SlideShare a Scribd company logo
1 of 20
Cyber Terrorisim or Terrible Code
#pyconau - 2015
Aimee Maree Forsstrom
@aimee_maree
“We are recovering from a network connectivity
issue this morning and restoring regular flight
operations.”
United Airlines 8th
of July 2015
400,000 passengers grounded
In our HyperConnected Modern World
What is more of a threat?
Which will kill you sooner?
CyberTerrorism
Or Terrible Code
1980 - NORAD reported that the US was under
missile attack. The problem was caused by a
faulty circuit, a possibility the reporting software
hadn’t taken into account.
1983 - Soviet Nuclear early warning system
malfunctioned and erroneously reported
incoming US missiles
Officer in charge decided to follow
gut feelings that it was a false alarm
Potentially avoiding
World War 3 ??
1985 - Therac-25 Radiation Therapy Machine
delivered a high-powered electron beam with 100
times the intended dose of radiation, delivering a
lethal dose of beta radiation
one-byte counter in a testing routine
frequently overflowed
1991 – Gulf War Patriot Missile System software
had a delay and was not tracking the missile
launch in real time, thus giving Iraq’s missile the
opportunity to break through and explode before
anything could be done to stop.
In all, 28 were killed with an additional 100+
injured.
1994 - Scotland, Chinook helicopter crashed and
killed all 29 passengers.
Initially the pilot was blamed for the crash
However evidence rised that a software error was
the actual cause
2000 - Radiation Therapy planning software
delivered different doses depending on the order
in which data was entered.
This resulted in massive overdoses
5 deaths where known potentially 21 died
2003 - Race Condition Bug causes blackout
across eight US states and Canada
affected 50 million people
2003 - Computer software blunder at St. Mary’s
Mercy Medical Center in Grand Rapids, Michigan,
that cost the lives of 8500 patients.
Well on paper anway they where
actually alive
Real Deaths by Terrible Code = 78
False Deaths by Terrible Code = 8500
Deaths by CyberTerrorisim = 0
Software will
EAT the WORLD
Marc Andreessen
Wall Stree Journal, August 2011
As Software EATS the WORLD
Quality of Code becomes
not just important but a nessecity
Its not just a website going down
there are human lifes at stake
In the olden days Infrastructure was built to have
99.9999999% uptime
Modern Containers and MicroServices
architecture allows us to
design infrastrcture for failure
We need to architect our software for failure
We need to accommodate for failures
Software Bugs should NOT take a system down
Fault tolerant Code Design Patterns
There are Human Lives
at Stake
Education is Key
Admitting we dont know everything
Asking for HELP
Learning from Each Other
Test Driven Development
Continous Quality Control
Build Checks into Release Cycles

More Related Content

Viewers also liked

Gesture-aware remote controls: guidelines and interaction techniques
Gesture-aware remote controls: guidelines and interaction techniquesGesture-aware remote controls: guidelines and interaction techniques
Gesture-aware remote controls: guidelines and interaction techniques
Dong-Bach Vo
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
jessicafay2010
 

Viewers also liked (18)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Gesture-aware remote controls: guidelines and interaction techniques
Gesture-aware remote controls: guidelines and interaction techniquesGesture-aware remote controls: guidelines and interaction techniques
Gesture-aware remote controls: guidelines and interaction techniques
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Automatic user state recognition for hand gesture based low cost television c...
Automatic user state recognition for hand gesture based low cost television c...Automatic user state recognition for hand gesture based low cost television c...
Automatic user state recognition for hand gesture based low cost television c...
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Cyber Terrorism or Terrible Code

Body Electric e-lag, Penelope Complex and other e-pathologies - Derrick de K...
Body Electric  e-lag, Penelope Complex and other e-pathologies - Derrick de K...Body Electric  e-lag, Penelope Complex and other e-pathologies - Derrick de K...
Body Electric e-lag, Penelope Complex and other e-pathologies - Derrick de K...
guest12aea7
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
smile790243
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
lisamulka
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
UltraUploader
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
 
