Model Driven Development of Certifiable Software: A Best Practice for Safety-Critical Applications
|
|
|
- Kristian Gaines
- 9 years ago
- Views:
Transcription
1 Model Driven Development of Certifiable Software: A Best Practice for Safety-Critical Applications Moving beyond Model Driven Design of Systems to Formal Development of Software as a Best Practice for Certification in Mil/Aero, Industrial, Transportation, and Medical Applications Jerry Krasner, Ph.D., MBA December 2008 Embedded Market Forecasters American Technology International, Inc.
2 About EMF: EMF is the premier market intelligence and advisory firm in the embedded technology industry. Embedded technology refers to the ubiquitous class of products which use some type of processor as a controller. These products include guided missiles, radars, and avionics as well as robots, automobiles, telecom gear, and medical electronics. Embedded Market Forecasters (EMF) is the market research division of American Technology International, Inc. EMF clients range from startups to Global 100 companies worldwide. Founded by Dr. Jerry Krasner, a recognized authority on electronics markets, product development and channel distribution, EMF is headquartered in Framingham, Mass. About the author: Jerry Krasner, Ph.D., MBA is Vice President of Embedded Market Forecasters and its parent company, American Technology International. A recognized authority with over 30 years of embedded industry experience, Dr. Krasner was formerly Chairman of Biomedical Engineering at Boston University, and Chairman of Electrical and Computer Engineering at Wentworth Institute of Technology and Bunker Hill Community College. In addition to his academic appointments, Dr. Krasner served as President of Biocybernetics, Inc. and CLINCO, Inc., Executive Vice President of Plasmedics, Inc. and Clinical Development Corporation, and Director of Medical Sciences for the Carnegie-Mellon Institute of Research. Earlier, he was Senior Engineer at the MIT Instrumentation Laboratory. Dr. Krasner earned BSEE and MSEE degrees from Washington University, a Ph.D. in Medical Physiology / Biophysics from Boston University and an MBA from Nichols College. He is a visiting professor at the Universidad de Las Palmas (Spain) where he is recognized for his work in neurosciences and computer technology. Copyright 2008 by Embedded Market Forecasters, a division of American Technology International, Inc, 1257 Worcester Road #500, Framingham, MA All rights reserved. No part of this document covered by copyright hereon may be reproduced or copied without expressed permission. Every effort has been made to provide accurate data. To the best of the editor s knowledge, data is reliable and complete, but no warranty is made for this.
3 Overview As an old timer I can assure today s developers that they have it good. The plethora of development tools and development processes available today stagger the imagination and make the tools that I had available to me many years ago seem prehistoric. To be honest, designs have become orders of magnitude more complex since I developed software. What is surprising to us (maybe it shouldn t be so surprising) is that developers are so busy that many are unaware of the available design concepts and processes that might shorten their development cycle and produce a better and more reliable product. From the annual detailed EMF surveys of embedded developers one can examine the tools that developers use, the applications that they use them in, whether they are new to the world designs or upgrades from prior designs, the time it takes to start a project and ship the product, and how close to one s final design compares with the pre-design expectation for performance, systems functionality, and features and schedule. Project managers can look at the tools market and processors to be used and see what fellow engineers have experienced. Using data filtering, we can examine each of these data in context with any or all of the others, so we can see what processors or programming languages are used for aerospace, consumer devices, medical applications, etc. Also, we can look at design outcomes where formal methods were employed and compare these to other methods. From year-over-year surveys, EMF is able to determine what practices developers are using (successfully or not) for ten different vertical applications (e.g., automotive, telecom, medical, etc). These data can be used to define different application markets that can create independent documentation to satisfy user needs or established requirements. The Federal Drug Administration s Center for Devices and Radiological Health (CDRH), for example, is responsible for regulating firms who manufacture, repackage, relabel, and/or import medical devices sold in the United States. The FDA in their 510k premarket notification process (required before a product can be sold in the U.S.) stipulates such criteria as proving that the product is Safe and Effective yet it provides no certification guidelines or requirements for software content. So, a developer or vendor can produce a product that meets the 510k requirement without using software best practices processes, or can use OSes or code that has been exposed to rigid testing by certifying agencies. Such software testing is required by the FAA, by the military and by the government for use in mission and safety-critical applications for which a software failure would be catastrophic (bringing down an airliner for example). If a vendor is going to produce a medical product, wouldn t it make sense to develop it in a manner such that failures would be kept to an acceptable minimum? EMF data can be used to determine design outcomes for those that use certified OSes compared with other OSes. 3
