Software Engineering. Computer Science Tripos 1B Michaelmas Richard Clayton
|
|
|
- Elisabeth McDowell
- 10 years ago
- Views:
Transcription
1 Software Engineering Computer Science Tripos 1B Michaelmas 2011 Richard Clayton
2 Critical software Many systems must avoid a certain class of failures with high assurance safety critical systems failure could cause, death, injury or property damage security critical systems failure could allow leakage of confidential data, fraud, real time systems software must accomplish certain tasks on time Critical systems have much in common with critical mechanical systems (bridges, brakes, locks, ) Key: engineers study how things fail
3 Tacoma Narrows, Nov
4 Definitions I Error design flaw or deviation from intended state (a static quality) Failure non-performance of system (a dynamic quality). Classical definition says under specified environmental conditions. Reliability probability of failure within a set period of time typically expressed as MTBF/MTTF: mean time between failures / to failure, depending whether system will be repaired and restarted Accident undesired, unplanned event resulting in specified kind/level of loss Near Miss (or Incident) event with the potential to be an accident, but no loss occurs
5 Definitions II Safety freedom from accidents Hazard Risk set of conditions on system which in some environmental conditions, will lead to an accident hence: hazard + failure = accident the probability of a bad outcome the probability that hazard leads to accident (danger), combined with the hazard exposure or duration (latency) Uncertainty risk not quantifiable
6 Arianne 5, June Arianne 5 accelerated faster than Arianne 4 This caused an operand error in float-to-integer conversion The backup inertial navigation set dumped core The core was interpreted by the live set as flight data Full nozzle deflection 20 o angle of attack booster separation $370 million of satellites destroyed
7 Real-time systems Many safety-critical systems are also real-time systems used in monitoring or control Criticality of timing makes many simple verification techniques inadequate Often, good design requires very extensive application domain expertise Exception handling tricky, as with Arianne Testing can also be really hard
8 Patriot missile failure, Feb Failed to intercept an Iraqi scud missile in First Gulf War SCUD struck US barracks in Dhahran; 29 dead Other SCUDs hit Saudi Arabia, Israel
9 Patriot missile failure Reason for failure measured time in 1/10 sec, truncated from when system upgraded from air-defence to anti-ballistic-missile, accuracy increased but not everywhere in the (assembly language) code! modules got out of step by 1/3 sec after 100 hours operation so system looked for Scud 600 metres away from where it was since nothing visible at incorrect location, no launch occurred not found in testing as spec only called for 4h tests Critical system failures are typically multifactorial: a reliable system can t fail in a simple way But classical definition of `failure said under specified environmental conditions... So was this a failure?
10 Security critical systems Usual approach try to get high assurance of one aspect of protection Example: stop classified data flowing from high to low using one-way flow Assurance via simple mechanism Keeping this small and verifiable is often harder than it looks at first!
11 Building critical systems Some things go wrong at the detail level and can only be dealt with there (e.g. integer scaling) However in general safety (along with security and real-time performance) is a system property and has to be dealt with at the system level A very common error is not getting the scope right for example, designers don t consider human factors such as usability and training
12 Hazard elimination e.g., motor reversing circuit above, in the left hand circuit failure of both switches to move together will short the battery Some tools can eliminate whole classes of software hazards, e.g. using a strongly-typed language such as Ada But usually hazards involve more than just software
13 The Therac accidents I The Therac-25 was a radiotherapy machine sold by AECL; 11 machines shipped Between 1985 and 1987 three people died in six accidents Example of a fatal coding error, compounded with usability problems and poor safety engineering
14 The Therac accidents II 25 MeV therapeutic accelerator with two modes of operation: 1. 25MeV focussed electron beam on target to generate X-rays MeV spread electron beam for skin treatment (with 1% of beam current) Safety requirement don t fire 100% beam at human!
