SlideShare a Scribd company logo
Practical Experience of Applying Agile Techniques to the Development of a Safety-Critical System 
David Nicoll 
Project Realization
When do we get value from software? 
When we get the software into…
Business Benefit 
Typical Waterfall Development 
Requirements 
Design 
Code 
Test 
Traceability between phases 
Completion of a Phase is often a contract payment milestone. 
Review 
Review 
Review 
End of Phase reviews form a stage-gate 
When do we get the ROI? 
Right at the end….. 
But will it deliver what we want ?
Reputation & Outcomes 
•Software is always late 
•It doesn’t work 
•Costs too much 
•Quality is poor 
•Changes are slow and costly
Model of Traditional Development 
Quality 
Time 
Cost 
Functionality 
Fixed 
Variable
Status of Agile 
•Is by far the fastest growing methodology today 
•Is being taken up across all sectors both public and private 
•Is becoming the de-facto standard approach 
•Originally for small development teams 
–Typical team of 7 people (± 2) 
–Is now being scaled to teams of 1000+ 
•Number of approaches for organisational levels 
–Development level (includes Scrum, XP) 
–Project & Programme level (includes DSDM, SAFe)
Basis of Agile and ROI 
•Agile is concerned with getting the fastest ROI 
•Continuous iterative development 
•Progressive incremental delivery 
–to provide Business Benefit throughout the development 
•Driven by costs and timescales 
–Functionality is removed or deferred 
•Assumes not everything is known 
–Anticipates Change will happen 
•Fast feedback supports continuous improvement 
•Collaborative working between 
–between Client and Supplier 
–Development teams
Deliveries are Fixed In Time 
Time 
Incremental 
Delivery 
#1 
Incremental 
Delivery 
#2 
Incremental 
Delivery 
#3 
Planned Delivery Dates based on Timescale NOT content
Increment #1 
Incremental Functionality 
Time 
Incremental Delivery #1 
Incremental 
Delivery 
#2 
Incremental Delivery #3 
Build incrementally on firm foundations 
Increment #1 
Increment #1 
Increment #2 
Increment #2 
Increment #3
Increment #2 
Increment #1 
Timescale Takes Precedence 
Time 
Incremental 
Delivery 
#1 
Incremental Delivery #2 
Incremental 
Delivery 
#3 
Continuous delivery – functionality deferred 
PRIORITISE 
PRIORITISE 
Increment #3 
Increment #1 
Increment #2 
Increment #3
Completeness of Increments 
Time 
Incremental Delivery #1 
Incremental 
Delivery 
#2 
Incremental Delivery #3 
Design 
Code 
Test 
Design 
Code 
Test 
Design 
Code 
Test 
Review 
Plan 
Review 
Plan 
Review 
Plan
Incremental Safety Assurance 
Time 
Increment 
#1 
Increment #2 
Increment 
#3 
Increment #2 
Increment #1 
Safety 
Audit 
#1 
Safety 
Audit 
#2 
Increment #1 
Safety 
Audit 
#1 
Increment #2 
Safety 
Audit 
#2 
Increment #1 
Safety 
Audit 
#1 
Increment #3 
Safety 
Audit 
#3
Model of Agile Development 
Quality 
Time 
Cost 
Functionality 
Fixed 
Variable
Agile Development 
No change to existing best practice 
•Full traceability (requirements, design, code, test) 
•Coding standards 
–Static analysis 
–Complexity 
–Module size 
•Unit Test – full path coverage 
•Independent reviews 
•Test Driven Development (TDD) 
•Automated overnight build and test 
•Strict configuration control and change control 
14
Management of Risk 
•Agile provides early tangible working product 
–Evidence based progress 
–Avoids the “90% complete” syndrome 
–Provides for re-prioritisation 
•Overall risk is progressively reduced throughout the development 
•Risk exposure is limited to the cost of the current increment 
•Lessons Learned from one increment are passed to the next
Risk Over Time 
Time 
Risk 
Delivery 
Deadline 
Waterfall 
Agile 
Increment #1 
Increment 
#2 
Increment 
#3
Progress Monitoring 
•Traditional Gantt Charts are only useful at a high level 
•Daily Stand-Up meetings 
