The document summarizes a webinar on taking responsibility for technology. It discusses three key points:
1. Technologists should accept responsibility for decisions that impact public safety and promptly disclose any risks.
2. They should be honest when stating claims or estimates based on data.
3. Improving understanding of technology, its appropriate applications, and potential consequences is important.
This document discusses the adoption of automated external defibrillators (AEDs) and personal watercraft (PWCs) as mature technologies that have found new applications in emergency response. It provides background on how AEDs were developed for hospitals and later adopted for public access through programs like Project Heart Beat in San Diego. PWCs started as recreational vehicles but were recognized as useful for water rescues by early adopters like lifeguards. Standards and training programs have helped further establish PWCs for professional water rescue.
This document discusses catastrophic engineering failures. It begins by defining catastrophic failure as the sudden, unrecoverable failure of a system that often leads to further failures. Several examples of catastrophic failures are provided, including bridge collapses, dam failures, and space shuttle disasters. Primary causes of such failures are then outlined, including human factors, design flaws, materials failures, and extreme conditions. The document concludes by emphasizing the importance of risk management, anticipating unexpected scenarios, and ensuring safety through redundant systems and teams to prevent catastrophic engineering failures.
The document is an invitation and agenda for the 4th International Tidal Energy Summit & Awards Ceremony taking place on November 23-24, 2010 in London. The summit will feature high-level sessions on opportunities in tidal energy, the latest device testing results, and legal advice. There will also be in-depth analysis of environmental impacts and permitting, engineering and technical expertise, and site and project development experience. The summit aims to bring together over 350 senior tidal energy professionals from 30+ organizations to discuss financing tidal projects and network.
IPR and Creative Commons for Interactive Learning Resources for SkillsJISC Legal
Delivered in London on 21 November 2014. This presentation was designed to support Jisc Interactive Learning Resources for Skills projects in dealing with the copyright issues associated with the creation of open resources.
The February meeting of the NESHEP group was held with over 50 attendees. Alan Bassett welcomed everyone and presented a case study demonstrating a lack of judgment that resulted in a severe risk of falling from height. New members Stuart Shirreff of KDC Contractors and Sylvia Callaghan of Fabricom gave presentations on their companies and projects, with Sylvia providing a moving account of the mothballing and reopening of the Corus steel plant. Mick Stephenson then updated the group on a new supervisors qualification being developed in partnership with Teesside University.
Copyright Law in the Educational Context (Darius Whelan part)Darius Whelan
These slides are one half of a joint presentation made by Dr Louise Crowley and me at a Teaching and learning Seminar, University College Cork, November 2012.
This part was prepared and presented by me (Darius Whelan).
Video is available at http://www.youtube.com/watch?v=XPse4z6LLMk.
Copyright law in the Educational Context Part 1 (Louise Crowley) Darius Whelan
This document summarizes copyright law in the educational context. It outlines the rights of copyright owners, exceptions for education and fair dealing, UCC's ICLA license agreement, and remedies for breaching copyright. Key points include what materials are protected by copyright, permitted uses of copyrighted works for education, and limitations on copying works for course materials under the ICLA license.
This document discusses the case for involving lay people in the accreditation of engineering programs. It notes that engineering is like other professions that have faced scandals due to a lack of oversight. The current accreditation criteria focus on technical aspects but lack clarity and input regarding ethics. The document proposes involving experts to strengthen ethics criteria and include ethics experts and lay people on accreditation panels. This would help address issues of trust and ensure engineering considers societal concerns.
This document discusses the adoption of automated external defibrillators (AEDs) and personal watercraft (PWCs) as mature technologies that have found new applications in emergency response. It provides background on how AEDs were developed for hospitals and later adopted for public access through programs like Project Heart Beat in San Diego. PWCs started as recreational vehicles but were recognized as useful for water rescues by early adopters like lifeguards. Standards and training programs have helped further establish PWCs for professional water rescue.
This document discusses catastrophic engineering failures. It begins by defining catastrophic failure as the sudden, unrecoverable failure of a system that often leads to further failures. Several examples of catastrophic failures are provided, including bridge collapses, dam failures, and space shuttle disasters. Primary causes of such failures are then outlined, including human factors, design flaws, materials failures, and extreme conditions. The document concludes by emphasizing the importance of risk management, anticipating unexpected scenarios, and ensuring safety through redundant systems and teams to prevent catastrophic engineering failures.
The document is an invitation and agenda for the 4th International Tidal Energy Summit & Awards Ceremony taking place on November 23-24, 2010 in London. The summit will feature high-level sessions on opportunities in tidal energy, the latest device testing results, and legal advice. There will also be in-depth analysis of environmental impacts and permitting, engineering and technical expertise, and site and project development experience. The summit aims to bring together over 350 senior tidal energy professionals from 30+ organizations to discuss financing tidal projects and network.
IPR and Creative Commons for Interactive Learning Resources for SkillsJISC Legal
Delivered in London on 21 November 2014. This presentation was designed to support Jisc Interactive Learning Resources for Skills projects in dealing with the copyright issues associated with the creation of open resources.
The February meeting of the NESHEP group was held with over 50 attendees. Alan Bassett welcomed everyone and presented a case study demonstrating a lack of judgment that resulted in a severe risk of falling from height. New members Stuart Shirreff of KDC Contractors and Sylvia Callaghan of Fabricom gave presentations on their companies and projects, with Sylvia providing a moving account of the mothballing and reopening of the Corus steel plant. Mick Stephenson then updated the group on a new supervisors qualification being developed in partnership with Teesside University.
Copyright Law in the Educational Context (Darius Whelan part)Darius Whelan
These slides are one half of a joint presentation made by Dr Louise Crowley and me at a Teaching and learning Seminar, University College Cork, November 2012.
This part was prepared and presented by me (Darius Whelan).
Video is available at http://www.youtube.com/watch?v=XPse4z6LLMk.
Copyright law in the Educational Context Part 1 (Louise Crowley) Darius Whelan
This document summarizes copyright law in the educational context. It outlines the rights of copyright owners, exceptions for education and fair dealing, UCC's ICLA license agreement, and remedies for breaching copyright. Key points include what materials are protected by copyright, permitted uses of copyrighted works for education, and limitations on copying works for course materials under the ICLA license.
This document discusses the case for involving lay people in the accreditation of engineering programs. It notes that engineering is like other professions that have faced scandals due to a lack of oversight. The current accreditation criteria focus on technical aspects but lack clarity and input regarding ethics. The document proposes involving experts to strengthen ethics criteria and include ethics experts and lay people on accreditation panels. This would help address issues of trust and ensure engineering considers societal concerns.
ICT for development options for researchers: A view of Computer Aid Internati...BioMedCentral
Computer Aid International is a UK-based charity that has provided over 190,000 refurbished computers to more than 100 countries since 1998. It focuses on using affordable technology solutions to improve education, health, agriculture, and inclusion. Some of its initiatives include setting up telemedicine networks to connect rural hospitals to specialists, implementing e-learning programs for universities, and deploying mesh networks and solar power in remote areas without electricity. The organization advocates for more affordable connectivity rates for educational and nonprofit use of ICT and promotes social media as a tool for researchers.
