• Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF

      Secure PDF Files

      Secure PDF files include digital rights management (DRM) software. DRM is included at the request of the publisher, as it helps them protect their copyright by restricting file sharing. In order to read a Secure PDF, you will need to install the FileOpen Plug-In on your computer. The FileOpen Plug-In works with Adobe Reader and other viewers. Visit FileOpen to see the full list.

        What you can do with a Secure PDF:
      • Print
      • Search
      • Highlight
      • Bookmark
      Please note that some publishers - including BOMA, IADC and ICML - do not allow printing of their documents.

    • 👥
    • Immediate download
    • $113.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $113.00
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $191.00
    • Add to Cart

Customers Who Bought This Also Bought


About This Item


Full Description

Provides a compendium of methodologies and considerations for integrating the underlying data used to support integrity management. Any one approach may not be appropriate or applicable in all circumstances. The document reviews possible approaches for consideration by operators in the context of their specific circumstances.

The primary focus of this bulletin is the methodologies and processes used to spatially integrate and normalize the data to support the application of comparative techniques used in interpreting integrity data, with particular emphasis on in-line inspection (ILI) data. The bulletin begins with a discussion of general data quality processes, goals, and considerations such that data quality approaches can be considered in the context of the data integration processes.

An impediment to informed integrity decisions is the inability to efficiently review a broad spectrum of data in a format that has been normalized and spatially aligned. With the variations in organizational structures, integrity management programs, and technologies used across the pipeline sector, individual operators design data integration procedures that are customized to their organizational structure, processes, and pipeline systems.

Properly managed and integrated data supports agile analytics to integrate new data as they become available and to recognize coincident events and patterns. The source of the data may be from within an organization or may be external to the company, as in the case of representative data based on industry experience or manufacturing processes. The intent is to empower operators to efficiently analyze and integrate threat- and integrity-related data to support their integrity management programs.