This document discusses early warning systems and provides definitions from various domains. It notes that there is no universally accepted definition of an early warning system. Descriptions of early warning systems include monitoring systems designed to detect problems in drinking water quality and strategic systems to support proactive business management. The document also discusses a prototype meta-systemic early warning system called SCEWA being developed to monitor water treatment plants in Ireland and support risk management.
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Kymberlee Price
Vulnerability Management Nirvana: A Study in Predicting Exploitability
When everything is a priority, nothing is. 15% or 10,000 vulnerabilities have a CVSS score of 10. Vendors and practitioners alike use CVSS or their own threat intelligence models to predict which vulnerabilities will be exploited next. We review current options, present a predictive data-driven prioritization model, and how attendees can get started using our approach in their vulnerability management program.
Enterprise Class Vulnerability Management Like A Bossrbrockway
A fluid and effective Vulnerability Management Framework, a core pillar in most Enterprise Security Architectures (ESA), remains a continual challenge to most organizations. Ask any of the major breach targets of the past several years. This talk takes the recent OWASP Application Security Verification Standard (ASVS) 2014 framework and applies it to Enterprise Vulnerability Management in an attempt to make a clearly complicated yet necessary part of your organization's ESA much more manageable, effective and efficient with feasible recommendations based on your business' needs.
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
This presentation covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets.
Key take-aways:
* Integrating the 3 critical factors - people, processes & technology
* Saving time and money via automated tools
* Anticipating and overcoming common Vulnerability Management roadblocks
* Meeting security regulations and compliance requirements with Vulnerability Management
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Kymberlee Price
Vulnerability Management Nirvana: A Study in Predicting Exploitability
When everything is a priority, nothing is. 15% or 10,000 vulnerabilities have a CVSS score of 10. Vendors and practitioners alike use CVSS or their own threat intelligence models to predict which vulnerabilities will be exploited next. We review current options, present a predictive data-driven prioritization model, and how attendees can get started using our approach in their vulnerability management program.
Enterprise Class Vulnerability Management Like A Bossrbrockway
A fluid and effective Vulnerability Management Framework, a core pillar in most Enterprise Security Architectures (ESA), remains a continual challenge to most organizations. Ask any of the major breach targets of the past several years. This talk takes the recent OWASP Application Security Verification Standard (ASVS) 2014 framework and applies it to Enterprise Vulnerability Management in an attempt to make a clearly complicated yet necessary part of your organization's ESA much more manageable, effective and efficient with feasible recommendations based on your business' needs.
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
This presentation covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets.
Key take-aways:
* Integrating the 3 critical factors - people, processes & technology
* Saving time and money via automated tools
* Anticipating and overcoming common Vulnerability Management roadblocks
* Meeting security regulations and compliance requirements with Vulnerability Management
Implementing Hot and Cold Air Containment in Existing Data CentersSchneider Electric
Containment solutions can eliminate hot spots and provide energy savings over traditional uncontained data center designs. The best containment solution for an existing facility will depend on the constraints of the facility. While ducted hot aisle containment is preferred for highest efficiency, cold aisle containment tends to be easier and more cost effective for facilities with existing raised floor air distribution. This presentation investigates the constraints, reviews all available containment methods, and provides recommendations for determining the best containment approach.
Introduction
Foreign Object Damage
– An aviation perspective
Health, Safety and Environment – a holistic approach
Engaging the human element
Culture
Leadership’s role
In this presentation from the Institute of Validation Technology's Life Sciences Aseptic Processing, Kim Van Antwerpen discusses collecting environmental data, methods for trending, and interpreting and sharing environmental monitoring data.
1The Nature of SuccessClass SeventeenREVIEW!!!!.docxvickeryr87
1
The Nature of Success
Class Seventeen
REVIEW!!!!
Midterm Exam
1. 55 multiple choice questions
2. Testing your fund of knowledge
3. Mainly from lectures, readings that are directly relevant
4. An ‘A’ means an ‘A’
5. Understand the concepts
November 6
3
The Nature of Success
Class One
Introduction and Course Overview
4
Reality is Amorphous
Draw a line around the system boundary
Indicate the most important challenges the system must face
Indicate how the system interacts to face these challenges
What it means to draw that boundary line
You have defined the domain of success/failure that you want to understand.
