Predicting Human Performance in Unexpected Events
|
|
|
- Mercy Lyons
- 10 years ago
- Views:
Transcription
1 Predicting Human Performance in Unexpected Events Angelia Sebok Alion Science and Technology April, 2015 The Challenge and Approach SLIDE 2 Challenge Things can and do go wrong We cannot possibly identify every potential situation ahead of time How can we predict how people will behave and respond in unexpected, off-nominal events? Approach Using computational models to predict operator performance Basing these models on empirical research / operational data and conducting validation studies 1
2 Human Performance Modeling SLIDE 3 Provides tools for simulating and predicting operator performance in different How it works Based on task analyses and understanding of cognitive demands placed on operators Includes data: task times, distributions, operator decisions and paths Each run can take a different path, generating sets of predicted performance results Output Mission time, success Operator workload, utilization, staffing levels Human error probabilities Operator noticing, situation awareness Productivity, throughput, optimization capabilities Distributions of predicted performance across runs Human Performance Modeling Applications SLIDE 4 Many industries use modeling to answer different questions Defense Aviation Healthcare Space Nuclear Predict performance in situations that cannot readily be tested Never performed tasks / missions New operational concepts Dangerous scenarios / When HITL is prohibitively expensive 2
3 SLIDE 5 Case Study Predicting Human Performance in Long Duration Space Missions NASA Grant NNX12AE69G PI: Angelia Sebok Co-Is: Robert Sargent and Benjamin Clegg Consultants: Christopher Wickens and Thomas Jones GRAs: Alex Vieane, Robert Gutzwiller NASA POCs: Brian Gore, Sandra Whitmire Purpose SLIDE 6 Identify vulnerable situations in longduration missions Select a worst case scenario Characterize and research components Develop analytic models and a taskbased model Conduct HITL studies for data gathering, model development, and validation purposes 3
4 S-PRINT Scenario of Interest SLIDE 7 Overload condition Task management strategies Workload Task Load Fatigue Sleep Disruption Sleep loss / restriction Circadian cycle effects Sleep inertia Complacency, Low SA Routine Workload Transition (Unexpected Automation Failure) Overload Time (minutes, hours, days?) Overview of the S-PRINT Project Tasks SLIDE 8 4
5 S-PRINT Conceptual Model SLIDE 9 Monitoring Detection Diagnosis Fault management Monitoring the automation status Noticing an off nominal event (the failure ) Identifying the failure (including troubleshooting) Implementing repair actions, safety actions. Experienced reliability of system, low expectancy Salience, Type of failure + +? Degree of automation, automation bias Checklist support, (& checklist design), perceived criticality + Visual scanning / information gathering Noticing indications Working memory Decision making/task management)? Resources devoted to another task Ability to + switch gears and make sense Multi tasking & task management skills + Salience, Interest, Difficulty, Priority Task Selection + S-PRINT: Fatigue Algorithms SLIDE 10 Fatigue overview Determine and quantify the effects of sleep-related factors on task completion time and accuracy Sleep deprivation, sleep restriction, circadian cycle, sleep inertia Important points: Quantifying the effects Identifying the effects on complex task performance 5
6 S-PRINT HAI Model SLIDE 11 Challenge: HAI research is diverse and automated systems differ tremendously Approach: To develop a model of HAI that applies across systems, yet is specific enough to accurately model the actual system Result: Used two complementary approaches A generic automation performance shaping factor that applies benefits or penalties to task performance A custom-built task network model to capture the differences in tasks and operator performance paths S-PRINT HAI: Performance Shaping Factor SLIDE 12 Developed based on studies that evaluate human performance across a variety of automation types Factors that the PSF includes Increasing degree of automation Improves performance in routine Degrades performance in failure Increasing reliability of automation Improves performance in routine Degrades performance in failure Alert absence penalty (failure type and salience) Routine Failure Increasing Degree of Automation Onnasch, Wickens, Li & Manzey,
