Reaping the benefits of Reusable Software Components
|
|
- Grant Briggs
- 7 years ago
- Views:
Transcription
1 Safety & Security for the Connected World Reaping the benefits of Reusable Software Components The Significance of FAA Reusable Software Component Certification Mark Pitchford
2 The conflicting demands on development The project triangle shows how conflicting demands on a project have the scope to compromise quality Process standards are primarily concerned with Quality and Functionality But Time and Cost are also critical to the viability of the development team (c) Lynx Software Technologies,
3 Software Reuse Software Reuse is an attractive weapon to use in balancing the demands of the project triangle But history shows us that what is proven in one system, may not be quite so appropriate in other circumstances There are examples both outside the realms of aerospace, and much closer to home (c) Lynx Software Technologies,
4 Therac 25 Later model replaced hardware interlocks with software, exposing existing software flaws elsewhere Therac 25 involved in at least 6 accidents in which 100 times the correct dose was applied Standards such as IEC designed to ensure that quality is not compromised And yet cost and time pressures don t go away! (c) Lynx Software Technologies, 2016
5 Ariane 5 Software exception raised in the Inertial Reference System (SRI). Design was almost exactly the same as that used successfully on the Ariane 4, particularly in the case of the software. Standards such as DO-178 are designed to ensure that quality is not compromised And yet cost and time pressures don t go away! (c) Lynx Software Technologies, 2016
6 The overheads of compliance DO-178 focuses on establishing quality software design and development practices. It describes the standard to which the definition of and tracing to requirements, design phases, software development and testing needs to be applied. It describe the artifacts which need to be collated to provide evidence of each completed step (c) Lynx Software Technologies, 2016
7 The principle of risk Risk = Probability of hazardous event occurring x Severity of event (c) Lynx Software Technologies,
8 EFFORT Design Assurance Level The greater the risk, the higher the DAL, the more compliance overhead increases (c) Lynx Software Technologies, 2016
9 Safety Objectives: DO-178C Design Assurance Level Objectives Objectives that must be verified with independence A - Catastrophic B - Hazardous C - Major 62 5 D - Minor 26 2 E No Effect - - (c) Lynx Software Technologies,
10 Safety Objectives: DO-178C (c) Lynx Software Technologies,
11 How much Testing is Enough? For example: Structural Coverage: Statement Coverage Branch Coverage MCDC (Modified Condition / Decision Coverage) Object Code Coverage DO-178B/C level A: 100% coverage of the Object Code (c) Lynx Software Technologies, 2016
12 The conundrum Therac 25 is an early example of the dangers of replacing hardware safety systems with inadequately proven software Ariane 5 shows the dangers of assuming that software proven in one circumstance is necessarily acceptable for another. But showing that a system is not flawed is both expensive and time consuming (c) Lynx Software Technologies, 2016
13 Reusable Software Components The FAA Advisory Circular AC was written in recognition of this conundrum. Because of economic incentives and advances in software component technology, software developers want to develop an RSC that can be integrated into many systems target computers and environments with other system software applications, as determined by the integrator or applicant. In these cases, an RSC developer may partially satisfy the applicable RTCA/DO-178B objectives, while the integrator or applicant completes and shows the compliance for the integrated software package, systems aspects, and aircraft certification. Examples of potential RSCs include software libraries, operating systems, and communication protocols. (c) Lynx Software Technologies, 2016
14 Reusable Software Component What is an RSC? A previously developed software component intended for reuse in follow-on systems in DO-178 projects What is AC ? Provides a means of compliance for RSC developers to take full/partial certification credit for RSC usage in follow-on programs. Motivation Advances in system design & software component technology Trend towards common/reusable components (eg, RTOS & middleware) Build/certify once, deploy often (c) Lynx Software Technologies,
