Part 2: The Use of Software in Safety Critical Systems
|
|
- Sharyl Payne
- 7 years ago
- Views:
Transcription
1 Part 2: The Use of Software in Safety Critical Systems
2 Software Design of Safety-Critical Systems There are three different concerns: Reliability. (Continuous operation. Absence of errors.) Safety. (Avoiding errors, accidents and losses in the general software-user environment). Security. (Defense against deliberate intelligent nonrandom attacks.)
3 Reliability Reliability is the probability that a piece of equipment or component will perform its intended function satisfactorily for a prescribed time and under stipulated environmental conditions. This notion is heavily influenced by thinking in terms of hardware (wear, strain, material failure). Can be increased (for hardware!) by multiple redundancy.
4 Safety Safety is freedom from accidents or losses. This depends not only on the software itself, but on the wider context where and how the software is used. Software does not operate in a vacuum. Designers of safety-critical software systems must be aware of the conditions under which the software will be used.
5 Security Security is the defense against deliberate non-random malicious action. Unlike for safety, multiple redundancy is ineffective. Probability estimates for security are very hard to achieve.
6 Computers and Risk And they looked upon the software, and saw that it was good. But they just had to add this one other feature -G.F. McCormick When Reach Exceeds Grasp Software is ubiquitous; is used to control all kinds of machines and devices. Software + General Purpose Computer Special Purpose Machine. Software has many advantages over traditional electromechanical control devices. BUT: The blessings of software (speed, flexibility) are also its curse.
7 How is software used in safety-critical systems? There are several different ways how software and operators can interact in the control-loop (see also [Ephrath & Young]). 1. Providing information or advice to human controller upon request. 2. Interpreting raw data and displaying results to controller, who makes decisions. 3. Issuing commands directly, but under human monitor and human influence from time to time. 4. Eliminating the human from the control-loop completely.
8 Safety-critical areas out of the control-loop 1. Software-generated data is used to make safety-critical decisions. (E.g., air traffic control, medical analyzers) 2. Software used in design (CAD/CAM) 3. Safety-critical data stored in computer databases (e.g., medical records, blood bank data) Software may be used in environments and conditions that have not been forseen by its designers. Many errors are ultimately caused by communication problems between system designers, software developers and operators.
9 Software Myths and Reality Myth 1. Computers cost less than analog or electromachanical devices. Reality: Microcomputer hardware is cheap, but building and maintaining highly reliable and safe software is not. Even worse, software can be built cheaply, but then causes enormous costs due to accidents, downtime, bug fixing, rewriting, impossibility to extend, etc.
10 Software Myths and Reality Myth 2. Software is easy to change. Reality. It is easy to make changes, but hard to keep the system consistent while doing so. Re-verifying and recertifying can cause enormous costs. Software becomes `brittle as changes are made, thus the danger of introducing new errors increases over the lifetime of the software.
11 Software Myths and Reality Myth 3. Computers provide greater reliability than the devices they replace. Reality. Software as a purely mathematical construct does not fail in the engineering-sense (corrosion, wearout, random failures). Software as pure design fails due to design errors. These are abundant, even in thoroughly tested software that has been in use for a long time.
12 Software Myths and Reality Myth 4. Increasing software reliability will increase safety. Reality. Software reliability can be increased by fixing errors that do not affect safety. Most safety-critical software errors are ultimately due to requirements-specification errors. Software can cause catastrophic failures while doing operating exactly as specified. Safety is not a software property, but a system property. (Or, more generally, a property of a system + its operating environment (documentation, operator training, etc.)).
13 Software Myths and Reality Myth 5. Testing software or proving correctness (by formal verification) can remove all errors. Reality. Exhaustive testing is practically impossible for large systems. Formal verification can only prove that the system satisfies the specified requirements. Many critical software errors are specification errors.
14 Software Myths and Reality Myth 6. Reusing software increases safety. Reality. Reusing software components may increase reliability in some situations, but not necessarily safety. Reuse causes new safety risks. Complacency. Changes in the operating environment. The software was never meant to be used under (or tested for) these conditions. Examples: Therac-20 and Therac-25. US air traffic control software used in the UK. Problems with 0 degrees longitude. Aviation software designed for the northern hemisphere failed in the southern hemisphere. F-16 aircraft used over the dead sea in Israel at an altitude of less than sea level.