4 So why don t medical device manufacturers incorporate such technologies in their designs and processes? The same can be said for other market verticals such as aerospace, military, automotive, and transportation, applications.. While some attention has been given to OSes that meet DO-178B level A certification (or ARINC 653, among others), that meet MILS or Common Criteria, much has been overlooked by developers. Such pre-design considerations as code preservation, code reuse and documentation maintenance that have become paramount for software and systems developers are available with Model Driven Development tools like IBM/Telelogic s Rhapsody and Esterel Technologies SCADE Suite, which also enables software redeployment when underlying hardware has changed. The fact that software can be certified using formal processes and tools has been largely overlooked in the development processes and the shipment of products to these markets. Think of being able not only to use established OSes and tools shown to be most useful in the design and support of products shipped, but to also assure the customer (as well as any regulating agency) that the software meets the stringent requirements set forth with certification, i.e., legal recognition by the certification authority that the software product complies with the requirements. Such certification comprises the activity of technically checking the software product, and the formal recognition of compliance with the applicable requirements. In particular, certification of a software product involves the process of assessing the design of a product to ensure that it complies with a set of standards applicable to that type of product so as to demonstrate an acceptable level of safety and/or security. Standards and Requirements That Are Driving the New Embedded Marketplace As the critical software and tools marketplace seeks a path to new and more profitable markets the strategies of the past are being cast aside as vendors seek to use standardization to their advantage rather than to pursue past based on non-compatibility. Keeping the customers in mind (developers and OEMs) a vendor can benefit from the fact that the use of software standards can reduce costs and enhance the design process: by certifying the software product using formal methods by increasing requirements, design and code reusability, project to project, system to system by reducing the learning curve for developers by enabling swift redeployment of developers, project to project by enabling the use of third-party products that are integrated and tested to work in that environment (e.g., Eclipse) The embedded software and tools marketplace became largely commoditized. RTOS and IDE vendors were competing in a virtual zero sum game. What the embedded industry needed was new and expanding markets particularly those that dwarf the established ones. 4
5 UML has enabled embedded vendors to address new and non-traditional markets markets that are opening and expanding at a rapid rate. These markets are creating new opportunities for smaller vendors as well. One way that the embedded market is expanding is to move into new or larger markets, such as the enterprise and the military. But another way to expand the embedded marketplace is to address the problems of creating safe and secure device software, not merely addressing where to place that software. Niche market opportunities are a characteristic of expanding markets as engineeringdepleted larger companies/oems need smaller and faster responding partners in order to deliver superior products, on-time, and within allowable cost structures. There are three items that characterize the new embedded marketplace: Interoperability Guaranteed software quality Enhanced safety and security By providing any or all of these, any vendor can significantly broaden their market opportunities. Interoperability As software complexity continues to increase and applications are distributed across a wide array of utilizations, it is essential to be able to interoperate software designs many of which have been developed using different RTOSes. This need is amplified by the requirement of forward and backward compatibility in order to upgrade systems without major software rewriting and to reuse existing applications in newer upgrades. One example is the U.S. Navy. Consider the findings of a conference sponsored by the Carnegie-Mellon Software Engineering Institute. The next generation of Navy ships will have a 30 to 50 year life expectancy. The Navy discovered that the cost of on-board personnel (sailors) is extremely costly and the expense forecast on current staffing levels would double the cost of the ship itself. With an all-volunteer military there is also the uncertainty of maintaining staffing levels. Hence there is a major incentive to reduce the number of sailors required on ships by automating processes with highly reliable and secure computing. Central to this strategy is the ability to create application software that can be used and upgraded across a large number of installations. The mission can be summarized as follows: Determine how small a crew is needed to effectively operate all systems. Determine how uniformity can be implemented across all ships and systems enabling a greater uniformity and expedience in training. Software interfaces need to be uniform across all operating systems (e.g., POSIX). As much as possible, existing software should be reusable for newer and upgraded systems. 5
6 Rewriting of software should be held to a minimum. Certified software products can be maintained. Guaranteed Software Quality Requirements for software quality are not limited to one or a few verticals, but are appropriate for many. For example, Aerospace and Defense manufacturers must optimize their device software development to provide next-generation applications with more interoperability, safety, security and connectivity. Central to this need is the ability to qualify both the performance of developed software and the development process that created the software in the first place. This best practice assurance is central to defense acquisitions and to avionics programs across the board. For U.S. coalition and allied forces to counter current and future threats successfully, they must operate worldwide with speed, agility and flexibility. They must have access to accurate, current and timely information, and the capability to share this information securely. In order to meet these requirements aerospace and defense manufacturers are faced with the following: Integrating devices to the Department of Defense's (DoD) Global Information Grid as a key element of future combat power. To support the continued growth and advancement of Net-Centric Warfare capabilities, the DoD requires that all devices will be IPv6 compliant by The NSA has accelerated the requirement that all devices will be compliant. A demand for mission-critical