Part 2: The Use of Software in Safety Critical Systems

Size: px
Start display at page:

Download "Part 2: The Use of Software in Safety Critical Systems"

Transcription

1 Part 2: The Use of Software in Safety Critical Systems

2 Software Design of Safety-Critical Systems There are three different concerns: Reliability. (Continuous operation. Absence of errors.) Safety. (Avoiding errors, accidents and losses in the general software-user environment). Security. (Defense against deliberate intelligent nonrandom attacks.)

3 Reliability Reliability is the probability that a piece of equipment or component will perform its intended function satisfactorily for a prescribed time and under stipulated environmental conditions. This notion is heavily influenced by thinking in terms of hardware (wear, strain, material failure). Can be increased (for hardware!) by multiple redundancy.

4 Safety Safety is freedom from accidents or losses. This depends not only on the software itself, but on the wider context where and how the software is used. Software does not operate in a vacuum. Designers of safety-critical software systems must be aware of the conditions under which the software will be used.

5 Security Security is the defense against deliberate non-random malicious action. Unlike for safety, multiple redundancy is ineffective. Probability estimates for security are very hard to achieve.

6 Computers and Risk And they looked upon the software, and saw that it was good. But they just had to add this one other feature -G.F. McCormick When Reach Exceeds Grasp Software is ubiquitous; is used to control all kinds of machines and devices. Software + General Purpose Computer Special Purpose Machine. Software has many advantages over traditional electromechanical control devices. BUT: The blessings of software (speed, flexibility) are also its curse.

7 How is software used in safety-critical systems? There are several different ways how software and operators can interact in the control-loop (see also [Ephrath & Young]). 1. Providing information or advice to human controller upon request. 2. Interpreting raw data and displaying results to controller, who makes decisions. 3. Issuing commands directly, but under human monitor and human influence from time to time. 4. Eliminating the human from the control-loop completely.

8 Safety-critical areas out of the control-loop 1. Software-generated data is used to make safety-critical decisions. (E.g., air traffic control, medical analyzers) 2. Software used in design (CAD/CAM) 3. Safety-critical data stored in computer databases (e.g., medical records, blood bank data) Software may be used in environments and conditions that have not been forseen by its designers. Many errors are ultimately caused by communication problems between system designers, software developers and operators.

9 Software Myths and Reality Myth 1. Computers cost less than analog or electromachanical devices. Reality: Microcomputer hardware is cheap, but building and maintaining highly reliable and safe software is not. Even worse, software can be built cheaply, but then causes enormous costs due to accidents, downtime, bug fixing, rewriting, impossibility to extend, etc.

10 Software Myths and Reality Myth 2. Software is easy to change. Reality. It is easy to make changes, but hard to keep the system consistent while doing so. Re-verifying and recertifying can cause enormous costs. Software becomes `brittle as changes are made, thus the danger of introducing new errors increases over the lifetime of the software.

11 Software Myths and Reality Myth 3. Computers provide greater reliability than the devices they replace. Reality. Software as a purely mathematical construct does not fail in the engineering-sense (corrosion, wearout, random failures). Software as pure design fails due to design errors. These are abundant, even in thoroughly tested software that has been in use for a long time.

12 Software Myths and Reality Myth 4. Increasing software reliability will increase safety. Reality. Software reliability can be increased by fixing errors that do not affect safety. Most safety-critical software errors are ultimately due to requirements-specification errors. Software can cause catastrophic failures while doing operating exactly as specified. Safety is not a software property, but a system property. (Or, more generally, a property of a system + its operating environment (documentation, operator training, etc.)).

13 Software Myths and Reality Myth 5. Testing software or proving correctness (by formal verification) can remove all errors. Reality. Exhaustive testing is practically impossible for large systems. Formal verification can only prove that the system satisfies the specified requirements. Many critical software errors are specification errors.

14 Software Myths and Reality Myth 6. Reusing software increases safety. Reality. Reusing software components may increase reliability in some situations, but not necessarily safety. Reuse causes new safety risks. Complacency. Changes in the operating environment. The software was never meant to be used under (or tested for) these conditions. Examples: Therac-20 and Therac-25. US air traffic control software used in the UK. Problems with 0 degrees longitude. Aviation software designed for the northern hemisphere failed in the southern hemisphere. F-16 aircraft used over the dead sea in Israel at an altitude of less than sea level.

