24
1 PHENIX WEEKLY PLANNING July 30, 2015 C. Biggs

1 PHENIX WEEKLY PLANNING July 30, 2015 C. Biggs. 2 This Week Continue MPC & MPC-Ex repairs 1. Finish up MPC crystal work Continue work on VTX/FVTX East

Embed Size (px)

Citation preview

  • Slide 1
  • 1 PHENIX WEEKLY PLANNING July 30, 2015 C. Biggs
  • Slide 2
  • 2 This Week Continue MPC & MPC-Ex repairs 1. Finish up MPC crystal work Continue work on VTX/FVTX East Prep Hall for Summer Sunday Fold down East Carriage Wings Start De-cabling TEC Racks
  • Slide 3
  • 3 Next Week Remove dance floor from Summer Sunday Test all MPC Crystals in 510 Re-install crystals in 1008 Continue Working on VTX/FVTX in 510 Continue De-cabling of TEC
  • Slide 4
  • 8/15/2015 4 510 Work Fizzo VTX East MPC-Ex Test
  • Slide 5
  • 8/15/2015 5 Your s-PHENIX Design Team (God Help Us!!) Mad Rich!! Spencer Chrispy Faking Work
  • Slide 6
  • 8/15/2015 6 Summer Sunday Dance Floor
  • Slide 7
  • 2015 SHUTDOWN SHEDULE June 19 th End of Run Party JUNE 22 ND END OF RUN June 23 rd Roll out Shield Wall June 25 30 Remove Shield Wall June 24 - 29 Pixel Testing on VTX (Chuck, Eric) July 1 Remove Collars, Move South Magnet south July 2 July 6 Disconnect & roll out East Carriage July 6 7 Setup up IR for shut down work July 6 10 De-Cable & remove East VTX/FVTX, move to 510 July 9 th Erect Scaffold between south and central magnets July 10 th Set up MPC-ex sled July 13 16 Remove MPC-ex south, MPC South Crystals July 14 21 De-Cable & remove West VTX/FVTX, move to 510 July 17 Aug 7 Repairs and upgrades to MPC-ex and MPC south in 510 July 17 Sept 21 Repairs to East VTX/FVTX in 510 July 17 - Oct 19 Repairs to VTX/FVTX West in 510 July 29 Deliver and set up Dance Floor for Summer Sunday July 31 Start to fold down East Carriage wings Aug 2 SUMMER SUNDAY @ PHENIX
  • Slide 8
  • 2015 SHUTDOWN SCHEDULE (cont.)
  • Slide 9
  • SPHENIX BI-WEEKLY PROJECT STATUS MEETING 9 July 30, 2015 Don Lynch
  • Slide 10
  • WBS Revised On Project and Off/Pre Project tasks separated, but still linked sPHENIX New collaboration forming New Spokesperson to be named soon Good turnout for Simulation Fest This week at SUNYSB Magnet Meeting Yesterday Prep for Nov sPHENIX Cost and Schedule Review draft agenda created. Potential speakers IDd Prep for this review and the spring test beam need to be our top priorities for the next months. Instructions to be sent out in the next few days or so. Very important to schedule the practices for the review (expect 2 practices in October) July 30, 2015 Don Lynch 10
  • Slide 11
  • SPHENIX MAGNET UPDATE Meeting yesterday: Magnet to be rotated next Monday Paul G. & Piyush J to measure strain gauges tomorrow and during rotation on Monday Next up platform railing for valve box, valve box leak check, install valve box support and prepare for valvebox installation Valvebox leak check procedure needs signoffs, then to P. Cirnigliaro for work permit which should be completed by Aug 10 Only purchase delay is He piping mod. Expect this to take 10 weeks including Cryo group prep so low field test looks like sometime in November. Arc flash calculation done, Roberto T. will calculate if end cap weld will hold up Stress calculations for cooldown and full power lead to confusing conclusions. More work needed in this area. John H. discussed Pasquale and Co. doing FEA under a consulting agreement. July 30, 2015 Don Lynch 11
  • Slide 12
  • July 30, 2015 12 Inner & Outer HCAL Prototype Updates 7/27 (Monday) Chris Manning spoke w/ Strecks; they have received material and will start machining soon Central shops were supposed to start the aluminum endplates Wednesday Water Jet machine broke down, needed a few new parts, which have since been installed. Endplates should be on the machine by end of the week. 2 new CNC machines are being setup inside the shops, Chris has indicated that they plan on using these machines to make our Inner HCAL absorber plates. We need to begin the process of reserving the 510 High Bay space for assembly purposes.
  • Slide 13
  • INNER HCAL ASSEMBLY July 30, 2015 Don Lynch 13 Anatoli and Dan are working on the Inner Hcal Assembly Fixtures and Tools
  • Slide 14
  • Performance Prototype Degrees of Freedom 14 8/15/2015 +/- 10 DEGREES
  • Slide 15
  • SPHENIX EMCAL UPDATE July 30, 2015 Don Lynch 15 Work is progressing on the EMCal 2D projective module Sean and Spencer are working on the fabrication techniques Work continues at THP and UIUC (See INDICO for more info)
  • Slide 16
  • 8/15/2015 D. Lynch, R. Ruggiero, A. Gordeev, D. Cacace16 sPHENIX Inner H-Cal Assembly Fixture and Support Structure
  • Slide 17
  • 8/15/2015 D. Lynch, R. Ruggiero, A. Gordeev, D. Cacace 17
  • Slide 18
  • 8/15/2015 18
  • Slide 19
  • 8/15/2015 19
  • Slide 20
  • 8/15/2015 20
  • Slide 21
  • 8/15/2015 21
  • Slide 22
