Unlock the Full Potential of AVEVA PI System with a True Expert

Over 25 Years of PI Experience Ensure Your Success

  Initial Architecture and Planning

If you just purchased a PI System or you need to expand the one you have, get started on the right foot with a system designed by someone with 25 years of experience. 

Installation and Upgrades

There are many factors that go into a successful deployment or major upgrade of a PI System. I can help with everything from specifying suitable hardware to discussing security options and best practices.

Rearchitecting and Upgrading

The business landscape changes constantly. Business units are bought and sold, operations are consolidated, and workforces change. If you find yourself with a heterogeneous environment in need of a redesign, choose someone with a proved track record and the necessary experience to properly architect and implement the project.

New Initiatives and Capabilities

The OSIsoft PI System has many newer capabilities. Whether you want to start using the asset-based approach, want to start adding analytics to your system, or need to integrate PI data into your other systems, you need someone who understands how it all fits together.

Enable Your No-Code Engineers

It is important to give your talented engineers the data tools that they need to fully leverage their knowledge. PI AF provides point-and-click tools to do just that, but most companies are not taking full advantage of this. Left to their own devices, engineers often default to using the tools that they already know like Excel. Unfortunately, this relegates them to manual data manipulation. Train your engineers to take full advantage of AF and put them on the path to developing automated solutions that continue to work in the background as they look for the next opportunity to improve your processes.

Data Architecture Development

The PI Asset Framework allows you to arrange and extend your data. If you are just getting started, it can be a bit overwhelming. It helps to have an experienced Data Architect on the team who is already familiar with the PI System and other typical applications used in industrial settings.

af-analysis-config

Recent Aveva OSIsoft PI System Posts

Installing PI Server 2012 RC0 on Windows 2008 R2 Core

By Rob Raesemann | April 29, 2012

It’s always a good day when you check the tech support page at http://techsupport.osisoft.com and see something new that you are interested in. I downloaded the PI Server 2012 Release Candidate yesterday and decided to setup a test VM so that I could play with it. I’m working on a new blog post about my…

PI in the Cloud – aka – “PI in the Sky”

By Rob Raesemann | April 27, 2012

I attended the UC session discussing “The Cloud” and OSIsoft’s mobile efforts. Their engineers have playfully dubbed this “PI in the Sky”. One of the refreshing things about the UC and the overall culture of OSIsoft and their Users Conference philosophy, you see presentations by the very engineers who are building the products. You aren’t…

Pictures from the OSIsoft UC 2010

By Rob Raesemann | March 3, 2011

Here are some pictures that I took of the VEEDIMS technology demo at last year’s user conference. They have developed the technology that allows them to send network signals and power over the same cable which greatly reduces wiring complexity. You simply plug the modules together and power and data flow.   Video…

More on Stuxnet and warnings about the coming worms that will be using the techniques pioneered by the worm

By Rob Raesemann | September 30, 2010

I am posting a few more interesting items on Stuxnet. In addition to the information that I posted yesterday, here are a few more facts. Symantec reports that 60% of the infections have occurred in Iran Fewer than 2% of the infections have occurred in the United States The developers created fake device drivers that were…

Stuxnet virus – fascinating and scary

By Rob Raesemann | September 29, 2010

Today seems to be a cyber security day. I spent some time this morning talking to Brian Owen of OSIsoft about PI architectures and NERC CIP compliance. Later I was looking at Slashdot which eventually led to an interesting blog post by Symantec regarding the Stuxnet virus. There are several interesting aspects to this virus… The virus uses…