RSC Colour: Primary Blue

  • Visualization layer

    The visualization layer is the part of an industrial or enterprise software stack that transforms raw or processed data into graphical views that humans can easily interpret. It typically sits on top of data sources such as MES, ERP, historians, OT systems, or data warehouses and focuses on presentation rather than storage or complex computation.

    In manufacturing and regulated environments, the visualization layer commonly includes dashboards, reports, real-time status boards, and analytic views that display information such as production status, work-in-progress, OEE, nonconformance trends, maintenance status, quality metrics, and supply chain indicators. It may be implemented through dedicated visualization tools, embedded reporting modules in MES/ERP, SCADA HMIs, or browser-based operations intelligence platforms.

    Key characteristics

    • Presentation-focused: Converts underlying data and KPIs into charts, graphs, alerts, and interactive screens, rather than performing primary control or heavy data processing.
    • Data-source agnostic: Can pull from multiple systems such as MES, ERP, QMS, LIMS, PLM, historians, and IoT platforms, often through APIs or data integration layers.
    • Role-specific views: Supports different perspectives for operators, supervisors, quality engineers, planners, and leadership, often via configurable dashboards and permissions.
    • Near real-time updates: In OT and MES contexts, often refreshes frequently so users can monitor equipment state, line performance, alarms, and exceptions.
    • Limited write-back: Some visualization layers are read-only; others allow limited interactions such as acknowledging alarms, adding comments, or triggering workflows in underlying systems.

    Operational context in manufacturing

    • On the shop floor: Andon boards, line status displays, and station-level HMIs that visualize machine state, takt time adherence, defect counts, or work instructions.
    • In quality and compliance: Dashboards for nonconformance rates, CAPA cycle times, audit findings, and inspection results, often sourced from MES, QMS, or SPC systems.
    • In planning and supply chain: Views of material availability, work order progress, shortages, and supplier on-time performance, typically fed by ERP and MES.
    • In performance management: KPI boards tracking OEE, downtime categories, throughput, and scrap, used in daily standups and continuous improvement reviews.

    Relationship to other layers

    The visualization layer is often distinguished from:

    • Data acquisition and control layers: PLCs, DCS, and low-level SCADA functions that directly interact with equipment and signals.
    • Application logic layers: MES, QMS, ERP, or workflow engines that implement business rules, sequencing, and approvals.
    • Data storage and integration layers: Databases, historians, data lakes, and integration middleware that store and move data between systems.

    In many architectures, the visualization layer consumes curated, contextualized data from these layers rather than connecting to all raw sources directly.

    Common confusion

    • Visualization layer vs. MES/QMS: An MES or QMS may include dashboards, but the system itself is not only a visualization layer. The visualization layer is specifically the presentation component, which may sit inside or outside those systems.
    • Visualization layer vs. HMI: HMIs are operator interfaces tightly coupled to specific machines or lines. A broader visualization layer often aggregates data from many assets and systems and serves multiple roles beyond local machine control.
    • Visualization layer vs. data warehouse or historian: Data warehouses and historians store and organize data; the visualization layer reads from them and renders it for human use.

    Use in regulated environments

    In regulated operations, the visualization layer is often used to monitor quality indicators, traceability coverage, backlog of reviews or approvals, and audit-relevant metrics. While it may surface compliance-related information and evidence, formal records and audit trails usually reside in underlying transactional systems and their databases, not in the visualization layer itself.

  • What is the ISA-95 MES model?

    The ISA-95 MES model is a set of standards (ISA-95 / IEC 62264) that define how manufacturing operations management, including MES, should be structured and interfaced between business systems (such as ERP) and plant-floor control systems (such as SCADA, DCS, and PLCs). It provides a reference model for roles, functions, and data flows, not a specific software product or implementation.

    Core idea: a structured layer between ERP and control systems

    ISA-95 describes a layered architecture for industrial systems:

    • Level 4: Business planning and logistics (ERP, APS, high-level scheduling).
    • Level 3: Manufacturing operations management (often implemented via MES and related systems).
    • Levels 0–2: Process sensing, control, and supervision (PLCs, DCS, SCADA, historians).