  • 8/15/2015 22 The following summary/information is from Kevin Brown regarding cyber security: In the past few months a number of news items have highlighted a variety of cyber security attacks and security breaches. It is important for us to remain diligent and not let our guard down. Here are a few recent incidents that show how vulnerable we can be. On July 9th, an Argonne National Laboratory web site was hacked and defaced by pro-ISIS hackers. On July 7th, an LBNL website was defaced. Groups associated with ISIS have been attacking NATO country websites (so any.gov website is a target). https://www.hackread.com/pro-isis-hackers-us-dept-of-energy/https://www.hackread.com/pro-isis-hackers-us-dept-of-energy/ These attacks were not complicated. The attackers looked for files on the website ending with a ~ character. Files with these characters are backup versions of main files, automatically saved by various editors (such as Joomla, Wordpress, emacs, etc.). In the case of the LBNL website defacement, the attackers found a file called "configuration.php~", which contained, in unencrypted plain ascii text, a username and password used to login to Joomla. This highlights how attackers look for the weakest/easiest targets first to gain easy access to systems. While in these two cases no sensitive data was stolen, the incidents are an embarrassment, especially given they would have been so easy to prevent. In two more serious incidents announced in late May, attackers breached the U.S. Office of Personnel Management (OPM) computer systems, stealing close to 25 million records from Federal background investigations. Up to 21.5 million individual social security numbers, and over 1 million fingerprints were stolen in this breach. The following summary/information is from Kevin Brown regarding cyber security: In the past few months a number of news items have highlighted a variety of cyber security attacks and security breaches. It is important for us to remain diligent and not let our guard down. Here are a few recent incidents that show how vulnerable we can be. On July 9th, an Argonne National Laboratory web site was hacked and defaced by pro-ISIS hackers. On July 7th, an LBNL website was defaced. Groups associated with ISIS have been attacking NATO country websites (so any.gov website is a target). https://www.hackread.com/pro-isis-hackers-us-dept- of-energy/https://www.hackread.com/pro-isis-hackers-us-dept- of-energy/ These attacks were not complicated. The attackers looked for files on the website ending with a ~ character. Files with these characters are backup versions of main files, automatically saved by various editors (such as Joomla, Wordpress, emacs, etc.). In the case of the LBNL website defacement, the attackers found a file called "configuration.php~", which contained, in unencrypted plain ascii text, a username and password used to login to Joomla. This highlights how attackers look for the weakest/easiest targets first to gain easy access to systems. While in these two cases no sensitive data was stolen, the incidents are an embarrassment, especially given they would have been so easy to prevent. In two more serious incidents announced in late May, attackers breached the U.S. Office of Personnel Management (OPM) computer systems, stealing close to 25 million records from Federal background investigations. Up to 21.5 million individual social security numbers, and over 1 million fingerprints were stolen in this breach. From Ray Karol:
  • Slide 23
  • 8/15/2015 23 This breach occurred because the systems the hackers gained access to did not use secure http protocols. OPM announced a number of cybersecurity actions and recommendations in a report released in June. https://www.opm.gov/news/latest-news/announcements/cybersecurity-report/ What is particularly troubling is hackers are now exploiting this incident and sending phishing emails to government employees (again, anyone with a.gov in their email, so even contractors could be targets) claiming to be OPM notifications. This has actually held up OPMs efforts to send out notifications. http://www.zdnet.com/article/phishing-e-mail-temporarily-stops-opm-hack- remediation-efforts/http://www.zdnet.com/article/phishing-e-mail-temporarily-stops-opm-hack- remediation-efforts/ DOE is responding to issues raised by the OPM incident. We have already seen changes, with the main BNL websites using secure http protocols (note: these changes were already being implemented prior to the incident, so ITD was able to roll them out very quickly after the incident.) More DOE ordered changes are coming soon to strengthen our cyber security practices and to protect BNL servers and information. This is good time to remind ourselves of BNL policies and best practices. There is a lot of information on ITD's cyber security website: http://intranet0.bnl.gov/cybersecurity/ You can review BNL policies at http://www0.bnl.gov/cybersecurity/policies/ For C-AD, local policies are captured in the OPM, so please review OPM 1.30 and OPM 1.30.1-5: http://www.c-ad.bnl.gov/esshq/snd/opm/Ch01/01-30.PDF
  • Slide 24
  • 24 WHERE TO FIND PHENIX ENGINEERING INFO http://www.phenix.bnl.gov/WWW/INTEGRATION/ME&Integration/DRL_SSint- page.htm Doug Fields in 20 Years