SlideShare a Scribd company logo
Taking Responsibility for Technology

 November 8, 2012
 11:00 AM – 12:30 PM




Slide: 1
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
Don Shafer
                                   CTO
                                   Athens Group, LLC
                                   dshafer@athensgroup.com

                                   Hosted by:
                                   Michael Milutis
                                   Director of Marketing
                                   Computer Aid, Inc. (CAI)
                                   Michael_Milutis@compaid.com



Slide: 2
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
About Athens Group:

Athens Group provides independent, 3rd party technology
assurance services for high-specification Oil & Gas drilling
and production systems. Our mission is to help operators,
drilling contractors and asset owners ensure safety, reduce
non-productive time (NPT), and safeguard the environment
over the entire asset lifecycle.



 Slide: 3
 11/8/2012
 Webinar Sponsored by Computer Aid, Inc.
CAI Achieves IT Operational Excellence




Slide: 4
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
PDU Credits Available for this Webinar

 • The PMI has accredited this webinar with PDUs

 • You will be eligible to receive 1.0 PDU credits

 • Your PDU email will be sent to you within 24 hours




Slide: 5
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
Online Webinar Recordings
NOW AVAILABLE
 • Anytime Access
 • Hundreds of Topics

 Visit:
 www.ITMPI.org/library

Slide: 6
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
Enjoy the benefits of ITMPI Membership
 JOIN TODAY!
 • UNLIMITED Free Webinar Recordings
 • UNLIMITED Free PDU Credits
 • Hundreds of Topics

 Visit:
 www.ITMPI.org/subscribe

Slide: 7
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
Taking Responsibility for Technology


 In our post-Macondo world, we all must understand the
 technology we are building, implementing and using.




Slide: 8
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
“Controlling” Technology is NOT the point




The life raft was at a 45-degree angle to the water. There's something called a painter
line that these life rafts attach to the rigs. We had pulled all that tight. And no one had
ever cut it. So we're tied to the rig and we're dumping people out of the life raft.
Transocean has a no-knife policy. No pocketknives of any kind. No one had a knife to
cut this line.
                                                         Mike Williams, Chief ET, DWH
       Slide: 9
       11/8/2012
       Webinar Sponsored by Computer Aid, Inc.
Technologists need a Code of Ethics
 We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
 quality of life throughout the world and in accepting a personal obligation to our profession, its
 members and the communities we serve, do hereby commit ourselves to the highest ethical and
 professional conduct and agree:
 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
 public, and to disclose promptly factors that might endanger the public or the environment;
 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
 parties when they do exist;
 3.to be honest and realistic in stating claims or estimates based on available data;
 4.to reject bribery in all its forms;
 5.to improve the understanding of technology, its appropriate application, and potential
 consequences;
 6.to maintain and improve our technical competence and to undertake technological tasks for others
 only if qualified by training or experience, or after full disclosure of pertinent limitations;
 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
 to credit properly the contributions of others;
 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
 national origin;
 9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
 10.to assist colleagues and co-workers in their professional development and to support them in
 following this code of ethics.




     Slide: 10
     11/8/2012
     Webinar Sponsored by Computer Aid, Inc.
Focus on three points:
 We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
 quality of life throughout the world and in accepting a personal obligation to our profession, its
 1. to accept responsibility in making decisions
 members and the communities we serve, do hereby commit ourselves to the highest ethical and
 professional conduct and agree:
 consistent with the safety, health and welfare of
 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
 public, and to disclose promptly factors that might endanger the public or the environment;
 the public, and to disclose promptly factors that
 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
 parties when they do exist;
 might endanger the public or the environment;
 3.to be honest and realistic in stating claims or estimates based on available data;
 4.to reject bribery in all its forms;
 5.to improve the understanding of technology, its appropriate application, and potential
 consequences;
 3. to be honest and realistic in stating claims or
 6.to maintain and improve our technical competence and to undertake technological tasks for others
 only if qualified by training or experience, or after full disclosure of pertinent limitations;
 estimates based on available data;
 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
 to credit properly the contributions of others;
 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
 national origin;
 5. to improve the understanding of technology,
 9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
 10.to assist colleagues and co-workers in their professional development and to support them in
 its appropriate application, and potential
 following this code of ethics.

 consequences;
     Slide: 11
     11/8/2012
     Webinar Sponsored by Computer Aid, Inc.
August 1628
 Vasa, the most lavishly
 appointed and heavily armed
 warship of its day, but one too
 long and too tall for its beam
 and ballast-a matchless array of
 features on an unstable
 platform. The standard stability
 test of the day-30 sailors
 running from side to side trying
 to rock the boat-tilted the Vasa
 perilously, the test was
 canceled and the ship readied
 for launch. Minutes after her
 grand launching, with all
 Stockholm watching, the Vasa
 heeled, listed and sank, killing
 about 50.

    Slide: 12
    11/8/2012
    Webinar Sponsored by Computer Aid, Inc.
December 1903
Burning of Chicago's Iroquois Theater - a supposedly
indestructible, up-to-the-minute design-in this case, a theater
advertised as "absolutely fireproof“ - killed 602 people, more
than twice the toll of "the Great Chicago Fire" 32 years earlier.
The Iroquois's owners acted with as much haste and hubris as
their Titanic counterparts, installing no firefighting equipment,
forgoing fire drills and opening before the sprinkler system was
ready. Instead, like so many others, they relied on a single
technological magic bullet: an asbestos curtain that would drop
down and shield the audience in the (rather common) event of a
backstage fire. An oil-painted backdrop brushed against a hot
calcium-arc spotlight and ignited. The asbestos curtain started
dropping on cue but caught on a stage light. Crew and cast
opened the stage door to flee, admitting a powerful gust that
sent fireballs shooting out over the unshielded audience.
Fleeing patrons either found the doors barred or could not turn
the newfangled latches on them.