The document provides an overview of information technology concepts including:
1) IT involves the use of modern technology to capture, store, retrieve, analyze and communicate information.
2) The information age is evolving more rapidly than the industrial age and will continue into the current century.
3) Computers are cornerstones of the economy and are involved in almost every future career.
CAD, or computer-aided design, uses computer technology to aid in designing and drafting products. It allows designers to develop and layout work digitally, enabling them to visualize, design, and document ideas clearly and efficiently in fields like fashion, architecture, and engineering. CAD programs exist for specialized industries and can create designs in both 2D and 3D dimensions.
The software as an educational resource copymiss yhda
The document discusses the importance of software in education and provides examples. It describes how software like Microsoft Windows acts as an interface between users and computers. It also discusses instructional software that can be accessed online or purchased, and notes teachers should carefully evaluate such resources to ensure they are pedagogically sound and accurate. Guidelines for evaluation include checking for attractive but not distracting design, easy navigation, clear explanations, accurate information, relevance to learning objectives, and lack of bias.
This document discusses constructivism and social constructivism as learning theories and how computers can support these paradigms. Constructivism posits that learners build knowledge through personal discovery, while social constructivism emphasizes that social and cultural contexts influence knowledge construction. The computer can function as an information tool by providing vast resources, as a constructive tool by allowing learners to manipulate and organize ideas, as a co-constructive tool by facilitating collaborative knowledge-building, and as a situating tool by immersing learners in virtual environments.
This document discusses the advantages and uses of computers in education. It outlines how computers can store and quickly process information, be used for audio-visual aids and better presentation of materials. Computers also allow access to the internet and quick communication between students, teachers and parents. The document also explores how computers are used for teaching, testing, research, administration and assisting disabled students. It introduces new technologies like interactive whiteboards, scanners and mobile devices that enhance the educational experience.
Computers have become an integral part of modern society. They are used by 68% of working Americans at their jobs and 84% say they are essential to their work. Computers are also widely used in schools, with hundreds of thousands of schools in the US having computer access. While computers have enabled many advances in areas like communication, business, and scientific research, they can also consume peoples' time and potentially ruin lives if overused. Overall, computers represent a powerful tool that has both benefits and drawbacks for society.
9th International Electrostatic Discharge Workshop – IEW 2015
The IEW provides a unique environment for envisioning, developing, and sharing robust design and test of ESD protection for state-of-the-art integrated circuits as well as advanced semiconductor system on chip (SOC) and system in package (SIP) applications.
Granlibakken Conference Center and Lodge, located in beautiful Lake Tahoe, provides an opportunity to meet in a relaxed, invigorating atmosphere.
The IEEE GLOBECOM 2014 Conference is one of the IEEE Communications Society's two flagship conferences. Each year, over 3,000 scientific researchers and their management submit proposals for program sessions to be held at a GLOBECOM Conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions.
Major components of the conference program include: keynote speakers (representing the elite of the Communications industry), technical papers sessions, workshops, tutorials, an award's luncheon and a world class banquet with entertainment. IEEE GLOBECOM 2014 will also place major emphasis on the real-world interests of industry practitioners.
It is with great pleasure that the Austin technical and business community was chosen to host this prestigious Conference. As communications technology professionals, engineers and practitioners around the world know, Austin, Texas is known as "Silicon Valley."
We offer many levels of patronage and opportunities to exhibit. After all, EVERYONE knows that Patronage Means Leadership and Reputation. There will be special industry events and opportunities to meet and recruit young engineers. This will include a GOLD (IEEE Graduates of the Last Decade) Session, and other professional and career events which will be publicized in the Advance Program.
Being a Patron presents your company to not only local audiences but also to those involved in world wide communications technology engineering and management. We expect up to 2,000 participants, technical researchers and industry practitioners from the USA and many other countries of the world to include Japan, China, India, Canada, England, France, Germany, Korea and many others.
See Patronage Brochure for complete details.
For more information, contact:
Russ Roy
email: Russ.Roy@rigstat.com
phone: 281-773-4055
or
James Kimery
email: jgkimery@ieee.org
phone: 512-413-2131
The 9th International ESD Workshop (IEW) will be held at the Granlibakken Conference Center & Lodge, Lake Tahoe, CA. Granlibakken Conference Center and Lodge, located in beautiful Lake Tahoe, provides the perfect opportunity to meet in a relaxed, invigorating atmosphere and engage in discussions about the latest issues confronting the ESD community.
The IEW will include invited seminars, technical sessions, special interest groups (SIGs), discussion groups, and invited speakers. The IEW especially invites submission of late-breaking exciting new research to stimulate discussion and interaction around new ideas, encouraging new research topics. To maintain the unique IEW experience and provide ample opportunity for informal discussions, the 2015 IEW workshop presentation format for Technical sessions will begin with each author presenting a brief summary to highlight key findings, followed by an interactive poster-based discussion session among authors and attendees. The IEW is closely aligned with the EOS/ESD Symposium for collaborative conference activities.
Abstract Submission Deadline Nov. 21, 2014
Two special attention focus issues for IEW 2015 include:
(1) Power Management EOS/ESD
The semiconductor technology development and IC design solutions that address efficient power management in systems have increased the complexity of ESD design challenges, and with expectations of solutions that also reduce cost, save space and work first time. The IEW invites contributions that address some of the ESD/EOS challenges in power management, including high performance IC on-chip power management, PMIC’s, DC/DC & AC/DC power devices, battery management, high voltage technologies and automotive applications.
(2) EDA EOS/ESD Tools Best Practices and Experiences
With the heightened emphasis on design for reliability, design flows that utilize EDA EOS/ESD verification and simulation tools continue to remain as important as ever, especially for Fabless companies that may lack direct access to manufacturing and process data. Even with Foundry rule decks, understanding how shrinking design margins can impact EOS/ESD and the best practices to consider design compromises is a challenging task. IEW provides a great open forum to share, discuss and learn from the experiences of others, particular for those in the Fabless community.
This 3-sentence summary provides the key details about the document:
The document discusses design ethics and was prepared by three authors in November 2012. It notes that design involves human interactions and impacts people's daily lives, so designers must consider how people interact with each other and the designs that are created. The document aims to raise awareness of ethical issues in design, identify ethical dilemmas and risks, and share strategies for ethical decision making.
Technological innovations and users requirements: how to fill the gap? An end...AEGIS-ACCESSIBLE Projects
The document summarizes the presentation given by F. Cesaroni at the AEGIS 1° International Conference in Seville, Spain in 2010. The presentation highlighted challenges that end-user organizations face in ensuring technological innovations meet user requirements. Specifically, it discussed COOSS's experience in 4 EU research projects, noting mismatches between technical achievements and user needs. The presentation concluded by emphasizing the importance of interdisciplinary collaboration and a user-centered design approach to reduce gaps between engineers and users.