A filter that prevents the spread of mail attachment-type trojan horse comput...
A filter that prevents the spread of mail attachment-type trojan horse comput...A filter that prevents the spread of mail attachment-type trojan horse comput...
A filter that prevents the spread of mail attachment-type trojan horse comput...
UltraUploader
 

Similar to Cyber Terrorism or Terrible Code (20)

Software Blunders
Software BlundersSoftware Blunders
Software Blunders
 
technical disaster
technical disastertechnical disaster
technical disaster
 
Wannacry ransomware attack (Sherly)
Wannacry ransomware attack (Sherly)Wannacry ransomware attack (Sherly)
Wannacry ransomware attack (Sherly)
 
Body Electric e-lag, Penelope Complex and other e-pathologies - Derrick de K...
Body Electric  e-lag, Penelope Complex and other e-pathologies - Derrick de K...Body Electric  e-lag, Penelope Complex and other e-pathologies - Derrick de K...
Body Electric e-lag, Penelope Complex and other e-pathologies - Derrick de K...
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
21 infamous & expensive software bugs
21 infamous & expensive software bugs21 infamous & expensive software bugs
21 infamous & expensive software bugs
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
A filter that prevents the spread of mail attachment-type trojan horse comput...
A filter that prevents the spread of mail attachment-type trojan horse comput...A filter that prevents the spread of mail attachment-type trojan horse comput...
A filter that prevents the spread of mail attachment-type trojan horse comput...
 
Port security
Port securityPort security
Port security
 
Malwares
MalwaresMalwares
Malwares
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Case study 11
Case study 11Case study 11
Case study 11
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 

More from Aimee Maree Forsstrom

Govhack - Collections of World War One Connecting the Dots
Govhack - Collections of World War One Connecting the DotsGovhack - Collections of World War One Connecting the Dots
Govhack - Collections of World War One Connecting the Dots
Aimee Maree Forsstrom
 

More from Aimee Maree Forsstrom (20)

AI - PAST, PRESENT, FUTURE.pptx
AI - PAST, PRESENT, FUTURE.pptxAI - PAST, PRESENT, FUTURE.pptx
AI - PAST, PRESENT, FUTURE.pptx
 
Pioneering Technology - My Story
Pioneering Technology - My StoryPioneering Technology - My Story
Pioneering Technology - My Story
 
DOM and Accessibility API Communication
DOM and Accessibility API CommunicationDOM and Accessibility API Communication
DOM and Accessibility API Communication
 
Machine Learning ate my homework
Machine Learning ate my homeworkMachine Learning ate my homework
Machine Learning ate my homework
 
Accessiblity 101 and JavaScript Frameworks
Accessiblity 101 and JavaScript Frameworks Accessiblity 101 and JavaScript Frameworks
Accessiblity 101 and JavaScript Frameworks
 
Accessibility, SEO and Joomla
Accessibility, SEO and JoomlaAccessibility, SEO and Joomla
Accessibility, SEO and Joomla
 
The Good, The Bad, The Voiceover - ios Accessibility
The Good, The Bad, The Voiceover - ios AccessibilityThe Good, The Bad, The Voiceover - ios Accessibility
The Good, The Bad, The Voiceover - ios Accessibility
 
Javascript Framework Acessibiliity Review
Javascript Framework Acessibiliity ReviewJavascript Framework Acessibiliity Review
Javascript Framework Acessibiliity Review
 
DeCoupling Drupal
DeCoupling DrupalDeCoupling Drupal
DeCoupling Drupal
 
Diversity through iOS Development - App Camp 4 Girls
Diversity through iOS Development - App Camp 4 GirlsDiversity through iOS Development - App Camp 4 Girls
Diversity through iOS Development - App Camp 4 Girls
 
Waving an Open Source Flag in Australian Government
Waving an Open Source Flag in Australian GovernmentWaving an Open Source Flag in Australian Government
Waving an Open Source Flag in Australian Government
 
Govhack - Collections of World War One Connecting the Dots
Govhack - Collections of World War One Connecting the DotsGovhack - Collections of World War One Connecting the Dots
Govhack - Collections of World War One Connecting the Dots
 