systems with secure connections that meets higher evaluation assurance levels (EAL 6-7) and DO-178B safety certification level A. Adhering to open standards like POSIX and ARINC 653, to facilitate device interoperability. The ability to deploy certified software products is consistent with this effort. If you are the Joint Commission of Accreditation of Health Organization (JCAHO pronounced Jay-co) and are ultimately responsible for setting software and patient information security requirements (as will be required under the Health Information Protection and Accountability Act HIPAA) it should be a no-brainer to look at the security and software performance requirements set forth by the government for defense and avionics applications. A similar case can be made for financial data transfer and acquisition applications that are now dictated by GLB legislation. Enterprise applications that involve company confidential information, e.g., CRM, inventory, pricing schedules, and customer data files, face similar concerns that may be addressed through application of the government s solutions for defense and avionics requirements. 6
7 Enhanced Embedded Safety and Security Embedded systems are responsible for the availability and functionality of many critical systems, from factory automation to gas pipeline monitors to networking equipment. Unfortunately, the critical importance of embedded systems is seldom matched with a strong, comprehensive security infrastructure. Some of the critical security issues presented by modern embedded systems are: Diverse network-connected embedded systems use combinations of custom and COTS software, the details of which are typically known only to the vendor of each embedded device, making vulnerability assessment, risk analysis and patch management difficult. Many embedded protocol implementations derive from older versions of opensource software like OpenSSL and the BSD TCP/IP stack, resulting in vulnerabilities to known attacks, which have since been patched in the main software distributions. Many other protocol implementations are built entirely from scratch and have not benefited from years of public analysis and repeated attack, resulting in unproven protocol implementations that may be vulnerable to attack. Formal methods that insure that code is certifiable can be of value. Even when vulnerabilities are identified, patches must be developed for each device or device family by the vendor, requiring tight collaboration between embedded software developers and the OEM s building devices based on the developers software. Most network-aware embedded devices lack sufficient management and auditing functionality thereby making centralized configuration and monitoring difficult and costly and severely limiting the data available for attack-pattern detection and after-attack forensic analysis. Embedded systems are not always considered an IT responsibility and thus often fall outside IT control resulting in lax policy enforcement, minimal configuration management and auditing, distorted risk analyses and little or no integration with enterprise security tools. Remediation of these issues will require the following: a concerted effort among commercial and custom embedded software developers, OEM s building embedded systems, vendors selling such, and customers purchasing and implementing products based on network-aware embedded software. Until information security becomes a strategic technology for embedded systems developers, their products will continue to be characterized by complacency and vulnerability. However embedded vendors and OEMs alike do not have the time to be complacent regarding security. The U.S. government has mandated that all equipment (including embedded designs) that provide connectivity for any level/type of connectivity, utilize FIPS certified modules for all purchases by the U.S. government and for all procurements by OEMs that have government contracts. The NSA has decreed that there are NO exceptions to the requirement. Device software developers could well increase the reliability of their software by complying with this and other security standards. 7
8 Formal Methods for Certifying Software Products and how it differs from Non- Formal or Semi-Formal Methods We have seen that on the OS and API side, standards and common interfaces are already wide spread and well accepted in the market. Software interfaces (such as POSIX, ARINC653) and communication protocols are standardized or at least industry standards are established. The situation is quite different for core application software development itself, beyond platforms and middleware, where it comes to the real meat of intellectual property, where vendors and developers can differentiate themselves by offering new functionality, innovative algorithms and add real value, the situation is quite different. Model-Driven Development is seen as a way to bring common best practices to this field. We have seen in the past how model-based exploration of the main system algorithms can be used by system designers and control engineers for the development of system requirements that contains greater details than text-based specifications. This allows for simulation of control laws together with a model of the physical environment long before any physical prototypes and systems are available. Going further down, we have also seen how the system engineers can use Model-Driven Design tools such as UML or SysML to build an architectural design of the system. Model-based methods and related tools can be classified into three basic categories. - Non-formal: The method and related models are either based on natural language, or is only defined through its implementation in a tool and it is open to arbitrary new symbols - Semi-formal: The syntax is defined based on a mathematical definition, but the semantics are defined either through natural language or its implementation in a tool - Formal: A fixed language with mathematically defined syntax and semantics. Based on this definition it is clear, that only a formal method will ensure that the specification will be complete, precise and consistent. Now consider the fact that the method and tools used for algorithm exploration, such as Simulink TM, are in general non-formal, the reason being that control engineers need more flexibility than formality when performing this task. Also consider that the methods for creating architectures, such as UML, can be classified as semi-formal. When it comes to developing critical software, our point of view is that formal methods and tools will then provide the necessary rigor for developing and certifying the software product in an efficient way in the various application domains that we have described above. In the end, we obtain the classification presented in Figure 1 below for specifying and developing a critical system: 8