–Provides an environment for communication and team building 
–Each team member provides a verbal update to the rest of the team 
•Wall boards show 
–The Workflow 
–Who is doing what 
–Where the progress blocks are 
•Burn-down charts 
–Shows how fast work is being performed (velocity) 
–Provide a forecast completion date
Progress Monitoring: Burn-Down Charts 
To Do 
Complete 
In Progress 
Estimated Finish #1 
Estimated Finish #2 
Date 
Number of Reqmts 
Estimated 
Finish #3 
Actual Finish
Agile for Safety-Critical Rail 
•Autonomous Underground Train Control system 
•Real-Time Safety-Critical System 
–CENELEC 50128 (SIL4) – Loss of Life 
•Automatic control of 
–train, signals, points 
•Radio based communication between 
–Trains 
–Timetable (including local speed restrictions) 
•Doppler radar 
–Provides speed, distance & direction 
•Axle counters 
–to determine train position in station
FBP: System Layout 
Radio 
Interlocking 
Control Centre 
ATP 
ATO 
Radio Links 
Communications 
Signals & Points 
Radio 
BP 
BP 
Fixed Block Processor 
Interlocking 
ATP 
ATO 
Train driving
Initial Development Process 
Detailed 
Design 
Code 
Review & 
Safety Audit 
Review & Safety Audit 
Requirements 
Definition 
High-Level 
Design 
Unit Test 
Integration 
Test 
Acceptance 
Test 
System 
Test 
Review & 
Safety Audit 
Review & 
Safety Audit 
Review & 
Safety Audit 
Review & 
Safety Audit 
Review & 
Safety Audit
Development Process 
Detailed 
Design 
Code 
Requirements 
Definition 
High-Level 
Design 
Unit Test 
Integration 
Test 
Acceptance 
Test 
System 
Test 
Code 
Detailed 
Design 
Unit Test 
Detailed Design 
Code 
SPARK 
Unit Test 
Increments 
SPARK 
Detailed Design 
Detailed Design 
Code 
SPARK 
Unit Test 
Detailed Design 
SPARK 
Unit Test 
Unit Test 
Code 
Code 
Detailed Design 
Code 
Unit Test 
SPARK
Incremental Development 
Time 
Review Previous Increment 
Plan this Increment 
Overall 
Requirements 
Backlog 
Design 
Code 
Test 
SPARK 
Increment 
Requirements 
Backlog 
Process Improvements
Incremental Development 
Design 
Code 
Test 
SPARK 
•Full Traceability 
–Requirements 
–Design 
–Code 
–Test 
•Independent Unit test 
–100% path coverage 
–MC/DC testing 
–Boundary values 
•Independent Formal Reviews 
•Incremental Hazard Analysis
25 
Conventional Safety Analysis Process 
System Hazards & Safety Constraints 
New Hazards 
New Hazards 
Vertical Slice Analysis 
Known Hazards 
Known Hazards 
Design Verification Safety Analysis 
Code Verification Safety Analysis 
Safety Requirements Verification Analysis 
Safety Audit Report 
Phase Specific Safety Reports 
Safety Analysis 
Safety Analysis 
Design 
Code 
Test
Safety 
Analysis 
FBP: Increment based Safety Analysis 
System Hazards & Safety Constraints 
Vertical Slice Analysis 
Increment 
Unit Test Safety Analysis 
Code Verification Safety Analysis 
Design Verification Safety Analysis 
Safety Audit Report (Increment) 
Design 
Code 
Test 
New Hazards 
Safety 
Analysis 
New Hazards 
Phase Specific Safety Reports 
Safety 
Analysis 
New Hazards
FBP Burn-Down: Testing 
0 
100 
200 
300 
400 
500 
600 
700 
800 
900 
No. of Module Tests 
Weeks 
FBP: Module Testing (Formal) 
Complete 
Progressing 
To Go 
Total Tests
28 
FBP: Retrospective Project Analysis 
Development Team Size = 70+ (35 UK, 35 India, 4 Spain) 
Primary project objective = Timescale 
Crude industry standard = 22 ↔ 24 months duration 
Actual development = 18 months 
Cost (Effort) 
Time 
FBP
Approaching Agile 
•Fundamentally Agile is a mind-set 
•It is about managing project risk in order to deliver business benefit 
•Agile is not proscriptive 
–Best practice in all activities 
–No conflict with current industry practice 
•Agile advocates a number of methods, techniques and approaches that deliver business benefit 
•It is up to you to tailor these to your need
Any Questions? 
David Nicoll 
www.project-realization.com
Ad