Accessibility with Joomla [on a budget]
Accessibility with Joomla [on a budget]Accessibility with Joomla [on a budget]
Accessibility with Joomla [on a budget]
 
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
 
Introduction to Python - Training for Kids
Introduction to Python - Training for KidsIntroduction to Python - Training for Kids
Introduction to Python - Training for Kids
 
UK Communications Bill Proposed Changes 2012
UK Communications Bill Proposed Changes 2012UK Communications Bill Proposed Changes 2012
UK Communications Bill Proposed Changes 2012
 
Welcome to the World of Trolls
Welcome to the World of TrollsWelcome to the World of Trolls
Welcome to the World of Trolls
 
Drupal7 themeing changes and inheritence
Drupal7 themeing changes and inheritenceDrupal7 themeing changes and inheritence
Drupal7 themeing changes and inheritence
 
Drupal’s growth
Drupal’s growthDrupal’s growth
Drupal’s growth
 
Help me help you learn
Help me help you learnHelp me help you learn
Help me help you learn
 

Recently uploaded

一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
AS
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
hfkmxufye
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
A
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 

Recently uploaded (20)

一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuineNungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuineSholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 

Cyber Terrorism or Terrible Code

  • 1. Cyber Terrorisim or Terrible Code #pyconau - 2015 Aimee Maree Forsstrom @aimee_maree
  • 2. “We are recovering from a network connectivity issue this morning and restoring regular flight operations.” United Airlines 8th of July 2015 400,000 passengers grounded
  • 3. In our HyperConnected Modern World What is more of a threat? Which will kill you sooner? CyberTerrorism Or Terrible Code
  • 4. 1980 - NORAD reported that the US was under missile attack. The problem was caused by a faulty circuit, a possibility the reporting software hadn’t taken into account.
  • 5. 1983 - Soviet Nuclear early warning system malfunctioned and erroneously reported incoming US missiles Officer in charge decided to follow gut feelings that it was a false alarm
  • 7. 1985 - Therac-25 Radiation Therapy Machine delivered a high-powered electron beam with 100 times the intended dose of radiation, delivering a lethal dose of beta radiation one-byte counter in a testing routine frequently overflowed
  • 8. 1991 – Gulf War Patriot Missile System software had a delay and was not tracking the missile launch in real time, thus giving Iraq’s missile the opportunity to break through and explode before anything could be done to stop. In all, 28 were killed with an additional 100+ injured.
  • 9. 1994 - Scotland, Chinook helicopter crashed and killed all 29 passengers. Initially the pilot was blamed for the crash However evidence rised that a software error was the actual cause
  • 10. 2000 - Radiation Therapy planning software delivered different doses depending on the order in which data was entered. This resulted in massive overdoses 5 deaths where known potentially 21 died
  • 11. 2003 - Race Condition Bug causes blackout across eight US states and Canada affected 50 million people
  • 12. 2003 - Computer software blunder at St. Mary’s Mercy Medical Center in Grand Rapids, Michigan, that cost the lives of 8500 patients.
  • 13. Well on paper anway they where actually alive
  • 14. Real Deaths by Terrible Code = 78 False Deaths by Terrible Code = 8500 Deaths by CyberTerrorisim = 0
  • 15. Software will EAT the WORLD Marc Andreessen Wall Stree Journal, August 2011
  • 16. As Software EATS the WORLD Quality of Code becomes not just important but a nessecity Its not just a website going down there are human lifes at stake
  • 17. In the olden days Infrastructure was built to have 99.9999999% uptime Modern Containers and MicroServices architecture allows us to design infrastrcture for failure
  • 18. We need to architect our software for failure We need to accommodate for failures Software Bugs should NOT take a system down Fault tolerant Code Design Patterns
  • 19. There are Human Lives at Stake
  • 20. Education is Key Admitting we dont know everything Asking for HELP Learning from Each Other Test Driven Development Continous Quality Control Build Checks into Release Cycles