Building the Commons: Community Archiving & Decentralized StorageTechSoup
This event shines a spotlight on the intersection of decentralized storage solutions and community archive projects. For years, digital archiving has been essential for preserving historical documents and community memories. However, traditional storage methods increasingly face issues around costs, data ownership, privacy concerns, and accessibility limitations. This is where decentralized storage offers a fresh approach to safeguarding vast public datasets.
Designed for enthusiasts and professionals in community archiving, research, and library sciences, this event will be a mix of talks and demos by leading Makers of public good technologies.
Hosted by TechSoup on April 25, 2024.
https://events.techsoup.org/events/details/techsoup-public-good-app-house-presents-building-the-commons-community-archiving-amp-decentralized-storage/
Ploughshare is owned by the UK Secretary of State for Defence and focuses on commercializing intellectual property from the Ministry of Defence. They have licensed over 110 technologies, spun out 11 companies, and helped create over 550 jobs in the UK. Their activities include licensing IP, providing commercialization services, and spinning out companies. Examples provided include spin-outs in areas like diagnostics, coatings, and instrumentation, as well as licenses for technologies in human identification, electro-optics, armor, radar, sonar, and cyber defense.
-- Search the web for an engineering related ethicsdisaster cashirstcruz
-- Search the web for an engineering related ethics/disaster cases and select one interesting case to study and write about it.
-- Write a typewritten report of no less than 500 words which includes the following:
a) An introduction of the case (what happened)
b) Engineering ethics issue: comment on this in the light of IEEE code of ethics.
1. · to hold paramount the safety, health, and welfare of the public, to strive to comply with ethical design and sustainable development practices, and to disclose promptly factors that might endanger the public or the environment;
2. · to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist;
3. · to be honest and realistic in stating claims or estimates based on available data;
4. · to reject bribery in all its forms;
5. · to improve the understanding by individuals and society of the capabilities and societal implications of conventional and emerging technologies, including intelligent systems;
6. · to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations;
7. · to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others;
8. · to treat fairly all persons and to not engage in acts of discrimination based on race, religion, gender, disability, age, national origin, sexual orientation, gender identity, or gender expression;
9. · to avoid injuring others, their property, reputation, or employment by false or malicious action;
10. · to assist colleagues and co-workers in their professional development and to support them in following this code of ethics.
c) Mitigation: Explain what were the causes of problem/failure/disaster. What mitigation plan would you recommend to avoid this issue in future.
d) Lessons and Conclusions
e) Reference
...
The webinar will cover emerging and disruptive technologies. Fraser Henderson will host and discuss topics like quantum computing, nuclear fusion, hydrogen economy, nanotechnology, and how COVID-19 may impact innovation. The webinar will also explore what it takes to foster a culture of innovation within an organization, including creating time and space for new ideas, funding challenges, collaboration, and experimentation. Participants will have an opportunity to discuss how disruptive trends and technologies may impact their business and how to take advantage of innovations.
2012 National Launch Party Program GuideCleantechOpen
Two competitions and challenges will be on the launch pad. The Cleantech Open Business Accelerator & Competition and the NASA Night Rover Challenge start their trajectories on this stellar evening.
It’s an exciting evening of interactive exhibits and unbeatable networking. Green Barrel wine will flow, hors d’oeuvres will be passed and new connections will be made.
Meet the people who count in cleantech, in Silicon Valley and the world beyond.
Shell Technology Futures 2004 - This is the summary of two sets of weeklong discussions that took place in Amsterdam and Houston, each of which included around 20 experts from across multiple disciplines all looking out 20 years at how technology may, or may not influence society. This was the first run of the Technology Futures programme and was followed in 2007 by similar discussions in Bangalore and London.
This first 2004 programme took a very wide view and covered everything from mesh networks, natural language processing and nano-technology to adaptive systems, automated sensing, tissue scaffolding and 3D printing.
The perception gap: the barrier to disruptive innovation in telecomsMartin Geddes
The 'state of the possible' in telecoms is a long way ahead the 'state of the art'. The new science of network performance enables a large leap in customer experience and cost. However, the perception among operators is that only relatively small, incremental improvements are possible.
This presentation explores the reasons for this 'perception gap' between what is seen to be possible, and what actually is. It draws on our work at senior levels for tier 1 operators, as well as examples from outside the telecoms industry.
Overcoming this gap opens the possibility to disruptive innovation. Who will seize the opportunity? Incumbents, challengers or new entrants?
Education information - Guest Speaker Brian SchupbachBrian Schupbach
In January, Brian Schupbach will be a featured speaker at the National Association of Catastrophe Adjusters Convention. He will be sharing his expertise using the Xactimate software to estimate large loss commercial damage.
ICT for development options for researchers: A view of Computer Aid Internati...BioMedCentral
Computer Aid International is a UK-based charity that has provided over 190,000 refurbished computers to more than 100 countries since 1998. It focuses on using affordable technology solutions to improve education, health, agriculture, and inclusion. Some of its initiatives include setting up telemedicine networks to connect rural hospitals to specialists, implementing e-learning programs for universities, and deploying mesh networks and solar power in remote areas without electricity. The organization advocates for more affordable connectivity rates for educational and nonprofit use of ICT and promotes social media as a tool for researchers.
The document provides an overview of information technology concepts including:
1) IT involves the use of modern technology to capture, store, retrieve, analyze and communicate information.
2) The information age is evolving more rapidly than the industrial age and will continue into the current century.
3) Computers are cornerstones of the economy and are involved in almost every future career.
CAD, or computer-aided design, uses computer technology to aid in designing and drafting products. It allows designers to develop and layout work digitally, enabling them to visualize, design, and document ideas clearly and efficiently in fields like fashion, architecture, and engineering. CAD programs exist for specialized industries and can create designs in both 2D and 3D dimensions.
The software as an educational resource copymiss yhda
The document discusses the importance of software in education and provides examples. It describes how software like Microsoft Windows acts as an interface between users and computers. It also discusses instructional software that can be accessed online or purchased, and notes teachers should carefully evaluate such resources to ensure they are pedagogically sound and accurate. Guidelines for evaluation include checking for attractive but not distracting design, easy navigation, clear explanations, accurate information, relevance to learning objectives, and lack of bias.
This document discusses constructivism and social constructivism as learning theories and how computers can support these paradigms. Constructivism posits that learners build knowledge through personal discovery, while social constructivism emphasizes that social and cultural contexts influence knowledge construction. The computer can function as an information tool by providing vast resources, as a constructive tool by allowing learners to manipulate and organize ideas, as a co-constructive tool by facilitating collaborative knowledge-building, and as a situating tool by immersing learners in virtual environments.
This document discusses the advantages and uses of computers in education. It outlines how computers can store and quickly process information, be used for audio-visual aids and better presentation of materials. Computers also allow access to the internet and quick communication between students, teachers and parents. The document also explores how computers are used for teaching, testing, research, administration and assisting disabled students. It introduces new technologies like interactive whiteboards, scanners and mobile devices that enhance the educational experience.
