1 PHENIX WEEKLY PLANNING July 30, 2015 C. Biggs. 2 This Week Continue MPC & MPC-Ex repairs 1. Finish...
24
1 PHENIX WEEKLY PLANNING July 30, 2015 C. Biggs
1 PHENIX WEEKLY PLANNING July 30, 2015 C. Biggs. 2 This Week Continue MPC & MPC-Ex repairs 1. Finish up MPC crystal work Continue work on VTX/FVTX East
2 This Week Continue MPC & MPC-Ex repairs 1. Finish up MPC
crystal work Continue work on VTX/FVTX East Prep Hall for Summer
Sunday Fold down East Carriage Wings Start De-cabling TEC
Racks
Slide 3
3 Next Week Remove dance floor from Summer Sunday Test all MPC
Crystals in 510 Re-install crystals in 1008 Continue Working on
VTX/FVTX in 510 Continue De-cabling of TEC
Slide 4
8/15/2015 4 510 Work Fizzo VTX East MPC-Ex Test
Slide 5
8/15/2015 5 Your s-PHENIX Design Team (God Help Us!!) Mad
Rich!! Spencer Chrispy Faking Work
Slide 6
8/15/2015 6 Summer Sunday Dance Floor
Slide 7
2015 SHUTDOWN SHEDULE June 19 th End of Run Party JUNE 22 ND
END OF RUN June 23 rd Roll out Shield Wall June 25 30 Remove Shield
Wall June 24 - 29 Pixel Testing on VTX (Chuck, Eric) July 1 Remove
Collars, Move South Magnet south July 2 July 6 Disconnect &
roll out East Carriage July 6 7 Setup up IR for shut down work July
6 10 De-Cable & remove East VTX/FVTX, move to 510 July 9 th
Erect Scaffold between south and central magnets July 10 th Set up
MPC-ex sled July 13 16 Remove MPC-ex south, MPC South Crystals July
14 21 De-Cable & remove West VTX/FVTX, move to 510 July 17 Aug
7 Repairs and upgrades to MPC-ex and MPC south in 510 July 17 Sept
21 Repairs to East VTX/FVTX in 510 July 17 - Oct 19 Repairs to
VTX/FVTX West in 510 July 29 Deliver and set up Dance Floor for
Summer Sunday July 31 Start to fold down East Carriage wings Aug 2
SUMMER SUNDAY @ PHENIX
Slide 8
2015 SHUTDOWN SCHEDULE (cont.)
Slide 9
SPHENIX BI-WEEKLY PROJECT STATUS MEETING 9 July 30, 2015 Don
Lynch
Slide 10
WBS Revised On Project and Off/Pre Project tasks separated, but
still linked sPHENIX New collaboration forming New Spokesperson to
be named soon Good turnout for Simulation Fest This week at SUNYSB
Magnet Meeting Yesterday Prep for Nov sPHENIX Cost and Schedule
Review draft agenda created. Potential speakers IDd Prep for this
review and the spring test beam need to be our top priorities for
the next months. Instructions to be sent out in the next few days
or so. Very important to schedule the practices for the review
(expect 2 practices in October) July 30, 2015 Don Lynch 10
Slide 11
SPHENIX MAGNET UPDATE Meeting yesterday: Magnet to be rotated
next Monday Paul G. & Piyush J to measure strain gauges
tomorrow and during rotation on Monday Next up platform railing for
valve box, valve box leak check, install valve box support and
prepare for valvebox installation Valvebox leak check procedure
needs signoffs, then to P. Cirnigliaro for work permit which should
be completed by Aug 10 Only purchase delay is He piping mod. Expect
this to take 10 weeks including Cryo group prep so low field test
looks like sometime in November. Arc flash calculation done,
Roberto T. will calculate if end cap weld will hold up Stress
calculations for cooldown and full power lead to confusing
conclusions. More work needed in this area. John H. discussed
Pasquale and Co. doing FEA under a consulting agreement. July 30,
2015 Don Lynch 11
Slide 12
July 30, 2015 12 Inner & Outer HCAL Prototype Updates 7/27
(Monday) Chris Manning spoke w/ Strecks; they have received
material and will start machining soon Central shops were supposed
to start the aluminum endplates Wednesday Water Jet machine broke
down, needed a few new parts, which have since been installed.
Endplates should be on the machine by end of the week. 2 new CNC
machines are being setup inside the shops, Chris has indicated that
they plan on using these machines to make our Inner HCAL absorber
plates. We need to begin the process of reserving the 510 High Bay
space for assembly purposes.