More Related Content

What's hot (19)

Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Perforce
 
A Computer Vision Application for In Vitro Diagnostics Devices
A Computer Vision Application for In Vitro Diagnostics DevicesA Computer Vision Application for In Vitro Diagnostics Devices
A Computer Vision Application for In Vitro Diagnostics Devices
AdaCore
 
Simmco Presentation
Simmco PresentationSimmco Presentation
Simmco Presentation
simmco
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
Luis Atencio
 
Testing in agile is it easier said than done
Testing in agile   is it easier said than done Testing in agile   is it easier said than done
Testing in agile is it easier said than done
Archana Joshi
 
Applying Agile Principles to Test Automation Development
Applying Agile Principles to Test Automation DevelopmentApplying Agile Principles to Test Automation Development
Applying Agile Principles to Test Automation Development
TechWell
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
Rogue Wave Software
 
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Mike Boudreaux
 
Designing For Functional Safety? How to Apply a Coding Standard
Designing For Functional Safety? How to Apply a Coding Standard Designing For Functional Safety? How to Apply a Coding Standard
Designing For Functional Safety? How to Apply a Coding Standard
Perforce
 
Flight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at DocusignFlight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at Docusign
Synopsys Software Integrity Group
 
DevOps as-a-Service (DaaS) value
DevOps as-a-Service (DaaS) valueDevOps as-a-Service (DaaS) value
DevOps as-a-Service (DaaS) value
Marc Hornbeek
 
Bosch ConnectedWorld 2017: Striving for Zero DPPM
Bosch ConnectedWorld 2017: Striving for Zero DPPMBosch ConnectedWorld 2017: Striving for Zero DPPM
Bosch ConnectedWorld 2017: Striving for Zero DPPM
David Park
 
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
Simone Onofri
 
Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...
Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...
Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...
Mike Boudreaux
 
Unlocking Faster Product Development Cycles
Unlocking Faster Product Development CyclesUnlocking Faster Product Development Cycles
Unlocking Faster Product Development Cycles
Perforce
 
Risk based QA af Michael Agerkvist Petersen, Radiometer Medical
Risk based QA af Michael Agerkvist Petersen, Radiometer MedicalRisk based QA af Michael Agerkvist Petersen, Radiometer Medical
Risk based QA af Michael Agerkvist Petersen, Radiometer Medical
InfinIT - Innovationsnetværket for it
 
Predictability at Scale
Predictability at ScalePredictability at Scale
Predictability at Scale
Perforce
 
MISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the futureMISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the future
AdaCore
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
deep sharma
 
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Perforce
 
A Computer Vision Application for In Vitro Diagnostics Devices
A Computer Vision Application for In Vitro Diagnostics DevicesA Computer Vision Application for In Vitro Diagnostics Devices
A Computer Vision Application for In Vitro Diagnostics Devices
AdaCore
 
Simmco Presentation
Simmco PresentationSimmco Presentation
Simmco Presentation
simmco
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
Luis Atencio
 
Testing in agile is it easier said than done
Testing in agile   is it easier said than done Testing in agile   is it easier said than done
Testing in agile is it easier said than done
Archana Joshi
 
Applying Agile Principles to Test Automation Development
Applying Agile Principles to Test Automation DevelopmentApplying Agile Principles to Test Automation Development
Applying Agile Principles to Test Automation Development
TechWell
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
Rogue Wave Software
 
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Mike Boudreaux
 
Designing For Functional Safety? How to Apply a Coding Standard
Designing For Functional Safety? How to Apply a Coding Standard Designing For Functional Safety? How to Apply a Coding Standard
Designing For Functional Safety? How to Apply a Coding Standard
Perforce
 