    The “MES model” is essentially the Level 3 portion: how production, quality, inventory, and maintenance operations are managed, and how information should flow between Level 3 and the levels above and below.

    Key components of the ISA-95 MES model

    Within Level 3, ISA-95 groups manufacturing operations into four major domains:

    • Production operations management: Dispatching production, tracking WIP, enforcing routes and operations, collecting production data, and managing exceptions such as holds or rework.
    • Quality operations management: Managing test plans, sampling, inspection execution, data collection, basic analysis, and managing quality records and disposition decisions.
    • Inventory operations management: Managing material movements, locations, status, lot and batch tracking, and consumption against orders.
    • Maintenance operations management: Managing work orders, basic asset status, and maintenance-related information that interacts with production.

    The model defines what information these domains exchange with each other, and with ERP and control systems. This is documented through information models and object types such as material definitions, equipment, personnel, production schedules, and production performance.

    What the ISA-95 MES model is not

    In regulated, long-lifecycle environments, it is important to be clear about boundaries:

    • It is not a ready-made MES specification or RFP checklist, although it informs many RFPs.
    • It does not guarantee interoperability between vendors. Two systems that both claim “ISA-95 compliant” can still require significant custom integration and mapping.
    • It does not define your validation strategy. It provides structures and interfaces you can use, but you still need to design and document validation, testing, and change control around your chosen implementation.
    • It does not replace your existing ERP, control systems, or QMS. It describes how they should logically interact.

    How it helps in brownfield environments

    Most regulated plants have a brownfield landscape: legacy MES, multiple ERPs, homegrown interfaces, and long-qualified equipment. In that context, the ISA-95 MES model is mainly useful as a shared reference for:

    • Defining boundaries: Clarifying which functions belong in MES vs ERP vs SCADA, reducing scope creep and duplicated logic.
    • Integration design: Using ISA-95 object types and message patterns as a template when designing interfaces and data models, even if the underlying protocols and formats differ.
    • Incremental modernization: Phasing in MES capabilities function-by-function (for example, starting with production tracking, then quality data collection), mapped against the ISA-95 model instead of attempting a full system replacement.
    • Vendor evaluation: Comparing how different vendors cover production, quality, inventory, and maintenance operations, and where gaps or overlaps with existing systems will occur.

    Because full replacement strategies can be high-risk in regulated settings, many organizations use the ISA-95 MES model to guide coexistence and migration plans rather than as a trigger for a complete rip-and-replace of MES or ERP.

    Constraints and tradeoffs in using the ISA-95 MES model

    Applying the ISA-95 MES model in a real plant comes with several practical constraints:

    • Interpretation differences: Vendors, integrators, and internal teams often interpret the model differently. Clear, documented decisions about scope and responsibilities are required.
    • Data readiness: The model assumes reasonably clean structures for materials, equipment, personnel, and routes. Many plants need non-trivial data preparation and governance work for ISA-95-based integrations to be reliable.
    • Integration debt: Existing point-to-point interfaces may not align cleanly with ISA-95 objects or messages. Harmonization usually requires staged refactoring and may impact validation, testing, and cutover planning.
    • Validation and traceability: In regulated environments, adopting ISA-95-aligned integrations still demands documented requirements, design specifications, test protocols, and traceability from business rules to implemented logic.
    • Long equipment lifecycles: Older PLCs, DCSs, and proprietary interfaces might not support modern messaging patterns. You may need intermediate gateways or data hubs to approximate ISA-95 data exchanges.

    How this typically shows up in MES projects

    In concrete MES programs, the ISA-95 model is often used to:

    • Define the Level 3 scope of a MES implementation (for example, “we will cover production operations and parts of quality operations in this phase”).
    • Specify interfaces between MES and ERP (such as order download, material master synchronization, and production response messages) using ISA-95 categories.
    • Structure master data (for example, how to represent equipment hierarchies, personnel roles, and material definitions) in a way that many tools and vendors understand.
    • Support multi-plant standardization by aligning site MES capabilities and naming conventions to a common model while still allowing local variations driven by equipment or regulatory differences.