You have identified the entities inside the boundary that are needed to achieve success (through their interactions). Thus, you have defined your system.
You have identified the entities outside the boundary that will pose the challenges/opportunities that must be managed by the system for the achievement of success.
You understand that it is the information that comes in from the outside entities and is processed by the inside entities – according to an established set of rules – that defines the functioning of the system.
The systems use of this established set of rules is based on the system’s working model of reality.
Core Ideas
Once a system’s purpose/aims and boundaries are known, then we have to understand the system’s structure and function.
A system’s structure describes the entities contained by the system and the particular way they are organized.
A system’s function describes how the entities interact with each other and how these interactions form the emergent properties of the system.
Emergent properties: The whole is greater than the sum of its parts.
Remarkably, a great variety of different systems have similar structural and functional characteristics.
Understanding these commonalities will make our work much easier.
Once we get all this we will see that Complex Systems – no matter how complex – usually follow a small number of simple rules.
If we can understand the rules of the Complex System containing a domain of success we care about, then we understand the rules that lead to the domain of success we care about.
6
7
The Nature of Success
Class Two
System Observations
8
The Nature of Success
Class Three
What is a System?
Our Basic System Model
Pattern of Emergent
Behavior
Observed Regularities
Behavior of System Elements
Positive
Feedback
Negative
Feedback
Responding to Ever-Changing
Environment
Key Points re Systems
System Boundaries: what’s in and what’s out
System components: what are the entities that comprise the inside of the system?
System interactions: what governs the behavior about how the systems entities interact with each other?
System purpose: What is the system ‘trying’ to accomplish? What does success and failure mean related to this definition of purpose?
System information pr.
The protocols of the Internet of Things (IoT) technology stack
are essential as, without them, the hardware would be rendered
useless, and data communication would be a challenge.
Implementing Hot and Cold Air Containment in Existing Data CentersSchneider Electric
Containment solutions can eliminate hot spots and provide energy savings over traditional uncontained data center designs. The best containment solution for an existing facility will depend on the constraints of the facility. While ducted hot aisle containment is preferred for highest efficiency, cold aisle containment tends to be easier and more cost effective for facilities with existing raised floor air distribution. This presentation investigates the constraints, reviews all available containment methods, and provides recommendations for determining the best containment approach.
Introduction
Foreign Object Damage
– An aviation perspective
Health, Safety and Environment – a holistic approach
Engaging the human element
Culture
Leadership’s role
In this presentation from the Institute of Validation Technology's Life Sciences Aseptic Processing, Kim Van Antwerpen discusses collecting environmental data, methods for trending, and interpreting and sharing environmental monitoring data.
1The Nature of SuccessClass SeventeenREVIEW!!!!.docxvickeryr87
1
The Nature of Success
Class Seventeen
REVIEW!!!!
Midterm Exam
1. 55 multiple choice questions
2. Testing your fund of knowledge
3. Mainly from lectures, readings that are directly relevant
4. An ‘A’ means an ‘A’
5. Understand the concepts
November 6
3
The Nature of Success
Class One
Introduction and Course Overview
4
Reality is Amorphous
Draw a line around the system boundary
Indicate the most important challenges the system must face
Indicate how the system interacts to face these challenges
What it means to draw that boundary line
You have defined the domain of success/failure that you want to understand.
You have identified the entities inside the boundary that are needed to achieve success (through their interactions). Thus, you have defined your system.
You have identified the entities outside the boundary that will pose the challenges/opportunities that must be managed by the system for the achievement of success.
You understand that it is the information that comes in from the outside entities and is processed by the inside entities – according to an established set of rules – that defines the functioning of the system.
The systems use of this established set of rules is based on the system’s working model of reality.
Core Ideas
Once a system’s purpose/aims and boundaries are known, then we have to understand the system’s structure and function.
A system’s structure describes the entities contained by the system and the particular way they are organized.