  Slide: 13
  11/8/2012
  Webinar Sponsored by Computer Aid, Inc.
December 1903
Burning of Chicago's Iroquois Theater - a supposedly
indestructible, up-to-the-minute design-in this case, a theater
advertised as "absolutely fireproof“ - killed 602 people, more
than twice the toll of "the Great Chicago Fire" 32 years earlier.
The Iroquois's owners acted with as much haste and hubris as
their Titanic counterparts, installing no firefighting equipment,
forgoing fire drills and opening before the sprinkler system was
ready. Instead, like so many others, they relied on a single
technological magic bullet: an asbestos curtain that would drop
down and shield the audience in the (rather common) event of a
backstage fire. An oil-painted backdrop brushed against a hot
calcium-arc spotlight and ignited. The asbestos curtain started
dropping on cue but caught on a stage light. Crew and cast
opened the stage door to flee, admitting a powerful gust that
sent fireballs shooting out over the unshielded audience.
Fleeing patrons either found the doors barred or could not turn
the newfangled latches on them.

  Slide: 14
  11/8/2012
  Webinar Sponsored by Computer Aid, Inc.
July 1979
 Atlantic Empress and Aegean
 Captain, gigantic supertankers
 collide off the island of Little
 Tobago in the Caribbean Sea,
 killing 26 crew members and
 spilling 280,000 tons of crude oil
 into the sea. At the time, it was
 the worst oil-tanker accident in
 history and remains one of the
 very few times in history when
 two oil tankers have collided.




    Slide: 15
    11/8/2012
    Webinar Sponsored by Computer Aid, Inc.
July 1981
 On July 17, 1981, approximately
 1,600 people gathered in the
 Hyatt Regency Kansas City
 atrium to participate in and watch
 a dance competition. The fourth
 floor walkway collapsed onto the
 second floor and both walkways
 then fell to the lobby floor below,
 resulting in 114 deaths and 216
 injuries. The basic problem was a
 lack of proper communication,
 failure to review the initial design
 thoroughly, and failure to perform
 basic calculations that would
 have revealed its serious intrinsic
 flaws — in particular, the doubling
 of the load on the fourth-floor
 beams.


     Slide: 16
     11/8/2012
     Webinar Sponsored by Computer Aid, Inc.
April 1986
 Chernobyl was a nuclear power plant in
 Ukraine that suffered a catastrophic
 meltdown. On April 26, 1986, one of the
 reactors underwent rapid overheating,
 leading to a meltdown that released an
 enormous cloud of radioactive fallout,
 simultaneously endangering the lives of
 hundreds of thousands of people in
 surrounding areas. Since the disaster,
 over 4,000 people have died due to
 cancer from the radiation. As it stands
 today, Chernobyl has a 17-mile radius
 ―Exclusion Zone‖ which is considered
 too hazardous to live safely in. Scientists
 estimate that Chernobyl will become fully
 safe to inhabit – in 20,000 years.
        Close but no cigar:
                  Three Mile Island
                  Hanford N-Reactor


     Slide: 17
     11/8/2012
     Webinar Sponsored by Computer Aid, Inc.
August 2007
The I-35W Mississippi River bridge
was an eight-lane, steel truss arch
bridge that carried Interstate 35W
across the Mississippi River in
Minneapolis. During the evening
rush hour on August 1, 2007, it
suddenly collapsed, killing 13
people and injuring 145. NTSB
found the primary cause was the
under-sized gusset plates.
Contributing to that error was the
fact that 2 inches of concrete were
added to the road surface over the
years, increasing the dead load by
20%. Also contributing was the
extraordinary weight of construction
equipment and material resting on
the bridge just above its weakest
point at the time of the collapse.


      Slide: 18
      11/8/2012
      Webinar Sponsored by Computer Aid, Inc.
October 2009
  Husky Racer: Toppled Boxes Top Heavy Due to Software Glitch
         Maersk Line – 18 Containers lost overboard
The preliminary examination of the
accident found that the inaccurate
container weights were on the loading
plan because of a system shortcoming
which did not update the operations
department when the shipper provided
more accurate contents details to the
carrier.
Maersk Line is running trials on an
upgraded software package that will
provide cargo planners with the declared
weights of the containers. This is
scheduled to be introduced in the first
weeks of January 2010.


      Slide: 19
      11/8/2012
      Webinar Sponsored by Computer Aid, Inc.
December 2009
                                          A control system failure occurred on a large, off-shore
                                          construction vessel. Two control units were restarted twice,
                                          unsuccessfully. A blinking red lamp on the PLC indicated that a
                                          memory reset was required, even though a memory reset had
                                          NEVER been requested by control system diagnostics during
                                          equipment operations. As soon as the hydraulic power packs
                                          started, a loud bang was heard. A quadruple joint of pipe
                                          dropped approximately one meter to the welding deck below.
                                          A second quadruple joint of pipe in the pipe elevator was
                                          released (all clamps opened and the hydraulic safety stop
                                          swung away) and fell the full length of the tower, smashing
                                          through a crowded access platform to the deck below.