15 Software Myths and Reality Myth 7. Computers reduce risk over mechanical systems. Reality. Computers have the potential to reduce risk, but not all uses of computers achieve this potential.

16 Increased Safety by Computers: Pro and Con Pro. Computers allow finer control. Check parameters often; Compute in real time; take action quickly. Con. Processes can (and will) be operated closer to the optimum. Safety margins will be cut.

17 Increased Safety by Computers: Pro and Con Pro. Automated systems allow operators to work farther away from hazardous areas. Con. Lack of familiarity with hazards causes extra danger when operators do have to enter the hazardous areas. Example: Robotic factory without special human-only walkways. Some robot gets stuck twice a day (much more frequently than anticipated). Operators have to go there and fix it. One cannot shut down the whole factory every time. The inevitable happens eventually.

18 Increased Safety by Computers: Pro and Con Pro. By eliminating operators, human errors are eliminated. Con. Operator errors are replaced by design and maintenance errors. Humans are not removed from the system, but shifted to different jobs further away. Thus, they can lose critical information for correct decision making. Do not always trust the explication `human error. It is often used wrongly when the real cause of the accident is either Unknown. Complex and hard to understand. Caused by many factors working together. Inconvenient or embarrassing for manufacturers, governments, management, etc.

19 Increased Safety by Computers: Pro and Con Pro. Computers have the potential to provide better information to operators and thus to improve decision making. Con. Theoretically true, but hard to achieve. Often too much information is provided in a badly structured way. Result: Sensory overload and confusion in a crisis-situation. Some design hints: Rank information according to relevance for safety. Use color and effects in moderation. Use colors, fonts, layout in a logically consistent way. Never ultimately rely on color for information. Some people are color blind. Remember that humans can only keep about 5-6 different things in view/memory at the same time.

20 Increased Safety by Computers: Pro and Con Pro. Software does not fail. Con. Only true for an extremely narrow definition of `failure. Software does not fail due to wearout, strain or corrosion, but due to design errors. Most mechanical systems have a relatively small number of (known) failure modes. Software fails in complex and unforseen ways.

21 The `Curse of Flexibility A project s specification rapidly becomes a wish list. Additions to the list encounter little or no resistance. We can always justify just one more feature, one more mode, one more gee-whiz capability. And don t worry, it ll be easy after all, it is just software. We can do anything. In one stroke we are free of nature s constraints. This freedom is software s main attraction, but unbounded freedom lies at the heart of all software difficulty. -G.F. McCormick When Reach Exceeds Grasp

22 Root Causes of Accidents Overconfidence and Complacency Discounting Risk Overrelying on Redundancy Unrealistic Risk Assessment Ignoring High-Consequence, Low Probability Events Assuming Risk Decreases over Time Underestimating Software-related Risks Ignoring Warning Signs

23 How to Increase Reliability Testing. Formal verification (automatic or semiautomatic). Model checking part of this course. Well-structured software design. ( Chapter 1.) Software should be designed with testing and verification in mind. Extra consistency checks during runtime. Backup servers used to recover from failures and to provide high availability. (Only possible for some types of systems (e.g. telephony switches)).

24 How to Increase Safety Design for the worst case. Ask what is the worst that could happen if the software went completely amok. A simple mechanical interlock might prevent a serious accident. User-friendly interface. Present enough information to the operator. Meaningful error messages. Well-structured and complete documentation. Keeping system logs makes it easier to reproduce errors.

25 How should software handle critical errors? This depends very much on the environment where the software is used. Critical operations that cannot be aborted: Continue best effort (e.g., the Ariane 5 failure). Operations that can be safely aborted: Stop and call for human help. Provide meaningful error messages and system logs (e.g., some robots, chemical plants).

26 References Safeware. System Safety and Computers. N.G. Leveson. Addison-Wesley T.S. Ferry. Safety Program Administration for Engineers and Managers. Charles C. Thomas Publisher, Springfield, Ill., A.R. Ephrath and L.R. Young. Monitoring vs. man-in-theloop detection of aircraft control failures. In Jens Rasmussen and William B. Rouse, editors, Human Detection and Diagnostics of System Failures, pages , Plenum Press, New York, 1981.