A system’s function describes how the entities interact with each other and how these interactions form the emergent properties of the system.
Emergent properties: The whole is greater than the sum of its parts.
Remarkably, a great variety of different systems have similar structural and functional characteristics.
Understanding these commonalities will make our work much easier.
Once we get all this we will see that Complex Systems – no matter how complex – usually follow a small number of simple rules.
If we can understand the rules of the Complex System containing a domain of success we care about, then we understand the rules that lead to the domain of success we care about.
6
7
The Nature of Success
Class Two
System Observations
8
The Nature of Success
Class Three
What is a System?
Our Basic System Model
Pattern of Emergent
Behavior
Observed Regularities
Behavior of System Elements
Positive
Feedback
Negative
Feedback
Responding to Ever-Changing
Environment
Key Points re Systems
System Boundaries: what’s in and what’s out
System components: what are the entities that comprise the inside of the system?
System interactions: what governs the behavior about how the systems entities interact with each other?
System purpose: What is the system ‘trying’ to accomplish? What does success and failure mean related to this definition of purpose?
System information pr.
The protocols of the Internet of Things (IoT) technology stack
are essential as, without them, the hardware would be rendered
useless, and data communication would be a challenge.
Improving cyber security using biosecurity experienceNorman Johnson
See the paper that goes with the PPT on my LinkedIn.
See detailed comments in PPT.
Abstract: How does the current planning and response to cyber threats compare to biological threats planning and response? How do the resources of each compare? Biothreats have been a concern for millennia, and humans systems have had significant time and funding to develop a mature response. In this paper we observe that by comparison, cyber response is still in a relatively immature stage, possibly comparable to the state of public health protection prior to the implementation of safe water, sanitary conditions and vaccinations. Furthermore, we argue that because of the similarity between bio- and cyber systems, there are significant opportunities to advance the maturity of cyber research and response, either by using bio analogies for inspiration or by the direct transfer of resources. An analysis of existing cyber resources and gaps are compared to available bio resources. Specific examples are provided for the application of bio-resources to cyber systems.
Crisis Information Management: A Primer, presentation by Sanjana Hattotuwa, Special Advisor, ICT4Peace Foundation. Prepared for ISCRAM Summer School 2011 - http://www.iscram.org/live/summerschool2011.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
1. Early Warning Systems
and
Systems Safety
Dr. Ioannis M. Dokas
Cork Constraint Computation Centre
University College Cork
2.
3. EWS: The Definition Problem
• A universally accepted definition of an early
warning system does not yet exist. Probably
one never will.
(Source: http://ccb.colorado.edu/warning/report.html )
4. Some Facts on EWS
• Many descriptions / definitions
• There is a great variety of designs – development
approaches
• In many domains
– Energy
– Medicine
– Currency crises
– Military
– Crisis Management
– Environment
7. Why This Trent?
• The need of being proactive to accidents and
disasters is getting bigger
• Better tools allow us to imagine that it is
feasible to prevent accidents and better adapt
to disasters
8. Types of Definitions
• Focused on:
– Aim
– How EWS are used in practice
– Functions
– Components
9. Domain: Business Intelligence
• Strategic EWS
• The aim of a competitive EWS is to support
the proactive strategic management of the
business. It is composed of an iterative three
part approach that starts with the Risk
Identification, continues with Risk Monitoring
and ends with the Management Action
10. Domain: Drinking Water
• EWS is an integrated system for monitoring
analyzing interpreting and communicating
monitoring data, which can then be used to
make decisions that are protective of public
health and minimize unnecessary concern and
inconvenience to the public
• Technologies and Techniques for Early Warning Systems to Monitor and Evaluate Drinking Water Quality,
US EPA
11. Domain: Drinking Water
• EWS are used to detect any sudden
deterioration in the quality of the source
drinking water supply either just before the
water goes into the distribution system or
some distance upstream.