15 The Therac accidents III Previous models (Therac 6 and 20) had mechanical interlocks to prevent high-intensity beam use unless X-ray target in place The Therac-25 replaced these with software Fault tree analysis arbitrarily assigned probability of to computer selects wrong energy Code was poorly written, unstructured and not really documented
16 The Therac accidents IV Marietta, GA, June 85: woman s shoulder burnt. settled out of court. FDA not told. Hamilton, Ontario, July 85: woman s hip burnt. AECL suspected a micro-switch error (reporting incorrect turntable positions) but could not reproduce fault; changed software anyway. Yakima, WA, Dec 85: woman s hip burned could not be a malfunction East Texas Cancer Centre, Mar 86: man burned in neck died five months later of complications 3 weeks later: another man burned on face & died after 3 weeks Hospital physicist managed to reproduce flaw: if parameters changed too quickly from x-ray to electron beam, then the safety interlocks failed Yakima, WA, Jan 87: man burned in chest and died different bug now thought to have caused Ontario accident
17 The Therac accidents V East Texas deaths caused by editing beam type and then issuing a start treatment request very quickly thereafter This was due to poor software design
18 The Therac accidents VI Data entry routine sets turntable and MEOS (the mode and energy level) When data entry complete (cursor on last line) machine starts configuration Part of this involves setting magnets into correct position (which takes 8 seconds, so a timer routine is called) The timer routine checks for cursor movement if it is being called whilst the magnets are being moved Unfortunately, it also cleared the magnets moving flag; so it didn t check the cursor for subsequent magnet moves
19 The Therac accidents VII AECL had ignored safety aspects of software initial investigations had looked for hardware faults Confused reliability with safety Lack of defensive design Inadequate reporting, follow-up and regulation failed to explain Ontario accident at the time a true/false flag was being incremented to keep it true, and after 255 increments it speciously got set to the wrong value! Unrealistic risk assessments ( think of a number and double it ) Inadequate software engineering practices specification an afterthought, complex architecture, dangerous coding, little testing, careless HCI design, incomprehensible messages displayed to users, failure to follow up accident reports
The Therac 25 A case study in safety failure. Therac 25 Background
The Therac 25 A case study in safety failure Radiation therapy machine The most serious computer-related accidents to date People were killed References: Nancy Leveson and Clark Turner, The Investigation
Software Safety Basics
Software Safety Basics (Herrmann, Ch. 2) 1 Patriot missile defense system failure On February 25, 1991, a Patriot missile defense system operating at Dhahran, Saudi Arabia, during Operation Desert Storm
Safety and Hazard Analysis
Safety and Hazard Analysis An F16 pilot was sitting on the runway doing the preflight and wondered if the computer would let him raise the landing gear while on the ground - it did A manufacturer of torpedoes
PATRIOT MISSILE DEFENSE Software Problem Led to System Failure at Dhahran, Saudi Arabia
--.- /Initcd Stdcs General Accounting Offiw Ikport to the Chairman, Subcommittee on Investigations and Oversight, Committee on Science, Space, and Technology, House of Rcprcsentativcs PATRIOT MISSILE DEFENSE
New trends in medical software safety: Are you up to date? 5 October 2015, USA
TÜV SÜD New trends in medical software safety: Are you up to date? 5 October 2015, USA Dr. Peter Havel, Senior Vice President, Medical & Health Services (MHS) TÜV SÜD Product Service [email protected] The
Dependable Systems Course. Introduction. Dr. Peter Tröger
Dependable Systems Course Introduction Dr. Peter Tröger Dependable Systems Course Extended version of the Dependable Systems course at Humboldt University (www.rok.informatik.hu-berlin.de) Knowledge gained
SFTA, SFMECA AND STPA APPLIED TO BRAZILIAN SPACE SOFTWARE
SFTA, SFMECA AND STPA APPLIED TO BRAZILIAN SPACE SOFTWARE Carlos H N Lahoz Instituto de Aeronautica e Espaco (IAE) Instituto Tecnologico da Aeronautica(ITA) BRAZIL STAMP/STAP Workshop 2014 25-27 March2014-MIT
World-first Proton Pencil Beam Scanning System with FDA Clearance
Hitachi Review Vol. 58 (29), No.5 225 World-first Proton Pencil Beam Scanning System with FDA Clearance Completion of Proton Therapy System for MDACC Koji Matsuda Hiroyuki Itami Daishun Chiba Kazuyoshi
Issue 1.0 Jan 2002. A Short Guide to Quality and Reliability Issues In Semiconductors For High Rel. Applications
Issue 1.0 Jan 2002 A Short Guide to Quality and Reliability Issues In Semiconductors For High Rel. Applications It is impossible to test Quality or Reliability into a product. It is, however, quite practical
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Risk. Risk Categories. Project Risk (aka Development Risk) Technical Risk Business Risk. Lecture 5, Part 1: Risk
Risk Lecture 5, Part 1: Risk Jennifer Campbell CSC340 - Winter 2007 The possibility of suffering loss Risk involves uncertainty and loss: Uncertainty: The degree of certainty about whether the risk will
Arc Flash Mitigation. Remote Racking and Switching for Arc Flash danger mitigation in distribution class switchgear.