15 Software Myths and Reality Myth 7. Computers reduce risk over mechanical systems. Reality. Computers have the potential to reduce risk, but not all uses of computers achieve this potential.
16 Increased Safety by Computers: Pro and Con Pro. Computers allow finer control. Check parameters often; Compute in real time; take action quickly. Con. Processes can (and will) be operated closer to the optimum. Safety margins will be cut.
17 Increased Safety by Computers: Pro and Con Pro. Automated systems allow operators to work farther away from hazardous areas. Con. Lack of familiarity with hazards causes extra danger when operators do have to enter the hazardous areas. Example: Robotic factory without special human-only walkways. Some robot gets stuck twice a day (much more frequently than anticipated). Operators have to go there and fix it. One cannot shut down the whole factory every time. The inevitable happens eventually.
18 Increased Safety by Computers: Pro and Con Pro. By eliminating operators, human errors are eliminated. Con. Operator errors are replaced by design and maintenance errors. Humans are not removed from the system, but shifted to different jobs further away. Thus, they can lose critical information for correct decision making. Do not always trust the explication `human error. It is often used wrongly when the real cause of the accident is either Unknown. Complex and hard to understand. Caused by many factors working together. Inconvenient or embarrassing for manufacturers, governments, management, etc.
19 Increased Safety by Computers: Pro and Con Pro. Computers have the potential to provide better information to operators and thus to improve decision making. Con. Theoretically true, but hard to achieve. Often too much information is provided in a badly structured way. Result: Sensory overload and confusion in a crisis-situation. Some design hints: Rank information according to relevance for safety. Use color and effects in moderation. Use colors, fonts, layout in a logically consistent way. Never ultimately rely on color for information. Some people are color blind. Remember that humans can only keep about 5-6 different things in view/memory at the same time.
20 Increased Safety by Computers: Pro and Con Pro. Software does not fail. Con. Only true for an extremely narrow definition of `failure. Software does not fail due to wearout, strain or corrosion, but due to design errors. Most mechanical systems have a relatively small number of (known) failure modes. Software fails in complex and unforseen ways.
21 The `Curse of Flexibility A project s specification rapidly becomes a wish list. Additions to the list encounter little or no resistance. We can always justify just one more feature, one more mode, one more gee-whiz capability. And don t worry, it ll be easy after all, it is just software. We can do anything. In one stroke we are free of nature s constraints. This freedom is software s main attraction, but unbounded freedom lies at the heart of all software difficulty. -G.F. McCormick When Reach Exceeds Grasp
22 Root Causes of Accidents Overconfidence and Complacency Discounting Risk Overrelying on Redundancy Unrealistic Risk Assessment Ignoring High-Consequence, Low Probability Events Assuming Risk Decreases over Time Underestimating Software-related Risks Ignoring Warning Signs
23 How to Increase Reliability Testing. Formal verification (automatic or semiautomatic). Model checking part of this course. Well-structured software design. ( Chapter 1.) Software should be designed with testing and verification in mind. Extra consistency checks during runtime. Backup servers used to recover from failures and to provide high availability. (Only possible for some types of systems (e.g. telephony switches)).
24 How to Increase Safety Design for the worst case. Ask what is the worst that could happen if the software went completely amok. A simple mechanical interlock might prevent a serious accident. User-friendly interface. Present enough information to the operator. Meaningful error messages. Well-structured and complete documentation. Keeping system logs makes it easier to reproduce errors.
25 How should software handle critical errors? This depends very much on the environment where the software is used. Critical operations that cannot be aborted: Continue best effort (e.g., the Ariane 5 failure). Operations that can be safely aborted: Stop and call for human help. Provide meaningful error messages and system logs (e.g., some robots, chemical plants).