Slide 13
INNER HCAL ASSEMBLY July 30, 2015 Don Lynch 13 Anatoli and Dan
are working on the Inner Hcal Assembly Fixtures and Tools
Slide 14
Performance Prototype Degrees of Freedom 14 8/15/2015 +/- 10
DEGREES
Slide 15
SPHENIX EMCAL UPDATE July 30, 2015 Don Lynch 15 Work is
progressing on the EMCal 2D projective module Sean and Spencer are
working on the fabrication techniques Work continues at THP and
UIUC (See INDICO for more info)
Slide 16
8/15/2015 D. Lynch, R. Ruggiero, A. Gordeev, D. Cacace16
sPHENIX Inner H-Cal Assembly Fixture and Support Structure
Slide 17
8/15/2015 D. Lynch, R. Ruggiero, A. Gordeev, D. Cacace 17
Slide 18
8/15/2015 18
Slide 19
8/15/2015 19
Slide 20
8/15/2015 20
Slide 21
8/15/2015 21
Slide 22
8/15/2015 22 The following summary/information is from Kevin
Brown regarding cyber security: In the past few months a number of
news items have highlighted a variety of cyber security attacks and
security breaches. It is important for us to remain diligent and
not let our guard down. Here are a few recent incidents that show
how vulnerable we can be. On July 9th, an Argonne National
Laboratory web site was hacked and defaced by pro-ISIS hackers. On
July 7th, an LBNL website was defaced. Groups associated with ISIS
have been attacking NATO country websites (so any.gov website is a
target).
https://www.hackread.com/pro-isis-hackers-us-dept-of-energy/https://www.hackread.com/pro-isis-hackers-us-dept-of-energy/
These attacks were not complicated. The attackers looked for files
on the website ending with a ~ character. Files with these
characters are backup versions of main files, automatically saved
by various editors (such as Joomla, Wordpress, emacs, etc.). In the
case of the LBNL website defacement, the attackers found a file
called "configuration.php~", which contained, in unencrypted plain
ascii text, a username and password used to login to Joomla. This
highlights how attackers look for the weakest/easiest targets first
to gain easy access to systems. While in these two cases no
sensitive data was stolen, the incidents are an embarrassment,
especially given they would have been so easy to prevent. In two
more serious incidents announced in late May, attackers breached
the U.S. Office of Personnel Management (OPM) computer systems,
stealing close to 25 million records from Federal background
investigations. Up to 21.5 million individual social security
numbers, and over 1 million fingerprints were stolen in this
breach. The following summary/information is from Kevin Brown
regarding cyber security: In the past few months a number of news
items have highlighted a variety of cyber security attacks and
security breaches. It is important for us to remain diligent and
not let our guard down. Here are a few recent incidents that show
how vulnerable we can be. On July 9th, an Argonne National
Laboratory web site was hacked and defaced by pro-ISIS hackers. On
July 7th, an LBNL website was defaced. Groups associated with ISIS
have been attacking NATO country websites (so any.gov website is a
target). https://www.hackread.com/pro-isis-hackers-us-dept-
of-energy/https://www.hackread.com/pro-isis-hackers-us-dept-
of-energy/ These attacks were not complicated. The attackers looked
for files on the website ending with a ~ character. Files with
these characters are backup versions of main files, automatically
saved by various editors (such as Joomla, Wordpress, emacs, etc.).
In the case of the LBNL website defacement, the attackers found a
file called "configuration.php~", which contained, in unencrypted
plain ascii text, a username and password used to login to Joomla.
This highlights how attackers look for the weakest/easiest targets
first to gain easy access to systems. While in these two cases no
sensitive data was stolen, the incidents are an embarrassment,
especially given they would have been so easy to prevent. In two
more serious incidents announced in late May, attackers breached
the U.S. Office of Personnel Management (OPM) computer systems,
stealing close to 25 million records from Federal background
investigations. Up to 21.5 million individual social security
numbers, and over 1 million fingerprints were stolen in this
breach. From Ray Karol:
Slide 23
8/15/2015 23 This breach occurred because the systems the
hackers gained access to did not use secure http protocols. OPM
announced a number of cybersecurity actions and recommendations in
a report released in June.
https://www.opm.gov/news/latest-news/announcements/cybersecurity-report/
What is particularly troubling is hackers are now exploiting this
incident and sending phishing emails to government employees
(again, anyone with a.gov in their email, so even contractors could
be targets) claiming to be OPM notifications. This has actually
held up OPMs efforts to send out notifications.
http://www.zdnet.com/article/phishing-e-mail-temporarily-stops-opm-hack-
remediation-efforts/http://www.zdnet.com/article/phishing-e-mail-temporarily-stops-opm-hack-
remediation-efforts/ DOE is responding to issues raised by the OPM
incident. We have already seen changes, with the main BNL websites
using secure http protocols (note: these changes were already being
implemented prior to the incident, so ITD was able to roll them out
very quickly after the incident.) More DOE ordered changes are
coming soon to strengthen our cyber security practices and to
protect BNL servers and information. This is good time to remind
ourselves of BNL policies and best practices. There is a lot of
information on ITD's cyber security website:
http://intranet0.bnl.gov/cybersecurity/ You can review BNL policies
at http://www0.bnl.gov/cybersecurity/policies/ For C-AD, local
policies are captured in the OPM, so please review OPM 1.30 and OPM
1.30.1-5: http://www.c-ad.bnl.gov/esshq/snd/opm/Ch01/01-30.PDF
Slide 24
24 WHERE TO FIND PHENIX ENGINEERING INFO
http://www.phenix.bnl.gov/WWW/INTEGRATION/ME&Integration/DRL_SSint-
page.htm Doug Fields in 20 Years