15 Re-use Certification Without RSC Reuse of COTS Product or In-House Solution Suppose it has been certified previously It is incorporated into your DO-178 system & submit for certification The lessons learned from such as Ariane 5 mean that the FAA looks for justification that the software component is appropriate for this application. Without an RSC, that requires all certification artifacts to be regenerated, resubmitted and re-reviewed Result: Time and Money are spent on certifying the same components over and over again. (c) Lynx Software Technologies,
16 RSC RTOS: Modularity is key Application Software System Software Hardware Development Team 1 Development Team 2 Partition 0, Level A/B Partition 1, Level B Partition 2, Level D VCT Cinit POSIX User Mode Health Monitor Supervisor Mode TCP/IP/UDP LynxOS-178 Partitioning Kernel CPU Support Package Microprocessor ARINC POSIX Board Support Package FTP/TFTP ARINC POSIX Static Device Drivers POSIX ARP/ICMP/IGMP PCI DRM SNMPv3 SOCKETS SOCKETS SOCKETS SNTP Hardware Partition N, Level E Process1 PCI Controller Process2 Dynamic Device Drivers Optional Hardware multiple development groups mixed criticalities and increased integration modular architecture (c) Lynx Software Technologies,
17 RSC RTOS: What is the difference? RSC Documentation doesn t stop with the provision of artifacts It includes guidelines to ensure that every interface to the RTOS is clearly specified (c) Lynx Software Technologies,
18 RSC RTOS: What is the difference? This highly specified modularity means that the RTOS can be treated as a black box FAA is satisfied that the application code cannot then cause a problem as long as the instructions are adhered to Adherence to those instructions is then the only required evidence. (c) Lynx Software Technologies,
19 RSC RTOS: What is the difference? In practical terms: The Certifying Authority will not re-examine the RSC component artifacts Modifications / Variations only require a Change Impact Analysis not a full recertification Protects against hardware and software modifications means greater re-use and repeatability (c) Lynx Software Technologies,
20 RSC RTOS: What is the difference? For the Integrator The RSC artifacts provide educational value to the integrator Written guidance and tests help the integrator to assimilate their applications Yields significant savings in labour compared to conventional DO-178 artifacts. (c) Lynx Software Technologies,
21 RSC RTOS: What is the difference? (c) Lynx Software Technologies,
22 What if certification is not mandated? For some systems, it is enough to know that a system is capable of certification For any RSC, the FAA is satisfied that the component will ALWAYS behave as expected. For alternative non-rsc components, they require evidence of that. Whatever your application, that provides evidence of an additional level of quality (c) Lynx Software Technologies,
23 Summary Standards such as DO-178 seek to apply best practice to avoid repeating the mistakes of the past Applying best practice requires time & money the project triangle For aviation projects, specifying an FAA designated RSC RTOS will reduce that effort with no compromise on quality Projects outside the scope of DO-178 certification can also benefit from that thoroughness of engineering, in terms of Presentation of evidence A sound engineering case (c) Lynx Software Technologies,
24 Safety & Security for the Connected World For further information visit or the Lynx stand
AC 20-148 REUSABLE SOFTWARE COMPONENTS
AC 20-148 REUSABLE SOFTWARE COMPONENTS December 7, 2004 12/7/04 AC 20-148 CONTENTS Paragraph Title Page 1. Purpose....1 2. Motivation for this Guidance....1 3. Document Overview...1 4. General Guidelines
More informationParameters for Efficient Software Certification
Parameters for Efficient Software Certification Roland Wolfig, e0327070@student.tuwien.ac.at Vienna University of Technology, Real-Time Systems Group 1 Abstract Software certification is a common approach
More informationARINC 653. An Avionics Standard for Safe, Partitioned Systems