DevOps as-a-Service (DaaS) value
DevOps as-a-Service (DaaS) valueDevOps as-a-Service (DaaS) value
DevOps as-a-Service (DaaS) value
Marc Hornbeek
 
Bosch ConnectedWorld 2017: Striving for Zero DPPM
Bosch ConnectedWorld 2017: Striving for Zero DPPMBosch ConnectedWorld 2017: Striving for Zero DPPM
Bosch ConnectedWorld 2017: Striving for Zero DPPM
David Park
 
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
Simone Onofri
 
Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...
Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...
Part 5 of 6 - Implementation Phase - Safety Lifecycle Seminar - Emerson Excha...
Mike Boudreaux
 
Unlocking Faster Product Development Cycles
Unlocking Faster Product Development CyclesUnlocking Faster Product Development Cycles
Unlocking Faster Product Development Cycles
Perforce
 
Predictability at Scale
Predictability at ScalePredictability at Scale
Predictability at Scale
Perforce
 
MISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the futureMISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the future
AdaCore
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
deep sharma
 

Viewers also liked (15)

How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...
AdaCore
 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and Security
AdaCore
 
Mixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core PlatformsMixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core Platforms
AdaCore
 
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
AdaCore
 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
AdaCore
 
The Muen Separation Kernel
The Muen Separation KernelThe Muen Separation Kernel
The Muen Separation Kernel
AdaCore
 
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest linkHIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
AdaCore
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
 
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
AdaCore
 
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
AdaCore
 
The Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling SoftwareThe Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling Software
AdaCore
 
Ada 202x A broad overview of relevant news
Ada 202x A broad overview of relevant newsAda 202x A broad overview of relevant news
Ada 202x A broad overview of relevant news
AdaCore
 
Bounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise EnvironmentBounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise Environment
AdaCore
 
Verification and Validation of Robotic Assistants
Verification and Validation of Robotic AssistantsVerification and Validation of Robotic Assistants
Verification and Validation of Robotic Assistants
AdaCore
 
Multi-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical SystemsMulti-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical Systems
AdaCore
 
How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...
AdaCore
 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and Security
AdaCore
 
Mixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core PlatformsMixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core Platforms
AdaCore
 
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
AdaCore
 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
AdaCore
 
The Muen Separation Kernel
The Muen Separation KernelThe Muen Separation Kernel
The Muen Separation Kernel
AdaCore
 
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest linkHIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
AdaCore
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
 
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
AdaCore
 
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
AdaCore
 
The Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling SoftwareThe Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling Software
AdaCore
 
Ada 202x A broad overview of relevant news
Ada 202x A broad overview of relevant newsAda 202x A broad overview of relevant news
Ada 202x A broad overview of relevant news
AdaCore
 
Bounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise EnvironmentBounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise Environment
AdaCore
 
Verification and Validation of Robotic Assistants
Verification and Validation of Robotic AssistantsVerification and Validation of Robotic Assistants
Verification and Validation of Robotic Assistants
AdaCore
 
Multi-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical SystemsMulti-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical Systems
AdaCore
 
Ad

Similar to Practical Application of Agile Techniques in Developing Safety Related Systems (20)

Effective Scrum
Effective ScrumEffective Scrum
Effective Scrum
Sándor Zolta Székely Sipos
 
Se 381 - lec 28 -- 34 - 12 jun12 - testing 1 of 2
Se 381 -  lec 28 -- 34 - 12 jun12 - testing 1 of 2Se 381 -  lec 28 -- 34 - 12 jun12 - testing 1 of 2
Se 381 - lec 28 -- 34 - 12 jun12 - testing 1 of 2
babak danyal
 
Engineering DevOps Right the First Time
Engineering DevOps Right the First TimeEngineering DevOps Right the First Time
Engineering DevOps Right the First Time
Marc Hornbeek
 
Agile software development
Agile software developmentAgile software development
Agile software development
Siddharth Sharma
 