9 Figure 1: Model-Driven Methods and Tools for Developing Critical Systems Let us now continue by stating in thetable 1 the main challenges that have to be faced when developing safety or mission-critical software: 1. Mastering complexity and scaling 2. Avoiding multiple descriptions of the software 3. Fighting ambiguity and lack of accuracy of specifications 4. Avoiding manual coding Certified critical software may be very large and complex in terms of architecture and functionality. It can be distributed over many computing nodes, control thousands of elements and have complex interdependencies. Processes that are mandated by the certification standards divide software development into several phases according to which the related documents are created (requirements specification, software architecture specification, module design, and source code). At each step, it is important to avoid as much as possible rewriting of the software descriptions. This rewriting would not only be expensive, it would also be error-prone. And therefore there is a major risk of inconsistencies between the different descriptions, leading to a significant effort in verification. Requirements and design specifications are traditionally written in some textual-based language, often complemented by non-formal or semi-formal graphical descriptions, such as UML. It is an everyday experience that textual-based languages are subject to interpretation. Their inherent ambiguity can lead to different interpretations, depending on the reader. This is especially true for the dynamic behavior of the applications. How to interpret several parallel sentences containing before X or after Y? Coding is the last transformation in a traditional development process. It takes as input the design specifications. The programmer generally has a limited understanding of the system requirements specification, which makes him 9
10 5. Finding specification and design errors as early as possible 6. Lowering the complexity of 7. Improving verification efficiency 8. Providing an efficient way to store Intellectual Property (IP) vulnerable to ambiguities in the specification. He produces source code, which is difficult, if not impossible, to understand by the author of the initial systems requirements. In this updates approach, the combined risk of interpretation error and coding error is so high that a major part of the lifecycle s verification effort is consumed by code testing. Many specification and design errors are only detected during software integration testing. One reason is that the requirements and design specifications are often ambiguous and subject to interpretation. The other reason is that it is particularly difficult for a human reader to understand the dynamic behavior of a specification described in a non-formal or semi-formal notation. In such a traditional process, the first time one can truly exercise the software is during integration. This is very late in the process. The cost of fixing an error is very much higher than if it has been detected during the specification phase. There are many sources of changes in the software, ranging from bug fixing to function improvement or the introduction of new functions. When something has to be changed, all products of the software life cycle have to be updated consistently, and all verification activities must be performed accordingly. The level of verification for certified safety-critical software is much higher than for other non-safety-critical software. For level A DO-178B avionics software, the overall verification cost may account for up to 80% of total costs. Verification is also a bottleneck for project completion. So, clearly, any change in speed and/or cost of verification has a major impact on the project time and budget. A significant part of the systems suppliers know-how resides in software. It is therefore important to provide tools and methods to efficiently store and access IP relative to these safety-critical systems. Such IP vaults should typically contain: textual requirements, software models, source code, tests cases, and certification artifacts. Table 1: the Challenges of Developing Safety and Mission-Critical Software Let us show how formal methods and tools, such as Esterel Technologies SCADE Suite, which is one of the few tool suites based on formal methods that is wellestablished in the market, provide an answer to the challenges that we have listed above. The Esterel SCADE Suite is based on formal methods and tools and it relies on the DESIGN-VERIFY-GENERATE paradigm, which has been proven in industrial applications to be much more efficient than the traditional DESIGN-CODE-VERIFY paradigm. This is shown in Figure 2. 10
11 Figure 2: the DESIGN- VERIFY- GENERATE Model-Based Development Approach for Certifying Software The main idea behind this lifecycle is to front-load all verification activities at model level, doing these very early and efficiently in the project lifecycle. Design The first step is modeling with SCADE Suite in the formal Scade language. The inputs to this process are the system requirements. This may be English text managed in a COTS Requirements Management tool or it can simply be a Word document. Furthermore, other inputs to the SCADE Suite design paradigm can include the control algorithms, as we discussed earlier, and the system architecture that may be expressed in UML or SysML, two notations that are particularly efficient at this stage. Verify The second step comprises the verification activities: Simulation on the basis of the Scade model. Such a simulation is driven by test cases that are based on system requirements and produces results that are guaranteed to be an exact representation of the behavior that is going to be 11