• International Life Science Institute (Brosnan 1999)
12. Domain: Drinking Water
• An ideal EWS
– (1) exhibits warning in sufficient time for action,
– (2) provides affordable cost,
– (3) requires low skill and training,
– (4) covers all potential threats,
– (5) identifies the source,
– (6) demonstrates sensitivity to quality changes at regulatory levels,
– (7) gives minimal false positive or negative responses ,
– ( 8) exhibits robustness,
– (9) allows remote operation, and
– (10) functions year-round.
• International Life Science Institute (Brosnan 1999)
13. Dictionary Definition
• A system or procedure designed to warn of a
potential or an impending problem.
– Note: The only action is to warn
14. UN Framework for EWS
(Natural Hazards)
Source : UN - ISDR
Third International Conference on Early Warning 27-29 March 2006 Bonn, Germany
18. Alert Systems vs EWS
• Feedback :
• Comparison between
actual and target values
(Alert Systems)
• Feedforward:
• Detection of possible
disturbances coming
from the environment
(e.g. EWS for Natural
Phenomena)
• Detection of possible
disturbances or
precondition of failures
coming from the
controlled process
(Metasystemic control
and EWS)
20. Proactive Metasystemic Control
• Need to “enter” in to the lower hierarchical
levels of the controlled process
• Identify the feedback control loops which
form the controlled process
• Define how the feedback control loops can fail
22. Metasystemic EWS
• Example: EWS for Drinking Water Treatment
Plants in the Republic of Ireland
• (Brief description will be given at the end of the
presentation)
23. • BUT!!! One Moment Please
• What Metasystemic realy means?
25. Organizations
• Organizations = complex systems
– A collection of hierarchical structured feedback
loops
• Interact with the environment
• To accomplish a purpose (or a hierarchy of
purposes)
• Top purpose: Maintain existence
• Adapt and evolve
26. Cybernetics
• The science of control and communication in
complex, dynamical systems (Wiener, 1948)
• The science of the emergence and design of
order (Malik, 2001)
• The science of effective organization (S. Beer,
1974)
27. Complexity
• Structural: Number of components in a system
or the number of combinations one must
consider in making decisions.
• Dynamic: Arise from the interactions among
agents in time. (Sterman, 2000)
28. Emergence
• Emergent properties are properties of the
‘whole’ not possessed by any of the individual
parts making up this whole.
• Example: Safety
29. Viability
• Viability = The ability to maintain a separate
existence (Beer, 1979)
• An organization should aim at viability beyond
survival – i.e., a viability which transcends
mere maintenance of a given identity
(Schwaninger 1993, 2001b)
30. Variety
• Variety = Measure of Complexity
• The number of different states or modes of
behaviour a certain system can adopt
(Schwaninger, 2006)
31. Elements of a Viable System
• Operations
• Management / Metasystem
32. Law of Requisite Variety (R. Ashby)
• Only variety can destroy/absorb variety
Reality: Ve > Vo > Vm
Ideally: Ve = Vo = Vm
Basic Elements of the VSM model (S. Beer)
33. Principals of Organization (S. Beer)
Managerial, operational and environmental varieties diffusing through an institutional
system, tend to equate; they should be designed to do so with minimum damage to
people and cost.
The four directional channels carrying information between the management unit, the
operation, and the environment must each have a higher capacity to transmit a given
amount of information relevant to variety selection in a given time than the originating
subsystem has to generate it in that time.
Wherever the information carried on a channel capable of distinguishing a given variety
crosses a boundary, it undergoes transduction; the variety of the transducer must be at
least equivalent to the variety of the channel.
34. Elements of a
Viable System
MetaSystem
• S1 – Implementation
• S2 – Co-ordination
• S3 – Internal Control
– S3* Audit
• S4 – Intelligence and
Development
• S5 – Strategy – Policy -
Ethos
36. EWS In Organizations
• “Hard” and “Soft” EWS
– Coherence (Hitchins, 2007)
• A soft system does not have a clear, singular purpose:
instead, it may have many, conflicting purposes,lack
synergy, etc.
• A hard system would have a clear, singular purpose,
and would have all the parts within that system
contributing towards that singular purpose
– Technology (Hitchins, 2007)
• ‘soft’ and ‘hard’ refer not to the coherence of the
system in question, but to the predominance or
otherwise of technology in the system.
