For a quantity of hydrocarbons to be classified as reserves the decision must be made that the accumulation will be developed and put into production within a reasonable timeframe. The reserves are divided into two groups, proven and unproven reserves. In turn, the unproven reserves are divided into probable and possible reserves. Proved reserves 1P Proved reserves are those quantities of petroleum which can be estimated with reasonable certainty more than 90 percent to be commercially recoverable from known reservoirs and under current economic conditions and operating methods.
If deterministic methods are used, the term reasonable certainty is intended to express a high degree of confidence that the quantities will be recovered. If probabilistic methods are used there should be at least 90 percent probaility that the quantities actually recovered will equal or exceed the estimates. Probable reserves 2P Probable reserves are those unproved reserves which are more likely than not to be commercial recoverable under current or future economic conditions.
Possible reserves 3P Possible reserves are reserves that are less likely to be available for extraction. Other quantities are designated as resources. All estimates of resources and reserves involve a certain degree of uncertainty, which is primarily due to the geological data available at the time of appraisal and the interpretation of this data.
Resources are therefore divided into various categories depending on the relative uncertainty that exists. If either of these occur, the goal is to contain the effects and maintain complete control over all productive and administrative processes at all sites.
Why do so many companies in your industry use versiondog? Invest 30 minutes to find out how versiondog can significantly increase safety, certainty and security in your production facility. Book your demonstration now. How to use cyberattacks to increase security. In order to systematically detect and defend against hacker attacks on industrial targets, socalled honeypots scenarios are often used.
In many of these, false pots of honey are left out in the open and the real pots of honey—valuable data, software and hardware—are protected as a result.
A good example of a false pot of honey in an industrial environment is a data-routing network switch. In this article, we take a closer look at how this could theoretically work in an operational production facility. Read more about "How to use cyberattacks to increase security". A process control system supports production, but what supports the process control system? One of the main challenges in establishing a successful market presence in the process industry is effectively mastering production processes and continuous automation.