12 observed on the target. The fundamental reason why this is possible is the complete formality of the underlying Scade notation. Coverage analysis of the Scade model. Certification usually requires that the software contains the required functions and no more than the required function. i.e. the software should not contain any unintended functionality. Model coverage analysis is an efficient way to achieve this objective. Formal verification of safety properties. The fact that Scade is a formal notation enables the execution of formal verification tools that can establish that a safety property is satisfied or not (e.g. the landing gear is not going up while the aircraft is on the ground), without testing, by an exhaustive examination of the state space of the application. Generate Finally, the source code is automatically and entirely generated by the certified code generator. This is only possible because of the inherent formality and rigor of the formal Scade model. Because the code generator produces certified code (e.g. DO-178B at level A) the source code is correct with respect to its specification, i.e. the Scade model. Therefore, there is no need for verification activities such as code reviews or code testing. The application is then integrated on target and can undergo system tests. The fact that the execution model of a SCADE generated application is very simple and very little dependant on the target guarantees a high degree of interoperability, as this was listed earlier as an important objective. Moreover, a set of project management and traceability services are provided by the SCADE model-based development environment (requirements management, configuration management, production of documentation, and certification evidence for such standards as DO-178B for aeronautics, EN for railway, and IEC for industry). In Table 2, let us now assess what the use of formal methods and tools has achieved with regard to the challenges we had listed previously in Table 1: 1. Mastering complexity and scaling 2. Avoiding multiple descriptions of the software 3. Fighting ambiguity and lack of accuracy of specifications Formal models can be used in the context of very large and complex systems, generating in the end potentially millions of lines of source code in real world applications. The initial software requirements can be described as a mix of natural language and semi-formal notation such as UML. Then, a formal model is constructed and it is at the center of all activities in the software development lifecycle (verification, code generation, certification etc). Being formal, Scade provides a notation that is used to describe non-ambiguous, complete and accurate software specifications. 4. Avoiding manual coding Thanks to the SCADE Suite certified code generator, source code can entirely and automatically be generated from a model. 5. Finding specification and design errors as early as possible Verification and validation activities are mostly performed at the level of the formal model. They can therefore start in a very early stage of the project. 12
13 6. Lowering the complexity of updates 7. Improving verification efficiency 8. Providing an efficient way to store Intellectual Property (IP) When a bug is detected, it can be fixed in the formal model, which is re-verified as needed, and code may be re-generated automatically, with no further verification activities. Errors can be detected at a very early stage of the project, thus cutting a lot of the verification cost. Moreover, certification of the code generator eliminates the need for verifying that the source code agrees with the formal model. A formal model is an ideal vehicle to store systems suppliers know-how in the form of re-usable libraries of formal models that are independent from their implementation since source code can be generated for any target. Together with the models, this IP vault would typically contain requirements, verification evidence, and more generally all certification artifacts. Table 2: the Benefits of Formal Methods for the Development of Safety and Mission- Critical Software 13
14 Conclusion Mathematical modeling theories and techniques have been developed over the last 20 years in the context of avionics control and have matured into formal methods and tools for developing critical software. For example, the Airbus 380's fly-by-wire software is automatically generated from such Scade models, and has been a showcase for the European prowess in establishing the right mathematical principles and models for requirements capture, and the transformations required to bridge the gap between system requirements models and certified software development. We have shown in this paper the efficiency and value of the design-verify-generate paradigm. It is now time these methods that have been used with tremendous success primarily in the European Mil/Aero domain, gain further momentum in other regions and industries developing safety-critical applications. Clearly, to remain competitive in the global economy, companies will have to move from manual informal and semi-formal methodologies and tools to proven certified model-based development environments. 14
How Product Development Organizations can Achieve Long- Term Cost Savings Using Model-Based Systems Engineering (MBSE)
How Product Development Organizations can Achieve Long- Term Cost Savings Using Model-Based Systems Engineering (MBSE) How financial managers can achieve lower costs of development, faster deployment of
IBM Rational systems and software solutions for the medical device industry
IBM Software August 2011 IBM Rational systems and software solutions for the medical device industry Improve processes, manage IEC 61508 and IEC 62304 standards, develop quality products Highlights Manage
ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY
ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY Dr. Gregg Wildes DornerWorks www.dornerworks.com Embedded Systems Engineering for Security and Safety-Critical Systems Where Hardware
Effective Software Verification for Medical Devices
STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing
Model Based System Engineering (MBSE) For Accelerating Software Development Cycle
Model Based System Engineering (MBSE) For Accelerating Software Development Cycle Manish Patil Sujith Annamaneni September 2015 1 Contents 1. Abstract... 3 2. MBSE Overview... 4 3. MBSE Development Cycle...