26 References Safeware. System Safety and Computers. N.G. Leveson. Addison-Wesley T.S. Ferry. Safety Program Administration for Engineers and Managers. Charles C. Thomas Publisher, Springfield, Ill., A.R. Ephrath and L.R. Young. Monitoring vs. man-in-theloop detection of aircraft control failures. In Jens Rasmussen and William B. Rouse, editors, Human Detection and Diagnostics of System Failures, pages , Plenum Press, New York, 1981.
Software Safety Basics
Software Safety Basics (Herrmann, Ch. 2) 1 Patriot missile defense system failure On February 25, 1991, a Patriot missile defense system operating at Dhahran, Saudi Arabia, during Operation Desert Storm
More informationPedestrian Struck By Forklift
Pedestrian Struck By Forklift Lessons Learned Volume 01 Issue 01 2004 USW Pedestrian Struck By Forklift Purpose To conduct a small group lessons learned activity to share information gained from incident
More informationThe Human Side of Test Automation
White Paper Silk The Human Side of Test Automation Improving User Experience in an Increasingly Complex Environment White Paper The Human Side of Test Automation Introduction: Human Interaction We ve dreamed
More informationFunctional safety. Essential to overall safety
Functional safety Essential to overall safety What is Functional safety? In public spaces, factories, offi ces or homes; we are surrounded by an increasing number of electric and electronic devices and
More informationMaking it happen IN-HOME NURSING CARE SERVICES. Guidelines for Families
Making it happen IN-HOME NURSING CARE SERVICES Guidelines for Families SECTION 1 Introduction...1 SECTION What is nursing care?... How do you determine our child s eligibility for nursing care?... How
More informationNetwork Design Best Practices for Deploying WLAN Switches
Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone
More informationLSST Hazard Analysis Plan
LSST Hazard Analysis Plan Large Synoptic Survey Telescope 950 N. Cherry Avenue Tucson, AZ 85719 www.lsst.org 1. REVISION SUMMARY: Contents 1 Introduction... 5 2 Definition of Terms... 5 2.1 System... 5
More informationAutomated Software Testing by: Eli Janssen
1. What is automated testing? Automated Software Testing by: Eli Janssen Automated testing is, much like the name implies, getting the computer to do the remedial work of ensuring that inputs yield expected
More informationCOMMON DISASTER RECOVERY PLAN MISCONCEPTIONS
TRUSTED TECHNOLOGY FOR BUSINESS COMMON DISASTER RECOVERY PLAN MISCONCEPTIONS ENSURING YOUR DR PLAN DOES NOT LEAD TO DISASTER Neverfail IT Continuity Engine Whitepaper Charles Street Solutions 28 Throgmorton
More informationCrane Boom Fails, 3 Injured
Crane Boom Fails, 3 Injured Lessons Learned Volume 04 Issue 16 2004 USW Crane Boom Fails, 3 Injured Purpose To conduct a small group lessons learned activity to share information gained from incident investigations.
More informationWhat You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com
More informationInductive Reasoning Page 1 of 7. Inductive Reasoning
Inductive Reasoning Page 1 of 7 Inductive Reasoning We learned that valid deductive thinking begins with at least one universal premise and leads to a conclusion that is believed to be contained in the
More informationMauro Calvano. About Aviation Safety Management Systems
Mauro Calvano About Aviation Safety Management Systems January 2003 1 INTRODUCTION In order to be aware of the factors that are driving the accident rate during the last decade, we must identify the hazards
More informationLoad Testing Basics: These are the basic ideas in setting up a load test By: Bob Wescott
: These are the basic ideas in setting up a load test By: Bob Wescott Summary Load testing requires you to select transactions that are important to you and then synthetically generate them at a rate that
More informationUsing Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting
Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting petemcbreen@acm.org All rights reserved. You have permission to copy and distribute the document as long as you make no changes
More informationIntroduction to Process Control Actuators
1 Introduction to Process Control Actuators Actuators are the final elements in a control system. They receive a low power command signal and energy input to amplify the command signal as appropriate to
More informationARM by Gylling Data Management, Inc. The Software Solution for Your Research Data Needs Website: www.gdmdata.com Email: staff@gdmdata.
ARM by Gylling Data Management, Inc. The Software Solution for Your Research Data Needs Website: www.gdmdata.com Email: staff@gdmdata.com Why Use ARM Software? The ARM is software for establishing, managing,
More informationWhere Do I Start With Virtual Desktops?