ARINC 653 An Avionics Standard for Safe, Partitioned Systems 1 Courtesy of Wind River Inc. 2008 IEEE-CS Seminar June 4 th, 2008 Agenda Aerospace Trends IMA vs. Federated ARINC 653 Main concepts Safety
More informationThe evolving ARINC 653 standard and it s application to IMA
The evolving ARINC 653 standard and it s application to IMA Alex Wilson Senior Program Manager Wind River November 13 th 2007 IMA and ARINC 653 Agenda DO-297 Certification of IMA under DO-297 Conclusions
More informationSIS 202 - Functional Design 15 minutes
2005 Emerson Process Management. All rights reserved. View this and other courses online at www.plantwebuniversity.com. SIS 202 - Functional Design 15 minutes In this course: 1 Overview 2 Software Types
More informationSAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.com DIGITAL FLIGHT / SOLUTIONS Presentation Outline DO-178 Overview
More informationCertification Authorities Software Team (CAST) Position Paper CAST-9
Certification Authorities Software Team (CAST) Position Paper CAST-9 Considerations for Evaluating Safety Engineering Approaches to Software Assurance Completed January, 2002 NOTE: This position paper
More informationENEA: THE PROVEN LEADER IN SAFETY CRITICAL AVIONICS SYSTEMS
ENEA: THE PROVEN LEADER IN SAFETY CRITICAL AVIONICS SYSTEMS info@enea.com. www.enea.com For over 40 years, we have been one of the fastest growing avionics consulting companies in the world. Today our
More informationPOSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)
RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate
More informationISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY
ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY Dr. Gregg Wildes DornerWorks www.dornerworks.com Embedded Systems Engineering for Security and Safety-Critical Systems Where Hardware
More informationNew Challenges In Certification For Aircraft Software
New Challenges In Certification For Aircraft Software John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Aircraft Software Certification 1 Overview The basics
More informationCertification Authorities Software Team (CAST) Position Paper CAST-18
Certification Authorities Software Team (CAST) Position Paper CAST-18 Reverse Engineering in Certification Projects Completed June 2003 (Rev 1) NOTE: This position paper has been coordinated among the
More informationManaging Software Product Line
* F 2 - Rules for Qualification of Developing and Managing Software Product Line F. Ahmed Electrical & Computer Engineering University of Western Ontario London Ontario, Canada, N5A5B9 sgraha5@uwo.ca L.F.
More informationDate: 9/30/15 AC No: 119-1 Initiated by: AFS-300 Change: 0
U.S. Department of Transportation Federal Aviation Administration Subject: Airworthiness and Operational Authorization of Aircraft Network Security Program (ANSP) Advisory Circular Date: 9/30/15 AC No:
More informationReal-time Operating Systems. VO Embedded Systems Engineering Armin Wasicek 11.12.2012
Real-time Operating Systems VO Embedded Systems Engineering Armin Wasicek 11.12.2012 Overview Introduction OS and RTOS RTOS taxonomy and architecture Application areas Mixed-criticality systems Examples:
More informationFundamental Principles of Software Safety Assurance
Fundamental Principles of Software Safety Assurance Tim Kelly tim.kelly@york.ac.uk Context Lack of agreement in the details of requirements of software safety assurance standards has long been recognised
More informationLife Saving Rules SAFETY BY CHOICE, NOT BY CHANCE
Life Saving Rules SAFETY BY CHOICE, NOT BY CHANCE Foreword from Kevin Reinhart The 12 Life Saving Rules are a part of Nexen s continued commitment to create a safe work environment for our employees. The
More informationTool Qualification Kit for NI TestStand Test Management Software
www.certtech.com Tool Qualification Kit for NI TestStand Test Management Software CertTech, L.L.C. 14425 College Blvd. Suite 140 Lenexa, KS 66215 P (913-814-9770) F (913-817-0837) CertTech s TestStand
More informationTHE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT
THE CHALLENGE The aviation system, essential to the U.S. economy, its quality of life, and national security, is in a sustained period of economic growth. As the system grows, so do the opportunities for
