SlideShare a Scribd company logo
1 of 7
ASIET KALADY
Software Engineering
Failures
Object Oriented Software Engineering
Respa Peter
10/7/2013
RespaPeter
M Tech CS
ASIET Kalady
Roll no:12
Software EngineeringFailures
ASIET Kalady
Major engineering failures due to software related course
 Year 1900bug
 Leap year bug
 Interface Misuse
 Security
 Late and over budget
 On time delivery
 Unnecessarycomplexity
Year 1900Bug
o The year 1900 problem concerns the misinterpretation of years recorded by only their
last two digits, and whether they occurred before or after the year 1900. Unlike the year
2000 problem, it is not tied to computer software alone, since the problem existed before
electronic computers did and has also cropped up in manual systems.
o The most common issue raised by the year 1900 problem regards people's ages. Often, a
person's birth year was registered with only two digits, on the assumption that either it
was not important exactly how old a person is, or that no one lives longer than one
hundred years.
For example:
o In 1992, Mary from Winona, Minnesota received an invitation to attend a kindergarten.
Mary was 104 at that time.
o In several countries, especially in Europe, a national identification number was
introduced (often in the 1950s), including two-digit information about the birth year.
o The largest unwelcome side effect from this is people 100 or more years old being
mistaken for young children or in some cases, young children being mistaken for adults
Software EngineeringFailures
ASIET Kalady
Leap Year Bug
o Leap year bug ( Leap year problem) is a problem for both digital (computer-related)
and non-digital documentation and data storage situations which results from the wrong
calculation of which years are leap years.
o A supermarket was fined $1000 for having meat around 1 day too long on February 29,
1988.
o The computer program that printing the expiration date on the meat labels did not take
into account that 1988 was a leap year.
There are several types of leap year bugs.
o In 2012, Gmail's chat history showed a date of 12/31/69 for all chats saved on Feb 29,
2012. On the same day Microsoft's cloud computing solution Azure went down for 8
hours caused by a leap year bug.
o Some digital systems have wrongly calculated which years are leap years. The best-
known case occurred in Sony's PlayStation 3: The system treated 2010 as a leap year, so
a non-existent date February 29, 2010 was shown on March 1, 2010, and caused program
error.
o Microsoft Excel has, since its earliest versions, incorrectly considered 1900 to be a leap
year, and therefore that February 29, 1900 comes between February 28 and March 1 of
that year. The bug originated from Lotus 1-2-3, and was purposely implemented in Excel
for the purpose of backward compatibility.
o A leading multinational corporation’s cloud computing service outage, which affected
Governments and consumers, was caused by the additional day in February this year.
o The same leap year date bug also affected an Australian payment system used by the
health industry, resulting in 150,000 customers being prevented from using private health
care cards for medical transactions for two days.
Software EngineeringFailures
ASIET Kalady
Interface Misuse
o Interface Misuse is a type of interface error.
o A calling component call another component and makes an error in its use of
its interface
Eg: Parameters in wrong order.
o Misuse of interface, These are faults arising from a misunderstanding of the
required interface among separate units.
o On April 10, 1990, in London, an underground train left the station without
its driver.
o The driver had trapped the button that started the train, relying on the system
that prevented the train from moving when doors were open.
o The train operatorhad left his train to close a doorwhich was stuck.
o When the doorwas finally shut, the train simply left.
Security
o Security failure can arise from any aspect of the operations. Incidents might be man-made
or natural in origin.
o It is impossible to prevent all security failure, but focussing on the key risk mitigation,
management and prevention (deterrence) for certain risks will help maintain a cost-
effective and pragmatic security risk management approach.
o The cost of security will be outweighed many times by the cost of security failure which
may lead to business-critical exposure.
Software EngineeringFailures
ASIET Kalady
o CERT (Computer Emergency Response Team) at the software Engineering Institute is a
government-funded organization for assisting the community in dealing with security
incidents, vulnerabilities, and security know-how.
o The number of security incidents reported to CERT from the United States increased
from 252 incidents I 1900 to 21,756 in 2000 and more than 40,000 incidents were
reported in 2001.
Late and over budget
o In 1995, bugs in the automated luggage system of the new Denver
International Airport caused suitcases to be chewed up. The airport opened
16 months late. $3.2 billion over budget, with a mostly manual luggage
system.
o In 2002, the Swanick Air Traffic Control system covers all the enroute air
traffic over England and Wales.
o The system was delivered substantially over budget (cost £623 million,
originally planned at £350 million) and 6 years late. Two major upgrades of
the system were delivered after training of the traffic controllers had started.
On time delivery
o Attaining acceptable delivery performance is the most significant manufacturing
challenge faced by many organizations.
o ƒ Metrics of excellence in customer service are on-time pickup and on-time delivery.
o Success or failure results with or beyond the carrier’s control Success or failure occurs
from the synergy of several SNI actions.
o These service metrics occur in the context of other operational measures budgetary
targets utilization of driver associates equipment availability safety requirements
Software EngineeringFailures
ASIET Kalady
o After 18 months of development, a $200-million system was delivered to a health
insurance company in Wisconsin in 1984.
o However, the system did not work correctly: $60 million in overpayments were issued.
The system took 3 years to fix.
Unnecessarycomplexity
o The C-17 cargo plane by McDonnell Douglas ran $500 million over budget
because of problems with its avionics software.
o The C-17 included 19 onboard computers, 80 microprocessors, and 6 different
programming languages.
o Each of these failures resulted from a software related problem. In some
cases, developers did not anticipate seldom-occurring situations (a person
living more than 100 years, leap years impacting expiration dates).
o In other cases, developers did not anticipate the user actively misusing the
system (tapping down a button, exploiting security holes I network software).
o In yet other cases, system failures resulted from management failures (late
and over budget delivery, on time delivery of an incorrect system,
unnecessary complexity).
Software EngineeringFailures
ASIET Kalady