Computers have become an integral part of modern society. They are used by 68% of working Americans at their jobs and 84% say they are essential to their work. Computers are also widely used in schools, with hundreds of thousands of schools in the US having computer access. While computers have enabled many advances in areas like communication, business, and scientific research, they can also consume peoples' time and potentially ruin lives if overused. Overall, computers represent a powerful tool that has both benefits and drawbacks for society.
9th International Electrostatic Discharge Workshop – IEW 2015
The IEW provides a unique environment for envisioning, developing, and sharing robust design and test of ESD protection for state-of-the-art integrated circuits as well as advanced semiconductor system on chip (SOC) and system in package (SIP) applications.
Granlibakken Conference Center and Lodge, located in beautiful Lake Tahoe, provides an opportunity to meet in a relaxed, invigorating atmosphere.
The IEEE GLOBECOM 2014 Conference is one of the IEEE Communications Society's two flagship conferences. Each year, over 3,000 scientific researchers and their management submit proposals for program sessions to be held at a GLOBECOM Conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions.
Major components of the conference program include: keynote speakers (representing the elite of the Communications industry), technical papers sessions, workshops, tutorials, an award's luncheon and a world class banquet with entertainment. IEEE GLOBECOM 2014 will also place major emphasis on the real-world interests of industry practitioners.
It is with great pleasure that the Austin technical and business community was chosen to host this prestigious Conference. As communications technology professionals, engineers and practitioners around the world know, Austin, Texas is known as "Silicon Valley."
We offer many levels of patronage and opportunities to exhibit. After all, EVERYONE knows that Patronage Means Leadership and Reputation. There will be special industry events and opportunities to meet and recruit young engineers. This will include a GOLD (IEEE Graduates of the Last Decade) Session, and other professional and career events which will be publicized in the Advance Program.
Being a Patron presents your company to not only local audiences but also to those involved in world wide communications technology engineering and management. We expect up to 2,000 participants, technical researchers and industry practitioners from the USA and many other countries of the world to include Japan, China, India, Canada, England, France, Germany, Korea and many others.
See Patronage Brochure for complete details.
For more information, contact:
Russ Roy
email: Russ.Roy@rigstat.com
phone: 281-773-4055
or
James Kimery
email: jgkimery@ieee.org
phone: 512-413-2131
The 9th International ESD Workshop (IEW) will be held at the Granlibakken Conference Center & Lodge, Lake Tahoe, CA. Granlibakken Conference Center and Lodge, located in beautiful Lake Tahoe, provides the perfect opportunity to meet in a relaxed, invigorating atmosphere and engage in discussions about the latest issues confronting the ESD community.
The IEW will include invited seminars, technical sessions, special interest groups (SIGs), discussion groups, and invited speakers. The IEW especially invites submission of late-breaking exciting new research to stimulate discussion and interaction around new ideas, encouraging new research topics. To maintain the unique IEW experience and provide ample opportunity for informal discussions, the 2015 IEW workshop presentation format for Technical sessions will begin with each author presenting a brief summary to highlight key findings, followed by an interactive poster-based discussion session among authors and attendees. The IEW is closely aligned with the EOS/ESD Symposium for collaborative conference activities.
Abstract Submission Deadline Nov. 21, 2014
Two special attention focus issues for IEW 2015 include:
(1) Power Management EOS/ESD
The semiconductor technology development and IC design solutions that address efficient power management in systems have increased the complexity of ESD design challenges, and with expectations of solutions that also reduce cost, save space and work first time. The IEW invites contributions that address some of the ESD/EOS challenges in power management, including high performance IC on-chip power management, PMIC’s, DC/DC & AC/DC power devices, battery management, high voltage technologies and automotive applications.
(2) EDA EOS/ESD Tools Best Practices and Experiences
With the heightened emphasis on design for reliability, design flows that utilize EDA EOS/ESD verification and simulation tools continue to remain as important as ever, especially for Fabless companies that may lack direct access to manufacturing and process data. Even with Foundry rule decks, understanding how shrinking design margins can impact EOS/ESD and the best practices to consider design compromises is a challenging task. IEW provides a great open forum to share, discuss and learn from the experiences of others, particular for those in the Fabless community.
This 3-sentence summary provides the key details about the document:
The document discusses design ethics and was prepared by three authors in November 2012. It notes that design involves human interactions and impacts people's daily lives, so designers must consider how people interact with each other and the designs that are created. The document aims to raise awareness of ethical issues in design, identify ethical dilemmas and risks, and share strategies for ethical decision making.
Technological innovations and users requirements: how to fill the gap? An end...AEGIS-ACCESSIBLE Projects
The document summarizes the presentation given by F. Cesaroni at the AEGIS 1° International Conference in Seville, Spain in 2010. The presentation highlighted challenges that end-user organizations face in ensuring technological innovations meet user requirements. Specifically, it discussed COOSS's experience in 4 EU research projects, noting mismatches between technical achievements and user needs. The presentation concluded by emphasizing the importance of interdisciplinary collaboration and a user-centered design approach to reduce gaps between engineers and users.
Building the Commons: Community Archiving & Decentralized StorageTechSoup
This event shines a spotlight on the intersection of decentralized storage solutions and community archive projects. For years, digital archiving has been essential for preserving historical documents and community memories. However, traditional storage methods increasingly face issues around costs, data ownership, privacy concerns, and accessibility limitations. This is where decentralized storage offers a fresh approach to safeguarding vast public datasets.
Designed for enthusiasts and professionals in community archiving, research, and library sciences, this event will be a mix of talks and demos by leading Makers of public good technologies.
Hosted by TechSoup on April 25, 2024.
https://events.techsoup.org/events/details/techsoup-public-good-app-house-presents-building-the-commons-community-archiving-amp-decentralized-storage/
Ploughshare is owned by the UK Secretary of State for Defence and focuses on commercializing intellectual property from the Ministry of Defence. They have licensed over 110 technologies, spun out 11 companies, and helped create over 550 jobs in the UK. Their activities include licensing IP, providing commercialization services, and spinning out companies. Examples provided include spin-outs in areas like diagnostics, coatings, and instrumentation, as well as licenses for technologies in human identification, electro-optics, armor, radar, sonar, and cyber defense.
-- Search the web for an engineering related ethicsdisaster cashirstcruz
-- Search the web for an engineering related ethics/disaster cases and select one interesting case to study and write about it.
-- Write a typewritten report of no less than 500 words which includes the following:
a) An introduction of the case (what happened)
b) Engineering ethics issue: comment on this in the light of IEEE code of ethics.