                                                                       Result

                                          Eight personnel were injured - four fatally. All were located on
                                          the access platform and several were thrown overboard by the
                                          impact.


Slide: 20
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
IEEE Code of Ethics
 We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
 quality of life throughout the world and in accepting a personal obligation to our profession, its
 1. to accept responsibility in making decisions
 members and the communities we serve, do hereby commit ourselves to the highest ethical and
 professional conduct and agree:
 consistent with the safety, health and welfare of
 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
 public, and to disclose promptly factors that might endanger the public or the environment;
 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
 the public, and to disclose promptly factors that
 parties when they do exist;
 3.to be honest and realistic in stating claims or estimates based on available data;
 might endanger the public or the environment;
 4.to reject bribery in all its forms;
 5.to improve the understanding of technology, its appropriate application, and potential
 consequences;
 6.to maintain and improve our technical competence and to undertake technological tasks for others
 3. to be honest and realistic in stating claims or
 only if qualified by training or experience, or after full disclosure of pertinent limitations;
 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
 to credit properly the contributions of others;
 estimates based on available data;
 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
 national origin;
 9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
 10.to assist colleagues and co-workers in their professional development and to support them in
 following this code of ethics.




     Slide: 21
     11/8/2012
     Webinar Sponsored by Computer Aid, Inc.
Opportunities LOST!
1.      June 22, 2009 - Mark E. Hafle, a senior drilling engineer at BP, warns that the metal casing for
        the blowout preventer might collapse under high pressure.
2.      March 2010 - An accident damages a gasket on the blowout preventer on the rig.
3.      April 1 - Halliburton employee Marvin Volek warns that BP's use of cement "was against our
        best practices.―
4.      April 6 - MMS issues permit to BP for the well with the notation, "Exercise caution while drilling
        due to indications of shallow gas and possible water flow."
5.      April 9 - BP drills last section with the wellbore 18,360 feet below sea level but the last 1,192
        feet need casing. Halliburton recommends liner/tieback casing that will provide 4 redundant
        barriers to flow. BP chooses to do a single liner with fewer barriers that is faster to install and
        cheaper ($7 to $10 million).
6.      April 15 - Morel informs Halliburton executive Jesse Gagliano that they plan to use 6
        centralizers. Gagliano says they should use 21.
7.      April 15 - Gagliano also recommends to circulate the drilling mud from the bottom of the well all
        the way up to the surface to remove air pockets and debris which can contaminate the cement,
        saying in an email, at "least circulate one bottoms up on the well before doing a cement job."
        Despite this recommendation, BP cycles only 261 barrels (41.5 m 3) of mud, a fraction of the
        total mud used in the well.
8.      April 17 - Gagliano now reports that using only 6 centralizers "would likely produce channeling
        and a failure of the cement job."
9.      April 18 - Gagliano's report says "well is considered to have a severe gas flow problem."
10.     April 20 -7 am - BP cancels a recommended cement bond log test.


      Slide: 22
      11/8/2012
      Webinar Sponsored by Computer Aid, Inc.
IEEE Code of Ethics
 We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
 1. to accept responsibility in making decisions
 quality of life throughout the world and in accepting a personal obligation to our profession, its
 members and the communities we serve, do hereby commit ourselves to the highest ethical and
 consistent with the safety, health and welfare of
 professional conduct and agree:
 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
 the public, and to disclose promptly factors that
 public, and to disclose promptly factors that might endanger the public or the environment;
 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
 might endanger the public or the environment;
 parties when they do exist;
 3.to be honest and realistic in stating claims or estimates based on available data;
 4.to reject bribery in all its forms;
 5.to improve the understanding of technology, its appropriate application, and potential
 3. to be honest and realistic in stating claims or
 consequences;
 6.to maintain and improve our technical competence and to undertake technological tasks for others
 estimates based on available data;
 only if qualified by training or experience, or after full disclosure of pertinent limitations;
 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
 to credit properly the contributions of others;
 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
 national origin;
 9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
  5. to improve the understanding of technology,
 10.to assist colleagues and co-workers in their professional development and to support them in
 following this code of ethics.
  its appropriate application, and potential
  consequences;
     Slide: 23
     11/8/2012
     Webinar Sponsored by Computer Aid, Inc.
Don Shafer, CSDP
Chief Technology and Safety Officer
Athens Group, Inc.
560824
Slide:
       Parkcrest Drive, Suite 200
Austin, Tx 78731
11/8/2012
donshafer@ieee.org
Webinar Sponsored by Computer Aid, Inc.
www.athensgroup.com
Questions?