Certification of a Scade 6 compiler
Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What
Getting Embedded C Applications to Market Faster using the Model-Driven Development Technologies of Modeling, Simulation and Code Generation
UML for C Developers Getting Embedded C Applications to Market Faster using the Model-Driven Development Technologies of Modeling, Simulation and Code Generation Jerome L. Krasner, Ph.D. April 2005 EMBEDDED
Best Practices for Verification, Validation, and Test in Model- Based Design
2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based
Six ways to accelerate Android mobile application development
Six ways to accelerate Android mobile application Creating an integrated solution for collaboration among teams Contents 1 Weaving the invisible thread of innovation 2 Android : vast opportunities and
Modernizing enterprise application development with integrated change, build and release management.
Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.
F-22 Raptor. Agenda. 1. Motivation
Model-Based Software Development and Automated Code Generation for Safety-Critical Systems F-22 Raptor for the Seminar Advanced Topics in Software Engineering for Safety-Critical Systems Cause: Bug in
DO-178B compliance: turn an overhead expense into a competitive advantage
IBM Software Rational Aerospace and Defense DO-178B compliance: turn an overhead expense into a competitive advantage 2 DO-178B compliance: turn an overhead expense into a competitive advantage Contents
Development of AUTOSAR Software Components within Model-Based Design
2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior
Technical Data Sheet SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers
661 Solutions for ARINC 661 Compliant Systems SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers SCADE Solutions for ARINC 661 Compliant
Parameters for Efficient Software Certification
Parameters for Efficient Software Certification Roland Wolfig, [email protected] Vienna University of Technology, Real-Time Systems Group 1 Abstract Software certification is a common approach
Software: Driving Innovation for Engineered Products
Software: Driving Innovation for Engineered Products Software in products holds the key to innovations that improve quality, safety, and ease-of-use, as well as add new functions. Software simply makes
SCADE System 17.0. Technical Data Sheet. System Requirements Analysis. Technical Data Sheet SCADE System 17.0 1
SCADE System 17.0 SCADE System is the product line of the ANSYS Embedded software family of products and solutions that empowers users with a systems design environment for use on systems with high dependability
Open Source Business Rules Management System Enables Active Decisions
JBoss Enterprise BRMS Open Source Business Rules Management System Enables Active Decisions What is it? JBoss Enterprise BRMS provides an open source business rules management system that enables active
SCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
Systems and software product lines: the new frontier for business innovation.
Systems and software product line solutions To support your product delivery objectives Systems and software product lines: the new frontier for business innovation. 2 The key to business success depends
Using Linux in Medical Devices: What Developers and
Using Linux in Medical Devices: What Developers and Manufacturers Need to Know By Ken Herold, Engineering Specialist, Wind River INNOVATORS START HERE. EXECUTIVE Overview Linux is the operating system
Open source business rules management system
JBoss Enterprise BRMS Open source business rules management system What is it? JBoss Enterprise BRMS is an open source business rules management system that enables easy business policy and rules development,
Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure
Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for RSA, The Security Division of EMC April 2010
Enhance visibility into and control over software projects IBM Rational change and release management software
Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software
Model-driven development solutions To support your business objectives. IBM Rational Rhapsody edition comparison matrix
Model-driven development solutions To support your business objectives IBM Rhapsody edition comparison matrix IBM Rhapsody 7.5 edition: capabilities and comparisons The enclosed table compares the capabilities
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data
Delivering Vertical Solutions to a Global Market
PARTNERSHIP Microsoft Dynamics AX Microsoft Dynamics Industry Solutions Delivering Vertical Solutions to a Global Market White Paper July 2007 http://www.microsoft.com/dynamics/ax/product/industrysolutions.mspx
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
ENEA: THE PROVEN LEADER IN SAFETY CRITICAL AVIONICS SYSTEMS
ENEA: THE PROVEN LEADER IN SAFETY CRITICAL AVIONICS SYSTEMS [email protected]. www.enea.com For over 40 years, we have been one of the fastest growing avionics consulting companies in the world. Today our
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Executive Summary - 1 -
Executive Summary Eurofighter Typhoon is the world s most advanced swing-role combat aircraft. A highly agile aircraft, it is capable of ground-attack as well as air defence. With 620 aircraft on order,
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Software: Driving Innovation for Engineered Products. Page
Software: Driving Innovation for Engineered Products Software in products holds the key to innovations that improve quality, safety, and ease-of-use, as well as add new functions. Software simply makes
CHOOSING LINUX FOR MEDICAL DEVICES