7 S-PRINT HAI: Task Network Model SLIDE 13 Automated systems differ tremendously Different modes and failures require that the operators perform unique tasks These paths (tasks, feedback, decisions) are included in the task network models This figure illustrates the concept S-PRINT: Overload Strategic Task Overload Management model SLIDE 14 Ongoing Task (OT) Why stay? More likely Engaging High priority Easy = Less likely Boring Low priority Hard Decision Point 0.60 to stay These attributes have both polarities and weights (empirically determined) 0.40 to switch Alternative Task (AT) to which task? More attractive Easy Engaging High priority High salience Less attractive Hard Boring Low priority Low salience 7
8 S-PRINT Scenario and Task Network Model Environmental process control Robotic arm control Predicts time, workload, mission success, tasks performed Two modes of operation for each system Different types of failures Different fatigue scenarios (sleep histories) SLIDE 15 S-PRINT Experiments SLIDE 16 8
9 STOM Validation: Percent visual attention allocation to AutoCAMS SLIDE 17 r = Summary SLIDE 18 Modeling to predict human performance in unexpected situations Identify potential worst case Characterize the situation factors? Conduct / review research to describe performance effects Develop models (analytic / descriptive and task-based) Perform data gathering and validation experiments Can be adapted to different industries, work situations, and environments Can run the model under a variety of to gather data / identify those combinations of factors that impact performance Can identify and evaluate potential mitigation strategies Contact info: [email protected] 9
Big Data, Data Analytics, and Data Visualization building your knowledge and expertise. September 15, 2015
+ Big Data, Data Analytics, and Data Visualization building your knowledge and expertise September 15, 2015 Today s Agenda 2! Kickoff: Glossary of Terms! Data analytics! Data visualization! Big Data! Body
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
The Art of Aeronautical Decision-Making Course Table of Contents
Federal Aviation Administration The Art of Aeronautical Decision-Making Course Table of Contents Introduction Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 What is ADM? 3-P Model
Selection of Techniques and Metrics
Selection of Techniques and Metrics Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse567-08/
System Aware Cyber Security
System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012
The Moebus Aviation Report on Scientific and Medical Evaluation of Flight Time Limitations : Invalid, Insufficient, and Risky
The Moebus Aviation Report on Scientific and Medical Evaluation of Flight Time Limitations : Invalid, Insufficient, and Risky Alertness Solutions January 2009 Introduction Fatigue has been identified as
TEST PLAN Issue Date: <dd/mm/yyyy> Revision Date: <dd/mm/yyyy>
DEPARTMENT OF HEALTH AND HUMAN SERVICES ENTERPRISE PERFORMANCE LIFE CYCLE FRAMEWORK CHECKLIIST TEST PLAN Issue Date: Revision Date: Document Purpose The purpose of
A Proactive Approach to Capacity Management
Healthcare Organizations ive Capacity ment A Proactive Approach to Capacity ment Capacity Planning Patient Flow Quality Compliance Workforce Optimization Benchmarking ment solutions 6 Faced with unprecedented
Cognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory [email protected], [email protected] The cognitive and organizational
Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
BUSINESS CONTINUITY PLAN
How to Develop a BUSINESS CONTINUITY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A BUSINESS CONTINUITY PLAN? CHAPTER PREPARING TO WRITE YOUR BUSINESS CONTINUITY PLAN CHAPTER
SCENARIO DEVELOPMENT FOR DECISION SUPPORT SYSTEM EVALUATION
SCENARIO DEVELOPMENT FOR DECISION SUPPORT SYSTEM EVALUATION Emilie M. Roth Roth Cognitive Engineering Brookline, MA James W. Gualtieri, William C. Elm and Scott S. Potter Aegis Research Corporation Pittsburgh,
Four Methods to Monetize Service Assurance Monitoring Data
whitepaper Four Methods to Monetize Service Assurance Monitoring Data Using Service Assurance Analytics in Voice and Data Network Monitoring to Increase Revenue and Reduce Cost Introduction In general,
b) Describe the concept of ERROR CHAIN in aviation.