Slide: 25
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
CAI Sponsors Proudly Sponsors
 The IT Metrics & Productivity Institute
 •    IT and Software Knowledge Center: WWW.ITMPI.ORG
 •    Weekly Webinars Hosted by Industry Leaders: WWW.ITMPI.ORG / WEBINARS
 •    Access Webinar Recordings Anytime at WWW.ITMPI.ORG / LIBRARY
 •    Enjoy the Benefits of ITMPI Membership at WWW.ITMPI.ORG / SUBSCRIBE
 •    Follow Us on TWITTER at WWW.TWITTER.COM / ITMPI
 •    Follow Us on FACEBOOK at WWW.ITMPI.ORG/ FACEBOOK
 •    Join Our Network on LINKED IN at WWW.ITMPI.ORG/ LINKEDIN
 •    Find Out About Our CONFERENCES at WWW.ITMPI.ORG/ EVENTS



Slide: 26
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
Subscribe to the AITS Newsletter
• Daily articles in your mailbox on improving the management
  of IT. Subscribe at www.AITS.org
• Listen to our ―Thought Radio‖ podcasts on iTunes or at
  www.AITS.org




   Slide: 27
   11/8/2012
   Webinar Sponsored by Computer Aid, Inc.
Don Shafer
                                    CTO
                                    Athens Group, LLC
                                    dshafer@athensgroup.com
                                   Hosted by:
                                   Michael Milutis
                                   Director of Marketing
                                   Computer Aid, Inc. (CAI)
                                   Michael_Milutis@compaid.com



Slide: 28
11/8/2012
Webinar Sponsored by Computer Aid, Inc.

More Related Content

Viewers also liked

ICT for development options for researchers: A view of Computer Aid Internati...
ICT for development options for researchers: A view of Computer Aid Internati...ICT for development options for researchers: A view of Computer Aid Internati...
ICT for development options for researchers: A view of Computer Aid Internati...
BioMedCentral
 
Information technology
Information technologyInformation technology
Information technology
Ankit Goyal
 
Expanding access to information technology in Africa
Expanding access to information technology in AfricaExpanding access to information technology in Africa
Expanding access to information technology in Africa
BioMedCentral
 
Rp1 Sarahdonnelly
Rp1 SarahdonnellyRp1 Sarahdonnelly
Rp1 Sarahdonnelly
sarahjade
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copy
miss yhda
 
Computer as a teachers tool
Computer as a teachers toolComputer as a teachers tool
Computer as a teachers tool
Rodmie Colene Tamang
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
Allana Delgado
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power point
oacore2
 

Viewers also liked (8)

ICT for development options for researchers: A view of Computer Aid Internati...
ICT for development options for researchers: A view of Computer Aid Internati...ICT for development options for researchers: A view of Computer Aid Internati...
ICT for development options for researchers: A view of Computer Aid Internati...
 
Information technology
Information technologyInformation technology
Information technology
 
Expanding access to information technology in Africa
Expanding access to information technology in AfricaExpanding access to information technology in Africa
Expanding access to information technology in Africa
 
Rp1 Sarahdonnelly
Rp1 SarahdonnellyRp1 Sarahdonnelly
Rp1 Sarahdonnelly
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copy
 
Computer as a teachers tool
Computer as a teachers toolComputer as a teachers tool
Computer as a teachers tool
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power point
 

Similar to Taking Responsibility for Technology

2015 International ESD Workshop
2015 International ESD Workshop2015 International ESD Workshop
2015 International ESD Workshop
ESD association
 
IEEE GLOBECOM Patronage
IEEE GLOBECOM Patronage IEEE GLOBECOM Patronage
IEEE GLOBECOM Patronage
IEEE Communications Society
 
2015 IEW call for papers
2015 IEW call for papers2015 IEW call for papers
2015 IEW call for papers
ESD association
 
Design ethics f
Design ethics fDesign ethics f
Design ethics f
R. Sosa
 
Technological innovations and users requirements: how to fill the gap? An end...
Technological innovations and users requirements: how to fill the gap? An end...Technological innovations and users requirements: how to fill the gap? An end...
Technological innovations and users requirements: how to fill the gap? An end...
AEGIS-ACCESSIBLE Projects
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
TechSoup
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015
ctgoff
 
-- Search the web for an engineering related ethicsdisaster cas
-- Search the web for an engineering related ethicsdisaster cas-- Search the web for an engineering related ethicsdisaster cas
-- Search the web for an engineering related ethicsdisaster cas
hirstcruz
 
Disruptive technologies
Disruptive technologiesDisruptive technologies
Disruptive technologies
Fraser Henderson
 
Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009
Ed Mitchell
 
2012 National Launch Party Program Guide
2012 National Launch Party Program Guide2012 National Launch Party Program Guide
2012 National Launch Party Program Guide
CleantechOpen
 
Shell Technology Futures 2004
Shell Technology Futures 2004Shell Technology Futures 2004
Shell Technology Futures 2004
Tim Jones
 
The perception gap: the barrier to disruptive innovation in telecoms
The perception gap: the barrier to disruptive innovation in telecomsThe perception gap: the barrier to disruptive innovation in telecoms
The perception gap: the barrier to disruptive innovation in telecoms
Martin Geddes
 
Education information - Guest Speaker Brian Schupbach
Education information - Guest Speaker Brian SchupbachEducation information - Guest Speaker Brian Schupbach
Education information - Guest Speaker Brian Schupbach
Brian Schupbach
 
Opening Innovation
Opening InnovationOpening Innovation
Opening Innovation
Michael Heiss
 
BIAC Hackathon Lightning Talks
BIAC Hackathon Lightning TalksBIAC Hackathon Lightning Talks
BIAC Hackathon Lightning Talks
Ed Donahue
 
hoja 2.docx
hoja 2.docxhoja 2.docx
hoja 2.docx
LionGiraldo1
 
Making AT
Making ATMaking AT
Making AT
Karl O'Keeffe
 
The_Ethics_of_Video_Downloading_Navigati.pdf
The_Ethics_of_Video_Downloading_Navigati.pdfThe_Ethics_of_Video_Downloading_Navigati.pdf
The_Ethics_of_Video_Downloading_Navigati.pdf
Andy Tabachnikov
 
