCA’s goal is to reach 30,000 Houston area youth.

CAMS values and aims to enrich the communities in which we live and work.

Limit Risk, Increase Efficiency and Improve Your Bottom Line

eTRAC is a CAMS proprietary software platform that provides real-time financial intelligence for energy generation assets. It is a reliable guide to help asset owners navigate market performance.

eTRAC provides an elegantly simple view of real-time, relevant pricing data, energy output and financial instrument performance in a mobile-friendly format.

Our optimization service increases returns and limits risk, making it the best choice to maximize efficiency and profitably.

Complete the form to download.

Whitepaper

Fill out the form to download our white paper

CAMS built eTRAC after observing that our clients who were asset owners did not have access to succinct and real-time information on the financial and operational performance of individual assets. eTRAC addresses that deficiency by combining information including market pricing and other data, an asset’s contractual structure, and operational performance to create easily digestible views.

    You are agreeing to receive communications from CAMS. Your information is private and will not be shared with any third party. You may unsubscribe from these communications at any time. See our Privacy Policy for more information.

    Articles | 07.14.21

    By Matthew Pacobit, Senior Director of Regulatory Affairs

    After posting the article Cybersecurity in Power Plants – Is my facility vulnerable? we received additional questions asking how OT or Operational Technology is different from IT business networks. This article will explain some of those differences and why they are important when considering cybersecurity.

    Operational vs. Business Networks

    Let’s first consider the structure of business networks because that is what most people are familiar with. Business networks are typically a collection of independent systems (computers) all running software from either Windows or Linux. Each computer is able to communicate with other computers through the business network, and each computer controls who it is talking to. For example, when you browse the internet you type in a web address which instructs your computer to initiate a request for information from a server. There are some exceptions to this generalized description of the structure of business networks, but for the purpose of this analysis they are not essential (even though I know there are some IT professional pulling out their hair in frustration with this oversimplification). One of the key characteristics of this structure is that it allows for enterprise-type solutions for virus protection and patching because all the machines on the business network run the same operating system. However, what happens if all the machines are not independent systems and do not run the same operating system?

    This brings us to Operational Technology, which again will be discussed very generically as there are countless types in existence. Operational networks do not just use the Windows PC that you see in the control room, but instead interface with field devices and field networks running a variety of proprietary software and/or operating systems. These could include systems from companies such as Emerson, GE, Siemens, Mitsubishi, Allen Bradley, and Bently Nevada to name a few. Even within these vendors there can be different systems such as Emerson’s Ovation system and Emerson’s heart communication implementation on their Rosemount transmitters. Normally, these different systems are run by a central controller. They are not designed for their own independent reliability, but for the overall reliability of the plant or system that they are operating. In practice, this means that if the central controller detects something is wrong, it will fail to the backup controller. What causes this to happen varies widely by system design and manufacturer.

    Due to the differences in the way business and operational networks are setup and function, we must take different approaches to how we secure these systems. For example, you can run a network detect tool on a business network with minimal risk of causing any issues, but if you run that same tool on an operations network you could bring down the entire network and the plant with it. While this may not happen every time, there is a much greater risk on the operational networks due to the differences in structure. Another good example is patching. There are several Windows patches that cannot be loaded onto certain operational networks because they will cause significant issues to the network.

    Therefore, it is crucial when you are looking at securing your operational networks to make sure you are using someone with knowledge and experience with OT and who understands why and how they are different from business networks.


    For help and information about protecting your operational or business network and data systems, contact one of our experts.

    Articles | 07.12.21

    Two CAMS facilities, Calhoun Power and Lincoln Generating Station are recognized leaders in the safety arena. Both sites are Voluntary Protection Program (VPP) Star sites.

    Calhoun Power Company, LLC is a 688-MW dual-fuel simple-cycle generation facility located in Eastaboga, Ala. The plant’s four GE 7FA gas turbine engines generate enough electricity to power over 500,000 homes in the region. The plant is owned by Harbert Power Fund V, LLC and had been operated by CAMS since 2016.
    The Lincoln Generating Facility is a 656-MW natural gas‐fired simple‐cycle facility located southeast of Manhattan, Ill. The plant includes eight GE 7EA Gas Turbines, four of which have black start capability. The plant is owned by Eastern Generation, LLC and has been operated by CAMS since 2016.

    As VPP sites, the Calhoun and Lincoln management teams, site staff, and OSHA work together to prevent fatalities, injuries, and illnesses. A tailored system is implemented that incorporates the key elements of the VPP program:

    • Management Leadership and Employee Involvement
    • Work Site Analysis
    • Hazard Prevention and Control
    • Health and Safety Training

    To participate, a formal application to OSHA is required, followed by a rigorous onsite evaluation by a team of safety and health professionals. VPP participants are re-evaluated every three to five years to remain in the program.

    Calhoun Power

    Mike Carter, Plant Manager at Calhoun Power shares his team’s safety strategies:

    Management Leadership and Employee Involvement

    Buy-in. All site members are involved and understand the importance of buy-in to the safety culture and expectation of safety at all levels. If anyone has an idea to improve a process, the team discusses and decides the next step as a group. If there is a way to improve a task or process, we will do it. Tasks need solid procedures in place. During site orientation, we mention our accomplishment of being a VPP Star site and enforce the need to work safely for the contractors.

    Work Site Analysis

    We are constantly looking to ensure no hidden hazards are in our work area. We discuss daily jobs at each morning meeting and remind each other of the safety hazards for the task to ensure the job will get done safely. We read a portion of the CAMS safety manual at every morning meeting to keep safety fresh on our minds.