1. Crew Resource Management (CRM) was celebrated as the convergence ofa concept, an attitude and a practical approach to pilot training. a) What is the CRM all about and how this program could improve
How To Test A Flash Storage Array For A Health Care Organization
AFA Storage Performance Testing and Validation Methodology PRESENTATION TITLE GOES HERE Peter Murray Load DynamiX Agenda Introduction Load DynamiX Testing Methodologies Performance Profiling Workload Modeling
Operation of Aircraft
International Standards and Recommended Practices Fatigue Management-related excerpts from: Annex 6 to the Convention on International Civil Aviation Operation of Aircraft Part I International Commercial
Recovery Management. Release Data: March 18, 2012. Prepared by: Thomas Bronack
Recovery Management Release Data: March 18, 2012 Prepared by: Thomas Bronack Section Table of Contents 8. RECOVERY MANAGEMENT... 4 8.1. INTRODUCTION TO RECOVERY MANAGEMENT... 4 8.1.1. DEFINITION... 4 8.1.2.
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
The Resource Management Life Cycle
The Resource Management Life Cycle Resource Planning for 2013 Revised November 2012 http://epmlive.com Contents Introduction...2 What is Resource Management?...2 Who Participates in Resource Management?...2
MEASURING EMPLOYEE EXPERIENCE TO DRIVE POSITIVE EMPLOYEE ENGAGEMENT A FORESEE WHITE PAPER
MEASURING EMPLOYEE EXPERIENCE TO DRIVE POSITIVE EMPLOYEE ENGAGEMENT A FORESEE WHITE PAPER 2014 ForeSee 2 MEASURING EMPLOYEE EXPERIENCE TO DRIVE POSITIVE EMPLOYEE ENGAGEMENT TABLE OF CONTENTS All Employee
Business Analyst Position Description
Analyst Position Description September 4, 2015 Analysis Position Description September 4, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
Closed Loop Incident Process
Closed Loop Incident Process From fault detection to closure Andreas Gutzwiller Presales Consultant, Hewlett-Packard (Schweiz) HP Software and Solutions 2010 Hewlett-Packard Development Company, L.P. The
PRODUCT INFORMATION. SICK LifeTime Services. LifeTime Services for Machines and Systems
PRODUCT INFORMATION SICK LifeTime Services LifeTime Services for Machines and Systems Ordering Information Place your trust in us... SICK LifeTime Services Place your trust in us... SICK LifeTime Services
An Increase in Software Testing Robustness: Enhancing the Software Development Standard for Space Systems
An Increase in Software Robustness: Enhancing the Software Development Standard for Space Systems Karen Owens and Suellen Eslinger Software Engineering Subdivision 15 th Ground System Architectures Workshop
Practical Action Consulting Kathmandu, Nepal POSITION DESCRIPTION
Practical Action Consulting Kathmandu, Nepal POSITION DESCRIPTION JOB TITLE Business Development Associate GRADE 4 REPORTS TO Practical Action Consulting Pvt. Ltd Managing Director / PAC Asia Regional
Problem Management: A CA Service Management Process Map
TECHNOLOGY BRIEF: PROBLEM MANAGEMENT Problem : A CA Service Process Map MARCH 2009 Randal Locke DIRECTOR, TECHNICAL SALES ITIL SERVICE MANAGER Table of Contents Executive Summary 1 SECTION 1: CHALLENGE
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
SureSense Software Suite Overview
SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
Shift Work Schedules
Shift Work Schedules Presented By: Dr. Robert Whiting, PhD Senior Project Manager Shiftwork Interventions Symposium November 6 2012 - Toronto, ON Overview 1. A model of alertness and fatigue Examples 2.