Journey to the center of DevOps - v6
Journey to the center of DevOps - v6Journey to the center of DevOps - v6
Journey to the center of DevOps - v6
Venkat Janardhanam, MS, MBA
 
Engineering DevOps to meet Business Goals
 Engineering DevOps to meet Business Goals Engineering DevOps to meet Business Goals
Engineering DevOps to meet Business Goals
Marc Hornbeek
 
Software Quality Metrics Software Quality
Software Quality Metrics Software QualitySoftware Quality Metrics Software Quality
Software Quality Metrics Software Quality
AlifFinandhita1
 
CM MatchPoint Agile Session
CM MatchPoint Agile SessionCM MatchPoint Agile Session
CM MatchPoint Agile Session
CM First Group
 
How Agile Are you
How Agile Are youHow Agile Are you
How Agile Are you
Heaton Cai
 
Fundamentals of agile tntu (2015-04-27)
Fundamentals of agile   tntu (2015-04-27)Fundamentals of agile   tntu (2015-04-27)
Fundamentals of agile tntu (2015-04-27)
Oleg Nazarevych
 
State of continuous delivery in 2015 - Minsk 15-5-2015
State of continuous delivery in 2015 - Minsk 15-5-2015State of continuous delivery in 2015 - Minsk 15-5-2015
State of continuous delivery in 2015 - Minsk 15-5-2015
Pavel Chunyayev
 
Павел Чуняев - State of Continuous Delivery in 2015
Павел Чуняев - State of Continuous Delivery in 2015Павел Чуняев - State of Continuous Delivery in 2015
Павел Чуняев - State of Continuous Delivery in 2015
ITSpringBY
 
Quantifying DevOps Adoption Empirically for Demonstrable ROI
Quantifying DevOps Adoption Empirically for Demonstrable ROIQuantifying DevOps Adoption Empirically for Demonstrable ROI
Quantifying DevOps Adoption Empirically for Demonstrable ROI
DevOps for Enterprise Systems
 
How To Avoid Continuously Delivering Faulty Software
How To Avoid Continuously Delivering Faulty SoftwareHow To Avoid Continuously Delivering Faulty Software
How To Avoid Continuously Delivering Faulty Software
Erika Barron
 
Shorten Business Life Cycle Using DevOps
Shorten Business Life Cycle Using DevOpsShorten Business Life Cycle Using DevOps
Shorten Business Life Cycle Using DevOps
Perfecto Mobile
 
Continuous Delivery Distilled
Continuous Delivery DistilledContinuous Delivery Distilled
Continuous Delivery Distilled
Matt Callanan
 
Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
Azhar Shaik
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
Dag Rowe
 
ThoughtWorks Approach 2009
ThoughtWorks Approach 2009ThoughtWorks Approach 2009
ThoughtWorks Approach 2009
ThoughtWorks Studios
 
Ncerc rlmca202 adm m3 ssm
Ncerc rlmca202  adm m3 ssmNcerc rlmca202  adm m3 ssm
Ncerc rlmca202 adm m3 ssm
ssmarar
 
Se 381 - lec 28 -- 34 - 12 jun12 - testing 1 of 2
Se 381 -  lec 28 -- 34 - 12 jun12 - testing 1 of 2Se 381 -  lec 28 -- 34 - 12 jun12 - testing 1 of 2
Se 381 - lec 28 -- 34 - 12 jun12 - testing 1 of 2
babak danyal
 
Engineering DevOps Right the First Time
Engineering DevOps Right the First TimeEngineering DevOps Right the First Time
Engineering DevOps Right the First Time
Marc Hornbeek
 
Agile software development
Agile software developmentAgile software development
Agile software development
Siddharth Sharma
 
Engineering DevOps to meet Business Goals
 Engineering DevOps to meet Business Goals Engineering DevOps to meet Business Goals
Engineering DevOps to meet Business Goals
Marc Hornbeek
 
Software Quality Metrics Software Quality
Software Quality Metrics Software QualitySoftware Quality Metrics Software Quality
Software Quality Metrics Software Quality
AlifFinandhita1
 
