Discusses sociotechnical issues that arose in the design of a national digital learning system intended for use by more than a million students and their teachers
Discusses sociotechnical issues that arose in the design of a national digital learning system intended for use by more than a million students and their teachers
Knowledge or Rule based Expert systems systems are widely used in engineering applications and in problem-solving. Rapid development today has brought with it environmental problems that cause loss or destruction of natural resources. Environmental impact assessment (EIA) has been acknowledged as a powerful planning and decisionmaking tool to assess new development projects. It requires qualified personnel with special expertise and responsibility in their domain. Rule-based EIA systems incorporate expert’s knowledge and act as a device-giving system. The system has an advantage over human experts and can significantly reduce the complexity of a planning task like EIA.
EU cybersecurity requirements under current and future medical devices regula...Erik Vollebregt
Presentation delivered at Q1 MEDICAL DEVICE CYBERSECURITY RISK MITIGATION conference in Washington on 25 July 2016 concerning EU cybersecurity requirements under current and future medical devices regulation
Knowledge or Rule based Expert systems systems are widely used in engineering applications and in problem-solving. Rapid development today has brought with it environmental problems that cause loss or destruction of natural resources. Environmental impact assessment (EIA) has been acknowledged as a powerful planning and decisionmaking tool to assess new development projects. It requires qualified personnel with special expertise and responsibility in their domain. Rule-based EIA systems incorporate expert’s knowledge and act as a device-giving system. The system has an advantage over human experts and can significantly reduce the complexity of a planning task like EIA.
EU cybersecurity requirements under current and future medical devices regula...Erik Vollebregt
Presentation delivered at Q1 MEDICAL DEVICE CYBERSECURITY RISK MITIGATION conference in Washington on 25 July 2016 concerning EU cybersecurity requirements under current and future medical devices regulation
Presentation at European Big Data Values forum on Fairness, Bias and the role of Ethics Standards in Algorithmic Decision Making. Part of the Data & Society session.
Network Connected Medical Devices - A Case StudySophiaPalmira
In this session, we welcome Shankar Somasundaram, CEO of Asimily, Priyanka Upendra, Quality Compliance Director at Banner Health, and Carrie Whysall. Director of Managed Security Services at CynergisTek.
Together, they will discuss medical device security, covering all you need to know from medical device assessments to remediation efforts. Attendees will leave this session knowing how to apply what they have learned about medical device security in real life.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
2. Dependability requirements engineering, York EngD programme, 2010 Slide 2
Objectives
• To introduce dependability requirements, which are of
particular significance for large-scale systems
• To discuss the notion of safety-critical information
systems and to introduce an exemplar system
concerned with healthcare records management
• To discuss an approach to dependability
requirements derivation based on viewpoints and
concerns that is geared to discovering requirements
conflicts
3. Dependability requirements engineering, York EngD programme, 2010 Slide 3
System dependability
• A system may be considered to be dependable if it
operates without interruption, delivers the services
that are expected by stakeholders, does not have
adverse effects on the system’s environment and
does not damage its data or the system itself.
• Dependability covers:
– Reliability
– Availability
– Safety
– Security
4. Dependability requirements engineering, York EngD programme, 2010 Slide 4
Dependability requirement types
• Non-functional requirements
– Requirements that specify the dependability properties of the
system
– The Probability of Failure on Demand of the Protection
system shall be 0.0001
• Functional requirements
– Requirements that are introduced in order to achieve
dependability as distinct from requirements that reflect the
functionality that is used by system stakeholders
– All data that is maintained on local disks must be encrypted
5. Dependability requirements engineering, York EngD programme, 2010 Slide 5
Integrated requirements engineering
• Dependability requirements are business
requirements so dependability requirements
engineering should not be a separate process but
should be part of the system requirements
engineering process
• Dependability issues should be considered alongside
other business requirements – dependability should
not be compromised but the best way to improve
dependability might be to change other system
requirements
• In this lecture, I will focus on safety requirements
engineering but the approach proposed is equally
applicable to other dependability requirements
6. Dependability requirements engineering, York EngD programme, 2010 Slide 6
Rationale
• Safety is not an isolated system property but must be
considered in conjunction with other properties such
as integrity and timeliness
• Requirements conflicts and trade-offs are harder to
make when safety requirements are distinguished in
some way
• Risks and hazards, especially for information
systems, cannot be identified until you have some
knowledge of the system requirements
7. Dependability requirements engineering, York EngD programme, 2010 Slide 7
Safety-critical information systems
• The safety-critical systems community has focused
its attention on safety-critical control systems
• In those systems, the actual damage that is caused
results from undesirable behaviour of the equipment
that is being controlled