Montana Department of Transportation Information Services Division. System Development Life Cycle (SDLC) Guide
Montana Department of Transportation Information Services Division System Development Life Cycle (SDLC) Guide Version 2 August 2, 2007 \mdt_sdlc_process\mdt_sdlc_v02.doc Table of Contents 1 Business Analysis...3
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain
INSTITUTE FOR DEFENSE ANALYSES Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain Jay Mandelbaum Christina M. Patterson April 2015 Approved for public release; distribution
Session Two. Organizational Knowledge Management
Knowledge Management Session Two Organizational Knowledge Management Intellectual capital Intellectual capital is combination of the Intellectual property (IP) held by a business and the people in that
Automation Sales/Marketing Professional
Automation Sales/Marketing Professional Alternate Titles: Inside sales: Customer Service Representative, Inside Sales Engineer, Technical Support Specialist Outside sales: Field Sales, Automation Product
Capture of Mission Assets
Capture of Mission Assets Vern Paxson University of California Berkeley, California USA [email protected] June 2009 Presented by Giovanni Vigna Outline Motivational context Tracking network system
Quality Risk Management The Pharmaceutical Experience Ann O Mahony Quality Assurance Specialist Pfizer Biotech Grange Castle
Quality Risk Management 11 November 2011 Galway, Ireland Quality Risk Management The Pharmaceutical Experience Ann O Mahony Quality Assurance Specialist Pfizer Biotech Grange Castle Overview Regulatory
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Using Mindjet Software and Templates for Strategic Consulting
Getting Started Guide Using Mindjet Software and Templates for Strategic Consulting Mindjet Getting Started Guide Using Mindjet Software and Templates for Strategic Consulting 2 One of the challenges we
IEEE P1633 Software Reliability Best Practices. Nematollah Bidokhti Working Group Member
1 IEEE P1633 Software Reliability Best Practices Nematollah Bidokhti Working Group Member 2 Introduction and motivation Software reliability Fundamental prerequisite for virtually all modern systems Software
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
A Best Practices Point of View from. Data Backup and Disaster Recovery Planning
A Best Practices Point of View from Data Backup and Disaster Recovery Planning Security Protect Your Data Expertise Support Patient Privacy Business Continuity Plan and Restore Peace of Mind Backup and
Predictive Maintenance in a Mission Critical Environment
March 2009 Predictive Maintenance in a Mission Critical Environment This paper discusses the need to proactively protect mechanical and electrical support systems in data processing centers and data storage
Subject: CREW RESOURCE MANAGEMENT TRAINING PROGRAMME
ADVISORY CIRCULAR FOR AIR OPERATORS Subject: CREW RESOURCE MANAGEMENT TRAINING PROGRAMME Date: xx.xx.2013 Initiated By: Republic of Korea AC No: 1. PURPOSE This advisory circular (AC) presents guidelines
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations
AP1000 European 18. Human Factors Engineering Design Control Document
18.2 Human Factors Engineering Program Management The purpose of this section is to describe the goals of the AP1000 human factors engineering program, the technical program to accomplish these goals,
Business Relationship Manager Position Description
Manager Position Description February 9, 2015 Manager Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
PMI Risk Management Professional (PMI-RMP) Exam Content Outline
PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,
Supplier Relationship Management Tools
Supplier Relationship Management Tools Contents The Need for Supplier Management Automation VSAAM Capabilities The Magic of VSAAM The VSAAM Value Proposition VSAAM System Integration and Deployment Process
Sound the Alarm: Alarm System Management for Patient Safety
Sound the Alarm: Alarm System Management for Patient Safety Chris Baker RN, PhD, MBA, FACHE Administrative Director Center for Professional Practice & Development St. Mary s Hospital Chris Baker has no
WHITE PAPER. Six Simple Steps to Improve Service Quality and Reduce Costs
WHITE PAPER Six Simple Steps to Improve Service Quality and Reduce Costs INTRODUCTION Do you have challenges with maintaining your SLA commitment? Does your customer support department get more complex
SITUATIONAL AWARENESS 5-1 SITUATIONAL AWARENESS
SITUATIONAL AWARENESS 5-1 SITUATIONAL AWARENESS OBJECTIVES To successfully complete this assignment, you must study the text and master the following objectives: State the actions required to maintain
british council behaviours www.britishcouncil.org
british council behaviours Mat Wright Mat Wright Mat Wright CREATING SHARED PURPOSE I gain the active support of other people so they are fully engaged and motivated to contribute effectively. I do this
An introduction to designing reliable cloud services
An introduction to designing reliable cloud services January 2014 Contents Overview 2 Cloud service reliability versus resiliency 4 Recovery-oriented computing 5 Planning for failure 7 Designing for and
The effects of level of automation and adaptive automation on human performance, situation awareness and workload in a dynamic control task
Theor. Issues in Ergon. Sci., 2003, 1 40, preview article The effects of level of automation and adaptive automation on human performance, situation awareness and workload in a dynamic control task David
THE INTEGRATED PERFORMANCE MODELING ENVIRONMENT - SIMULATING HUMAN-SYSTEM PERFORMANCE. David Dahn K. Ronald Laughery
THE INTEGRATED PERFORMANCE MODELING ENVIRONMENT - SIMULATING HUMAN-SYSTEM PERFORMANCE David Dahn K. Ronald Laughery Micro Analysis and Design, Incorporated 4900 Pearl East Circle, Suite 201E Boulder, Colorado
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
Safety of Nuclear Power Plant : Human Reliability Analysis (HRA) Prof. Wolfgang Kröger
Safety of Nuclear Power Plant : Human Reliability Analysis (HRA) Prof. Wolfgang Kröger (http://www.riskcenter.ethz.ch, [email protected]) Human influence on operation and safety of a system such as anpp
Network Management Basics
CHAPTER 6 Chapter Goal Become familiar with the basic functions of a network management system. Introduction This chapter describes functions common to most network-management architectures and protocols.