The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...
More informationProcess Cutting Heating Assembly Hrs per unit 2 3 4 Total hours available 100,000 120,000 220,000
RELEVANT TO ACCA QUALIFICATION PAPER F5 AND PERFORMANCE OBJECTIVES 12, 13 AND 14 Throughput accounting and the theory of constraints In the previous article, I told you all about The Goal, the book in
More informationIf you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses
2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...
More informationThe Therac 25 A case study in safety failure. Therac 25 Background
The Therac 25 A case study in safety failure Radiation therapy machine The most serious computer-related accidents to date People were killed References: Nancy Leveson and Clark Turner, The Investigation
More information5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to
More informationOrganizational Requirements Engineering
Chapter 9, Non-functional Requirements Organizational Requirements Engineering Prof. Dr. Armin B. Cremers Sascha Alda Armin B. Cremers, Sascha Alda Organizational Requirements Engineering 1 Overview of
More informationMaximizing return on plant assets
Maximizing return on plant assets Manufacturers in nearly every process industry face the need to improve their return on large asset investments. Effectively managing assets, however, requires a wealth
More informationManufacturing Intelligence By William R. Hays, Engineering Manager - Rainmaker Group
Manufacturing Intelligence By William R. Hays, Engineering Manager - Rainmaker Group Introduction While factory floor automation has significantly improved all areas of processing for manufacturing companies,
More informationUnderstanding Options: Calls and Puts
2 Understanding Options: Calls and Puts Important: in their simplest forms, options trades sound like, and are, very high risk investments. If reading about options makes you think they are too risky for
More informationThe Importance of Software License Server Monitoring White Paper
LicenseMonitor The Importance of Software License Server Monitoring The Importance of Software License Server Monitoring White Paper Introduction In the electronic design automation (EDA) and other CAD
More informationSources of finance (Or where can we get money from?)
Sources of finance (Or where can we get money from?) Why do we need finance? 1. Setting up a business 2. Need to finance our day-to-day activities 3. Expansion 4. Research into new products 5. Special
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationFisher FIELDVUE Instrumentation Improving Safety Instrumented System Reliability
Fisher FIELDVUE Instrumentation Improving Safety Instrumented System Reliability 2 Improving Safety Instrumented System Reliability Improving Safety Instrumented System Reliability 3 Safety Instrumented
More informationTwo-sample inference: Continuous data
Two-sample inference: Continuous data Patrick Breheny April 5 Patrick Breheny STA 580: Biostatistics I 1/32 Introduction Our next two lectures will deal with two-sample inference for continuous data As
More informationQUICK GUIDE. How to Select an Effective Mobile Workforce Management Solution. How to Select an Effective Mobile Workforce Management Solution
QUICK GUIDE How to Select an Effective Mobile Workforce Management Solution 1 How to Select an Effective Mobile Workforce Management Solution This Quick Guide will cover: What a comprehensive Mobile Workforce
More informationSTANDARDIZED WORK 2ND SESSION. Art of Lean, Inc. 1 www.artoflean.com
STANDARDIZED WORK 2ND SESSION 1 STANDARDIZED WORK AND WORK STANDARDS - SESSION 2 AIM (1) Understand the Importance of Standardization in TPS (2) Introduce Various Standards Sheets and Basics of Creation
More informationVirtual Career Fair (VCF) Employer Guide Quick Start
Virtual Career Fair (VCF) Employer Guide Quick Start Employers By clicking on Employers on the VCF home page, you will be taken to the event Directory. From here you will find logos for the various Featured
More informationSelf-Improving Supply Chains
Self-Improving Supply Chains Cyrus Hadavi Ph.D. Adexa, Inc. All Rights Reserved January 4, 2016 Self-Improving Supply Chains Imagine a world where supply chain planning systems can mold themselves into
More informationUnderstanding Device Level Connection Topologies
July 2013 Understanding Device Level Connection Topologies Author: Advantech E-mail: eainfo@advantech.com July 2013 Even ten years ago, most factory floor sensors were connected directly to a PLC or other
More informationPARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...