More informationAdvisory Circular. U.S. Department of Transportation Federal Aviation Administration
U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: Airborne Software Assurance Date: 07/19/2013 AC No: 20-115C Initiated by: AIR-120 Change: 1. Purpose of this
More informationMauro Calvano. About Aviation Safety Management Systems
Mauro Calvano About Aviation Safety Management Systems January 2003 1 INTRODUCTION In order to be aware of the factors that are driving the accident rate during the last decade, we must identify the hazards
More informationImproving the Certification and Accreditation Process for DII COE Based Systems
Ground Station Architectures Workshop 2001 Improving the Certification and Process for Based Systems February 21, 2001 Trusted Computer Systems Department Stuart Schaeffer stuart@aero aero.org 2001, The
More informationevm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
More informationPhilosophy of GIMnet
Philosophy of GIMnet Software Modularity and Reusability through Service Oriented Architecture and Hardware Abstraction Introduction GIMnet MaCI GIMnet = tcphub + GIMI Enables communication between distributed
More informationUsing an IEC 61508-Certified RTOS Kernel for Safety-Critical Systems
Using an IEC 61508-Certified RTOS Kernel for Safety-Critical Systems Chris Hobbs, Kernel Developer chobbs@qnx.com Abstract This whitepaper presents the characteristics of a safe kernel, and briefly describes
More informationWIND RIVER RTCA DO-178 SOFTWARE CERTIFICATION SERVICES
WIND RIVER RTCA DO-178 SOFTWARE CERTIFICATION SERVICES Wind River Professional Services RTCA DO-178 Practice provides software certification services to help our customers address their demanding software
More informationDRAFT. Date: DRAFT Initiated by: AFS-300
DRAFT U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: Airworthiness and Operational Approval of Aircraft Network Security Program (ANSP) Date: DRAFT Initiated
More informationNotes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.
Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.
More informationIntroduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level
ISO 26262 the Emerging Automotive Safety Standard Agenda Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 4 : Product Development System Level Part 6 : Product Development
More informationSoftware testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
More informationCompositional Security Evaluation: The MILS approach
Compositional Security Evaluation: The MILS approach John Rushby and Rance DeLong Computer Science Laboratory SRI International Menlo Park CA USA Primary affiliation: LynuxWorks John Rushby, Rance DeLong,
More informationSimplifying Processes Interoperability with a Service Oriented Architecture
Why SOA? Simplifying Processes Interoperability with a Service Oriented Architecture Zak Merzouki, Software Architecture and Technology Director BDPA 11/20/2008 Perspective "Things should be made as simple
More information21st Century Tax Systems: COTS or Service Oriented Architectures. August 3, 2009
21st Century Tax Systems: COTS or Service Oriented Architectures August 3, 2009 Agenda SOA and COTS Defined Integrated Tax Systems Other Tools that support SOA Pros and Cons Additional Considerations 2
More informationTitle & Image NATIONAL CIVIL AVIATION ADMINSTRATION. Advisory Circular
Title & Image NATIONAL CIVIL AVIATION ADMINSTRATION Advisory Circular Subject: CREW RESOURCE MANAGEMENT TRAINING PROGRAMME Issuing Office: [Identity of Office of NCAA issuing ] Document No.: [NCAA AC #]
More informationICAO Language Proficiency in Ab-Initio Flight Training. Ms. Angela C. Albritton Aviation English Consultant acalbritton@yahoo.com.
ICAO Language Proficiency in Ab-Initio Flight Training Ms. Angela C. Albritton Aviation English Consultant acalbritton@yahoo.com Brief Summary Ab-initio cadets are selected using rigorous selection processes.
More informationTesting of safety-critical software some principles
1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6
More informationEXPORT AIRWORTHINESS APPROVALS
Advisory Circular AC 21.17(0) APRIL 1999 EXPORT AIRWORTHINESS APPROVALS CONTENTS 1. References 1 2. Purpose 1 3. Status of this AC 1 4. Classification of products 2 5. General 2 6. Who may apply? 4 7.