Software Safety Basics

Software Safety Basics Software Safety Basics (Herrmann, Ch. 2) 1 Patriot missile defense system failure On February 25, 1991, a Patriot missile defense system operating at Dhahran, Saudi Arabia, during Operation Desert Storm

More information

Pedestrian Struck By Forklift

Pedestrian Struck By Forklift Pedestrian Struck By Forklift Lessons Learned Volume 01 Issue 01 2004 USW Pedestrian Struck By Forklift Purpose To conduct a small group lessons learned activity to share information gained from incident

More information

The Human Side of Test Automation

The Human Side of Test Automation White Paper Silk The Human Side of Test Automation Improving User Experience in an Increasingly Complex Environment White Paper The Human Side of Test Automation Introduction: Human Interaction We ve dreamed

More information

Functional safety. Essential to overall safety

Functional safety. Essential to overall safety Functional safety Essential to overall safety What is Functional safety? In public spaces, factories, offi ces or homes; we are surrounded by an increasing number of electric and electronic devices and

More information

Making it happen IN-HOME NURSING CARE SERVICES. Guidelines for Families

Making it happen IN-HOME NURSING CARE SERVICES. Guidelines for Families Making it happen IN-HOME NURSING CARE SERVICES Guidelines for Families SECTION 1 Introduction...1 SECTION What is nursing care?... How do you determine our child s eligibility for nursing care?... How

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

LSST Hazard Analysis Plan

LSST Hazard Analysis Plan LSST Hazard Analysis Plan Large Synoptic Survey Telescope 950 N. Cherry Avenue Tucson, AZ 85719 www.lsst.org 1. REVISION SUMMARY: Contents 1 Introduction... 5 2 Definition of Terms... 5 2.1 System... 5

More information

Automated Software Testing by: Eli Janssen

Automated Software Testing by: Eli Janssen 1. What is automated testing? Automated Software Testing by: Eli Janssen Automated testing is, much like the name implies, getting the computer to do the remedial work of ensuring that inputs yield expected

More information

COMMON DISASTER RECOVERY PLAN MISCONCEPTIONS

COMMON DISASTER RECOVERY PLAN MISCONCEPTIONS TRUSTED TECHNOLOGY FOR BUSINESS COMMON DISASTER RECOVERY PLAN MISCONCEPTIONS ENSURING YOUR DR PLAN DOES NOT LEAD TO DISASTER Neverfail IT Continuity Engine Whitepaper Charles Street Solutions 28 Throgmorton

More information

Crane Boom Fails, 3 Injured

Crane Boom Fails, 3 Injured Crane Boom Fails, 3 Injured Lessons Learned Volume 04 Issue 16 2004 USW Crane Boom Fails, 3 Injured Purpose To conduct a small group lessons learned activity to share information gained from incident investigations.

More information

What You Should Know About Cloud- Based Data Backup

What You Should Know About Cloud- Based Data Backup What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com

More information

Inductive Reasoning Page 1 of 7. Inductive Reasoning

Inductive Reasoning Page 1 of 7. Inductive Reasoning Inductive Reasoning Page 1 of 7 Inductive Reasoning We learned that valid deductive thinking begins with at least one universal premise and leads to a conclusion that is believed to be contained in the

More information

Mauro Calvano. About Aviation Safety Management Systems

Mauro Calvano. About Aviation Safety Management Systems Mauro Calvano About Aviation Safety Management Systems January 2003 1 INTRODUCTION In order to be aware of the factors that are driving the accident rate during the last decade, we must identify the hazards

More information

Load Testing Basics: These are the basic ideas in setting up a load test By: Bob Wescott

Load Testing Basics: These are the basic ideas in setting up a load test By: Bob Wescott : These are the basic ideas in setting up a load test By: Bob Wescott Summary Load testing requires you to select transactions that are important to you and then synthetically generate them at a rate that

More information

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting petemcbreen@acm.org All rights reserved. You have permission to copy and distribute the document as long as you make no changes

More information

Introduction to Process Control Actuators

Introduction to Process Control Actuators 1 Introduction to Process Control Actuators Actuators are the final elements in a control system. They receive a low power command signal and energy input to amplify the command signal as appropriate to

More information

ARM by Gylling Data Management, Inc. The Software Solution for Your Research Data Needs Website: www.gdmdata.com Email: staff@gdmdata.