37. Metasystemic EWS Do Exist!
• Have the form of safety procedures - periodic
reports - internal regulations
• Existing Metasystemic EWS = Soft EWS
• However. There are not any hard
metasystemic EWS
41. TYPES OF PROBLEMS
S. French et al. (2009) Decision behaviour, analysis and support
42. The Cynefin Framework
• A sense making framework that helps to
categorise problems based on the nature of
the relationship between cause and effect into
five contexts.
http://www.youtube.com/watch?v=N7oz366X0-8
44. Domain: Drinking Water
• An ideal EWS
– (1) exhibits warning in sufficient time for action,
– (2) provides affordable cost,
– (3) requires low skill and training,
– (4) covers all potential threats,
– (5) identifies the source,
– (6) demonstrates sensitivity to quality changes at regulatory levels,
– (7) gives minimal false positive or negative responses ,
– ( 8) exhibits robustness,
– (9) allows remote operation, and
– (10) functions year-round.
• International Life Science Institute (Brosnan 1999)
45. Early Warning
• The expression ‘early warning’ is used in many fields
to mean the provision of information on an emerging
dangerous circumstance where that information can
enable action in advance to reduce the risks involved
(Basher, 2006 Phil. Trans. R. Soc. 364, 2167–2182 doi:10.1098/rsta.2006.1819)
46. Signal – Sign - Alert
• Signal: It needs a transmitter (Measurable – A
strong signal)
• Alert: A verified event which denotes that a
“system level hazard” has occurred
• Sound signal vs Weak Signal
47. Types of Signals
• Those that are beyond our perception
• Those that are within our perception but
unrecognised by our mental models
• Signals recognised by our mental models that
we use to modify our behaviour.
Bryan Coffman, “Weak Signal Research”
http://www.mgtaylor.com/mgtaylor/jotm/winter97/wsrintro.htm
48. Weak Signal
• A development about which only partial
information is available at the moment when the
response must be launched, if it is to be
completed before the development impacts on
the firm. (Ansoff, 1984)
• A weak signal is a factor for change hardly
perceptible at present but which will constitute a
strong trend in the future (Michelle Codet).
49. Filters of Weak Signals (I. Ansoff)
• A weak signal has to pass three different filters
to have an impact
• Strategic EWS
53. Safety
• Safety is an emergent property of systems that
arises when system components interact with
each other within a larger environment (Leveson)
• Safety is a control problem (Leveson, Rasmusen)
• Safety is a dynamic non event (Weik)
– a stable outcome produced by constant adjustments
to system parameters. To achieve stability, change in
one system parameter must be compensated for by
changes in other parameters, through a process of
continuous mutual adjustment.
54. Hazards and Accident
• Hazard: a state or set of conditions of the
system that together with other conditions in
the environment will lead to an accident
• Accident: undesired and unplanned events that
result in a loss
55. Accident Models
• Provide descriptions of the conceptual
elements needed to explain the phenomenon
of accidents.
– sequential,
– epidemiological and
– systemic
56. Sequential
• The sequential models
explain accidents as the
result of a sequence of
“root cause” events
• Social or historical
background of an individual
drive individual to make
an error leads to an
unsafe act or condition
leads to an accident and
an injury. http://www.ekdrm.net/e5783/e17327/e24075/e27357/
57. Common Types of Events
• Component failures, human error, or energy-
related event
• The basic accident model for common hazard
analysis
– FTA, FMECA, Event Trees, etc.