More informationReduce Medical Device Compliance Costs with Best Practices. mark.pitchford@ldra.com
Reduce Medical Device Compliance Costs with Best Practices mark.pitchford@ldra.com 1 Agenda Medical Software Certification How new is Critical Software Certification? What do we need to do? What Best Practises
More informationSoftware in safety critical systems
Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions
More informationSafety Analysis and Certification of Open Distributed Systems. P. M. Conmy; Department of Computer Science, University of York, York, YO10 5DD U.K.
Safety Analysis and Certification of Open Distributed Systems P. M. Conmy; Department of Computer Science, University of York, York, YO10 5DD U.K. M. Nicholson; Department of Computer Science, University
More informationQuality Meets the CEO
Quality Meets the CEO Jeffery E. Payne jepayn@rstcorp.com Reliable Software Technologies Corporate management does not care about quality. This is the cold, hard reality of the software world. Management
More informationLynxOS RTOS (Real-Time Operating System)
LynxOS RTOS (Real-Time Operating System) Stephen J. Franz CS-550 Section 1 Fall 2005 1 Summary LynxOS is one of two real time operating systems (RTOS) developed and marketed by LynuxWorks of San José,
More informationSubject Software Aspects of Certification
EASA NOTIFICATION OF A PROPOSAL TO ISSUE A CERTIFICATION MEMORANDUM EASA Proposed CM No.: EASA CM - SWAEH 002 Issue: 02 Issue Date: 22 nd of October 2013 Issued by: Safety, Software & Airborne Electronic
More informationDie wichtigsten Use Cases für MISRA, HIS, SQO, IEC, ISO und Co. - Warum Polyspace DIE Embedded Code-Verifikationslösung ist.
Die wichtigsten Use Cases für MISRA, HIS, SQO, IEC, ISO und Co. - Warum Polyspace DIE Embedded Code-Verifikationslösung ist. Christian Guß Application Engineer The MathWorks GmbH 2015 The MathWorks, Inc.
More informationExample Software Development Process.
Example Software Development Process. The example software development process is shown in Figure A. The boxes represent the software development process kernels. The Software Unit Testing, Software Component
More informationSmarter Balanced Assessment Consortium. Recommendation
Smarter Balanced Assessment Consortium Recommendation Smarter Balanced Quality Assurance Approach Recommendation for the Smarter Balanced Assessment Consortium 20 July 2012 Summary When this document was
More informationSubject: CREW RESOURCE MANAGEMENT TRAINING PROGRAMME
ADVISORY CIRCULAR FOR AIR OPERATORS Subject: CREW RESOURCE MANAGEMENT TRAINING PROGRAMME Date: xx.xx.2013 Initiated By: Republic of Korea AC No: 1. PURPOSE This advisory circular (AC) presents guidelines
More informationRapid Modular Software Integration (RMSI)
Rapid Modular Software Integration (RMSI) Adam Grimm adam.grimm@kihomac.com Overview RMSI Overview Future Airborne Compatibility Environment (FACE ) Analog Computer Rehost Integration of Modular Components
More informationBarriers To Team Success
Barriers To Team Success When plans are inadequate Leaders without leadership skills When members have poor attitudes Training that doesn t train Communications breakdowns Team members don t get along
More informationOperating System for the K computer
Operating System for the K computer Jun Moroo Masahiko Yamada Takeharu Kato For the K computer to achieve the world s highest performance, Fujitsu has worked on the following three performance improvements
More informationCertification Authorities Software Team (CAST) Position Paper CAST-10
Certification Authorities Software Team (CAST) Position Paper CAST-10 What is a Decision in Application of Modified Condition/Decision Coverage (MC/DC) and Decision Coverage (DC)? Completed June 2002 NOTE:
More informationIBM Rational Rhapsody
IBM Rational Rhapsody IBM Rational Rhapsody Kit for DO-178B/C Overview Version 1.8 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated
More informationGaruda Indonesia Airlines CRM Training Program Overview. Capt. Prita Widjaja
Garuda Indonesia Airlines CRM Training Program Overview Capt. Prita Widjaja Aviation s Safety History & Human Factors Threats No defined recognition or training in human factors pre- 1980 Mishaps reach
More informationIntland s Medical Template
Intland s Medical Template Traceability Browser Risk Management & FMEA Medical Wiki Supports compliance with IEC 62304, FDA Title 21 CFR Part 11, ISO 14971, IEC 60601 and more INTLAND codebeamer ALM is
More informationSOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT
SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original
More informationPart 2: The Use of Software in Safety Critical Systems
Part 2: The Use of Software in Safety Critical Systems Software Design of Safety-Critical Systems There are three different concerns: Reliability. (Continuous operation. Absence of errors.) Safety. (Avoiding
More informationThe Software Process. The Unified Process (Cont.) The Unified Process (Cont.)