ARM by Gylling Data Management, Inc. The Software Solution for Your Research Data Needs Website: www.gdmdata.com Email: staff@gdmdata. ARM by Gylling Data Management, Inc. The Software Solution for Your Research Data Needs Website: www.gdmdata.com Email: staff@gdmdata.com Why Use ARM Software? The ARM is software for establishing, managing,

More information

Where Do I Start With Virtual Desktops?

Where Do I Start With Virtual Desktops? The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...

More information

Process Cutting Heating Assembly Hrs per unit 2 3 4 Total hours available 100,000 120,000 220,000

Process Cutting Heating Assembly Hrs per unit 2 3 4 Total hours available 100,000 120,000 220,000 RELEVANT TO ACCA QUALIFICATION PAPER F5 AND PERFORMANCE OBJECTIVES 12, 13 AND 14 Throughput accounting and the theory of constraints In the previous article, I told you all about The Goal, the book in

More information

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses 2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...

More information

The Therac 25 A case study in safety failure. Therac 25 Background

The Therac 25 A case study in safety failure. Therac 25 Background The Therac 25 A case study in safety failure Radiation therapy machine The most serious computer-related accidents to date People were killed References: Nancy Leveson and Clark Turner, The Investigation

More information

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to

More information

Organizational Requirements Engineering

Organizational Requirements Engineering Chapter 9, Non-functional Requirements Organizational Requirements Engineering Prof. Dr. Armin B. Cremers Sascha Alda Armin B. Cremers, Sascha Alda Organizational Requirements Engineering 1 Overview of

More information

Maximizing return on plant assets

Maximizing return on plant assets Maximizing return on plant assets Manufacturers in nearly every process industry face the need to improve their return on large asset investments. Effectively managing assets, however, requires a wealth

More information

Manufacturing Intelligence By William R. Hays, Engineering Manager - Rainmaker Group

Manufacturing Intelligence By William R. Hays, Engineering Manager - Rainmaker Group Manufacturing Intelligence By William R. Hays, Engineering Manager - Rainmaker Group Introduction While factory floor automation has significantly improved all areas of processing for manufacturing companies,

More information

Understanding Options: Calls and Puts

Understanding Options: Calls and Puts 2 Understanding Options: Calls and Puts Important: in their simplest forms, options trades sound like, and are, very high risk investments. If reading about options makes you think they are too risky for

More information

The Importance of Software License Server Monitoring White Paper

The Importance of Software License Server Monitoring White Paper LicenseMonitor The Importance of Software License Server Monitoring The Importance of Software License Server Monitoring White Paper Introduction In the electronic design automation (EDA) and other CAD

More information

Sources of finance (Or where can we get money from?)

Sources of finance (Or where can we get money from?) Sources of finance (Or where can we get money from?) Why do we need finance? 1. Setting up a business 2. Need to finance our day-to-day activities 3. Expansion 4. Research into new products 5. Special

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

Fisher FIELDVUE Instrumentation Improving Safety Instrumented System Reliability

Fisher FIELDVUE Instrumentation Improving Safety Instrumented System Reliability Fisher FIELDVUE Instrumentation Improving Safety Instrumented System Reliability 2 Improving Safety Instrumented System Reliability Improving Safety Instrumented System Reliability 3 Safety Instrumented

More information

Two-sample inference: Continuous data

Two-sample inference: Continuous data Two-sample inference: Continuous data Patrick Breheny April 5 Patrick Breheny STA 580: Biostatistics I 1/32 Introduction Our next two lectures will deal with two-sample inference for continuous data As

More information

QUICK GUIDE. How to Select an Effective Mobile Workforce Management Solution. How to Select an Effective Mobile Workforce Management Solution