CM MatchPoint Agile Session
CM MatchPoint Agile SessionCM MatchPoint Agile Session
CM MatchPoint Agile Session
CM First Group
 
How Agile Are you
How Agile Are youHow Agile Are you
How Agile Are you
Heaton Cai
 
Fundamentals of agile tntu (2015-04-27)
Fundamentals of agile   tntu (2015-04-27)Fundamentals of agile   tntu (2015-04-27)
Fundamentals of agile tntu (2015-04-27)
Oleg Nazarevych
 
State of continuous delivery in 2015 - Minsk 15-5-2015
State of continuous delivery in 2015 - Minsk 15-5-2015State of continuous delivery in 2015 - Minsk 15-5-2015
State of continuous delivery in 2015 - Minsk 15-5-2015
Pavel Chunyayev
 
Павел Чуняев - State of Continuous Delivery in 2015
Павел Чуняев - State of Continuous Delivery in 2015Павел Чуняев - State of Continuous Delivery in 2015
Павел Чуняев - State of Continuous Delivery in 2015
ITSpringBY
 
Quantifying DevOps Adoption Empirically for Demonstrable ROI
Quantifying DevOps Adoption Empirically for Demonstrable ROIQuantifying DevOps Adoption Empirically for Demonstrable ROI
Quantifying DevOps Adoption Empirically for Demonstrable ROI
DevOps for Enterprise Systems
 
How To Avoid Continuously Delivering Faulty Software
How To Avoid Continuously Delivering Faulty SoftwareHow To Avoid Continuously Delivering Faulty Software
How To Avoid Continuously Delivering Faulty Software
Erika Barron
 
Shorten Business Life Cycle Using DevOps
Shorten Business Life Cycle Using DevOpsShorten Business Life Cycle Using DevOps
Shorten Business Life Cycle Using DevOps
Perfecto Mobile
 
Continuous Delivery Distilled
Continuous Delivery DistilledContinuous Delivery Distilled
Continuous Delivery Distilled
Matt Callanan
 
Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
Azhar Shaik
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
Dag Rowe
 
Ncerc rlmca202 adm m3 ssm
Ncerc rlmca202  adm m3 ssmNcerc rlmca202  adm m3 ssm
Ncerc rlmca202 adm m3 ssm
ssmarar
 
Ad

More from AdaCore (18)

RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
AdaCore
 
Have we a Human Ecosystem?
Have we a Human Ecosystem?Have we a Human Ecosystem?
Have we a Human Ecosystem?
AdaCore
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
AdaCore
 
SPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic librarySPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic library
AdaCore
 
Developing Future High Integrity Processing Solutions
Developing Future High Integrity Processing SolutionsDeveloping Future High Integrity Processing Solutions
Developing Future High Integrity Processing Solutions
AdaCore
 
Taming event-driven software via formal verification
Taming event-driven software via formal verificationTaming event-driven software via formal verification
Taming event-driven software via formal verification
AdaCore
 
Pushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program ProofPushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program Proof
AdaCore
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
AdaCore
 
Product Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configurationProduct Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configuration
AdaCore
 
Securing the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareSecuring the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded Software
AdaCore
 
Spark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware DevelopmentSpark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware Development
AdaCore
 
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
AdaCore
 
The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!
AdaCore
 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR Architecture
AdaCore
 
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
AdaCore
 
Software Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar TechnologySoftware Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar Technology
AdaCore
 
MISRA C in an ISO 26262 context
MISRA C in an ISO 26262 contextMISRA C in an ISO 26262 context
MISRA C in an ISO 26262 context
AdaCore
 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle software
AdaCore
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
AdaCore
 
Have we a Human Ecosystem?
Have we a Human Ecosystem?Have we a Human Ecosystem?
Have we a Human Ecosystem?
AdaCore
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
AdaCore
 
SPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic librarySPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic library
AdaCore
 
Developing Future High Integrity Processing Solutions
Developing Future High Integrity Processing SolutionsDeveloping Future High Integrity Processing Solutions
Developing Future High Integrity Processing Solutions
AdaCore
 