    Hazard Prevention and Control

    We are required to conduct one safety meeting a month, instead, we do one each Wednesday. Part of this includes a Hazard Hunt, during which each individual walks the site specifically looking for any hazards and taking action to mitigate potentially unsafe conditions.

    Safety and Health Training

    As with all sites, we are required to conduct specific training, either computer based (GPi), or hands on. Tracking is critical to ensure all personnel receive the training required to maintain the knowledge required for proficiency at daily tasks as well as emergencies. We have emergency procedures for any critical scenario we can think of.

    Lincoln Generating Facility

    The Lincoln Generating Facility program fundamentals include:

    Management Leadership and Employee Involvement

    Management recognizes and accepts the responsibility in leading all employees in maintaining a safe culture at Lincoln Generating Facility. Responsibility for safety and health at Lincoln Generating Facility is assigned in a variety of ways.

    All employees are responsible for the maintenance, housekeeping, and safety of the site. Therefore to assist in the drive of these responsibilities, the site utilizes not only the Safety Committee to lead in these efforts, but also the Safety Promotion and Recognition Program to reward employees for their efforts. Safety is as much an individual’s responsibility as it is a management or company responsibility. All Lincoln Generating Facility employees are expected to leave work in the same physical condition as when they arrived. Therefore, these same employees are responsible to assist in maintaining and improving the sites safety and health programs and are expected to set a safe example for all employees’ contractors and visitors.

    Worksite Analysis

    All job descriptions are developed with safety accountabilities as a primary component. Safety procedures indicate positions that are responsible for activities and/or documentation.

    Job Safety Analysis (JSAs) are developed by the job experts/employees in each area to identify position responsibilities for safe practices. General employee safety responsibilities are stated in the new employee orientation and weekly/ annual safety training at the site. Safety goals and objectives are part of every employee’s performance review.

    Health & Safety Performance Goals & Training

    Lincoln Generating Facility annually sets safety and performance goals for the site. This allows the site to prioritize its Safety, Health, and Training issues and enhances the recognition of safety, as a long-term commitment. All employees are held accountable in reaching performance goals and objectives. These goals and objectives are measured through the employees’ annual performance review process. The annual reviews include areas of safety, quality and productivity.  Safety, Health, and Training programs and goals are communicated on a regular basis with the employees via new employee orientations, daily meetings, postings and employee evaluations.


    Do you need a health and safety assessment? Safety training? Support for Management of Change processes? Learn more about our health and safety services or contact one of our experts today. contact-ancillary-services

    Articles | 06.24.21

    By Matthew Pacobit, Senior Director of Regulatory Affairs

    We have been getting many questions from clients about cybersecurity and the cyberattacks that have been widely reported in recent news. Most clients want to know why these attacks are happening all of a sudden and whether or not their plant is vulnerable.

    To begin, the media may have just started reporting some of these high-profile attacks, but if you read public companies past disclosures, you will find that this has been going on for years. Additionally, cyberattacks have been growing exponentially and with the rise of cryptocurrency, criminals are now able to demand payments that are almost completely untraceable.

    With regards to the vulnerability of clients’ plants, the answer is a bit more complicated and there are a few key points that need to be made clear.

    First, all power plant control systems are vulnerable and there is no such thing as a perfectly secure system. Even systems that are air-gaped are still at risk of transient cyber assets and removable media (laptops, tablets, phones, USBs, etc.).

    Second, power plant control systems are not the same as IT business networks. Plant control systems are made up of many customized components from a wide variety of venders. Some of these components might be off-the-shelf computers, but they cannot be secured using the same solutions as business network computers. I have seen firsthand, a cybersecurity software try to request information from a plant controller on an operation network. The controller interpreted it as an unknown error, failed, and triggered a backup. The software then did the same thing to the backup and took down the entire system.

    Because of the risk to the control system, the CAMS cybersecurity team separates out the business network from the operational network when looking at cybersecurity solutions. Most of our clients currently use CAMS Bluewire Technologies for their business network cybersecurity, however, each operational network is unique. There needs to be a discussion on risk mitigation vs. cost for each control system and each cybersecurity solution. Some control systems can be secured with a firewall or data diode, while others are better off with firewall monitoring and/or whitelisting. Additionally, most power plant control systems have at least some components and software that are older than 5-10 years, so determining the right fit is a personalized process.

    In the end, securing the power plant control system not only reduces the risk of down time but also reduces the risk of equipment damage, making cybersecurity and risk mitigation worth the cost.

    For more information, contact us below.

      First Name*

      Last Name*

      Company*

      Email*

      Articles | 06.08.21

      Picture yourself working as a Solar Operations & Maintenance Service Technician for CAMS Solar Services, LLC.

      CAMS offers a variety of excellent benefits. Full-time employees are offered the following: medical, dental, vision, LTD, STD, and Life insurance plans. You can even select additional “al la carte” benefits to meet all of your needs. You can also enroll in our 401k, flex spending accounts for medical and childcare needs, and participate in our employee referral and tuition reimbursement programs.

      CAMS is hiring a Solar O&M Service Technician in Massachusetts (in the Brockton, Worcester, and/or Southbridge counties). The Solar O&M Service Technician must have knowledge in electrical systems and commercial solar space. They will be responsible for completing service calls, troubleshooting solar site systems and electrical. Must have a strong safety mindset, an excellent work ethic, and good communication and documenting skills.

      Please click here to apply and/or review all of our open positions.

      Qualified applicants must be legally authorized for employment in the United States. Qualified applicants will not require employer sponsored work authorization now or in the future for employment in the United States.