Avit infrastructure guide
Avit infrastructure guideAvit infrastructure guide
Avit infrastructure guide
Harsha Vardhan Kancharla
 

Similar to Taking Responsibility for Technology (20)

2015 International ESD Workshop
2015 International ESD Workshop2015 International ESD Workshop
2015 International ESD Workshop
 
IEEE GLOBECOM Patronage
IEEE GLOBECOM Patronage IEEE GLOBECOM Patronage
IEEE GLOBECOM Patronage
 
2015 IEW call for papers
2015 IEW call for papers2015 IEW call for papers
2015 IEW call for papers
 
Design ethics f
Design ethics fDesign ethics f
Design ethics f
 
Technological innovations and users requirements: how to fill the gap? An end...
Technological innovations and users requirements: how to fill the gap? An end...Technological innovations and users requirements: how to fill the gap? An end...
Technological innovations and users requirements: how to fill the gap? An end...
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015
 
-- Search the web for an engineering related ethicsdisaster cas
-- Search the web for an engineering related ethicsdisaster cas-- Search the web for an engineering related ethicsdisaster cas
-- Search the web for an engineering related ethicsdisaster cas
 
Disruptive technologies
Disruptive technologiesDisruptive technologies
Disruptive technologies
 
Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009
 
2012 National Launch Party Program Guide
2012 National Launch Party Program Guide2012 National Launch Party Program Guide
2012 National Launch Party Program Guide
 
Shell Technology Futures 2004
Shell Technology Futures 2004Shell Technology Futures 2004
Shell Technology Futures 2004
 
The perception gap: the barrier to disruptive innovation in telecoms
The perception gap: the barrier to disruptive innovation in telecomsThe perception gap: the barrier to disruptive innovation in telecoms
The perception gap: the barrier to disruptive innovation in telecoms
 
Education information - Guest Speaker Brian Schupbach
Education information - Guest Speaker Brian SchupbachEducation information - Guest Speaker Brian Schupbach
Education information - Guest Speaker Brian Schupbach
 
Opening Innovation
Opening InnovationOpening Innovation
Opening Innovation
 
BIAC Hackathon Lightning Talks
BIAC Hackathon Lightning TalksBIAC Hackathon Lightning Talks
BIAC Hackathon Lightning Talks
 
hoja 2.docx
hoja 2.docxhoja 2.docx
hoja 2.docx
 
Making AT
Making ATMaking AT
Making AT
 
The_Ethics_of_Video_Downloading_Navigati.pdf
The_Ethics_of_Video_Downloading_Navigati.pdfThe_Ethics_of_Video_Downloading_Navigati.pdf
The_Ethics_of_Video_Downloading_Navigati.pdf
 
Avit infrastructure guide
Avit infrastructure guideAvit infrastructure guide
Avit infrastructure guide
 

More from Computer Aid, Inc

A Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI PulseA Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI Pulse
Computer Aid, Inc
 
Management by Walking Around
Management by Walking AroundManagement by Walking Around
Management by Walking Around
Computer Aid, Inc
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) Security
Computer Aid, Inc
 
Knowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerKnowledge Management - By Joe Hessmiller
Knowledge Management - By Joe Hessmiller
Computer Aid, Inc
 
Why Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe HessmillerWhy Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe Hessmiller
Computer Aid, Inc
 
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Computer Aid, Inc
 
Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)
Computer Aid, Inc
 
APO State Government Business Brief
APO State Government Business BriefAPO State Government Business Brief
APO State Government Business Brief
Computer Aid, Inc
 
White paper-management-by-walking-around
White paper-management-by-walking-aroundWhite paper-management-by-walking-around
White paper-management-by-walking-around
Computer Aid, Inc
 
Leadership, Presented at Lehigh University
Leadership, Presented at Lehigh UniversityLeadership, Presented at Lehigh University
Leadership, Presented at Lehigh University
Computer Aid, Inc
 
APO ITBuzz Overview
APO ITBuzz OverviewAPO ITBuzz Overview
APO ITBuzz Overview
Computer Aid, Inc
 
Introduction to CAI
Introduction to CAIIntroduction to CAI
Introduction to CAI
Computer Aid, Inc
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st Century
Computer Aid, Inc
 
State of Georgia
State of GeorgiaState of Georgia
State of Georgia
Computer Aid, Inc
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st Century
Computer Aid, Inc
 
APO IT Buzz Overview and Screenshots
APO IT Buzz Overview and ScreenshotsAPO IT Buzz Overview and Screenshots
APO IT Buzz Overview and Screenshots
Computer Aid, Inc
 
AmeriHealth Case Study
AmeriHealth Case StudyAmeriHealth Case Study
AmeriHealth Case Study
Computer Aid, Inc
 
APO Presentation
APO PresentationAPO Presentation
APO Presentation
Computer Aid, Inc
 
Interview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert CharetteInterview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert Charette
Computer Aid, Inc
 
APO 2.0
APO 2.0APO 2.0

More from Computer Aid, Inc (20)

A Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI PulseA Few Interesting Observations From 2014 PMI Pulse
A Few Interesting Observations From 2014 PMI Pulse
 
Management by Walking Around
Management by Walking AroundManagement by Walking Around
Management by Walking Around
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) Security
 
Knowledge Management - By Joe Hessmiller
Knowledge Management - By Joe HessmillerKnowledge Management - By Joe Hessmiller
Knowledge Management - By Joe Hessmiller
 
Why Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe HessmillerWhy Do CIO's Get Fired? By Joe Hessmiller
Why Do CIO's Get Fired? By Joe Hessmiller
 
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...
 
Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)Driving Innovative IT Metrics (Project Management Institute Presentation)
Driving Innovative IT Metrics (Project Management Institute Presentation)
 
APO State Government Business Brief
APO State Government Business BriefAPO State Government Business Brief
APO State Government Business Brief
 
White paper-management-by-walking-around
White paper-management-by-walking-aroundWhite paper-management-by-walking-around
White paper-management-by-walking-around
 
Leadership, Presented at Lehigh University
Leadership, Presented at Lehigh UniversityLeadership, Presented at Lehigh University
Leadership, Presented at Lehigh University
 
APO ITBuzz Overview
APO ITBuzz OverviewAPO ITBuzz Overview
APO ITBuzz Overview
 
Introduction to CAI
Introduction to CAIIntroduction to CAI
Introduction to CAI
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st Century
 
State of Georgia
State of GeorgiaState of Georgia
State of Georgia
 
Managing in the 21st Century
Managing in the 21st CenturyManaging in the 21st Century
Managing in the 21st Century
 
APO IT Buzz Overview and Screenshots
APO IT Buzz Overview and ScreenshotsAPO IT Buzz Overview and Screenshots
APO IT Buzz Overview and Screenshots
 
AmeriHealth Case Study
AmeriHealth Case StudyAmeriHealth Case Study
AmeriHealth Case Study
 
APO Presentation
APO PresentationAPO Presentation
APO Presentation
 
Interview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert CharetteInterview with Risk Management Practitioner: Robert Charette
Interview with Risk Management Practitioner: Robert Charette
 