    None of this happens automatically. Benefit from the ISA-95 MES model depends heavily on how rigorously a plant or enterprise translates the conceptual standard into practical specifications, configurations, and validated integrations.

  • How does ISO 22400 handle cross-functional KPIs like OEE?

    ISO 22400 provides standardized definitions and calculation structures for manufacturing KPIs, including Overall Equipment Effectiveness (OEE), but it does not by itself solve the cross-functional and cross-system challenges around how OEE is governed, implemented, or interpreted in a real plant.

    What ISO 22400 actually defines for OEE

    ISO 22400 treats OEE as an equipment and operations performance indicator and focuses on:

    • Terminology for availability, performance, and quality components.
    • Calculation logic for OEE and related indicators (e.g., availability rate, output, scrap).
    • Input data categories (e.g., planned time, unplanned downtime, speed losses, rejects).
    • Relationships between KPIs, making it easier to compare and aggregate data across equipment and plants.

    In other words, ISO 22400 gives you a common language and reference for how OEE should be computed on the shop floor, which can reduce ambiguity between operations, engineering, and IT.

    Limits for cross-functional, business-level use

    Cross-functional KPIs like OEE usually span production, maintenance, quality, and finance. ISO 22400 supports this indirectly, but it does not fully address:

    • Business ownership and governance: The standard does not say who owns OEE, how disputes are resolved, or how frequently rules can change.
    • Financial reconciliation: It does not prescribe how OEE should tie to standard costing, absorbed overhead, or financial reporting.
    • Cross-site comparability: It standardizes formulas but does not force sites to use identical operating policies, loss models, or shift patterns.
    • Regulatory interpretation: It does not address how OEE is used or evidenced in audits, nor how it interacts with validated systems.

    As a result, two plants can both claim to use ISO 22400 and still produce OEE numbers that are not directly comparable if the underlying classifications, routing assumptions, or shift rules differ.

    Interaction with brownfield MES/ERP/QMS environments

    In most regulated, long-lifecycle factories, OEE already exists in some form inside MES, historian, spreadsheets, or custom reports. Applying ISO 22400 in that reality typically means:

    • Mapping existing data to ISO 22400 definitions: Unplanned vs planned stops, minor stops, setup, rework, and scrap categories often do not align cleanly and require explicit mapping.
    • Reconciling multiple OEE calculations: MES, line-side tools, and corporate BI platforms may each compute different variants. ISO 22400 can be used as the reference definition, but you must decide which system is authoritative.
    • Managing system coexistence: Fully replacing KPI logic inside validated MES/ERP stacks with an ISO 22400-only approach is uncommon due to qualification burden, downtime risk, and integration cost. A more realistic path is to standardize definitions and then incrementally align existing systems.
    • Validating changes: Any change to KPI calculations in GxP or aerospace environments typically requires documented impact assessment, change control, test evidence, and traceability back to requirements. ISO 22400 can be cited as a requirement source, but does not replace validation.

    How it supports cross-functional KPIs in practice

    Where ISO 22400 helps with cross-functional KPIs like OEE is in providing a structured, shared reference for how the metric is defined. Practically, that often looks like:

    • Using ISO 22400 as the canonical definition in internal KPI standards and governance documents, then configuring MES and analytics accordingly.
    • Documenting deviations: When plant realities require modified formulas (e.g., treatment of setup, inspection, or rework), those deviations are documented against the ISO 22400 baseline so that leadership understands why site-level OEE differs.
    • Enabling multi-discipline review: Operations, maintenance, quality, and finance can review KPI logic against a neutral standard rather than debating custom definitions.
    • Supporting vendor alignment: When buying or upgrading MES/OEE tools, ISO 22400 terms give you a neutral reference to ask how vendors compute each component and where their assumptions differ.