Advantages, Issues, and Recommendations for Device Manufacturers By Ken Herold, Engineering Specialist, Medical and Security Solutions INNOVATORS START HERE. EXECUTIVE SUMMARY Linux is the operating system
TESSY Automated dynamic module/unit and. CTE Classification Tree Editor. integration testing of embedded applications. for test case specifications
TESSY Automated dynamic module/unit and integration testing of embedded applications CTE Classification Tree Editor for test case specifications Automated module/unit testing and debugging at its best
the state of the practice Variations in Software Development Practices
focus the state of the practice invited article Variations in Software Development Practices Capers Jones, Software Productivity Research My colleagues and I at Software Productivity Research gathered
W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure
W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure Sponsored by: VMware Tim Grieser August 2008 IDC OPINION Global Headquarters: 5 Speen Street Framingham,
Agile Model-Based Systems Engineering (ambse)
Agile Model-Based Systems Engineering (ambse) Bruce Powel Douglass, Ph.D. Chief Evangelist, Global Technology Ambassador IBM Rational [email protected] Twitter: @BruceDouglass Yahoo: tech.groups.yahoo.com/group/rt-uml/
Achieving Functional Safety with Global Resources and Market Reach
Achieving Functional Safety with Global Resources and Market Reach 0A 0B Burner management systems Combustion controls Electric vehicle components (on-board, off board) Electrosensitive equipment Elevator
IF2261 Software Engineering. Introduction. What is software? What is software? What is software? Failure Curve. Software Applications Type
IF2261 Software Engineering Introduction Program Studi Teknik Informatika STEI ITB What is software? Definitions: Computer programs, procedures, and possibly associated documentation and data pertaining
Applying Multi-core and Virtualization to Industrial and Safety-Related Applications
White Paper Wind River Hypervisor and Operating Systems Intel Processors for Embedded Computing Applying Multi-core and Virtualization to Industrial and Safety-Related Applications Multi-core and virtualization
W H I T E P A P E R T h e R o l e o f L i n u x S e r v e r s and Commercial Workloads
W H I T E P A P E R T h e R o l e o f L i n u x S e r v e r s and Commercial Workloads Sponsored by: The Linux Foundation Al Gillen Brett Waldman April 2008 Elaina Stergiades IDC OPINION Global Headquarters:
The MILS Component Integration Approach To Secure Information Sharing
The MILS Component Integration Approach To Secure Information Sharing Carolyn Boettcher, Raytheon, El Segundo CA Rance DeLong, LynuxWorks, San Jose CA John Rushby, SRI International, Menlo Park CA Wilmar
Application Test Management and Quality Assurance
SAP Brief Extensions SAP Quality Center by HP Objectives Application Test Management and Quality Assurance Deliver new software with confidence Deliver new software with confidence Testing is critical
The IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Software Development for Medical Devices
Overcoming the Challenges of Compliance, Quality and Cost An MKS White Paper Introduction Software is fast becoming the differentiator for manufacturers of medical devices. The rewards available from software
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Automating Software License Management
Automating Software License Management Automating license management saves time, resources, and costs. It also consistently produces high quality data and a documentable method for mapping software licenses
When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems. Chris Hobbs, Senior Developer, Safe Systems
When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems Chris Hobbs, Senior Developer, Safe Systems 2 Audience and Assumptions Who will benefit from this presentation? Software designers
Orchestrated. Release Management. Gain insight and control, eliminate ineffective handoffs, and automate application deployments
Orchestrated Release Management Gain insight and control, eliminate ineffective handoffs, and automate application deployments Solution Brief Challenges Release management processes have been characterized
Real Time Developer Studio. Emmanuel Gaudin [email protected]
Real Time Developer Studio Emmanuel Gaudin [email protected] PragmaDev French SME, Beneficiary since 2006. Dedicated to the development of a modelling tool for the development of Event driven
BENEFITS OF MODELING WITH A FORMAL LANGUAGE. Emmanuel Gaudin [email protected]
BENEFITS OF MODELING WITH A FORMAL LANGUAGE Emmanuel Gaudin [email protected] PragmaDev French software editor based in Paris Dedicated to the development of RTDS: a modeling and testing tool
Government. Network and Communications Infrastructure for Federal Government
Government Network and Communications Infrastructure for Federal Government Federal Government Network Infrastructure Challenges Network and communications infrastructures are mission-critical elements
Understanding How to Choose a Database Platform for Siemens PLM Software s Teamcenter
Understanding How to Choose a Database Platform for Siemens PLM Software s Teamcenter White Paper Published: April 2009 For the latest information, see http://www.microsoft.com/sqlserver/2008. Copyright
Propsim enabled Aerospace, Satellite and Airborne Radio System Testing
www.anite.com Propsim enabled Aerospace, Satellite and Airborne Radio System Testing Anite is now part of Keysight Technologies Realistic and repeatable real-time radio channel emulation solutions for
White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business.