1. · to hold paramount the safety, health, and welfare of the public, to strive to comply with ethical design and sustainable development practices, and to disclose promptly factors that might endanger the public or the environment;
2. · to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist;
3. · to be honest and realistic in stating claims or estimates based on available data;
4. · to reject bribery in all its forms;
5. · to improve the understanding by individuals and society of the capabilities and societal implications of conventional and emerging technologies, including intelligent systems;
6. · to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations;
7. · to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others;
8. · to treat fairly all persons and to not engage in acts of discrimination based on race, religion, gender, disability, age, national origin, sexual orientation, gender identity, or gender expression;
9. · to avoid injuring others, their property, reputation, or employment by false or malicious action;
10. · to assist colleagues and co-workers in their professional development and to support them in following this code of ethics.
c) Mitigation: Explain what were the causes of problem/failure/disaster. What mitigation plan would you recommend to avoid this issue in future.
d) Lessons and Conclusions
e) Reference
...
The webinar will cover emerging and disruptive technologies. Fraser Henderson will host and discuss topics like quantum computing, nuclear fusion, hydrogen economy, nanotechnology, and how COVID-19 may impact innovation. The webinar will also explore what it takes to foster a culture of innovation within an organization, including creating time and space for new ideas, funding challenges, collaboration, and experimentation. Participants will have an opportunity to discuss how disruptive trends and technologies may impact their business and how to take advantage of innovations.
2012 National Launch Party Program GuideCleantechOpen
Two competitions and challenges will be on the launch pad. The Cleantech Open Business Accelerator & Competition and the NASA Night Rover Challenge start their trajectories on this stellar evening.
It’s an exciting evening of interactive exhibits and unbeatable networking. Green Barrel wine will flow, hors d’oeuvres will be passed and new connections will be made.
Meet the people who count in cleantech, in Silicon Valley and the world beyond.
Shell Technology Futures 2004 - This is the summary of two sets of weeklong discussions that took place in Amsterdam and Houston, each of which included around 20 experts from across multiple disciplines all looking out 20 years at how technology may, or may not influence society. This was the first run of the Technology Futures programme and was followed in 2007 by similar discussions in Bangalore and London.
This first 2004 programme took a very wide view and covered everything from mesh networks, natural language processing and nano-technology to adaptive systems, automated sensing, tissue scaffolding and 3D printing.
The perception gap: the barrier to disruptive innovation in telecomsMartin Geddes
The 'state of the possible' in telecoms is a long way ahead the 'state of the art'. The new science of network performance enables a large leap in customer experience and cost. However, the perception among operators is that only relatively small, incremental improvements are possible.
This presentation explores the reasons for this 'perception gap' between what is seen to be possible, and what actually is. It draws on our work at senior levels for tier 1 operators, as well as examples from outside the telecoms industry.
Overcoming this gap opens the possibility to disruptive innovation. Who will seize the opportunity? Incumbents, challengers or new entrants?
Education information - Guest Speaker Brian SchupbachBrian Schupbach
In January, Brian Schupbach will be a featured speaker at the National Association of Catastrophe Adjusters Convention. He will be sharing his expertise using the Xactimate software to estimate large loss commercial damage.
1. AT&T is awarding an Excellence Award for the best use of their M2X API at the BIAC hackathon, with a $2,000 cash prize and Udacity scholarships.
2. The award will judge projects based on how well they articulate the app's purpose, originality, technical challenge, and use of the M2X API.
3. Attendees have access to online and onsite resources including documentation, sample code, and technical mentors to help build projects using M2X.
The document discusses Stan Meyer's water fuel cell technology. It describes how Meyer is using a dune buggy prototype to test and refine the technology. Meyer presented the water fuel cell at the Symposium on Free Energy, where it was well received by the scientific community as a viable solution to future energy problems. Admirals and experts in the UK and Europe have recognized the potential of the technology to address energy challenges.
Presentation to the AT Community of Practice at UCD January 2016 on how AT users and professionals can benefit from the new social and technological innovations associated with Maker Culture?
Delving into the intricate web of video downloading, 'Ethical Considerations in Video Downloading and Copyright Navigation' offers a nuanced exploration of the moral and legal implications tied to online content acquisition. This article sheds light on the often blurred lines between fair use and copyright infringement, providing readers with a comprehensive understanding of responsible digital consumption in today's rapidly evolving media landscape.
This document provides guidelines for integrating AV/IT infrastructure into court facilities. It discusses the needs assessment process, design details for technology-enabled courtrooms, courthouse infrastructure planning, and considerations for new construction and renovations. The keys to successful technology implementation are careful planning, thoughtful design, expert involvement, and coordination among all stakeholders. The goal is to create functional facilities that seamlessly integrate technology.
Similar to Taking Responsibility for Technology (20)
This document discusses Management by Walking Around (MBWA), an effective management technique where managers visit employees informally to boost morale, maintain visibility of projects, and provide coaching. While successful for companies like HP, MBWA is limited in virtual environments. The document proposes a conceptual "virtual MBWA" solution using intelligent project management software to allow rapid Q&A reviews, risk assessment, integration with collaboration tools, and a centralized repository, in order to continue providing the benefits of visibility, control and optimization for distributed teams.
This document discusses the need for comprehensive risk management and automation for cyber security. It makes three key points:
1) Security is a process that requires monitoring across physical, technical and administrative controls to be effective. Automation is needed for continuous monitoring of vulnerabilities and threats.
2) Automation is also key to modifying security behaviors by consistently enforcing and reinforcing security practices.
3) An effective approach is to automate comprehensive monitoring that incorporates both technical ("hard") data from security systems and human ("soft") feedback to provide situational awareness and reinforce security policies in order to change behaviors.
Joe Hessmiller presented on knowledge management. The presentation covered the basics of knowledge management including definitions, value, history and lessons learned. It discussed common mistakes made in KM projects and emphasized that KM is about people, not technology. The presentation also provided overviews of wiki software, leading KM products, and recommendations for implementing KM, including emphasizing human aspects over control and best practices.
This document summarizes a presentation about why CIOs get fired. It begins by outlining the agenda and purpose of discussing key career risks for CIOs. It then presents statistics showing that involuntary CIO departures are comparable to other executives. However, the risk of firing increases with company size. The presentation identifies the top 10 reasons CIOs get fired, including failure to address priorities, lack of revenue involvement, and being unprepared for new technologies. It suggests CIO tenure tracks business cycles and those committed to outdated strategies are at risk. The reasons CEOs get fired - like ignoring customers or reality - also apply to CIOs. The takeaway is that CIOs need to be in touch with realities
Leadership is Simple, Followership is a Challenge - Lehigh University Guest L...Computer Aid, Inc
This document discusses leadership and followership. It defines leadership as differentiating your style to the unique needs of your organization while focusing on your strengths. Followership is also important, with effective followers being coachable, anticipating needs, seizing initiatives, and more. The document recommends starting by focusing on conditions for success, communicating through shared metrics, and relating metrics to practical measures like those on a car's dashboard. This helps simplify complexity and enable effective leadership.