    Key tradeoffs and pitfalls

    When attempting to “implement ISO 22400 OEE” as a cross-functional KPI, typical issues include:

    • Loss of local nuance: Forcing every line and plant into a rigid interpretation can hide important context, especially in high-mix, low-volume or regulated flows with frequent changeovers and inspections.
    • Misalignment with existing reports: Once you adopt ISO 22400 definitions, legacy OEE numbers and targets are no longer equivalent. Targets, incentives, and historical trends may need to be reset or re-baselined.
    • Partial implementation: Plants may adopt the label “OEE” and cite ISO 22400 without actually aligning data structures or classification, leading to false confidence and confusing leadership comparisons.
    • Overextension: Using OEE as a proxy for everything (labor efficiency, yield, schedule adherence) stretches the metric beyond what ISO 22400 defines. It is an equipment-centric metric, not a complete business performance indicator.

    Practical approach for regulated and long-lifecycle environments

    A pragmatic way to use ISO 22400 for cross-functional KPIs like OEE is:

    1. Adopt ISO 22400 as the reference specification for KPI definitions, but explicitly list where your plant deviates and why.
    2. Align data models over time across MES, historians, and analytics instead of attempting a single cutover, to reduce downtime and validation impact.
    3. Define ownership and governance for OEE rules (who can change definitions, how changes are reviewed, and how impacts to KPIs used in management reviews are assessed).
    4. Verify and validate calculations with engineered test cases and traceable evidence, especially where KPIs impact regulatory reporting, customer commitments, or incentive plans.
    5. Keep OEE in its lane as an operational metric and complement it with other ISO 22400 KPIs (e.g., utilization, NPT-related indicators) and financial metrics for a full view.

    Used this way, ISO 22400 does not eliminate the hard cross-functional work, but it reduces ambiguity and provides a common technical starting point for aligning OEE in complex, brownfield manufacturing environments.

  • assessment and authorization (A&A)

    Assessment and authorization (A&A) is a formal, documented process used to evaluate the security and privacy controls of an information system and decide whether that system is approved to operate. It is widely used in government and regulated environments, and is often aligned with frameworks such as NIST SP 800-53.

    What assessment and authorization includes

    In most programs, A&A encompasses:

    • Assessment: Planning and performing an evidence-based review of implemented controls (technical, physical, and administrative) to determine whether they are correctly implemented, operating as intended, and producing the desired security and privacy outcomes.
    • Authorization: A risk-based decision by an authorizing official (or designated authority) to approve, conditionally approve, or reject system operation based on the assessment results and documented residual risks.

    The output typically includes an assessment report, a risk or security posture summary, and an authorization decision with defined terms, conditions, and review cycles.

    Use in industrial and manufacturing environments

    In industrial and manufacturing contexts, A&A is applied to information systems and operational technology (OT) that handle production data, quality records, configuration data, or regulated product information. Examples include:

    • Manufacturing execution systems (MES) and plant historians that store batch, genealogy, or traceability data.
    • Industrial control systems and SCADA platforms that interface with regulated production lines.
    • Integrated OT/IT environments where plant systems connect to enterprise ERP, quality, or supplier portals handling controlled technical data.

    For organizations working with U.S. federal agencies or handling controlled unclassified information, A&A activities are often aligned with programs such as FISMA, FedRAMP, or CMMC, which reference NIST SP 800-53 control baselines.

    Operational characteristics

    Practically, an A&A process commonly includes:

    • System categorization and definition of system boundaries.
    • Selection and tailoring of applicable security and privacy controls.
    • Implementation of controls and collection of objective evidence.
    • Independent or designated assessment of control effectiveness.
    • Documentation of findings, risks, and remediation plans.
    • Formal authorization decision with periodic re-assessment or continuous monitoring.

    In manufacturing operations, evidence may include configuration records, change control logs, access management records, network diagrams, backup and recovery test results, and monitoring or incident records relevant to production systems.

    Common confusion

    A&A vs. certification: A&A is a process and decision framework used within broader regulatory or contractual programs. It is not itself a certification and does not guarantee compliance to a particular standard. Instead, it uses control catalogs (such as NIST SP 800-53) as inputs to a documented risk decision.