White Paper: AlfaPeople ITSM 2013 This whitepaper discusses how ITIL 3.0 can benefit your business. Executive Summary Imagine trying to run a manufacturing business without a comprehensive and detailed
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
IBM Rational Rhapsody
IBM Rational Rhapsody IBM Rational Rhapsody Reference Workflow Guide Version 1.9 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Security in SCADA solutions
Security in SCADA solutions Green Hills Software Peter Hoogenboom Engineering Manager - EMEA 2011 Green Hills Software D&E Event, 22 Sep 2011, Evoluon Eindhoven (NL) Slide 1 Security in SCADA solutions
Whitepaper Accelerating Your Success with Avnet and HP
Accelerating Your Success Whitepaper Accelerating Your Success with Avnet and HP Build your competitive advantage with stable, long-life platforms, global support, and direct engineering access Accelerating
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
Contents. Introduction... 1
Managed SQL Server 2005 Deployments with CA ERwin Data Modeler and Microsoft Visual Studio Team Edition for Database Professionals Helping to Develop, Model, and Maintain Complex Database Architectures
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
Virtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Off-the-Shelf Software: A Broader Picture By Bryan Chojnowski, Reglera Director of Quality
Off-the-Shelf Software: A Broader Picture By Bryan Chojnowski, Reglera Director of Quality In the past decade, there has been a sea change in the business software domain. Many companies are no longer
The Impact of RTCA DO-178C on Software Development
Cognizant 20-20 Insights The Impact of RTCA DO-178C on Software Development By following DO-178C, organizations can implement aeronautical software with clear and consistent ties to existing systems and
WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
Why enterprise data archiving is critical in a changing landscape
Why enterprise data archiving is critical in a changing landscape Ovum white paper for Informatica SUMMARY Catalyst Ovum view The most successful enterprises manage data as strategic asset. They have complete
Christie Price Subcontract Administrator Lockheed Martin Corporation 12257 South Wadsworth Blvd. Littleton, CO 80125
Functional Area 1 - Research and Development Support ISYS provides research and development, thermal design, analysis, research, planning and development support for the Thermal Protection System of the
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas
Agile enterprise content management and the IBM Information Agenda.
Transforming your content into a trusted, strategic asset Agile enterprise content management and the IBM Information Agenda. Delivering a common information framework for uncommon business agility Highlights
How To Improve Your Software
Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing
Answers to Top BRMS Questions
November 2009 Answers to Top BRMS Questions Answers to ten frequently asked questions about what business rule management systems are and how they are used Brett Stineman Product Marketing, Business Rules
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Meeting DO-178B Software Verification Guidelines with Coverity Integrity Center
Meeting DO-178B Software Verification Guidelines with Coverity Integrity Center May, 2009 Thomas Schultz Director of Product Strategy, Coverity, Inc. Executive Summary Development organizations that create
Lecture 8 About Quality and Quality Management Systems
Lecture 8 About Quality and Quality Management Systems Kari Systä 10.03.2014 10.03.2014 TIE-21100/21106; K.Systä 1 Content of today s lecture Two weeks ago we discussed about testing and inspections, that
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
ANSYS SCADE Model-Based Development Solutions for Industrial Equipment and Energy. Critical Systems & Software Development Solutions
ANSYS SCADE Model-Based Development Solutions for Industrial Equipment and Energy Critical Systems & Software Development Solutions Heavy Duty Industrial Equipment Applications Mechatronics Controls and
SERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
Application Deployment Experts
Application Deployment Experts Introduction UNICOM Engineering, a UNICOM Global company, is a leading provider of purpose-built application platforms and lifecycle deployment services for software developers
Global Delivery Excellence Best Practices for Improving Software Process and Tools Adoption. Sunil Shah Technical Lead IBM Rational
Global Delivery Excellence Best Practices for Improving Software Process and Tools Adoption Sunil Shah Technical Lead IBM Rational Agenda Organization s Challenges from a Delivery Perspective Introduction
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.09 July 15, 2015 DoD CIO SUBJECT: Communication Waveform Management and Standardization References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues
Voice Documentation in HIPAA Compliance
Voice Documentation in HIPAA Compliance An OAISYS White Paper Americas Headquarters OAISYS 7965 South Priest Drive, Suite 105 Tempe, AZ 85284 USA www.oaisys.com (480) 496-9040 CONTENTS 1 Introduction 2
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
The Massachusetts Open Cloud (MOC)
The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is