The Software Process Xiaojun Qi 1 The Unified Process Until recently, three of the most successful object-oriented methodologies were Booch smethod Jacobson s Objectory Rumbaugh s OMT (Object Modeling
More informationAn Enterprise Architect s Approach to Assessment Development
An Enterprise Architect s Approach to Assessment Development How to Architect, Design and Implement an Efficient Assessment-Building Process 2012 Users Conference New Orleans March 20-23 Topics 1. TIBCO
More informationDesign & Manufacture Seminar SOFTWARE SECURITY & DESIGN ASSURANCE JAYSON ROWE SENIOR ENGINEER AVIONICS
Design & Manufacture Seminar SOFTWARE SECURITY & DESIGN ASSURANCE JAYSON ROWE SENIOR ENGINEER AVIONICS Aircraft Network Security Development was required for B787 B787 over 1400 Loadable Software Parts
More informationMeeting DO-178B Software Verification Guidelines with Coverity Integrity Center
Meeting DO-178B Software Verification Guidelines with Coverity Integrity Center May, 2009 Thomas Schultz Director of Product Strategy, Coverity, Inc. Executive Summary Development organizations that create
More informationDO-254 Requirements Traceability
DO-254 Requirements Traceability Louie De Luna, Aldec - June 04, 2013 DO-254 enforces a strict requirements-driven process for the development of commercial airborne electronic hardware. For DO-254, requirements
More informationApplying 4+1 View Architecture with UML 2. White Paper
Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was
More informationSoftware Production. Industrialized integration and validation of TargetLink models for series production
PAGE 24 EB AUTOMOTIVE Industrialized integration and validation of TargetLink models for series production Continuous Software Production The complexity of software systems in vehicles is increasing at
More informationiscsi SANs Don t Have To Suck
iscsi SANs Don t Have To Suck Derek J. Balling, Answers.com Summary: We have created a iscsi SAN architecture which permits maintenance of network components without any downtime,
More informationDr. Brian Murray March 4, 2011
Event that could lead to an accident GM Autonomy HAZARD 1 Q=6e-7 Event that could lead to a hazard Control to prevent HAZARDOUS EVENT 1 HAZARDOUS EVENT 1 HAZARD CONTROL 1 r=6e-008 Q=0.0006 Q=0.001 Q=0.001
More informationCOMMONWEALTH OF MASSACHUSETTS STATE BUILDING CODE 780 CMR, 6 th Edition FIRE PROTECTION SYSTEMS CHAPTER 9
COMMONWEALTH OF MASSACHUSETTS STATE BUILDING CODE 780 CMR, 6 th Edition FIRE PROTECTION SYSTEMS CHAPTER 9 GUIDELINES FOR THE PREPARATION OF FIRE PROTECTION SYSTEM NARRATIVE REPORTS 780 CMR 903.1.1 State
More informationHow To Write Software
1 Medical Device Software - Software Life Cycle Processes IEC 62304 2 Credits John F. Murray Software Compliance Expert U.S. Food and Drug Administration Marcie R. Williams Medical Device Fellow Ph.D.