More Related Content

What's hot

Validation testing
Validation testingValidation testing
Validation testingSlideshare
 
Software maintenance Unit5
Software maintenance  Unit5Software maintenance  Unit5
Software maintenance Unit5Mohammad Faizan
 
Hardware/Software Integration Testing
Hardware/Software Integration TestingHardware/Software Integration Testing
Hardware/Software Integration TestingJohan Hoberg
 
McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance sundas Shabbir
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process FrameworkJAINAM KAPADIYA
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality FactorsUsman Khan
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality AssuranceSachithra Gayan
 
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)IrtazaAfzal3
 
Software Testing Principles
Software Testing PrinciplesSoftware Testing Principles
Software Testing PrinciplesKanoah
 
Software Design and Modularity
Software Design and ModularitySoftware Design and Modularity
Software Design and ModularityDanyal Ahmad
 
Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )Kiran Hanjar
 
Chapter 13 software testing strategies
Chapter 13 software testing strategiesChapter 13 software testing strategies
Chapter 13 software testing strategiesSHREEHARI WADAWADAGI
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsGatte Ravindranath
 
Boehm Software Quality Model
Boehm Software Quality ModelBoehm Software Quality Model
Boehm Software Quality ModelProfessional QA
 
State transition testing-software_testing
State transition testing-software_testingState transition testing-software_testing
State transition testing-software_testingMidhun S
 

What's hot (20)

Validation testing
Validation testingValidation testing
Validation testing
 
Software maintenance Unit5
Software maintenance  Unit5Software maintenance  Unit5
Software maintenance Unit5
 
Hardware/Software Integration Testing
Hardware/Software Integration TestingHardware/Software Integration Testing
Hardware/Software Integration Testing
 
McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality Factors
 
Regression testing
Regression testingRegression testing
Regression testing
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
 
Software Testing Principles
Software Testing PrinciplesSoftware Testing Principles
Software Testing Principles
 
Software Design and Modularity
Software Design and ModularitySoftware Design and Modularity
Software Design and Modularity
 
Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )
 
Chapter 13 software testing strategies
Chapter 13 software testing strategiesChapter 13 software testing strategies
Chapter 13 software testing strategies
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Software Myths
Software MythsSoftware Myths
Software Myths
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design Patterns
 
Boehm Software Quality Model
Boehm Software Quality ModelBoehm Software Quality Model
Boehm Software Quality Model
 
Cohesion and coupling
Cohesion and couplingCohesion and coupling
Cohesion and coupling
 
State transition testing-software_testing
State transition testing-software_testingState transition testing-software_testing
State transition testing-software_testing
 

Viewers also liked

2011 App Failures - Year in Review CAST
2011 App Failures  - Year in Review CAST2011 App Failures  - Year in Review CAST
2011 App Failures - Year in Review CASTCAST
 
Air Traffic System Technologies
Air Traffic System TechnologiesAir Traffic System Technologies
Air Traffic System TechnologiesÜlger Ahmet
 
Project Quality Management
Project Quality ManagementProject Quality Management
Project Quality ManagementGiO Friginal
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resourcesanuragmbst
 
Disaster At Chernobyl
Disaster At ChernobylDisaster At Chernobyl
Disaster At ChernobylBen Dover
 
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentSoftware Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentPersistent Systems Ltd.
 