Arc Flash Mitigation Remote Racking and Switching for Arc Flash danger mitigation in distribution class switchgear. Distance is Safety We will discuss through examples of actual occurrences and possible
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 21/2012, ISSN 1642-6037
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 21/2012, ISSN 1642-6037 FDA, medical software, recall, safety of medical devices. Leszek DREWNIOK 1, Ewelina PIEKAR 1, Mirosław STASIAK 1, Remigiusz MANIURA
Occupational Electrical Accidents in the U.S., 2003-2009 James C. Cawley, P.E.
An ESFI White Paper Occupational Electrical Accidents in the U.S., 2003-2009 James C. Cawley, P.E. INTRODUCTION The Electrical Safety Foundation International (ESFI) is a non-profit organization dedicated
Safety-Critical Firmware What can we learn from past failures?
Safety-Critical Firmware What can we learn from past failures? Michael Barr & Dan Smith Webinar: September 9, 2014 MICHAEL BARR, CTO BSEE/MSEE and Firmware Developer Consultant and Trainer (1999-present)
WHITEPAPER: SOFTWARE APPS AS MEDICAL DEVICES THE REGULATORY LANDSCAPE
WHITEPAPER: SOFTWARE APPS AS MEDICAL DEVICES THE REGULATORY LANDSCAPE White paper produced by Maetrics For more information, please contact global sales +1 610 458 9312 +1 877 623 8742 [email protected]
Project Risks. Risk Management. Characteristics of Risks. Why Software Development has Risks? Uncertainty Loss
Project Risks Risk Management What can go wrong? What is the likelihood? What will the damage be? What can we do about it? M8034 @ Peter Lo 2006 1 M8034 @ Peter Lo 2006 2 Characteristics of Risks Uncertainty
Software Engineering. Hans van Vliet Vrije Universiteit Amsterdam, The Netherlands email: [email protected]
Software Engineering Hans van Vliet Vrije Universiteit Amsterdam, The Netherlands email: [email protected] ARIANE Flight 501 http://www.youtube.com/watch?v=gp_d8r-2hwk Disintegration after 39 sec origin of
A Patient s Guide to the Calypso System for Breast Cancer Treatment
A Patient s Guide to the Calypso System for Breast Cancer Treatment Contents Introduction How Radiation Works To Treat Cancer Radiation Treatment for Breast Cancer Special Concerns for Treating the Left
Turntable microswitch assembly Plunger
Medical Devices: The Therac-25 Nancy Leveson University of Washington 1 Introduction Between June 1985 and January 1987, a computer-controlled radiation therapy machine, called the Therac-25, massively
NTSU Fleet Vehicle Driving
Severity Date: Updated1/12/12 What Is Being Assessed: Describe the hazard & how it can The Driver Collision with other or pedestrians Assessed By: Colin Hutchinson NTSU Fleet Vehicle Driving and other
Use of the VALIDATOR Dosimetry System for Quality Assurance and Quality Control of Blood Irradiators
Technical Note: 9 Use of the VALIDATOR Dosimetry System for Quality Assurance and Quality Control of Blood Irradiators 1- Introduction The VALIDATOR, model TN-ID-60, is a compact, and stand-alone dosimetry
University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities
II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when
Cathode Ray Tube. Introduction. Functional principle
Introduction The Cathode Ray Tube or Braun s Tube was invented by the German physicist Karl Ferdinand Braun in 897 and is today used in computer monitors, TV sets and oscilloscope tubes. The path of the
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Defect Management and Reporting Domain: Application Domain Date Issued:
CS4507 Advanced Software Engineering
CS4507 Advanced Software Engineering Lecturer: Adrian O Riordan Office: Room G.71 WGB Email: a.oriordan cs.ucc.ie Course Webpage: http://www.cs.ucc.ie/~adrian/cs4507.html CS4507 Overview 5 Credit course
C3306 LOCKOUT/TAGOUT FOR AUTHORIZED EMPLOYEES. Leader s Guide. 2005, CLMI Training
C3306 LOCKOUT/TAGOUT FOR AUTHORIZED EMPLOYEES Leader s Guide 2005, CLMI Training LOCKOUT/TAGOUT FOR AUTHORIZED EMPLOYEES This easy-to-use Leader s Guide is provided to assist in conducting a successful
Embedded Real-Time Systems (TI-IRTS) Safety and Reliability Patterns B.D. Chapter 9. 405-456
Embedded Real-Time Systems (TI-IRTS) Safety and Reliability Patterns B.D. Chapter 9. 405-456 Version: 10-5-2010 Agenda Introduction to safety Patterns: 1. Protected Single Channel Pattern 2. Homogeneous