    A&A vs. routine audits: Routine internal audits or inspections may feed evidence into an A&A, but A&A culminates in a formal authorization decision about whether a system is allowed to operate under defined conditions.

  • KPI store

    A KPI store is a centralized data layer, database, or service that is dedicated to calculating, storing, and serving key performance indicators (KPIs) in a consistent way across an organization. In industrial and manufacturing environments, it is commonly implemented as part of an operations intelligence, MES, or data platform architecture.

    Core characteristics

    A KPI store typically includes:

    • Standardized KPI definitions with agreed formulas, time bases, and filters (for example, a single definition of OEE, NPT, or yield).
    • Pre-calculated metrics at common grains such as shift, line, work center, asset, product, or work order.
    • Historical retention of KPI values for trend analysis, benchmarking, and audit support.
    • Programmatic access through APIs, queries, or analytic tools so that dashboards, reports, and MES or ERP screens all pull from the same values.
    • Data lineage and traceability that connect KPIs back to underlying event, production, quality, or transactional data.

    The KPI store may be implemented in a data warehouse, data lakehouse, time-series database, or as KPI-focused tables within an MES or historian, as long as it acts as the designated source of truth for KPI values.

    Operational usage in manufacturing

    In regulated or complex manufacturing, a KPI store commonly supports:

    • Shop-floor visibility by feeding consistent KPIs to operator boards, andon systems, and daily management reviews.
    • Management reporting on OEE, throughput, scrap, rework, schedule adherence, and other operational metrics across plants or value streams.
    • Quality and compliance monitoring through standardized defect, NCR, CAPA, and COPQ-related indicators.
    • Cross-system alignment so that MES, ERP, QMS, and BI tools all use the same KPI values and definitions, reducing reconciliation effort.

    What it is not

    A KPI store is not:

    • Raw data storage only. It is more than a simple data lake or historian; it focuses on curated, computed indicators.
    • Just a dashboard tool. Visualization tools may consume data from the KPI store but do not replace the store itself.
    • A full MES or ERP. Those systems generate events and transactional data; the KPI store organizes and standardizes metrics derived from that data.

    Common confusion

    • KPI store vs data warehouse: A data warehouse holds broad subject-area data, whereas a KPI store is scoped to standardized metrics (sometimes implemented as a layer inside the warehouse).
    • KPI store vs historian: A historian captures high-frequency time-series data from equipment; a KPI store typically uses aggregated or processed data, often including non-OT sources such as ERP and QMS.
  • privacy controls

    Privacy controls are organizational and technical measures used to manage how personal and other sensitive data is collected, processed, stored, transmitted, shared, and deleted. In industrial and regulated manufacturing environments, they apply to data about employees, contractors, suppliers, customers, and sometimes data embedded in product or equipment records.

    What privacy controls include

    Privacy controls commonly refer to:

    • Policies and procedures that define acceptable collection, use, retention, and disclosure of personal data, including HR, visitor, supplier, and engineering-related records.
    • Technical mechanisms such as access controls, data minimization features, audit logging, pseudonymization, and anonymization in IT and OT systems.
    • Data lifecycle safeguards covering data classification, retention schedules, archival, and secure deletion of personal information from MES, ERP, QMS, maintenance, and historian systems.
    • Transparency and consent mechanisms like notices, acknowledgments, and records of data processing activities related to individuals.
    • Role-based controls that limit who in operations, quality, maintenance, or engineering can view or modify personal or sensitive records.
    • Governance and oversight such as privacy risk assessments, vendor assessments, and periodic reviews of how personal data flows through manufacturing and enterprise systems.

    Operational meaning in manufacturing and industrial systems

    In manufacturing contexts, privacy controls show up in everyday operations, for example:

    • Limiting who can see detailed operator performance data in MES or OEE dashboards, especially when it identifies individuals.
    • Restricting access to HR records used for training qualifications, badging, or shift scheduling that integrate with MES, access control, or safety systems.
    • Managing visitor and contractor information collected for site access, safety briefings, or tool tracking.
    • Controlling how supplier contact details or personally identifiable information (PII) in engineering documentation is stored and shared across PLM, ERP, and document management systems.
    • Ensuring logs and audit trails that contain user identifiers are retained and shared only as needed for security, quality investigations, and compliance.