• Increasingly, however, information systems are
safety-critical in that system failure results in indirect
risks to people
• Other systems (not necessarily equipment but also
human systems) may rely on an information system
for their correct functioning. Failure of these systems
may then lead to damage
8. Dependability requirements engineering, York EngD programme, 2010 Slide 8
Examples
• Design systems
– Failure of CAD systems that are used to design critical hardware and
software may lead to the failure of the systems that have been designed
– A story in the 1970s suggested that a number of plane crashes were a result
of errors in a structural analysis program which resulted in structural
weaknesses in the airframe
• Records systems
– Incorrect information or unavailability of records systems may mean that
users of these systems take actions that are potentially dangerous
– If a maintenance record for an aircraft is incorrect, parts that have reached
the end of their design life may not be replaced
• Simulation systems
– Simulation systems that do not match the real environment may result in
incorrect design decisions or misplaced confidence in the integrity of the
system
9. Dependability requirements engineering, York EngD programme, 2010 Slide 9
Secondary risks
• In control systems, the risks (primary risks) are
determined from the characteristics of the equipment
that is being controlled
• This doesn’t mean that risk assessment is easy but it
does provide boundaries for the risk assessment and
helps identify information sources
• In information systems, the risks are secondary risks
(ie they result from the use of some other dependent
system)
• As there may be many dependent systems,
identifying risks is consequently more difficult
10. Dependability requirements engineering, York EngD programme, 2010 Slide 10
Hazard classes
• Data hazards, namely hazards that are associated
with the data processed by the system, are the major
type of hazard in information systems
• Control hazards, hazards that are associated with the
software controlling the system are also significant
11. Dependability requirements engineering, York EngD programme, 2010 Slide 11
Secondary risk example
• An electronic health record in a hospital may be used
in:
– Diagnostic processes
– Anaesthetic processes
– Treatment processes
– Discharge processes
• A failure in that system associated with an individual
record may be non-critical for some of these
processes but critical for others
12. Dependability requirements engineering, York EngD programme, 2010 Slide 12
Control systems and information systems
• Control systems are becoming increasingly data
intensive as more and more operational data is
stored and used
• Control systems are increasingly being directly
connected to information systems so that failure of
the information system is a hazard for the control
system. This type of hazard can be difficult to
manage
13. Dependability requirements engineering, York EngD programme, 2010 Slide 13
The MHCPMS
• This system (not its real name but a real system) is a
generic medical information system that is configured
for use in different regional health trusts
• It supports the management of patients suffering from
mental health problems and provides information on
their treatment to health service managers
14. Dependability requirements engineering, York EngD programme, 2010 Slide 14
System goals
• To provide management information that allows
health service managers to assess performance
against local and government targets
• To provide medical staff with timely information to
facilitate the treatment of patients
15. Dependability requirements engineering, York EngD programme, 2010 Slide 15
Mental health care
• Patients do not always attend the same clinic but may
attend in different hospitals and local health centres
• Patients may be confused and disorganised, miss
appointments, deliberately or accidentally lose
medication, forget instructions and make
unreasonable demands on staff
• Mental health care is safety-critical as a small number
of patients may be a danger to themselves and
others
16. Dependability requirements engineering, York EngD programme, 2010 Slide 16
Concerns
• Safety should be considered as an organisational
goal and should be considered in conjunction with
other organisational goals and business requirements
• Concerns are a general mechanism that we have
devised that are used to reflect organisational goals
• They also reflect constraints on the organisation that
reflect the environment in which the organisation
operates
• They help focus the requirements engineering
process and provide a basis for conflict analysis
17. Dependability requirements engineering, York EngD programme, 2010 Slide 17
Concerns
• Are issues that an organisation must pay attention to
and that are systemic ie they apply to the system as a
whole
• They are cross-cutting issues that may affect all
system stakeholders
• Help bridge the gap between organisational goals
and system requirements
• May exist at a number of levels so may be
decomposed into more specific sub-concerns
18. Dependability requirements engineering, York EngD programme, 2010 Slide 18
Concerns
Software
and
hardware
Safety
Cost
Security
Operators
Society
The organisation
19. Dependability requirements engineering, York EngD programme, 2010 Slide 19
Concerns and safety analysis
• Concerns are completely compatible with safety
analysis as discussed earlier
• However, they provide a mechanism where safety
can be integrated with other critical system
requirements
• They help highlight trade-offs that may have to be
made and conflicts that may arise
20. Dependability requirements engineering, York EngD programme, 2010 Slide 20
Concerns in the MHCPMS
• The principal concerns in the MHCPMS are:
– Safety - the system should help reduce the number of
occasions where patients cause harm to themselves and
others
– Privacy - patient privacy must be maintained according to the