More informationModular Safety Cases
Modular Safety Cases Facilitating Incremental Upgrade to Military Capability by Managing the Complexity of Safety Assurance Executive Summary Maintaining military capability at state of the art levels,
More informationNon Profit Accounting Basics E-Book
Non Profit Accounting Basics E-Book PG 1 Building a level of trust in the community and with donors is imperative to the success of non profits. PG 2 The purpose of a non profit organization is to meet
More informationOperation of Aircraft
International Standards and Recommended Practices Fatigue Management-related excerpts from: Annex 6 to the Convention on International Civil Aviation Operation of Aircraft Part I International Commercial
More informationFunctional safety. Essential to overall safety
Functional safety Essential to overall safety What is Functional safety? In public spaces, factories, offi ces or homes; we are surrounded by an increasing number of electric and electronic devices and
More informationMoving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them
Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them Table of Contents Executive Summary... 3 Introduction: Opportunities of SaaS... 3 Introducing Nimsoft Service
More informationModule 10: Inventory Managing Stocks at the HIV Rapid Testing Site
Module 10: Inventory Managing Stocks at the HIV Rapid Testing Site Purpose To equip the participants with necessary knowledge so they can properly manage the stocks at the rapid testing sites. Pre-requisite
More informationIndependent Validation of Software Safety Requirements for System of Systems by S. Driskell, J. Murphy, J.B. Michael, M. Shing
Independent Validation of Software Safety Requirements for System of Systems by S. Driskell, J. Murphy, J.B. Michael, M. Shing Presented by Stephen Driskell Stephen.Driskell@TASC.com Judy Murphy jmurphy@mpl.com
More informationVirtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
More informationVAIL-Plant Asset Integrity Management System. Software Development Process
VAIL-Plant Asset Integrity Management System Software Development Process Document Number: VAIL/SDP/2008/008 Engineering For a Safer World P u b l i c Approved by : Ijaz Ul Karim Rao Revision: 0 Page:2-of-15
More informationIF The customer should receive priority service THEN Call within 4 hours PCAI 16.4
Back to Basics Backward Chaining: Expert System Fundamentals By Dustin Huntington Introduction Backward chaining is an incredibly powerful yet widely misunderstood concept, yet it is key to building many
More informationTRAINING PROGRAM APPROVAL PROCESS FOR APPROVED MAINTENANCE ORGANISATIONS (AMOs)
AIRWORTHINESS CIVIL AVIATION AUTHORITY OF BOTSWANA ADVISORY CIRCULAR CAAB Document AAC-020 TRAINING PROGRAM APPROVAL PROCESS FOR APPROVED MAINTENANCE ORGANISATIONS (AMOs) AAC-020 Revision: Original 07
More informationTrustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
More informationWhen COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems. Chris Hobbs, Senior Developer, Safe Systems
When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems Chris Hobbs, Senior Developer, Safe Systems 2 Audience and Assumptions Who will benefit from this presentation? Software designers
More informationInternal Audit Checklist
Internal Audit Checklist 4.2 Policy Verify required elements Verify management commitment Verify available to the public Verify implementation by tracing links back to policy statement Check review/revisions
More informationPikeOS: Multi-Core RTOS for IMA. Dr. Sergey Tverdyshev SYSGO AG 29.10.2012, Moscow
PikeOS: Multi-Core RTOS for IMA Dr. Sergey Tverdyshev SYSGO AG 29.10.2012, Moscow Contents Multi Core Overview Hardware Considerations Multi Core Software Design Certification Consideratins PikeOS Multi-Core
More informationAP STATISTICS 2010 SCORING GUIDELINES
2010 SCORING GUIDELINES Question 4 Intent of Question The primary goals of this question were to (1) assess students ability to calculate an expected value and a standard deviation; (2) recognize the applicability
More informationConfiguration Management for Reusable Software
Configuration Management for Reusable Software William B. Frakes Computer Science Department Virginia Tech wfrakes@vt.edu Abstract This paper discusses the configuration management of reusable software,
More informationRelease: 1. BSBWHS508 Manage WHS hazards associated with plant
Release: 1 BSBWHS508 Manage WHS hazards BSBWHS508 Manage WHS hazards Modification History Release Release 1 Comments This version first released with BSB Business Services Training Package Version 1.0.