Analyzing Electrical Hazards in the Workplace
Analyzing Electrical Hazards in the Workplace By Dennis K. Neitzel, CPE AVO Training Institute, Inc. The need for analyzing electrical hazards in the workplace has been recognized by a small segment of
BWC Division of Safety and Hygiene
BWC Division of Safety and Hygiene A SAMPLE LOCKOUT/TAGOUT PROCEDURE A good Lockout/Tagout Procedure, at a minimum, should contain the following elements: 1. All maintenance personnel shall be provided
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned
Motivation and Contents Overview
Motivation and Contents Overview Software Engineering Winter Semester 2011/2012 Department of Computer Science cs.uni-salzburg.at Dr. Stefan Resmerita 2 Course Contents Goals Learning about commonly used
Risk and Hazard Management
Risk and Hazard Management Models Z34/22 Safe 227 Maximum 10.4 Maximum 12.4 Z40/23 Working 227 Platform 12.2 Working 14.2 Z45/25 Load (kg) 227 Drive 13.7 Height (m) 15.7 Z51/30 227 Height (m) 15.5 17.5
How To Use An Nc Express5800 Card (Nec) With A Remote Management Card (Ec) On A Pc Or Mac Computer (Nemca) With An Ipa/Sda/Sdu) On An Ipad Or
Remote Management Card User s Guide 07/2004 8115-01_RMC CONTENTS Safety Indications... 3 About Remote Management Card... 4 Components... 4 Installation / Removal / Replacement... 5 Installation... 6 Removal...
Human Factors and Medical Device Accidents. Presented by Frank R. Painter, MS, CCE University of Connecticut
Human Factors and Medical Device Accidents Presented by Frank R. Painter, MS, CCE University of Connecticut 1 Human Factors & User Errors A perfectly designed device will be easy to use and no one will
penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software
penelope case management software SOFTWARE AS A SERVICE INFORMATION PACKAGE athena software "I've worked with major corporations and universities and I am really impressed with Athena's hosted server and
Risk Assessment. Module 1. Health & Safety. Essentials. 16-23 November 2013. Registered charity number 207890
Risk Assessment Module 1 Risk assessment in the laboratory After studying this module you will be able to understand the need to conduct risk assessments, how this applies to all laboratory activities,
CS 6290 I/O and Storage. Milos Prvulovic
CS 6290 I/O and Storage Milos Prvulovic Storage Systems I/O performance (bandwidth, latency) Bandwidth improving, but not as fast as CPU Latency improving very slowly Consequently, by Amdahl s Law: fraction
Workplace Incident Fatalities Accepted by the Workers Compensation Board in 2014
Workplace Incident Fatalities Accepted by the Workers Compensation Board in 2014 Workplace Incident Fatalities Year to date, numbers as of December 31, 2014 Workplace Incident fatalities are cases where
Near Miss Reporting. Loss Causation Model
Near Miss Reporting Loss Causation Model Define what is a near miss Defined so everyone is on the same page. Practical reporting How do we apply this and make it work? Objective Accident An unplanned event
Building Software in an Agile Manner
Building Software in an Agile Manner Abstract The technology industry continues to evolve with new products and category innovations defining and then redefining this sector's shifting landscape. Over
Rice University Laser Safety Manual
Rice University Laser Safety Manual Environmental Health and Safety MS 123 P.O. Box 1892 Houston, TX 77251-1892 December 2012 RICE UNIVERSITY 1 Introduction This manual is intended to provide the basic
Risk Analysis of a CBTC Signaling System
Risk Analysis of a CBTC Signaling System João Batista Camargo Jr. 1, Jorge Rady de Almeida Jr. 1, Paulo Sérgio Cugnasca 1 1 Escola Politécnica da Universidade de São Paulo, São Paulo-SP, Brazil Abstract
LS1024B / LS2024B/ LS3024B. Solar Charge Controller USER MANUAL
EPSOLAR LS1024B / LS2024B/ LS3024B Solar Charge Controller USER MANUAL Thank you very much for selecting our product! This manual offers important information and suggestions with respect to installation,
Lockout/Tagout (LOTO): Automating the process
Lockout/Tagout (LOTO): Automating the process By: Bryan K. Gay, Jr. CHAMPS Software, Inc. Lockout/Tagout (LOTO): Automating the process Table of Contents 1. The traditional LOTO process 2. Why automate?