58. Limitations of Hazard Analysis Based
on the Sequential Model
• Social Factors
• Organizational factors
• Software
• Human error
• Adaptation
62. SCEWA Project
• A 5 year research project (800K Euros)
• Begun January 2008
• Goal: To design and develop a prototype web
based early warning system for water
treatment plants
• Aim: To support a Proactive Risk Management
Strategy
63. Drinking Water Quality in Ireland
• Failures in meeting drinking
water standards
• Boil water notices
• Sever consequences
– More than 200 lab-tested cases
of cryptosporidiosis in Galway
• A third of all public water
supplies in Ireland are
vulnerable (EPA report)
64. Drinking Water Safety
• “Safe water” means that potential harmful
substances, depending on their nature and
characteristics, are either absent from the
water or their quantities falls below safety
standards
• Standards are updated periodically
66. Safety: The Basic Concept
• Knowledge of how accidents occur
• From which threats a system must be protected
from
• Safety is considered as emergent property of the
system (interaction among components may
produce hazardous behaviours that are
previously unidentified)
• Monitoring of hazards (physical, chemical,
microbial, radiological agents) only is not enough
67. Approaches for Safe Drinking Water
• Multiple Barrier Approach
• Water Safety Plans
• Hazard Analysis and Critical Control Points
Monitoring and Control
Raw Water Drinking Water
70. Use Case
PROACTIVE
SYSTEM
WARNING
LA SLIGO WTP
SLIGO
WWW
HSE
EPA
71. Selected Methods and Technologies
• Domain Specific Modelling
• Software as a Service
• Bayesian Belief Networks
• Hidden Markov Models (under development)
72. Domain Specific Modelling Language
• Users develop models using a graphical language
which has specific syntax and semantics
• Based on the graphical models executable code is
generated
73. Example
Water Service Authority
Hazard
Analyst State Agency
75. Meta-model
•Eclipse EMF Ecore to perform metamodeling
•Java Persistence API (JPA) annotation for object-
relational mapping approach.
75
76. The Editor
M2T transformation using XPand
• The code is executed with the SMILE BBN
engine
76
77. Technologies
• Eclipse’ GMF has been adopted to build the core
architecture,
• Which consists of two frameworks:
• For Metametamodeling Model-based Eclipse Modeling
Framework (EMF) technology based upon a subset of
the Object Management Group standard (OMG).
• Graphical Editing Framework for graphical editor
creation.
• Other Technologies used are UML2 Tools, OCL, XML
Schema definition
• To provide persistency we have used Teneo, Hibernate.
78. Code Generation
• For code generation openArchitectureWare platform
is integrated in which M2T transformation is
performed using Xpand.
• Further Technologies to be integrated
• PostgreSQL
• Apache Tomcat
• Eclipse Rich Client Platform (RCP)
• Eclipse Rich Ajax Platform (RAP)
79. A SaaS Approach for Socio-technical EWS
•Multi-users scattered all over the country
•Users run the software using a Web browser
•No extra hardware, software nor plug-in
•No upfront license fees required! Pay as you go!
•Easy to update
•Leverage the economy of scale Cost Efficient
80. SaaS Details
• Several Tenants:
– Water Service Authorities
– WTP personnel
– Health Service Executive (HSE)
– Environmental Protection Agency (EPA)
– Drinking Water Laboratories
• User inputs and sensor data are considered as
evidence for the BBNs (SMILE Engine)
• The BBN result represents our updated belief
about the occurrence of a system hazard in
each WTP
81. Technologies Used
• Linux, Apache, MySQL, PHP and PostgreSQL.
• PHP 5.2 was used as the server scripting language
while Apache 2.2 was our Web
• PostgreSQL 8.3 because provides a native support for
XML and a build-in query mechanism based on Xpath
1.0.
• Postgre SQL 8.3 exports the result of a query to an
XML document and check the well-formedness of an
XML document such as XMLPARSE and
XMLSERIALIZE.
88. Metasystemic EWS
• “Typical EWS” provide inputs
• Users provide inputs (e.g. Audit reports, Warning
signals, Change of working conditions)
• Monitoring for the concurrency of signals/events
indicating shift from a safe system state
• The mechanism detecting the deterioration of
safety is based on Systemic Accident models
89. Metasystemic EWS
• The output is not a forecast
• It raises a flag (warnings) when deterioration
of safety has been detected
• The stakeholders who form the governance
model of safety in the system are “tenants” of
the socio-technical EWS
• A socio-technical EWS is a socio-technical
system (it may fail, like the reference system,
due to the same general processes)
90. Thank you
Dr. Ioannis M. Dokas
e-mail: i.dokas@4c.ucc.ie