QUICK GUIDE. How to Select an Effective Mobile Workforce Management Solution. How to Select an Effective Mobile Workforce Management Solution QUICK GUIDE How to Select an Effective Mobile Workforce Management Solution 1 How to Select an Effective Mobile Workforce Management Solution This Quick Guide will cover: What a comprehensive Mobile Workforce

More information

STANDARDIZED WORK 2ND SESSION. Art of Lean, Inc. 1 www.artoflean.com

STANDARDIZED WORK 2ND SESSION. Art of Lean, Inc. 1 www.artoflean.com STANDARDIZED WORK 2ND SESSION 1 STANDARDIZED WORK AND WORK STANDARDS - SESSION 2 AIM (1) Understand the Importance of Standardization in TPS (2) Introduce Various Standards Sheets and Basics of Creation

More information

Virtual Career Fair (VCF) Employer Guide Quick Start

Virtual Career Fair (VCF) Employer Guide Quick Start Virtual Career Fair (VCF) Employer Guide Quick Start Employers By clicking on Employers on the VCF home page, you will be taken to the event Directory. From here you will find logos for the various Featured

More information

Self-Improving Supply Chains

Self-Improving Supply Chains Self-Improving Supply Chains Cyrus Hadavi Ph.D. Adexa, Inc. All Rights Reserved January 4, 2016 Self-Improving Supply Chains Imagine a world where supply chain planning systems can mold themselves into

More information

Understanding Device Level Connection Topologies

Understanding Device Level Connection Topologies July 2013 Understanding Device Level Connection Topologies Author: Advantech E-mail: eainfo@advantech.com July 2013 Even ten years ago, most factory floor sensors were connected directly to a PLC or other

More information

PARALLELS CLOUD STORAGE

PARALLELS CLOUD STORAGE PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...

More information

Linear Programming. Solving LP Models Using MS Excel, 18

Linear Programming. Solving LP Models Using MS Excel, 18 SUPPLEMENT TO CHAPTER SIX Linear Programming SUPPLEMENT OUTLINE Introduction, 2 Linear Programming Models, 2 Model Formulation, 4 Graphical Linear Programming, 5 Outline of Graphical Procedure, 5 Plotting

More information

SwiftStack Global Cluster Deployment Guide

SwiftStack Global Cluster Deployment Guide OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read

More information

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when

More information

Delusions are false beliefs that are not part of their real-life. The person keeps on believing his delusions even when other people prove that the be

Delusions are false beliefs that are not part of their real-life. The person keeps on believing his delusions even when other people prove that the be Schizophrenia Schizophrenia is a chronic, severe, and disabling brain disorder which affects the whole person s day-to-day actions, for example, thinking, feeling and behavior. It usually starts between

More information

Elevator Malfunction Anyone Going Down?

Elevator Malfunction Anyone Going Down? Elevator Malfunction Anyone Going Down? Lessons Learned Volume 04 Issue 41 2004 USW Purpose Elevator Malfunction - Anyone Going Down? To conduct a small group lessons learned activity to share information

More information

Software Engineering. Computer Science Tripos 1B Michaelmas 2011. Richard Clayton

Software Engineering. Computer Science Tripos 1B Michaelmas 2011. Richard Clayton Software Engineering Computer Science Tripos 1B Michaelmas 2011 Richard Clayton Critical software Many systems must avoid a certain class of failures with high assurance safety critical systems failure

More information

The Top 3 Common Mistakes Men Make That Blow All Their Chances of Getting Their Ex-Girlfriend Back Which of these mistakes are you making?

The Top 3 Common Mistakes Men Make That Blow All Their Chances of Getting Their Ex-Girlfriend Back Which of these mistakes are you making? The Top 3 Common Mistakes Men Make That Blow All Their Chances of Getting Their Ex-Girlfriend Back Which of these mistakes are you making? By George Karanastasis, M.D. COPYRIGHT NOTICE THIS ELECTRONIC

More information

System Specification. Objectives

System Specification. Objectives System Specification cmsc435-1 Objectives To explain how dependability requirements may be identified by analyzing the risks faced by critical systems To explain how safety requirements are generated from

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year?

Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? MANAGED IT SERVICES Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? A lot of business owners, executives, and managers have a love-hate relationship with managed

More information

Operations & Maintenance 101 Maintenance Strategies and Work Practices to Reduce Costs

Operations & Maintenance 101 Maintenance Strategies and Work Practices to Reduce Costs 2003 Emerson Process Management. All rights reserved. View this and other courses online at www.plantwebuniversity.com. Operations & Maintenance 101 Maintenance Strategies and Work Practices to Reduce

More information

Performance Optimization Guide

Performance Optimization Guide Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.

More information

Incident Investigation Guidelines

Incident Investigation Guidelines Incident Investigation Guidelines Commencement Date: 02 December 2011 Category: Campus Life, Information Management 1. PURPOSE This Incident Investigation Guideline is a guide to completing an incident

More information

Reviewers Guide. Don t Panic - Photo Edition 1

Reviewers Guide. Don t Panic - Photo Edition 1 Don t Panic - Photo Edition Reviewers Guide Don t Panic - Photo Edition 1 Contents What to look for when evaluating photo recovery software... 3-4 Installation... 4 Suggested ways to test Don t Panic...

More information

BLR s Safety Training Presentations

BLR s Safety Training Presentations BLR s Safety Training Presentations Machine Guarding 29 CFR 1910.211 to 1910.219 Machine guarding is an integral part of any safety and health program. As statistics can demonstrate, it is also one aspect

More information

WRITING A CRITICAL ARTICLE REVIEW

WRITING A CRITICAL ARTICLE REVIEW WRITING A CRITICAL ARTICLE REVIEW A critical article review briefly describes the content of an article and, more importantly, provides an in-depth analysis and evaluation of its ideas and purpose. The

More information

KEEPING PATIENT INFORMATION SAFE AND SECURE IN THE CLOUD

KEEPING PATIENT INFORMATION SAFE AND SECURE IN THE CLOUD CASE STUDY Take Cover The costs of exposing or losing patient information can ruin a dental practice. Cloud-based solutions can protect your business and your patients against these threats: Unauthorized

More information

Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects

Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their

More information

Software Testing. Knowledge Base. Rajat Kumar Bal. Introduction

Software Testing. Knowledge Base. Rajat Kumar Bal. Introduction Software Testing Rajat Kumar Bal Introduction In India itself, Software industry growth has been phenomenal. IT field has enormously grown in the past 50 years. IT industry in India is expected to touch

More information

Finding the Right Cloud Solution for Your Business

Finding the Right Cloud Solution for Your Business Finding the Right Cloud Solution for Your Business Overview of Cloud Computing Different Types of Cloud Computing Explained Pros and Cons of Moving to the Cloud Migration Gotchas - How to Have a Seamless

More information

IT SERVICE MANAGEMENT: HOW THE SAAS APPROACH DELIVERS MORE VALUE

IT SERVICE MANAGEMENT: HOW THE SAAS APPROACH DELIVERS MORE VALUE 1 IT Service Management: How the SaaS Approach Delivers More Value IT SERVICE MANAGEMENT: HOW THE SAAS APPROACH DELIVERS MORE VALUE EXECUTIVE SUMMARY Today s companies are very reliant on their technology

More information

Software Engineering. Introduc)on

Software Engineering. Introduc)on Software Engineering Introduc)on Software engineering The economies of ALL developed nations are dependent on software. More and more systems are software controlled Software engineering is concerned with

More information

Dealing with risk. Why is risk management important?

Dealing with risk. Why is risk management important? Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe

More information

Computer Science with Maths

Computer Science with Maths King s Student Perspectives Computer Science with Maths Profir, 1st year Profir is from Chișinău, the capital city of the Republic of Moldova (which is between Romania and Ukraine). He took A levels the

More information

Best Practices for Verification, Validation, and Test in Model- Based Design

Best Practices for Verification, Validation, and Test in Model- Based Design 2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based

More information

A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud

A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud 1 THE HYBRID CLOUD DILEMMA Finding Agility without Adding Fragility Today, businesses have to move fast to stay competitive.

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

CAST Analysis. 2013 John Thomas and Nancy Leveson. All rights reserved.