Taming event-driven software via formal verification
Taming event-driven software via formal verificationTaming event-driven software via formal verification
Taming event-driven software via formal verification
AdaCore
 
Pushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program ProofPushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program Proof
AdaCore
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
AdaCore
 
Product Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configurationProduct Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configuration
AdaCore
 
Securing the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareSecuring the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded Software
AdaCore
 
Spark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware DevelopmentSpark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware Development
AdaCore
 
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
AdaCore
 
The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!
AdaCore
 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR Architecture
AdaCore
 
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
AdaCore
 
Software Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar TechnologySoftware Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar Technology
AdaCore
 
MISRA C in an ISO 26262 context
MISRA C in an ISO 26262 contextMISRA C in an ISO 26262 context
MISRA C in an ISO 26262 context
AdaCore
 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle software
AdaCore
 

Recently uploaded (20)

What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New VersionPixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
saimabibi60507
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New VersionPixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
saimabibi60507
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 

Practical Application of Agile Techniques in Developing Safety Related Systems

  • 1. Practical Experience of Applying Agile Techniques to the Development of a Safety-Critical System David Nicoll Project Realization
  • 2. When do we get value from software? When we get the software into…
  • 3. Business Benefit Typical Waterfall Development Requirements Design Code Test Traceability between phases Completion of a Phase is often a contract payment milestone. Review Review Review End of Phase reviews form a stage-gate When do we get the ROI? Right at the end….. But will it deliver what we want ?
  • 4. Reputation & Outcomes •Software is always late •It doesn’t work •Costs too much •Quality is poor •Changes are slow and costly
  • 5. Model of Traditional Development Quality Time Cost Functionality Fixed Variable
  • 6. Status of Agile •Is by far the fastest growing methodology today •Is being taken up across all sectors both public and private •Is becoming the de-facto standard approach •Originally for small development teams –Typical team of 7 people (± 2) –Is now being scaled to teams of 1000+ •Number of approaches for organisational levels –Development level (includes Scrum, XP) –Project & Programme level (includes DSDM, SAFe)
  • 7. Basis of Agile and ROI •Agile is concerned with getting the fastest ROI •Continuous iterative development •Progressive incremental delivery –to provide Business Benefit throughout the development •Driven by costs and timescales –Functionality is removed or deferred •Assumes not everything is known –Anticipates Change will happen •Fast feedback supports continuous improvement •Collaborative working between –between Client and Supplier –Development teams
  • 8. Deliveries are Fixed In Time Time Incremental Delivery #1 Incremental Delivery #2 Incremental Delivery #3 Planned Delivery Dates based on Timescale NOT content
  • 9. Increment #1 Incremental Functionality Time Incremental Delivery #1 Incremental Delivery #2 Incremental Delivery #3 Build incrementally on firm foundations Increment #1 Increment #1 Increment #2 Increment #2 Increment #3
  • 10. Increment #2 Increment #1 Timescale Takes Precedence Time Incremental Delivery #1 Incremental Delivery #2 Incremental Delivery #3 Continuous delivery – functionality deferred PRIORITISE PRIORITISE Increment #3 Increment #1 Increment #2 Increment #3
  • 11. Completeness of Increments Time Incremental Delivery #1 Incremental Delivery #2 Incremental Delivery #3 Design Code Test Design Code Test Design Code Test Review Plan Review Plan Review Plan
  • 12. Incremental Safety Assurance Time Increment #1 Increment #2 Increment #3 Increment #2 Increment #1 Safety Audit #1 Safety Audit #2 Increment #1 Safety Audit #1 Increment #2 Safety Audit #2 Increment #1 Safety Audit #1 Increment #3 Safety Audit #3