More informationLinear Programming. Solving LP Models Using MS Excel, 18
SUPPLEMENT TO CHAPTER SIX Linear Programming SUPPLEMENT OUTLINE Introduction, 2 Linear Programming Models, 2 Model Formulation, 4 Graphical Linear Programming, 5 Outline of Graphical Procedure, 5 Plotting
More informationSwiftStack Global Cluster Deployment Guide
OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read
More informationUniversity of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities
II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when
More informationDelusions are false beliefs that are not part of their real-life. The person keeps on believing his delusions even when other people prove that the be
Schizophrenia Schizophrenia is a chronic, severe, and disabling brain disorder which affects the whole person s day-to-day actions, for example, thinking, feeling and behavior. It usually starts between
More informationElevator Malfunction Anyone Going Down?
Elevator Malfunction Anyone Going Down? Lessons Learned Volume 04 Issue 41 2004 USW Purpose Elevator Malfunction - Anyone Going Down? To conduct a small group lessons learned activity to share information
More informationSoftware Engineering. Computer Science Tripos 1B Michaelmas 2011. Richard Clayton
Software Engineering Computer Science Tripos 1B Michaelmas 2011 Richard Clayton Critical software Many systems must avoid a certain class of failures with high assurance safety critical systems failure
More informationThe Top 3 Common Mistakes Men Make That Blow All Their Chances of Getting Their Ex-Girlfriend Back Which of these mistakes are you making?
The Top 3 Common Mistakes Men Make That Blow All Their Chances of Getting Their Ex-Girlfriend Back Which of these mistakes are you making? By George Karanastasis, M.D. COPYRIGHT NOTICE THIS ELECTRONIC
More informationSystem Specification. Objectives
System Specification cmsc435-1 Objectives To explain how dependability requirements may be identified by analyzing the risks faced by critical systems To explain how safety requirements are generated from
More informationIntrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
More informationCould a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year?
MANAGED IT SERVICES Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? A lot of business owners, executives, and managers have a love-hate relationship with managed
More informationOperations & Maintenance 101 Maintenance Strategies and Work Practices to Reduce Costs
2003 Emerson Process Management. All rights reserved. View this and other courses online at www.plantwebuniversity.com. Operations & Maintenance 101 Maintenance Strategies and Work Practices to Reduce
More informationPerformance Optimization Guide
Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.
More informationIncident Investigation Guidelines
Incident Investigation Guidelines Commencement Date: 02 December 2011 Category: Campus Life, Information Management 1. PURPOSE This Incident Investigation Guideline is a guide to completing an incident
More informationReviewers Guide. Don t Panic - Photo Edition 1
Don t Panic - Photo Edition Reviewers Guide Don t Panic - Photo Edition 1 Contents What to look for when evaluating photo recovery software... 3-4 Installation... 4 Suggested ways to test Don t Panic...
More informationBLR s Safety Training Presentations
BLR s Safety Training Presentations Machine Guarding 29 CFR 1910.211 to 1910.219 Machine guarding is an integral part of any safety and health program. As statistics can demonstrate, it is also one aspect
More informationWRITING A CRITICAL ARTICLE REVIEW
WRITING A CRITICAL ARTICLE REVIEW A critical article review briefly describes the content of an article and, more importantly, provides an in-depth analysis and evaluation of its ideas and purpose. The
More informationKEEPING PATIENT INFORMATION SAFE AND SECURE IN THE CLOUD
CASE STUDY Take Cover The costs of exposing or losing patient information can ruin a dental practice. Cloud-based solutions can protect your business and your patients against these threats: Unauthorized
More informationCoverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their
More informationSoftware Testing. Knowledge Base. Rajat Kumar Bal. Introduction
Software Testing Rajat Kumar Bal Introduction In India itself, Software industry growth has been phenomenal. IT field has enormously grown in the past 50 years. IT industry in India is expected to touch
More informationFinding the Right Cloud Solution for Your Business
Finding the Right Cloud Solution for Your Business Overview of Cloud Computing Different Types of Cloud Computing Explained Pros and Cons of Moving to the Cloud Migration Gotchas - How to Have a Seamless
More informationIT SERVICE MANAGEMENT: HOW THE SAAS APPROACH DELIVERS MORE VALUE
1 IT Service Management: How the SaaS Approach Delivers More Value IT SERVICE MANAGEMENT: HOW THE SAAS APPROACH DELIVERS MORE VALUE EXECUTIVE SUMMARY Today s companies are very reliant on their technology
More informationSoftware Engineering. Introduc)on
Software Engineering Introduc)on Software engineering The economies of ALL developed nations are dependent on software. More and more systems are software controlled Software engineering is concerned with
More informationDealing with risk. Why is risk management important?
Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe
More informationComputer Science with Maths
King s Student Perspectives Computer Science with Maths Profir, 1st year Profir is from Chișinău, the capital city of the Republic of Moldova (which is between Romania and Ukraine). He took A levels the
More informationBest Practices for Verification, Validation, and Test in Model- Based Design
2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based
More informationA VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud
A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud 1 THE HYBRID CLOUD DILEMMA Finding Agility without Adding Fragility Today, businesses have to move fast to stay competitive.
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationCAST Analysis. 2013 John Thomas and Nancy Leveson. All rights reserved.
CAST Analysis 1 CAST Process Identify the Accident (Loss) Identify the Hazards Identify the Safety Constraints Identify the Proximal Events Draw the Safety Control Structure Analyze each component 2 CAST
More informationDeveloping software which should never compromise the overall safety of a system
Safety-critical software Developing software which should never compromise the overall safety of a system Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 21 Slide 1 Objectives To introduce
More informationEnsure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707
Ensure Absolute Protection with Our Backup and Data Recovery Services ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services STAY PROTECTED WITH OUR BACKUP AND
More informationThe Cost and Benefits of On-Demand vs. On-Premise Procurement Software
The Cost and Benefits of On-Demand vs. On-Premise Procurement Software A Coupa Executive White Paper Executive Summary Procurement software enables organizations to save time, money, and effort throughout
More informationThe Basics of Robot Mazes Teacher Notes
The Basics of Robot Mazes Teacher Notes Why do robots solve Mazes? A maze is a simple environment with simple rules. Solving it is a task that beginners can do successfully while learning the essentials
More informationREALISTIC THINKING. How to Do It
REALISTIC THINKING We can all be bogged down by negative thinking from time to time, such as calling ourselves mean names (e.g., idiot, loser ), thinking no one likes us, expecting something, terrible
More informationWalk around and identify the area to be assessed and look at what could reasonably be expected to cause harm.
Risk Assessment Introduction The assessment of risk is central to the management of health and safety. The purpose of this is to assist in identifying those measures which are needed to remove or otherwise
More informationRisk management a practical approach
Risk management a practical approach Introduction Preventing work related accidents and injuries is the primary concern for all those involved in health and safety. Work related accidents and injuries
More informationPartial Fractions. Combining fractions over a common denominator is a familiar operation from algebra:
Partial Fractions Combining fractions over a common denominator is a familiar operation from algebra: From the standpoint of integration, the left side of Equation 1 would be much easier to work with than
More informationBarTender Version Upgrades. Best practices for updating your BarTender installation WHITE PAPER
BarTender Version Upgrades Best practices for updating your BarTender installation WHITE PAPER Contents Understanding Version Upgrades 3 Upgrading BarTender to a Newer Version 4 Planning a Version Upgrade
More informationSEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007
SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007 SEMS/NIMS - SYSTEM (ICS) is the model tool for command, control, and coordination of a response and provides a means to coordinate the efforts of individual
More informationData Loss in a Virtual Environment An Emerging Problem
Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios
More informationData Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks
Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks November 12, 2008 How safe is small business data? As the power of computers continues to grow, more and more of the
More informationWait-Time Analysis Method: New Best Practice for Performance Management
WHITE PAPER Wait-Time Analysis Method: New Best Practice for Performance Management September 2006 Confio Software www.confio.com +1-303-938-8282 SUMMARY: Wait-Time analysis allows IT to ALWAYS find the
More informationSPPA-T3000 Control System The Benchmark in Controls
Instrumentation, Controls & Electrical SPPA-T3000 Control System The Benchmark in Controls Siemens Power & Process Automation Answers for energy. The benchmark for Distributed Control Systems Developed