CAST Analysis. 2013 John Thomas and Nancy Leveson. All rights reserved. CAST Analysis 1 CAST Process Identify the Accident (Loss) Identify the Hazards Identify the Safety Constraints Identify the Proximal Events Draw the Safety Control Structure Analyze each component 2 CAST

More information

Developing software which should never compromise the overall safety of a system

Developing software which should never compromise the overall safety of a system Safety-critical software Developing software which should never compromise the overall safety of a system Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 21 Slide 1 Objectives To introduce

More information

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services STAY PROTECTED WITH OUR BACKUP AND

More information

The Cost and Benefits of On-Demand vs. On-Premise Procurement Software

The Cost and Benefits of On-Demand vs. On-Premise Procurement Software The Cost and Benefits of On-Demand vs. On-Premise Procurement Software A Coupa Executive White Paper Executive Summary Procurement software enables organizations to save time, money, and effort throughout

More information

The Basics of Robot Mazes Teacher Notes

The Basics of Robot Mazes Teacher Notes The Basics of Robot Mazes Teacher Notes Why do robots solve Mazes? A maze is a simple environment with simple rules. Solving it is a task that beginners can do successfully while learning the essentials

More information

REALISTIC THINKING. How to Do It

REALISTIC THINKING. How to Do It REALISTIC THINKING We can all be bogged down by negative thinking from time to time, such as calling ourselves mean names (e.g., idiot, loser ), thinking no one likes us, expecting something, terrible

More information

Walk around and identify the area to be assessed and look at what could reasonably be expected to cause harm.

Walk around and identify the area to be assessed and look at what could reasonably be expected to cause harm. Risk Assessment Introduction The assessment of risk is central to the management of health and safety. The purpose of this is to assist in identifying those measures which are needed to remove or otherwise

More information

Risk management a practical approach

Risk management a practical approach Risk management a practical approach Introduction Preventing work related accidents and injuries is the primary concern for all those involved in health and safety. Work related accidents and injuries

More information

Partial Fractions. Combining fractions over a common denominator is a familiar operation from algebra:

Partial Fractions. Combining fractions over a common denominator is a familiar operation from algebra: Partial Fractions Combining fractions over a common denominator is a familiar operation from algebra: From the standpoint of integration, the left side of Equation 1 would be much easier to work with than

More information

BarTender Version Upgrades. Best practices for updating your BarTender installation WHITE PAPER

BarTender Version Upgrades. Best practices for updating your BarTender installation WHITE PAPER BarTender Version Upgrades Best practices for updating your BarTender installation WHITE PAPER Contents Understanding Version Upgrades 3 Upgrading BarTender to a Newer Version 4 Planning a Version Upgrade

More information

SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007

SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007 SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007 SEMS/NIMS - SYSTEM (ICS) is the model tool for command, control, and coordination of a response and provides a means to coordinate the efforts of individual

More information

Data Loss in a Virtual Environment An Emerging Problem

Data Loss in a Virtual Environment An Emerging Problem Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios

More information

Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks

Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks November 12, 2008 How safe is small business data? As the power of computers continues to grow, more and more of the

More information

Wait-Time Analysis Method: New Best Practice for Performance Management

Wait-Time Analysis Method: New Best Practice for Performance Management WHITE PAPER Wait-Time Analysis Method: New Best Practice for Performance Management September 2006 Confio Software www.confio.com +1-303-938-8282 SUMMARY: Wait-Time analysis allows IT to ALWAYS find the

More information

SPPA-T3000 Control System The Benchmark in Controls

SPPA-T3000 Control System The Benchmark in Controls Instrumentation, Controls & Electrical SPPA-T3000 Control System The Benchmark in Controls Siemens Power & Process Automation Answers for energy. The benchmark for Distributed Control Systems Developed

More information

High Availability White Paper

High Availability White Paper High Availability White Paper This document provides an overview of high availability best practices for mission critical applications. Author: George Quinlan, Senior Consultant Background - High Availability

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems

Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems Simon Brown The author is with the Health & Safety Executive, Magdalen House, Bootle, Merseyside,

More information

Reaping the benefits of Reusable Software Components

Reaping the benefits of Reusable Software Components Safety & Security for the Connected World Reaping the benefits of Reusable Software Components The Significance of FAA Reusable Software Component Certification Mark Pitchford The conflicting demands on