Driving Innovative IT Metrics (Project Management Institute Presentation)Computer Aid, Inc
This document discusses innovative IT metrics and focuses on the conditions for success. It begins by establishing the need and opportunity for improving project success rates through better metrics. Common metrics track progress retrospectively on factors like costs, quality and volume, while innovative metrics should also manage risk prospectively. The document identifies expectations management, sponsor involvement and process compliance as key conditions to monitor, and introduces four related metrics - SMART, SMPL, PAL and PRPL - to track these conditions over time. It provides examples and explanations of how these condition-based metrics can help identify and address risks early.
The state government agency faced the challenge of building a new application within 14 months to receive a grant, requiring management of multiple vendors across different locations. CAI's Automated Project Office (APO) provided visibility into the project's status, risks, and resource issues through accurate and timely updates from team members. This allowed the project manager to address risks proactively and keep the project on track to be completed early and retain the grant funding. APO ensured constant communication between stakeholders and transparency of the project's progress.
MBWA, or Management by Walking Around, was a technique pioneered by HP in which managers would informally and spontaneously check in with employees to gain visibility into projects and address issues early. While effective, MBWA is limited in virtual environments where travel is required. This document proposes a virtual MBWA tool that would allow for rapid, intelligent QA reviews of all projects using checklists. It would also enable managers to drill down into risk areas and combine existing communication tools. The goal is to continue providing the benefits of visibility, control and optimization that traditional MBWA provided to remote and distributed teams.
The document discusses leadership and followership. It defines a leader as someone who guides others and helps them work towards shared goals, while an effective follower is coachable, anticipates needs, offers solutions, and earns trust through dependability. The document argues that leadership requires effective followers and focuses on getting the right people engaged in pursuing a joint vision. It provides rules for effective followership and emphasizes monitoring key performance and condition data, like an automobile dashboard, to ensure the team is working well together towards their objectives.
The document discusses an automated project office tool called Computer Aid's Automated Management Interface (AMI) that provides visibility, governance, and control over projects. It allows organizations to track project data, status, and key metrics; manage projects and processes consistently; and provide reporting at various levels of the organization. The presentation demonstrates AMI's capabilities such as managing projects, tasks, and resources as well as its analytics and reporting features. It also discusses implementation options and next steps to set up and configure AMI for an organization.
This document provides an overview of CAI Company, an IT services firm with 3,000 associates worldwide and $370 million in revenue. It discusses CAI's 30+ years in IT services, global presence with offices and delivery centers across the US and world. The document also summarizes CAI's focus on processes, metrics, and quality standards. It proposes several ways for CAI to increase a client's delivery capability, such as through application support, enhancement delivery services, and software development teams. Metrics and case studies are presented to demonstrate CAI's track record of measurable success in delivering projects on-time and within budget.
This document discusses a new approach to management in the 21st century called "The Management Cell Concept". It involves:
1) Dividing organizations into operational departments or "cells" that each manage their own work and use data and stakeholder perspectives to do so.
2) Giving each management position a "Personal Cockpit" that provides knowledge, guidance, best practices and other tools to help them manage.
3) Networking these cockpits together into an integrated business management and control system.
The goal is to balance efficiency, scale and control with flexibility, speed and entrepreneurship in order to help companies adapt, survive and prosper in the future.
The state of Georgia is a valued Computer Aid, Inc. (CAI) customer who is seeing great success with both APO and PPM. From their Director of Enterprise Governance and Planning,
"The CAI solution provides a governance layer of process discipline, best practices, and predictive analysis to reduce risk and improve project success, regardless of the PPM tool used by agency project teams."
This document discusses techniques for successful 21st century management. It emphasizes establishing a management system that ensures critical information flows throughout the organization. The system should provide distilled, key information to all levels of management. It should build a fact-based culture and repository of operational data to allow for knowledge sharing and use of best practices. The goal is a prescribed information system that facilitates clean, honest information flow and efficient management interaction across the organization.
ITBuzz is a suite of products that provides project and initiative governance, service delivery management, portfolio management and governance, and a CIO dashboard. The suite includes tools for asset assessment, organizational analysis, predictive analytics, and post-implementation reviews to enable continuous improvement. ITBuzz automates the flow of role-based and rule-based information to provide instant views of KPIs and detailed analytics.
The AmeriHealth Mercy Family of Companies implemented Tracer tools and Automated Project Office (APO) to better manage their work, set priorities and expectations, track progress, and measure performance and customer satisfaction. This enabled them to improve delivery, demand management, and develop metrics to enhance their relationship with customers and meet strategic goals. The solutions provided visibility into workloads and issues to address quality, risks, and productivity.
The document promotes an automated project office (APO) system that provides project control, governance, and communications/visibility. It claims APO acts as an expert reviewer that regularly analyzes project data against best practices to identify risks and issues. Using APO, organizations can gain early insights, improve processes, and have consistent information across teams. The system costs $5,000 per month to use and can be implemented quickly with its software-as-a-service model.
Interview with Risk Management Practitioner: Robert CharetteComputer Aid, Inc
El documento discute el desarrollo de un sistema de resumen automático que puede generar resúmenes cortos de documentos de manera concisa. El sistema analiza la estructura y el contenido del documento original para identificar las ideas y la información clave. Luego genera un resumen de uno o dos párrafos que captura la información fundamental del documento de manera compacta.
The document discusses Advanced Management Insight (AMI), a solution from CAI that provides IT management visibility, control, and optimization through automated data collection and analysis. It captures project data, measures against best practices and KPIs, and provides dashboards and reports. AMI aims to eliminate "management by walking around" by surfacing risks and issues early. It has helped customers reduce reporting time by 80% and rework by up to 40% while improving productivity and innovation. The demonstration shows sample AMI dashboards and analytics for portfolio management, resource planning, budgeting, predictive insights, and stage gating.
1. Taking Responsibility for Technology
November 8, 2012
11:00 AM – 12:30 PM
Slide: 1
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
2. Don Shafer
CTO
Athens Group, LLC
dshafer@athensgroup.com
Hosted by:
Michael Milutis
Director of Marketing
Computer Aid, Inc. (CAI)
Michael_Milutis@compaid.com
Slide: 2
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
3. About Athens Group:
Athens Group provides independent, 3rd party technology
assurance services for high-specification Oil & Gas drilling
and production systems. Our mission is to help operators,
drilling contractors and asset owners ensure safety, reduce
non-productive time (NPT), and safeguard the environment
over the entire asset lifecycle.
Slide: 3
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
4. CAI Achieves IT Operational Excellence
Slide: 4
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
5. PDU Credits Available for this Webinar
• The PMI has accredited this webinar with PDUs
• You will be eligible to receive 1.0 PDU credits
• Your PDU email will be sent to you within 24 hours
Slide: 5
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
6. Online Webinar Recordings
NOW AVAILABLE
• Anytime Access
• Hundreds of Topics
Visit:
www.ITMPI.org/library
Slide: 6
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
7. Enjoy the benefits of ITMPI Membership
JOIN TODAY!
• UNLIMITED Free Webinar Recordings
• UNLIMITED Free PDU Credits
• Hundreds of Topics
Visit:
www.ITMPI.org/subscribe
Slide: 7
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
8. Taking Responsibility for Technology
In our post-Macondo world, we all must understand the
technology we are building, implementing and using.
