See also:
- Boeing MAX8
In some industries, if people screw up, people die It is just the nature of any industry that deals with functional safety.
It's why some industries are also heavily regulated. Regulations that include, but are not limited to:
- ISO 26262 for road vehicles.
- IEC 61508 for industrial equipment.
- IEC 62279 for rail roads.
- IEC 61513 for nuclear power plants.
- DO-178B for avionics software.
- DO-254 for avionics hardware.
- IEC 62304 for medical device software.
Engineers in those industries they must be cognizant of CYA:
Cover your ass (British: arse), abbreviated CYA, is activity done by an individual to protect himself or herself from possible subsequent criticism, legal penalties, or other repercussions, usually in a work-related or bureaucratic context. In one sense, it may be rightful steps to protect oneself properly while in a difficult situation, such as what steps to take to protect oneself after being fired.
Almost everything is done by word of mouth. It's why corporate lawyers ask you to talk on the phone not in e-mail. It's why e-mail retention policies exist. (And why you should always print off anything you really want to keep.)
It's so that when the NTSB, lawyers, or anyone else comes to the door, you (on a personal level) can show that you did nothing wrong:
A very public and recent example is the the case of VW and Dieselgate.
In the July 2015 discussion, Weiß was asked to cheat, the testimony said. Weiß refused. After more discussion, the engineer demanded an order in writing. According to the testimony, his boss Heiduk went in conference with the board, and came back with a written order to break the law.
That engineer then went to keep that order locked in a safe until he presented it in court.
A cryptographic hash function is a hash function which takes an input (or 'message') and returns a fixed-size alphanumeric string. The string is called the 'hash value', 'message digest', 'digital fingerprint', 'digest' or 'checksum').
The ideal hash function has three main properties: - It is extremely easy to calculate a hash for any given data. - It is extremely computationally difficult to calculate an alphanumeric text that has a given hash. - It is extremely unlikely that two slightly different messages will have the same hash.
A blockchain, originally block chain,is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a hash pointer as a link to a previous block, a timestamp and transaction data. By design, blockchains are inherently resistant to modification of the data. The Harvard Business Review describes it as "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way." - Wiki
If you have graduated engineering in the last few decades you were probably discussed the Space Shuttle Challenger. It is a case study in group think and engineering ethics.
For this example I will show what Allan McDonald could have done in 2018 to CYA.
-
Write your message.
I am concerned that below-freezing temperatures might impact the integrity of the solid rockets' O-rings.
I refuse to sign the launch recommendation over safety concerns.
Allan McDonald
https://www.nasa.gov/centers/langley/news/researchernews/rn_Colloquium1012.html
https://github.com/dapperfu/BlockchainCYA/blob/master/ChallengerLaunch.txt
Post it somewhere:
This was a very short and not at all complete tutorial of all the tools available.
- PGP/GPG Keys & Signing
- FIDO U2F (Universal 2nd Factor Authentication)
- Distributed Blockchain Storage (Storj, Sia)
If you want to see any of the above topics prioritized, open an issue.