  • 13. Model of Agile Development Quality Time Cost Functionality Fixed Variable
  • 14. Agile Development No change to existing best practice •Full traceability (requirements, design, code, test) •Coding standards –Static analysis –Complexity –Module size •Unit Test – full path coverage •Independent reviews •Test Driven Development (TDD) •Automated overnight build and test •Strict configuration control and change control 14
  • 15. Management of Risk •Agile provides early tangible working product –Evidence based progress –Avoids the “90% complete” syndrome –Provides for re-prioritisation •Overall risk is progressively reduced throughout the development •Risk exposure is limited to the cost of the current increment •Lessons Learned from one increment are passed to the next
  • 16. Risk Over Time Time Risk Delivery Deadline Waterfall Agile Increment #1 Increment #2 Increment #3
  • 17. Progress Monitoring •Traditional Gantt Charts are only useful at a high level •Daily Stand-Up meetings –Provides an environment for communication and team building –Each team member provides a verbal update to the rest of the team •Wall boards show –The Workflow –Who is doing what –Where the progress blocks are •Burn-down charts –Shows how fast work is being performed (velocity) –Provide a forecast completion date
  • 18. Progress Monitoring: Burn-Down Charts To Do Complete In Progress Estimated Finish #1 Estimated Finish #2 Date Number of Reqmts Estimated Finish #3 Actual Finish
  • 19. Agile for Safety-Critical Rail •Autonomous Underground Train Control system •Real-Time Safety-Critical System –CENELEC 50128 (SIL4) – Loss of Life •Automatic control of –train, signals, points •Radio based communication between –Trains –Timetable (including local speed restrictions) •Doppler radar –Provides speed, distance & direction •Axle counters –to determine train position in station
  • 20. FBP: System Layout Radio Interlocking Control Centre ATP ATO Radio Links Communications Signals & Points Radio BP BP Fixed Block Processor Interlocking ATP ATO Train driving
  • 21. Initial Development Process Detailed Design Code Review & Safety Audit Review & Safety Audit Requirements Definition High-Level Design Unit Test Integration Test Acceptance Test System Test Review & Safety Audit Review & Safety Audit Review & Safety Audit Review & Safety Audit Review & Safety Audit
  • 22. Development Process Detailed Design Code Requirements Definition High-Level Design Unit Test Integration Test Acceptance Test System Test Code Detailed Design Unit Test Detailed Design Code SPARK Unit Test Increments SPARK Detailed Design Detailed Design Code SPARK Unit Test Detailed Design SPARK Unit Test Unit Test Code Code Detailed Design Code Unit Test SPARK
  • 23. Incremental Development Time Review Previous Increment Plan this Increment Overall Requirements Backlog Design Code Test SPARK Increment Requirements Backlog Process Improvements
  • 24. Incremental Development Design Code Test SPARK •Full Traceability –Requirements –Design –Code –Test •Independent Unit test –100% path coverage –MC/DC testing –Boundary values •Independent Formal Reviews •Incremental Hazard Analysis
  • 25. 25 Conventional Safety Analysis Process System Hazards & Safety Constraints New Hazards New Hazards Vertical Slice Analysis Known Hazards Known Hazards Design Verification Safety Analysis Code Verification Safety Analysis Safety Requirements Verification Analysis Safety Audit Report Phase Specific Safety Reports Safety Analysis Safety Analysis Design Code Test
  • 26. Safety Analysis FBP: Increment based Safety Analysis System Hazards & Safety Constraints Vertical Slice Analysis Increment Unit Test Safety Analysis Code Verification Safety Analysis Design Verification Safety Analysis Safety Audit Report (Increment) Design Code Test New Hazards Safety Analysis New Hazards Phase Specific Safety Reports Safety Analysis New Hazards
  • 27. FBP Burn-Down: Testing 0 100 200 300 400 500 600 700 800 900 No. of Module Tests Weeks FBP: Module Testing (Formal) Complete Progressing To Go Total Tests
  • 28. 28 FBP: Retrospective Project Analysis Development Team Size = 70+ (35 UK, 35 India, 4 Spain) Primary project objective = Timescale Crude industry standard = 22 ↔ 24 months duration Actual development = 18 months Cost (Effort) Time FBP
  • 29. Approaching Agile •Fundamentally Agile is a mind-set •It is about managing project risk in order to deliver business benefit •Agile is not proscriptive –Best practice in all activities –No conflict with current industry practice •Agile advocates a number of methods, techniques and approaches that deliver business benefit •It is up to you to tailor these to your need
  • 30. Any Questions? David Nicoll www.project-realization.com