INFRAGARD.ORG. Portland FBI. Unclassified 1
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper
Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an
Design-Simulation-Optimization Package for a Generic 6-DOF Manipulator with a Spherical Wrist
Design-Simulation-Optimization Package for a Generic 6-DOF Manipulator with a Spherical Wrist MHER GRIGORIAN, TAREK SOBH Department of Computer Science and Engineering, U. of Bridgeport, USA ABSTRACT Robot
BIGDATA GREENPLUM DBA INTRODUCTION COURSE OBJECTIVES COURSE SUMMARY HIGHLIGHTS OF GREENPLUM DBA AT IQ TECH
BIGDATA GREENPLUM DBA Meta-data: Outrun your competition with advanced knowledge in the area of BigData with IQ Technology s online training course on Greenplum DBA. A state-of-the-art course that is delivered
Motivations. spm - 2014 adolfo villafiorita - introduction to software project management
Risk Management Motivations When we looked at project selection we just took into account financial data In the scope management document we emphasized the importance of making our goals achievable, i.e.
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Advanced Database Performance Analysis Techniques Using Metric Extensions and SPA Mughees A. Minhas VP of Product Management Oracle 2 Program Agenda Database Performance Analysis Challenges Advanced
Application Performance Testing Basics
Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free
Electric Energy Systems
Electric Energy Systems Electric Energy Systems seeks to explore methods at the frontier of understanding of the future electric power and energy systems worldwide. The track will focus on the electric
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy
This is a preview - click here to buy the full publication TECHNICAL REPORT INFORMATION TECHNOLOGY HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL
TECHNICAL REPORT ISO/IEC TR 15067-4 First edition 2001-06 INFORMATION TECHNOLOGY HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL Part 4: Security system for HES ISO/IEC 2001 All rights reserved. Unless
Health monitoring & predictive analytics To lower the TCO in a datacenter
Health monitoring & predictive analytics To lower the TCO in a datacenter PRESENTATION TITLE GOES HERE Christian B Madsen & Andrei Khurshudov Seagate Technology [email protected] Outline 1.
Embedded Systems Lecture 9: Reliability & Fault Tolerance. Björn Franke University of Edinburgh
Embedded Systems Lecture 9: Reliability & Fault Tolerance Björn Franke University of Edinburgh Overview Definitions System Reliability Fault Tolerance Sources and Detection of Errors Stage Error Sources
How To Test For Elulla
EQUELLA Whitepaper Performance Testing Carl Hoffmann Senior Technical Consultant Contents 1 EQUELLA Performance Testing 3 1.1 Introduction 3 1.2 Overview of performance testing 3 2 Why do performance testing?
GAO. Year 2000 Computing Crisis: Business Continuity and Contingency Planning
GAO United States General Accounting Office Accounting and Information Management Division August 1998 Year 2000 Computing Crisis: Business Continuity and Contingency Planning GAO/AIMD-10.1.19 Preface