provisions of the Data Protection Act and local ethical
guidelines
– Information quality - the information maintained by the system
must be accurate and up-to date
– Operational costs - the operational costs of the system must
be ‘reasonable’
21. Dependability requirements engineering, York EngD programme, 2010 Slide 21
Concern decomposition
• Concerns are decomposed into sub-concerns:
Information quality
Information integrity
Information accuracy
Information timeliness
22. Dependability requirements engineering, York EngD programme, 2010 Slide 22
The safety concern
Safety
Patient safety
Staff safety
Public safety
Mental Health Act
Accidental self-harm
Deliberate self-harm
Incorrect treatment
Adverse reaction to medication
23. Dependability requirements engineering, York EngD programme, 2010 Slide 23
Concern identification
• The process of establishing concerns is probably best
done in a series of meetings involving business
managers and technical staff
• Brainstorming or a similar technique may be used
• Analysis of concerns between meetings is essential
and someone should take an explicit action to do this
• Several meetings over a relatively short period of
time are required for this stage
24. Dependability requirements engineering, York EngD programme, 2010 Slide 24
From concerns to questions
• A problem that I find with hazard analysis is the
‘requirements gap’. You identify the hazards and
possible root causes but there is no method for going
from there to requirements
• To address this, we proposed that, after sub-
concerns are identified, you should then explicitly
identify questions and sub-questions associated with
each concern
• Answers to these questions come from system
stakeholders and help generate system requirements
25. Dependability requirements engineering, York EngD programme, 2010 Slide 25
Generic questions
• What information relates to the sub-concern being
considered?
• Who requires the information and when do they
require it?
• How is the information delivered?
• What constraints does the (sub) concern impose?
• What are the consequences of failing to deliver this
information?
26. Dependability requirements engineering, York EngD programme, 2010 Slide 26
Deliberate self-harm sub-
concern
• Information about previous history of self-harm or
threats of self-harm
• Medical staff during consultations. Relatives and
carers
• Can be delivered to medical staff directly through the
system. Delivered to relatives and carers through a
message from the clinic
• No obvious constraints imposed
• Failing to deliver may mean an incident of
preventable self-harm occurs
27. Dependability requirements engineering, York EngD programme, 2010 Slide 27
Concern-cross checking
• A generic problem in complex systems is
requirements conflicts where different system
requirements are mutually contradictory
• In my view, separating safety analysis in the RE
process increases the likelihood of conflict and the
costs of resolving that conflict
• Concerns partially address this problem as it allows
cross-checking at a higher level of abstraction than
the requirements themselves
28. Dependability requirements engineering, York EngD programme, 2010 Slide 28
Concern comparison
• Concerns should be compared in pairs to assess the
likelihood of of potential conflicts
• Safety and information quality
– Conflicts only likely if the requirements allow erroneous or out of
date information to be maintained in the system
• Safety and privacy
– Privacy may impose limits on what information can be shared and
who can access that information. Requirements on information
sharing and access should be checked
• Safety and operational costs
– Operational processes that require extensive staff time may be
problematic
29. Dependability requirements engineering, York EngD programme, 2010 Slide 29
The privacy concern
• All information in the system that relates to
identifiable individuals is covered by the Data
Protection Act
• All staff need to be aware of the requirements
imposed by the Act
• There are no information delivery requirements
• Personal information may only be disclosed to
accredited information users
• Failure to address the concern could result in legal
action against the Trust
30. Dependability requirements engineering, York EngD programme, 2010 Slide 30
A requirements conflict
• To reduce the likelihood of deliverate self-harm, the
patient’s relatives should be informed of incidents or
threats of self-harm
• Information may only be disclosed to accredited
information users
• The privacy concern conflicts with the safety concern
31. Dependability requirements engineering, York EngD programme, 2010 Slide 31
Requirements derivation
• Requirements are derived from the answers to the
questions associated with concerns.
• However, there is not a simple 1:1 relationship
between answers and requirements
• By using answers to questions, the problem of
stakeholders suggesting requirements that are too
specific is reduced
32. Dependability requirements engineering, York EngD programme, 2010 Slide 32
MHCPMS requirements
• The system shall provide fields in each patient record
that allow details of incidents or threats of deliberate
self-harm to be maintained
• The records of patients with a record of deliberate
self-harm shall be highlighted to bring them to the
attention of clinical system users
• The system shall only permit the transmission of
personal patient information to accredited staff and to
the patient themselves
33. Dependability requirements engineering, York EngD programme, 2010 Slide 33
Key points
• Dependability requirements focus on the safety,
reliability, availability and security of an LSCITS
• An increasing number of information systems of
various kinds are safety critical systems
• Concerns are a mechanism that allows safety to be
integrated with other business requirements
• Concerns are decomposed to sub-concerns and
questions that then drive the requirements
engineering process