SOFTWARE FAILURES.

Slides:



Advertisements
Similar presentations
. Today you will: Learn about how an is processed once it has been sent Learn some advantages and disadvantages of using Learn how.
Advertisements

Electronic Measure and Test Unit 53 Task 4 (P4).  A plan that clearly details the tests that will be performed  What to test  How to test (step by.
CML CML CS 230: Computer Organization and Assembly Language Aviral Shrivastava Department of Computer Science and Engineering School of Computing and Informatics.
OHT 2.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software Quality assurance (SQA) SWE 333 Dr Khalid Alnafjan
Shooting for the Moon Bernard Brown Ashley Richter Will Bullins.
Syllabus Case Histories WW III Almost Medical Killing Machine
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Patriot Missile Failure
CSC 4250 Computer Architectures September 12, 2006 Appendix H. Computer Arithmetic.
WHY THEY FAILED AND LESSONS TO BE DRAWN Samuel Franklin G53QAT: Quality Assurance and Testing Famous Software Failures.
Software Engineering Disasters
Computers in Society Week 10: Software System Failures.
Chapter 8 Representing Information Digitally.
1 Software Development Prepared By Joseph Leung. 2Agenda 1.Discuss the need for quality software in business systems, industrial process control systems,
The Internet Facilitates Global data communications.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Toward A Reasonable Programmer Standard Responsibility and Negligence in Software Design.
Software Errors Who is to blame?. Almost everything in our daily lives is controlled by CPU’s and software… Does Embedded Software = Embedded Disasters?
Know your users!. Users Last week we looked at the physical and cognitive abilities of humans Aims this week ◦ Understand the importance of knowing your.
The Unintended Consequences of a career in Engineering Or How to end up a mass murderer without even trying.
INTRODUCTION TO COMPUTERS The personal computer was far from reality in Computer users were limited to specially trained operators and engineers.
1/ REU Program at ECU Software Testing - Foundations, Tools, and Applications Lecture 1 May 21, 2013 Introduction to Software Testing Dr. Sergiy.
ITGS Software Reliability. ITGS All IT systems are a combination of: –Hardware –Software –People –Data Problems with any of these parts, or a combination.
Ganssle 1 MAPLD 2005/S110 Learning from Jack Ganssle Disaster.
Software Engineering Background Dr. David A. Gaitros.
Telecommunications Communication over a long distance; Distant communication.
CS 4001Mary Jean Harrold 1 Can We Trust the Computer?
Week Rainey Community ICT Classes ICT – The Basics.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Lecture 08 – Documentation, debugging.  docstring  A special kind of string (text) used to provide documentation  Appears at the top of a module 
BY: KELLY MEYERS Iraq War Operation Desert Storm.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
“I am not in the office at the moment. Send any work to be translated.”
TWO EXAMPLES AS MOTIVATION FOR THE STUDY OF COMPUTER ERRORS
SEN 460 Software Quality Assurance. Bahria University Karachi Campus Waseem Akhtar Mufti B.E(UIT), M.S(S.E) AAU Denmark Assistant Professor Department.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
1 Software Quality Assurance COMP 4004 Notes Adapted from S. Som é, A. Williams.
Are You Ready for 2000? Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst, NJ SCANY2K
The Year 2000: Enough Crises for Everyone Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst,
The Unintended Consequences of a career in Engineering Or How to end up a mass murderer without even trying.
Unintended Consequences of a career in Engineering.
By Alyssa Sedlak. This worm arrived by on May 4, 2000 The subject was simply “ILOVEYOU” and held an attachment named “LOVE-LETTER-FOR-YOU” LOVE.
Chapter 8 Errors, Failures, & Risks. Real Headlines Navigation system directs car into river Data entry typo mutes millions of U.S. pagers Flaws found.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 Chapter 1- Introduction How Bugs affect our lives What is a Bug? What software testers do?
1 Advanced Computer Programming Project Management: Basics Copyright © Texas Education Agency, 2013.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
CS 389 – Software Engineering Lecture 1 Introduction Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.
Computer Virus’s.
Intro to Malware Attacks
Patriot Missile Failure
Legislation in ICT.
Computer Viruses Latifah alabdulkarim
is short for electronic mail!
ECE 103 Engineering Programming Chapter 2 SW Disasters
Data Integrity Leadership Institute
Several definitions: “Testing is the process of establishing confidence that a program or system does what it is supposed to.” by Hetzel 1973 “Testing.
The Top 10 bugs
Software Engineering Lecture 1 Introduction Adapted from:
Legislation in ICT.
Computer Viruses Standard A-4 (Safety Unit)
Scale of things : Big and Small
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
What this course is NOT about:
Software Engineering Disasters
Do I Understand the Internet?
Type the name of your disaster here.
Presentation transcript:

SOFTWARE FAILURES

Cancer Treatment (2000) Cost: Eight people dead, 20 critically injured Disaster: Radiation therapy software by Multidata Systems International miscalculated the proper dosage, exposing patients to harmful and in some cases fatal levels of radiation.  The physicians, who were legally required to double-check the software’s calculations, were indicted for murder. Cause: The software calculated radiation dosage based on the order in which data was entered, sometimes delivering a double dose of radiation

Love Letter Cost:  $8.75 billion, millions of computers infected, significant data loss Disaster: The LoveLetter worm infected millions of computers and caused more damage than any other computer virus in history.  The worm deleted files, changed home pages and messed with the Registry. Cause: LoveLetter infected users via e-mail, Internet chat and shared file systems.  The email had an executable file attachment and subject line, “ILOVEYOU.”  When the user opened the attachment, the virus would infect the user’s computer and send itself to everyone in the address book

Y2K Cost: $500 billion Disaster: One man’s disaster is another man’s fortune, as demonstrated by the infamous Y2K bug.  Businesses spent billions on programmers to fix a glitch in legacy software.  While no significant computer failures occurred, preparation for the Y2K bug had a significant cost and time impact on all industries that use computer technology. Cause: To save computer storage space, legacy software often stored the year for dates as two digit numbers, such as “99″ for 1999.  The software also interpreted “00″ to mean 1900 rather than 2000, so when the year 2000 came along, bugs would result.

British passport to nowhere (1999) Cost: £12.6 million, mass inconvenience Disaster: The U.K. Passport Agency implemented a new Siemens computer system, which failed to issue passports on time for a half million British citizens.  The Agency had to pay millions in compensation, staff overtime and umbrellas for people queuing in the rain for passports. Cause: The Passport Agency rolled out its new computer system without adequately testing it or training its staff.  At the same time, a law change required all children under 16 traveling abroad to obtain a passport, resulting in a huge spike in passport demand that overwhelmed the buggy new computer system

Mars Climate Crasher (1998) Cost: $125 million Disaster: After a 286-day journey from Earth, the Mars Climate Orbiter fired its engines to push into orbit around Mars.  The engines fired, but the spacecraft fell too far into the planet’s atmosphere, likely causing it to crash on Mars. Cause: The  software that controlled the Orbiter thrusters used imperial units (pounds of force), rather than metric units (Newtons) as specified by NASA.

Patriot Fails Soldier (1991) Cost: 28 soldiers dead, 100 injured Disaster: During the first Gulf War, an American Patriot Missile system in Saudi Arabia failed to intercept an incoming Iraqi Scud missile. The missile destroyed an American Army barracks. Cause: A software rounding error incorrectly calculated the time, causing the Patriot system to ignore the incoming Scud missile