APO 2.0
APO 2.0APO 2.0
APO 2.0
 

Taking Responsibility for Technology

  • 1. Taking Responsibility for Technology November 8, 2012 11:00 AM – 12:30 PM Slide: 1 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 2. Don Shafer CTO Athens Group, LLC dshafer@athensgroup.com Hosted by: Michael Milutis Director of Marketing Computer Aid, Inc. (CAI) Michael_Milutis@compaid.com Slide: 2 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 3. About Athens Group: Athens Group provides independent, 3rd party technology assurance services for high-specification Oil & Gas drilling and production systems. Our mission is to help operators, drilling contractors and asset owners ensure safety, reduce non-productive time (NPT), and safeguard the environment over the entire asset lifecycle. Slide: 3 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 4. CAI Achieves IT Operational Excellence Slide: 4 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 5. PDU Credits Available for this Webinar • The PMI has accredited this webinar with PDUs • You will be eligible to receive 1.0 PDU credits • Your PDU email will be sent to you within 24 hours Slide: 5 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 6. Online Webinar Recordings NOW AVAILABLE • Anytime Access • Hundreds of Topics Visit: www.ITMPI.org/library Slide: 6 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 7. Enjoy the benefits of ITMPI Membership JOIN TODAY! • UNLIMITED Free Webinar Recordings • UNLIMITED Free PDU Credits • Hundreds of Topics Visit: www.ITMPI.org/subscribe Slide: 7 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 8. Taking Responsibility for Technology In our post-Macondo world, we all must understand the technology we are building, implementing and using. Slide: 8 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 9. “Controlling” Technology is NOT the point The life raft was at a 45-degree angle to the water. There's something called a painter line that these life rafts attach to the rigs. We had pulled all that tight. And no one had ever cut it. So we're tied to the rig and we're dumping people out of the life raft. Transocean has a no-knife policy. No pocketknives of any kind. No one had a knife to cut this line. Mike Williams, Chief ET, DWH Slide: 9 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 10. Technologists need a Code of Ethics We, the members of the IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world and in accepting a personal obligation to our profession, its members and the communities we serve, do hereby commit ourselves to the highest ethical and professional conduct and agree: 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist; 3.to be honest and realistic in stating claims or estimates based on available data; 4.to reject bribery in all its forms; 5.to improve the understanding of technology, its appropriate application, and potential consequences; 6.to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations; 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin; 9.to avoid injuring others, their property, reputation, or employment by false or malicious action; 10.to assist colleagues and co-workers in their professional development and to support them in following this code of ethics. Slide: 10 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 11. Focus on three points: We, the members of the IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world and in accepting a personal obligation to our profession, its 1. to accept responsibility in making decisions members and the communities we serve, do hereby commit ourselves to the highest ethical and professional conduct and agree: consistent with the safety, health and welfare of 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; the public, and to disclose promptly factors that 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist; might endanger the public or the environment; 3.to be honest and realistic in stating claims or estimates based on available data; 4.to reject bribery in all its forms; 5.to improve the understanding of technology, its appropriate application, and potential consequences; 3. to be honest and realistic in stating claims or 6.to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations; estimates based on available data; 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin; 5. to improve the understanding of technology, 9.to avoid injuring others, their property, reputation, or employment by false or malicious action; 10.to assist colleagues and co-workers in their professional development and to support them in its appropriate application, and potential following this code of ethics. consequences; Slide: 11 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 12. August 1628 Vasa, the most lavishly appointed and heavily armed warship of its day, but one too long and too tall for its beam and ballast-a matchless array of features on an unstable platform. The standard stability test of the day-30 sailors running from side to side trying to rock the boat-tilted the Vasa perilously, the test was canceled and the ship readied for launch. Minutes after her grand launching, with all Stockholm watching, the Vasa heeled, listed and sank, killing about 50. Slide: 12 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 13. December 1903 Burning of Chicago's Iroquois Theater - a supposedly indestructible, up-to-the-minute design-in this case, a theater advertised as "absolutely fireproof“ - killed 602 people, more than twice the toll of "the Great Chicago Fire" 32 years earlier. The Iroquois's owners acted with as much haste and hubris as their Titanic counterparts, installing no firefighting equipment, forgoing fire drills and opening before the sprinkler system was ready. Instead, like so many others, they relied on a single technological magic bullet: an asbestos curtain that would drop down and shield the audience in the (rather common) event of a backstage fire. An oil-painted backdrop brushed against a hot calcium-arc spotlight and ignited. The asbestos curtain started dropping on cue but caught on a stage light. Crew and cast opened the stage door to flee, admitting a powerful gust that sent fireballs shooting out over the unshielded audience. Fleeing patrons either found the doors barred or could not turn the newfangled latches on them. Slide: 13 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 14. December 1903 Burning of Chicago's Iroquois Theater - a supposedly indestructible, up-to-the-minute design-in this case, a theater advertised as "absolutely fireproof“ - killed 602 people, more than twice the toll of "the Great Chicago Fire" 32 years earlier. The Iroquois's owners acted with as much haste and hubris as their Titanic counterparts, installing no firefighting equipment, forgoing fire drills and opening before the sprinkler system was ready. Instead, like so many others, they relied on a single technological magic bullet: an asbestos curtain that would drop down and shield the audience in the (rather common) event of a backstage fire. An oil-painted backdrop brushed against a hot calcium-arc spotlight and ignited. The asbestos curtain started dropping on cue but caught on a stage light. Crew and cast opened the stage door to flee, admitting a powerful gust that sent fireballs shooting out over the unshielded audience. Fleeing patrons either found the doors barred or could not turn the newfangled latches on them. Slide: 14 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 15. July 1979 Atlantic Empress and Aegean Captain, gigantic supertankers collide off the island of Little Tobago in the Caribbean Sea, killing 26 crew members and spilling 280,000 tons of crude oil into the sea. At the time, it was the worst oil-tanker accident in history and remains one of the very few times in history when two oil tankers have collided. Slide: 15 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 16. July 1981 On July 17, 1981, approximately 1,600 people gathered in the Hyatt Regency Kansas City atrium to participate in and watch a dance competition. The fourth floor walkway collapsed onto the second floor and both walkways then fell to the lobby floor below, resulting in 114 deaths and 216 injuries. The basic problem was a lack of proper communication, failure to review the initial design thoroughly, and failure to perform basic calculations that would have revealed its serious intrinsic flaws — in particular, the doubling of the load on the fourth-floor beams. Slide: 16 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 17. April 1986 Chernobyl was a nuclear power plant in Ukraine that suffered a catastrophic meltdown. On April 26, 1986, one of the reactors underwent rapid overheating, leading to a meltdown that released an enormous cloud of radioactive fallout, simultaneously endangering the lives of hundreds of thousands of people in surrounding areas. Since the disaster, over 4,000 people have died due to cancer from the radiation. As it stands today, Chernobyl has a 17-mile radius ―Exclusion Zone‖ which is