More informationHigh Availability White Paper
High Availability White Paper This document provides an overview of high availability best practices for mission critical applications. Author: George Quinlan, Senior Consultant Background - High Availability
More informationInformation Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
More informationOverview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems
Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems Simon Brown The author is with the Health & Safety Executive, Magdalen House, Bootle, Merseyside,
More informationReaping the benefits of Reusable Software Components
Safety & Security for the Connected World Reaping the benefits of Reusable Software Components The Significance of FAA Reusable Software Component Certification Mark Pitchford The conflicting demands on
More informationARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS
ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS Abdu Idris Omer Taleb M.M., PhD Majmaah University, Kingdom of Saudia Arabia Abstract This article is aimed to name the levels of industrial automation, describes
More informationIn-Flight Mechanics A Software Package Management Conversion Project
In-Flight Mechanics A Software Package Management Conversion Project Philip J. Hollenback Yahoo, Inc. Overview Over the course of most of 2009 I acted as the technical lead on a software package management
More informationTuesday, October 18. Configuration Management (Version Control)
Tuesday, October 18 Configuration Management (Version Control) How Version Control Works Place the official version of source code into a central repository, or database Programmers check out a working
More informationWHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan
WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises
More informationSystem Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic
More informationFrequently Asked Questions (FAQ s)
Frequently Asked Questions (FAQ s) 1. What is the Internet Modem Server? 2. A fee based service? Why do I have to pay to program DoorKing systems? 3. How s does the Internet Modem Server work? 4. What
More informationGETTING BACKUP AND DISASTER RECOVERY WHEN AND WHERE YOU NEED IT
GETTING BACKUP AND DISASTER RECOVERY WHEN AND WHERE YOU NEED IT CONTENTS EXECUTIVE SUMMARY... 7 ABOUT STORAGECRAFT... 8 BACKUP FAST, RECOVER FASTER... 9 THE DEPTH OF DISASTER RECOVERY... 10 THE BREADTH
More informationMANAGING THE RISKS OF CHANGE
MANAGING THE RISKS OF CHANGE Dr Andrew Brazier, Consultant www.andybrazier.co.uk andy.brazier@gmail.com þ 44 7984 284642 The process industry has always had to deal with changes to plant and equipment,
More information10 Hidden IT Risks That Threaten Your Financial Services Firm
Your firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your business without IT. Today,
More informationIF The customer should receive priority service THEN Call within 4 hours PCAI 16.4
Back to Basics Backward Chaining: Expert System Fundamentals By Dustin Huntington Introduction Backward chaining is an incredibly powerful yet widely misunderstood concept, yet it is key to building many
More informationSetting up a website: key considerations.
Setting up a website: key considerations. Supporting you on your business journey. If your business is going to trade online, then you ll already be thinking about your website. But even if you re not
More informationSYSTEMIC FACTORS IN SOFTWARE-RELATED SPACECRAFT ACCIDENTS
SYSTEMIC FACTORS IN SOFTWARE-RELATED SPACECRAFT ACCIDENTS Prof. Nancy G. Leveson Aeronautics and Astronautics Dept. Massachusetts Institute of Technology leveson@mit.edu and http://sunnyday.mit.edu AIAA
More informationRAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card
RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility
More informationalternative collection
01 technical this article considers two methods a company could adopt in order to speed up the collection of cash from its customers. Additionally, worked examples show how these methods can be evaluated
More informationLab - Dual Boot - Vista & Windows XP
Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain
More informationRealize your full potential with the new version of SIMATIC PCS 7
Version 8.1 Realize your full potential with the new version of SIMATIC PCS 7 Performance you trust siemens.com/simatic-pcs7 Answers for industry. More than 70 new features, new possibilities: SIMATIC
More informationDo Your IT Housekeeping with UC4 Workload Automation Suite
Do Your IT Housekeeping with UC4 Workload Automation Suite Introduction This document describes how to keep the increasing complexity of data centers in check by means of IT housekeeping specifically,
More information