Citation 1 Item 1a. #22: Struck by Inspection #1081105
A 35 year old male employee was removing a high pressure hydraulic hose from an aluminum die-casting machine accumulator, when it fatality struck the employee in the neck & chest. The 3,000 ton die cast
System Integration. system integration at a glance. Manufacturing Capabilities. Control and Identity Systems
at a glance Key Features n Produces fully integrated, best-in-class systems and frames n Generates highly structured, predictable and repeatable BOMs n Controls high-mix, configure-to-order system builds
Safety and Radiation Protection Office Working with X-Ray Equipment
Safety and Radiation Protection Office Working with X-Ray Equipment Radiation Safety Rules May 2016 Radiation Safety Rules X-Ray Equipment General Rules for the protection of persons exposed to ionising
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Defense Acquisition Review January April 2004
100 LETTER Letter TO to THE Editor EDITOR HONEST PERFORMANCE ANALYSIS: A NOT-ALWAYS MET REQUIREMENT Over a decade after Operation Desert Storm and months after Operation Iraqi Freedom, questions remain
Software Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University
Software Engineering Introduction & Background Department of Computer Science Kent State University Complaints Software production is often done by amateurs Software development is done by tinkering or
Developing software which should never compromise the overall safety of a system
Safety-critical software Developing software which should never compromise the overall safety of a system Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 21 Slide 1 Objectives To introduce
Preventing Workplace Injuries. Mike Griffiths, HM Inspector of Health and Safety
Mike Griffiths, HM Inspector of Health and Safety 3 most common causes of Fatal / Life-changing incidents in factories: Falls from Height Workplace Transport Machinery What issues occur consistently in
Ethical Issues in the Software Quality Assurance Function
Ethical Issues in the Software Quality Assurance Function Jim Nindel-Edwards Microsoft, Inc. USA [email protected] Gerhard Steinke Seattle Pacific University USA [email protected] ABSTRACT The responsibility
Software in safety critical systems
Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions
An accident is an unplanned and unwelcome event which disrupts normal routine.
ACCIDENT INVESTIGATION What is an Accident? An accident is an unplanned and unwelcome event which disrupts normal routine. Accidents can result in: Death, injury, illness or a near miss Damage to equipment
DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER
DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER Disasters or accidents would cause great harm on network infrastructure. It is unavoidable and the operation of network would be hampered for a long
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Software-based medical devices from defibrillators
C O V E R F E A T U R E Coping with Defective Software in Medical Devices Steven R. Rakitin Software Quality Consulting Inc. Embedding defective software in medical devices increases safety risks. Given
Safety Requirements Specification Guideline
Safety Requirements Specification Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:[email protected] -1- Summary Safety Requirement
Workers Compensation: Making a claim
Workers Compensation: Making a claim What are workers compensation benefits? Workers compensation benefits are payments for injuries or diseases that are related to the work you were doing. Workers compensation
New Challenges In Certification For Aircraft Software
New Challenges In Certification For Aircraft Software John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Aircraft Software Certification 1 Overview The basics
Guide to Sources Relating to Units of the Canadian Expeditionary Force. Tramways Companies, Canadian Engineers
Guide to Sources Relating to Units of the Canadian Expeditionary Force Tramways Companies, Canadian Engineers Tramways Companies, Canadian Engineers Introduction... 1 1 st Tramways Company, Canadian Engineers...
Elevator Malfunction Anyone Going Down?