considered too hazardous to live safely in. Scientists estimate that Chernobyl will become fully safe to inhabit – in 20,000 years. Close but no cigar: Three Mile Island Hanford N-Reactor Slide: 17 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 18. August 2007 The I-35W Mississippi River bridge was an eight-lane, steel truss arch bridge that carried Interstate 35W across the Mississippi River in Minneapolis. During the evening rush hour on August 1, 2007, it suddenly collapsed, killing 13 people and injuring 145. NTSB found the primary cause was the under-sized gusset plates. Contributing to that error was the fact that 2 inches of concrete were added to the road surface over the years, increasing the dead load by 20%. Also contributing was the extraordinary weight of construction equipment and material resting on the bridge just above its weakest point at the time of the collapse. Slide: 18 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 19. October 2009 Husky Racer: Toppled Boxes Top Heavy Due to Software Glitch Maersk Line – 18 Containers lost overboard The preliminary examination of the accident found that the inaccurate container weights were on the loading plan because of a system shortcoming which did not update the operations department when the shipper provided more accurate contents details to the carrier. Maersk Line is running trials on an upgraded software package that will provide cargo planners with the declared weights of the containers. This is scheduled to be introduced in the first weeks of January 2010. Slide: 19 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 20. December 2009 A control system failure occurred on a large, off-shore construction vessel. Two control units were restarted twice, unsuccessfully. A blinking red lamp on the PLC indicated that a memory reset was required, even though a memory reset had NEVER been requested by control system diagnostics during equipment operations. As soon as the hydraulic power packs started, a loud bang was heard. A quadruple joint of pipe dropped approximately one meter to the welding deck below. A second quadruple joint of pipe in the pipe elevator was released (all clamps opened and the hydraulic safety stop swung away) and fell the full length of the tower, smashing through a crowded access platform to the deck below. Result Eight personnel were injured - four fatally. All were located on the access platform and several were thrown overboard by the impact. Slide: 20 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 21. IEEE Code of Ethics We, the members of the IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world and in accepting a personal obligation to our profession, its 1. to accept responsibility in making decisions members and the communities we serve, do hereby commit ourselves to the highest ethical and professional conduct and agree: consistent with the safety, health and welfare of 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected the public, and to disclose promptly factors that parties when they do exist; 3.to be honest and realistic in stating claims or estimates based on available data; might endanger the public or the environment; 4.to reject bribery in all its forms; 5.to improve the understanding of technology, its appropriate application, and potential consequences; 6.to maintain and improve our technical competence and to undertake technological tasks for others 3. to be honest and realistic in stating claims or only if qualified by training or experience, or after full disclosure of pertinent limitations; 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; estimates based on available data; 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin; 9.to avoid injuring others, their property, reputation, or employment by false or malicious action; 10.to assist colleagues and co-workers in their professional development and to support them in following this code of ethics. Slide: 21 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 22. Opportunities LOST! 1. June 22, 2009 - Mark E. Hafle, a senior drilling engineer at BP, warns that the metal casing for the blowout preventer might collapse under high pressure. 2. March 2010 - An accident damages a gasket on the blowout preventer on the rig. 3. April 1 - Halliburton employee Marvin Volek warns that BP's use of cement "was against our best practices.― 4. April 6 - MMS issues permit to BP for the well with the notation, "Exercise caution while drilling due to indications of shallow gas and possible water flow." 5. April 9 - BP drills last section with the wellbore 18,360 feet below sea level but the last 1,192 feet need casing. Halliburton recommends liner/tieback casing that will provide 4 redundant barriers to flow. BP chooses to do a single liner with fewer barriers that is faster to install and cheaper ($7 to $10 million). 6. April 15 - Morel informs Halliburton executive Jesse Gagliano that they plan to use 6 centralizers. Gagliano says they should use 21. 7. April 15 - Gagliano also recommends to circulate the drilling mud from the bottom of the well all the way up to the surface to remove air pockets and debris which can contaminate the cement, saying in an email, at "least circulate one bottoms up on the well before doing a cement job." Despite this recommendation, BP cycles only 261 barrels (41.5 m 3) of mud, a fraction of the total mud used in the well. 8. April 17 - Gagliano now reports that using only 6 centralizers "would likely produce channeling and a failure of the cement job." 9. April 18 - Gagliano's report says "well is considered to have a severe gas flow problem." 10. April 20 -7 am - BP cancels a recommended cement bond log test. Slide: 22 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 23. IEEE Code of Ethics We, the members of the IEEE, in recognition of the importance of our technologies in affecting the 1. to accept responsibility in making decisions quality of life throughout the world and in accepting a personal obligation to our profession, its members and the communities we serve, do hereby commit ourselves to the highest ethical and consistent with the safety, health and welfare of professional conduct and agree: 1.to accept responsibility in making decisions consistent with the safety, health and welfare of the the public, and to disclose promptly factors that public, and to disclose promptly factors that might endanger the public or the environment; 2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected might endanger the public or the environment; parties when they do exist; 3.to be honest and realistic in stating claims or estimates based on available data; 4.to reject bribery in all its forms; 5.to improve the understanding of technology, its appropriate application, and potential 3. to be honest and realistic in stating claims or consequences; 6.to maintain and improve our technical competence and to undertake technological tasks for others estimates based on available data; only if qualified by training or experience, or after full disclosure of pertinent limitations; 7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; 8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin; 9.to avoid injuring others, their property, reputation, or employment by false or malicious action; 5. to improve the understanding of technology, 10.to assist colleagues and co-workers in their professional development and to support them in following this code of ethics. its appropriate application, and potential consequences; Slide: 23 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 24. Don Shafer, CSDP Chief Technology and Safety Officer Athens Group, Inc. 560824 Slide: Parkcrest Drive, Suite 200 Austin, Tx 78731 11/8/2012 donshafer@ieee.org Webinar Sponsored by Computer Aid, Inc. www.athensgroup.com
  • 26. CAI Sponsors Proudly Sponsors The IT Metrics & Productivity Institute • IT and Software Knowledge Center: WWW.ITMPI.ORG • Weekly Webinars Hosted by Industry Leaders: WWW.ITMPI.ORG / WEBINARS • Access Webinar Recordings Anytime at WWW.ITMPI.ORG / LIBRARY • Enjoy the Benefits of ITMPI Membership at WWW.ITMPI.ORG / SUBSCRIBE • Follow Us on TWITTER at WWW.TWITTER.COM / ITMPI • Follow Us on FACEBOOK at WWW.ITMPI.ORG/ FACEBOOK • Join Our Network on LINKED IN at WWW.ITMPI.ORG/ LINKEDIN • Find Out About Our CONFERENCES at WWW.ITMPI.ORG/ EVENTS Slide: 26 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 27. Subscribe to the AITS Newsletter • Daily articles in your mailbox on improving the management of IT. Subscribe at www.AITS.org • Listen to our ―Thought Radio‖ podcasts on iTunes or at www.AITS.org Slide: 27 11/8/2012 Webinar Sponsored by Computer Aid, Inc.
  • 28. Don Shafer CTO Athens Group, LLC dshafer@athensgroup.com Hosted by: Michael Milutis Director of Marketing Computer Aid, Inc. (CAI) Michael_Milutis@compaid.com Slide: 28 11/8/2012 Webinar Sponsored by Computer Aid, Inc.

Editor's Notes

  1. Citation: http://www.maib.gov.uk/publications/completed_preliminary_examinations/completed_preliminary_examinations_2010/husky_racer.cfm