    Relationship to security and NIST SP 800-53

    Privacy controls are related to, but distinct from, security controls. Security controls focus on protecting information and systems from unauthorized access, alteration, or loss. Privacy controls focus on how information about identifiable individuals is collected and used, and on limiting unnecessary or unexpected processing.

    In frameworks such as NIST SP 800-53, privacy controls are organized into specific control families, including those focused on personally identifiable information (PII) processing and transparency. In regulated manufacturing, these controls must be interpreted for HR, supplier, and engineering data flows, and aligned with applicable privacy laws and internal security controls.

    Common confusion

    • Privacy controls vs security controls: Security controls protect data in general, while privacy controls specifically govern how personal and identifiable data is handled. Many mechanisms, such as access control and encryption, support both.
    • Privacy controls vs confidentiality: Confidentiality focuses on preventing unauthorized disclosure. Privacy controls also cover collection, purpose limitation, retention, and transparency to individuals, not only keeping data secret.

    Connection to regulated environments

    In regulated industries, privacy controls are typically applied alongside quality, safety, and cybersecurity requirements. Organizations commonly document how personal data appears in manufacturing systems, define who can access it, and establish procedures for handling subject access requests, corrections, or deletion within the constraints of record retention and regulatory evidence requirements.

  • Baseline Metrics

    Baseline metrics are the initial, agreed set of measurements used to quantify current performance before any planned change, improvement initiative, or system implementation. They provide a reference point to compare against future measurements so that changes in performance can be objectively assessed.

    What baseline metrics include

    In industrial operations and regulated manufacturing environments, baseline metrics commonly refer to:

    • Operational performance values, such as throughput, cycle time, OEE, uptime, yield, or scrap rate, recorded over a defined period before a change.
    • Quality and compliance indicators, such as defect rates, deviation counts, batch rejection rates, or audit findings.
    • Process and system measures, such as data latency between MES and ERP, manual entry error rates, or number of paper-based records.

    The key characteristic is that they describe the “current state” in a consistent, documented way prior to a project, improvement program, or new control strategy.

    How baseline metrics are used operationally

    Baseline metrics typically appear in workflows such as:

    • Continuous improvement and lean projects: used to quantify the starting point for initiatives focused on reducing waste, NPT, or COPQ.
    • System implementations (for example MES, quality management systems, or data historians): used to assess whether post go-live performance differs from pre-go-live performance.
    • Regulatory and quality programs: used to demonstrate that changes to validated processes or equipment are monitored and that any impact on critical quality attributes is measured.
    • Risk and safety management: used to compare incident rates, near-misses, or nonconformances before and after risk controls are introduced.

    Operationally, baseline metrics are usually defined in measurement plans, project charters, or validation protocols, with clear details about data sources, calculation methods, time windows, and responsible owners.

    What baseline metrics are not

    • They are not targets or goals. Targets describe desired future performance, while baseline metrics describe the current measured state.
    • They are not necessarily permanent. Baselines can be updated after major process or product changes, as long as the change and rationale are documented.
    • They are not limited to a single KPI. A baseline is often a small set of metrics covering safety, quality, delivery, cost, and compliance, depending on the scope.

    Common confusion

    • Baseline metrics vs. key performance indicators (KPIs): KPIs are the selected measures considered most important to the business or process. Baseline metrics are the initial values of those measures (and sometimes additional ones) at a defined point in time.
    • Baseline metrics vs. control limits: Control limits in statistical process control are calculated boundaries used to detect special cause variation. Baseline metrics are the observed performance values themselves, not the statistical limits around them.

    Example in a manufacturing context

    Before implementing a new electronic batch record system, a site may establish baseline metrics such as:

    • Average batch release lead time over the last 6 months.
    • Number of documentation-related deviations per 1,000 batches.
    • Percentage of manual data entries requiring correction.

    These baseline metrics are then compared with the same metrics after the system is implemented to assess impact on performance, quality, and compliance workflows.