Elevator Malfunction Anyone Going Down? Lessons Learned Volume 04 Issue 41 2004 USW Purpose Elevator Malfunction - Anyone Going Down? To conduct a small group lessons learned activity to share information
How to Mimic the PanelMate Readout Template with Vijeo Designer
Data Bulletin 8000DB0709 04/2010 Raleigh, NC, USA How to Mimic the PanelMate Readout Template with Vijeo Designer Retain for future use. Overview The purpose of this data bulletin is to provide step-by-step
Introduction. Getting started with software engineering. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 1 Slide 1
Introduction Getting started with software engineering Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 1 Slide 1 Why? the Therac-25 Failure 1985-1987 Therac-25 Radiation Treatment Machine
PG DRIVES TECHNOLOGY R-NET PROGRAMMER R-NET PROGRAMMING SOFTWARE - DEALER ELECTRONIC MANUAL SK78809/2 SK78809/2 1
R-NET PROGRAMMING SOFTWARE - DEALER ELECTRONIC MANUAL SK78809/2 SK78809/2 1 PG Drives Technology 2009 All rights reserved. This manual is furnished under copyright and may only be used in accordance with
APA format (title page missing) Proton Therapy 3. A paper. A New Cancer Treatment: Proton Therapy. A Review of the Literature
APA format (title page missing) Proton Therapy 3 A paper A New Cancer Treatment: Proton Therapy A Review of the Literature Cancer is a widespread disease that is defined as a malignant or invasive growth
Generic risk assessment form. This document forms part of Loughborough University s health and safety policy Version 3 February 2014
Generic risk assessment form Date: (1) Assessed by: (2) Checked / Validated* by: (3) Location: (4) Assessment ref no (5) Review date: (6) Task / premises: (7) Activity (8) Significant hazard (9) Who might
Bypass transfer switch mechanisms
Power topic #6013 Technical information from Cummins Power Generation transfer switch mechanisms > White paper By Gary Olson, Director, Power Systems Development This paper describes the configuration
the compensation myth
the compensation myth The Compensation Myth It is common to hear stories of the Compensation Culture or claims that Britain is becoming Risk Averse as a result of people claiming compensation. The truth
An Escape. our man John on a research binge. Electric Slide
Electric Slide by John Anello An Escape Hybrid nostart sends our man John on a research binge I received a call from a body shop for a complaint of a no-start on a 2006 Ford Escape 2.3 Hybrid (Figure #1).
AHIS Road safety project Student Council THINK!
AHIS Road safety project Student Council 2013 THINK! Today, we drive safer cars on safer roads; decades of advertisements and public information campaigns have made most of us safer drivers. Improvements
WHS Induction Series. 36 Toolbox Talks. Contents
36 Toolbox Talks 3-5 minute toolbox talks for induction or refresher safety training. Having regular training programs that educate your workers about workplace issues has never been easier than now with
Motorcycle Airbag System
PRESS INFORMATION September 2005 Motorcycle Airbag System Honda Motor Co., Ltd. Introduction Honda has been proactive in fostering driver and rider training as well as developing and implementing active
Owner/ Operator Hauling Asphalt Flux Dies After Driving into a Ravine and Striking Trees
Owner/ Operator Hauling Asphalt Flux Dies After Driving into a Ravine and Striking Trees Incident Number: 11KY072 Photograph of semi involved in this incident. Property of KY FACE. Kentucky Fatality Assessment
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
How To Control Gimbal
Tarot 2-Axis Brushless Gimbal for Gopro User Manual V1.0 1. Introduction Tarot T-2D gimbal is designed for the Gopro Hero3, which is widely used in film, television productions, advertising aerial photography,
NFPA 70E 2012 Rolls Out New Electrical Safety Requirements Affecting Data Centers
NFPA 70E 2012 Rolls Out New Electrical Safety Requirements Affecting Data Centers A market position paper from the experts in Business-Critical Continuity TM Executive Summary Electrocutions are the fourth
Machine Guarding and Operator Safety. Leader Guide and Quiz
4646 Machine Guarding and Operator Safety Leader Guide and Quiz Leader s Guide MACHINE GUARDING & OPERATOR SAFETY INTRODUCTION: A brief description of the program and the subject that it addresses. This
ROTATING MACHINES. Alignment & Positioning of. Fast, easy and accurate alignment of rotating machines, pumps, drives, foundations, etc.
Alignment & Positioning of ROTATING MACHINES Fast, easy and accurate alignment of rotating machines, pumps, drives, foundations, etc. To compete in today s marketplace, you have to outperform your competitors
PhoneWatch Smart Security System User Manual - Domonial
PW0002 10/13 Customer Support: 1850 753 753 PhoneWatch Ltd., Unit 3/4, Sandyford Park, Burton Hall Rd, Sandyford Industrial Estate, Dublin 18. Email: [email protected] PhoneWatch Smart Security System