More informationIntroduction to Software Engineering
What is Software Engineering Introduction to Software Engineering Prof. Lyle N. Long lnl@psu.edu http://www.personal.psu.edu/lnl Sources of Material What is software? Software Engineering, 7 th Edition,
More informationMemorandum Date: February 5, 2014
Federal Aviation Administration Memorandum Date: February 5, 2014 To: From: Subject: Memo No.: See Distribution List David W. Hempe, Manager, Aircraft Engineering Division, AIR-100 James D. Seipel, Manager,
More informationDOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations
DOWNLOAD COURSE PRESENTATIONS 2 Scan to download course presentations ZYNQ OS SUPPORT 3 AGENDA 4 > OS/Ecosystem Overview > Xilinx Petalinux/OSL > AMP Reference Design Information > Linux Partial Reconfiguration
More informationFROM SAFETY TO SECURITY SOFTWARE ASSESSMENTS AND GUARANTEES FLORENT KIRCHNER (LIST)
FROM SAFETY TO SECURITY SOFTWARE ASSESSMENTS AND GUARANTEES FLORENT KIRCHNER (LIST) M loc 12 ONBOARD SOFTWARE SIZE 10 Volt (2011) F-35 (2012) 8 6 787 (2010) F-35 (2010) 4 2 F-22 (2005) 0 WHY DO WE TRUST
More informationCertification of a Scade 6 compiler
Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What
More informationTESSY Automated dynamic module/unit and. CTE Classification Tree Editor. integration testing of embedded applications. for test case specifications
TESSY Automated dynamic module/unit and integration testing of embedded applications CTE Classification Tree Editor for test case specifications Automated module/unit testing and debugging at its best
More informationCOMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
More informationSoftware Safety Basics
Software Safety Basics (Herrmann, Ch. 2) 1 Patriot missile defense system failure On February 25, 1991, a Patriot missile defense system operating at Dhahran, Saudi Arabia, during Operation Desert Storm
More informationCertification Authorities Software Team (CAST) Position Paper CAST-13
Certification Authorities Software Team (CAST) Position Paper CAST-13 Automatic Code Generation Tools Development Assurance Completed June 2002 NOTE: This position paper has been coordinated among the
More informationDeveloping a Public-Private Partnership Framework: Policies and PPP Units
Note 4 May 2012 Developing a Public-Private Partnership Framework: Policies and PPP Units This note is the fourth in a series of notes on developing a comprehensive policy, legal, and institution framework
More informationThe Concept of Apps as a Tool to Improve Innovation in e-navigation
http://www.transnav.eu the International Journal on Marine Navigation and Safety of Sea Transportation Volume 9 Number 3 September 2015 DOI: 10.12716/1001.09.03.17 The Concept of Apps as a Tool to Improve
More informationEnterprise On The Go: 5 Essentials For BYOD & Mobile Enablement
Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement Introduction: The Opportunities & Challenges of Enterprise Mobility Apps & the Enterprise The existence of smartphones and tablets able to
More information3 August 2014. Software Safety and Security Best Practices A Case Study From Aerospace
3 August 2014 Software Safety and Security Best Practices A Case Study From Aerospace Agenda Introduction Why Aviation? ARINC 653 Real-time Linux on Xen (ARLX) Safety Artifacts for ARLX Security Artifacts
More informationJapan Communication India Skill Development Center
Japan Communication India Skill Development Center Java Application System Developer Course Detail Track 3 Java Application Software Developer: Phase1 SQL Overview 70 Querying & Updating Data (Review)
More information