Slide: 8
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
9. “Controlling” Technology is NOT the point
The life raft was at a 45-degree angle to the water. There's something called a painter
line that these life rafts attach to the rigs. We had pulled all that tight. And no one had
ever cut it. So we're tied to the rig and we're dumping people out of the life raft.
Transocean has a no-knife policy. No pocketknives of any kind. No one had a knife to
cut this line.
Mike Williams, Chief ET, DWH
Slide: 9
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
10. Technologists need a Code of Ethics
We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
quality of life throughout the world and in accepting a personal obligation to our profession, its
members and the communities we serve, do hereby commit ourselves to the highest ethical and
professional conduct and agree:
1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
public, and to disclose promptly factors that might endanger the public or the environment;
2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
parties when they do exist;
3.to be honest and realistic in stating claims or estimates based on available data;
4.to reject bribery in all its forms;
5.to improve the understanding of technology, its appropriate application, and potential
consequences;
6.to maintain and improve our technical competence and to undertake technological tasks for others
only if qualified by training or experience, or after full disclosure of pertinent limitations;
7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
to credit properly the contributions of others;
8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
national origin;
9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
10.to assist colleagues and co-workers in their professional development and to support them in
following this code of ethics.
Slide: 10
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
11. Focus on three points:
We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
quality of life throughout the world and in accepting a personal obligation to our profession, its
1. to accept responsibility in making decisions
members and the communities we serve, do hereby commit ourselves to the highest ethical and
professional conduct and agree:
consistent with the safety, health and welfare of
1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
public, and to disclose promptly factors that might endanger the public or the environment;
the public, and to disclose promptly factors that
2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
parties when they do exist;
might endanger the public or the environment;
3.to be honest and realistic in stating claims or estimates based on available data;
4.to reject bribery in all its forms;
5.to improve the understanding of technology, its appropriate application, and potential
consequences;
3. to be honest and realistic in stating claims or
6.to maintain and improve our technical competence and to undertake technological tasks for others
only if qualified by training or experience, or after full disclosure of pertinent limitations;
estimates based on available data;
7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
to credit properly the contributions of others;
8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
national origin;
5. to improve the understanding of technology,
9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
10.to assist colleagues and co-workers in their professional development and to support them in
its appropriate application, and potential
following this code of ethics.
consequences;
Slide: 11
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
12. August 1628
Vasa, the most lavishly
appointed and heavily armed
warship of its day, but one too
long and too tall for its beam
and ballast-a matchless array of
features on an unstable
platform. The standard stability
test of the day-30 sailors
running from side to side trying
to rock the boat-tilted the Vasa
perilously, the test was
canceled and the ship readied
for launch. Minutes after her
grand launching, with all
Stockholm watching, the Vasa
heeled, listed and sank, killing
about 50.
Slide: 12
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
13. December 1903
Burning of Chicago's Iroquois Theater - a supposedly
indestructible, up-to-the-minute design-in this case, a theater
advertised as "absolutely fireproof“ - killed 602 people, more
than twice the toll of "the Great Chicago Fire" 32 years earlier.
The Iroquois's owners acted with as much haste and hubris as
their Titanic counterparts, installing no firefighting equipment,
forgoing fire drills and opening before the sprinkler system was
ready. Instead, like so many others, they relied on a single
technological magic bullet: an asbestos curtain that would drop
down and shield the audience in the (rather common) event of a
backstage fire. An oil-painted backdrop brushed against a hot
calcium-arc spotlight and ignited. The asbestos curtain started
dropping on cue but caught on a stage light. Crew and cast
opened the stage door to flee, admitting a powerful gust that
sent fireballs shooting out over the unshielded audience.
Fleeing patrons either found the doors barred or could not turn
the newfangled latches on them.
Slide: 13
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
14. December 1903
Burning of Chicago's Iroquois Theater - a supposedly
indestructible, up-to-the-minute design-in this case, a theater
advertised as "absolutely fireproof“ - killed 602 people, more
than twice the toll of "the Great Chicago Fire" 32 years earlier.
The Iroquois's owners acted with as much haste and hubris as
their Titanic counterparts, installing no firefighting equipment,
forgoing fire drills and opening before the sprinkler system was
ready. Instead, like so many others, they relied on a single
technological magic bullet: an asbestos curtain that would drop
down and shield the audience in the (rather common) event of a
backstage fire. An oil-painted backdrop brushed against a hot
calcium-arc spotlight and ignited. The asbestos curtain started
dropping on cue but caught on a stage light. Crew and cast
opened the stage door to flee, admitting a powerful gust that
sent fireballs shooting out over the unshielded audience.
Fleeing patrons either found the doors barred or could not turn
the newfangled latches on them.
Slide: 14
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
15. July 1979
Atlantic Empress and Aegean
Captain, gigantic supertankers
collide off the island of Little
Tobago in the Caribbean Sea,
killing 26 crew members and
spilling 280,000 tons of crude oil
into the sea. At the time, it was
the worst oil-tanker accident in
history and remains one of the
very few times in history when
two oil tankers have collided.
Slide: 15
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
16. July 1981
On July 17, 1981, approximately
1,600 people gathered in the
Hyatt Regency Kansas City
atrium to participate in and watch
a dance competition. The fourth
floor walkway collapsed onto the
second floor and both walkways
then fell to the lobby floor below,
resulting in 114 deaths and 216
injuries. The basic problem was a
lack of proper communication,
failure to review the initial design
thoroughly, and failure to perform
basic calculations that would
have revealed its serious intrinsic
flaws — in particular, the doubling
of the load on the fourth-floor
beams.
Slide: 16
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
17. April 1986
Chernobyl was a nuclear power plant in
Ukraine that suffered a catastrophic
meltdown. On April 26, 1986, one of the
reactors underwent rapid overheating,
leading to a meltdown that released an
enormous cloud of radioactive fallout,
simultaneously endangering the lives of
hundreds of thousands of people in
surrounding areas. Since the disaster,
over 4,000 people have died due to
cancer from the radiation. As it stands
today, Chernobyl has a 17-mile radius
―Exclusion Zone‖ which is considered
too hazardous to live safely in. Scientists
estimate that Chernobyl will become fully
safe to inhabit – in 20,000 years.
Close but no cigar:
Three Mile Island
Hanford N-Reactor
Slide: 17
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
18. August 2007
The I-35W Mississippi River bridge
was an eight-lane, steel truss arch
bridge that carried Interstate 35W
across the Mississippi River in
Minneapolis. During the evening
rush hour on August 1, 2007, it
suddenly collapsed, killing 13
people and injuring 145. NTSB
found the primary cause was the
under-sized gusset plates.
Contributing to that error was the
fact that 2 inches of concrete were
added to the road surface over the
years, increasing the dead load by
20%. Also contributing was the
extraordinary weight of construction
equipment and material resting on
the bridge just above its weakest
point at the time of the collapse.