More information

ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS

ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS Abdu Idris Omer Taleb M.M., PhD Majmaah University, Kingdom of Saudia Arabia Abstract This article is aimed to name the levels of industrial automation, describes

More information

In-Flight Mechanics A Software Package Management Conversion Project

In-Flight Mechanics A Software Package Management Conversion Project In-Flight Mechanics A Software Package Management Conversion Project Philip J. Hollenback Yahoo, Inc. Overview Over the course of most of 2009 I acted as the technical lead on a software package management

More information

Tuesday, October 18. Configuration Management (Version Control)

Tuesday, October 18. Configuration Management (Version Control) Tuesday, October 18 Configuration Management (Version Control) How Version Control Works Place the official version of source code into a central repository, or database Programmers check out a working

More information

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises

More information

System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria

System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic

More information

Frequently Asked Questions (FAQ s)

Frequently Asked Questions (FAQ s) Frequently Asked Questions (FAQ s) 1. What is the Internet Modem Server? 2. A fee based service? Why do I have to pay to program DoorKing systems? 3. How s does the Internet Modem Server work? 4. What

More information

GETTING BACKUP AND DISASTER RECOVERY WHEN AND WHERE YOU NEED IT

GETTING BACKUP AND DISASTER RECOVERY WHEN AND WHERE YOU NEED IT GETTING BACKUP AND DISASTER RECOVERY WHEN AND WHERE YOU NEED IT CONTENTS EXECUTIVE SUMMARY... 7 ABOUT STORAGECRAFT... 8 BACKUP FAST, RECOVER FASTER... 9 THE DEPTH OF DISASTER RECOVERY... 10 THE BREADTH

More information

MANAGING THE RISKS OF CHANGE

MANAGING THE RISKS OF CHANGE MANAGING THE RISKS OF CHANGE Dr Andrew Brazier, Consultant www.andybrazier.co.uk andy.brazier@gmail.com þ 44 7984 284642 The process industry has always had to deal with changes to plant and equipment,

More information

10 Hidden IT Risks That Threaten Your Financial Services Firm

10 Hidden IT Risks That Threaten Your Financial Services Firm Your firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your business without IT. Today,

More information

IF The customer should receive priority service THEN Call within 4 hours PCAI 16.4

IF The customer should receive priority service THEN Call within 4 hours PCAI 16.4 Back to Basics Backward Chaining: Expert System Fundamentals By Dustin Huntington Introduction Backward chaining is an incredibly powerful yet widely misunderstood concept, yet it is key to building many

More information

Setting up a website: key considerations.

Setting up a website: key considerations. Setting up a website: key considerations. Supporting you on your business journey. If your business is going to trade online, then you ll already be thinking about your website. But even if you re not

More information

SYSTEMIC FACTORS IN SOFTWARE-RELATED SPACECRAFT ACCIDENTS

SYSTEMIC FACTORS IN SOFTWARE-RELATED SPACECRAFT ACCIDENTS SYSTEMIC FACTORS IN SOFTWARE-RELATED SPACECRAFT ACCIDENTS Prof. Nancy G. Leveson Aeronautics and Astronautics Dept. Massachusetts Institute of Technology leveson@mit.edu and http://sunnyday.mit.edu AIAA

More information

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility

More information

alternative collection

alternative collection 01 technical this article considers two methods a company could adopt in order to speed up the collection of cash from its customers. Additionally, worked examples show how these methods can be evaluated

More information

Lab - Dual Boot - Vista & Windows XP

Lab - Dual Boot - Vista & Windows XP Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain

More information

Realize your full potential with the new version of SIMATIC PCS 7

Realize your full potential with the new version of SIMATIC PCS 7 Version 8.1 Realize your full potential with the new version of SIMATIC PCS 7 Performance you trust siemens.com/simatic-pcs7 Answers for industry. More than 70 new features, new possibilities: SIMATIC

More information

Do Your IT Housekeeping with UC4 Workload Automation Suite

Do Your IT Housekeeping with UC4 Workload Automation Suite Do Your IT Housekeeping with UC4 Workload Automation Suite Introduction This document describes how to keep the increasing complexity of data centers in check by means of IT housekeeping specifically,

More information