Slide: 18
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
19. October 2009
Husky Racer: Toppled Boxes Top Heavy Due to Software Glitch
Maersk Line – 18 Containers lost overboard
The preliminary examination of the
accident found that the inaccurate
container weights were on the loading
plan because of a system shortcoming
which did not update the operations
department when the shipper provided
more accurate contents details to the
carrier.
Maersk Line is running trials on an
upgraded software package that will
provide cargo planners with the declared
weights of the containers. This is
scheduled to be introduced in the first
weeks of January 2010.
Slide: 19
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
20. December 2009
A control system failure occurred on a large, off-shore
construction vessel. Two control units were restarted twice,
unsuccessfully. A blinking red lamp on the PLC indicated that a
memory reset was required, even though a memory reset had
NEVER been requested by control system diagnostics during
equipment operations. As soon as the hydraulic power packs
started, a loud bang was heard. A quadruple joint of pipe
dropped approximately one meter to the welding deck below.
A second quadruple joint of pipe in the pipe elevator was
released (all clamps opened and the hydraulic safety stop
swung away) and fell the full length of the tower, smashing
through a crowded access platform to the deck below.
Result
Eight personnel were injured - four fatally. All were located on
the access platform and several were thrown overboard by the
impact.
Slide: 20
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
21. IEEE Code of Ethics
We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
quality of life throughout the world and in accepting a personal obligation to our profession, its
1. to accept responsibility in making decisions
members and the communities we serve, do hereby commit ourselves to the highest ethical and
professional conduct and agree:
consistent with the safety, health and welfare of
1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
public, and to disclose promptly factors that might endanger the public or the environment;
2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
the public, and to disclose promptly factors that
parties when they do exist;
3.to be honest and realistic in stating claims or estimates based on available data;
might endanger the public or the environment;
4.to reject bribery in all its forms;
5.to improve the understanding of technology, its appropriate application, and potential
consequences;
6.to maintain and improve our technical competence and to undertake technological tasks for others
3. to be honest and realistic in stating claims or
only if qualified by training or experience, or after full disclosure of pertinent limitations;
7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
to credit properly the contributions of others;
estimates based on available data;
8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
national origin;
9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
10.to assist colleagues and co-workers in their professional development and to support them in
following this code of ethics.
Slide: 21
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
22. Opportunities LOST!
1. June 22, 2009 - Mark E. Hafle, a senior drilling engineer at BP, warns that the metal casing for
the blowout preventer might collapse under high pressure.
2. March 2010 - An accident damages a gasket on the blowout preventer on the rig.
3. April 1 - Halliburton employee Marvin Volek warns that BP's use of cement "was against our
best practices.―
4. April 6 - MMS issues permit to BP for the well with the notation, "Exercise caution while drilling
due to indications of shallow gas and possible water flow."
5. April 9 - BP drills last section with the wellbore 18,360 feet below sea level but the last 1,192
feet need casing. Halliburton recommends liner/tieback casing that will provide 4 redundant
barriers to flow. BP chooses to do a single liner with fewer barriers that is faster to install and
cheaper ($7 to $10 million).
6. April 15 - Morel informs Halliburton executive Jesse Gagliano that they plan to use 6
centralizers. Gagliano says they should use 21.
7. April 15 - Gagliano also recommends to circulate the drilling mud from the bottom of the well all
the way up to the surface to remove air pockets and debris which can contaminate the cement,
saying in an email, at "least circulate one bottoms up on the well before doing a cement job."
Despite this recommendation, BP cycles only 261 barrels (41.5 m 3) of mud, a fraction of the
total mud used in the well.
8. April 17 - Gagliano now reports that using only 6 centralizers "would likely produce channeling
and a failure of the cement job."
9. April 18 - Gagliano's report says "well is considered to have a severe gas flow problem."
10. April 20 -7 am - BP cancels a recommended cement bond log test.
Slide: 22
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
23. IEEE Code of Ethics
We, the members of the IEEE, in recognition of the importance of our technologies in affecting the
1. to accept responsibility in making decisions
quality of life throughout the world and in accepting a personal obligation to our profession, its
members and the communities we serve, do hereby commit ourselves to the highest ethical and
consistent with the safety, health and welfare of
professional conduct and agree:
1.to accept responsibility in making decisions consistent with the safety, health and welfare of the
the public, and to disclose promptly factors that
public, and to disclose promptly factors that might endanger the public or the environment;
2.to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected
might endanger the public or the environment;
parties when they do exist;
3.to be honest and realistic in stating claims or estimates based on available data;
4.to reject bribery in all its forms;
5.to improve the understanding of technology, its appropriate application, and potential
3. to be honest and realistic in stating claims or
consequences;
6.to maintain and improve our technical competence and to undertake technological tasks for others
estimates based on available data;
only if qualified by training or experience, or after full disclosure of pertinent limitations;
7.to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and
to credit properly the contributions of others;
8.to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or
national origin;
9.to avoid injuring others, their property, reputation, or employment by false or malicious action;
5. to improve the understanding of technology,
10.to assist colleagues and co-workers in their professional development and to support them in
following this code of ethics.
its appropriate application, and potential
consequences;
Slide: 23
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
24. Don Shafer, CSDP
Chief Technology and Safety Officer
Athens Group, Inc.
560824
Slide:
Parkcrest Drive, Suite 200
Austin, Tx 78731
11/8/2012
donshafer@ieee.org
Webinar Sponsored by Computer Aid, Inc.
www.athensgroup.com
26. CAI Sponsors Proudly Sponsors
The IT Metrics & Productivity Institute
• IT and Software Knowledge Center: WWW.ITMPI.ORG
• Weekly Webinars Hosted by Industry Leaders: WWW.ITMPI.ORG / WEBINARS
• Access Webinar Recordings Anytime at WWW.ITMPI.ORG / LIBRARY
• Enjoy the Benefits of ITMPI Membership at WWW.ITMPI.ORG / SUBSCRIBE
• Follow Us on TWITTER at WWW.TWITTER.COM / ITMPI
• Follow Us on FACEBOOK at WWW.ITMPI.ORG/ FACEBOOK
• Join Our Network on LINKED IN at WWW.ITMPI.ORG/ LINKEDIN
• Find Out About Our CONFERENCES at WWW.ITMPI.ORG/ EVENTS
Slide: 26
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
27. Subscribe to the AITS Newsletter
• Daily articles in your mailbox on improving the management
of IT. Subscribe at www.AITS.org
• Listen to our ―Thought Radio‖ podcasts on iTunes or at
www.AITS.org
Slide: 27
11/8/2012
Webinar Sponsored by Computer Aid, Inc.
28. Don Shafer
CTO
Athens Group, LLC
dshafer@athensgroup.com
Hosted by:
Michael Milutis
Director of Marketing
Computer Aid, Inc. (CAI)
Michael_Milutis@compaid.com
Slide: 28
11/8/2012
Webinar Sponsored by Computer Aid, Inc.