Introduction to Software Review
Introduction to Software ReviewIntroduction to Software Review
Introduction to Software ReviewPhilip Johnson
 
Object Modelling in Software Engineering
Object Modelling in Software EngineeringObject Modelling in Software Engineering
Object Modelling in Software Engineeringguest7fe55d5e
 
Chapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and DisciplineChapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and DisciplineRayman Soe
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9Ian Sommerville
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8Siddharth Ayer
 
Employee Rights
Employee RightsEmployee Rights
Employee Rightssh_neha252
 
Software Engineering UPTU
Software Engineering UPTUSoftware Engineering UPTU
Software Engineering UPTURishi Shukla
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 

Viewers also liked (20)

Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
2011 App Failures - Year in Review CAST
2011 App Failures  - Year in Review CAST2011 App Failures  - Year in Review CAST
2011 App Failures - Year in Review CAST
 
Error Messages In Software Applications
Error Messages In Software ApplicationsError Messages In Software Applications
Error Messages In Software Applications
 
Air Traffic System Technologies
Air Traffic System TechnologiesAir Traffic System Technologies
Air Traffic System Technologies
 
Project Quality Management
Project Quality ManagementProject Quality Management
Project Quality Management
 
Software bugs
Software bugsSoftware bugs
Software bugs
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resources
 
Disaster At Chernobyl
Disaster At ChernobylDisaster At Chernobyl
Disaster At Chernobyl
 
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentSoftware Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@Persistent
 
Introduction to Software Review
Introduction to Software ReviewIntroduction to Software Review
Introduction to Software Review
 
Object Modelling in Software Engineering
Object Modelling in Software EngineeringObject Modelling in Software Engineering
Object Modelling in Software Engineering
 
Chapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and DisciplineChapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and Discipline
 
Unit 8
Unit 8Unit 8
Unit 8
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9
 
Nuclear accidents
Nuclear accidentsNuclear accidents
Nuclear accidents
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8
 
Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 
Employee Rights
Employee RightsEmployee Rights
Employee Rights
 
Software Engineering UPTU
Software Engineering UPTUSoftware Engineering UPTU
Software Engineering UPTU
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 

Similar to software failures

Software engineering unit 1
Software engineering  unit 1Software engineering  unit 1
Software engineering unit 1Sumit Paul
 
10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ict10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ictAllan Paterson
 
Group 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaGroup 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaBluepie1
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Semicon west monetizing the internet of things
Semicon west   monetizing the internet of thingsSemicon west   monetizing the internet of things
Semicon west monetizing the internet of thingsPaul Brody
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docxMIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docxannandleola
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter  66.1 Changes, Fears, and QuestionsComputers free u.docxChapter  66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docxtidwellveronique
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information societySomerco Research
 
Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Julian Matthews
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis MPhil/MRes/BSc
 
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxIntel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxnormanibarber20063
 
The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1Michael Denis
 
Scrooge” and our Software Industry
Scrooge” and our Software Industry Scrooge” and our Software Industry
Scrooge” and our Software Industry eswc
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 
A Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A ReviewA Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A ReviewIRJET Journal
 

Similar to software failures (20)

Software engineering unit 1
Software engineering  unit 1Software engineering  unit 1
Software engineering unit 1
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ict10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ict
 
Group 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaGroup 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb idea
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Semicon west monetizing the internet of things
Semicon west   monetizing the internet of thingsSemicon west   monetizing the internet of things
Semicon west monetizing the internet of things
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docxMIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docx
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter  66.1 Changes, Fears, and QuestionsComputers free u.docxChapter  66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxIntel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
 
The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1
 
Scrooge” and our Software Industry
Scrooge” and our Software Industry Scrooge” and our Software Industry
Scrooge” and our Software Industry
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 
A Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A ReviewA Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A Review
 

More from Respa Peter

Tpes of Softwares
Tpes of SoftwaresTpes of Softwares
Tpes of SoftwaresRespa Peter
 
Information technology for business
Information technology for business Information technology for business
Information technology for business Respa Peter
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacksRespa Peter
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining TechniqRespa Peter
 
Managing software development
Managing software developmentManaging software development
Managing software developmentRespa Peter
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithmRespa Peter
 
Matrix multiplicationdesign
Matrix multiplicationdesignMatrix multiplicationdesign
Matrix multiplicationdesignRespa Peter
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Respa Peter
 
Matrix chain multiplication
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplicationRespa Peter
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 

More from Respa Peter (14)

Tpes of Softwares
Tpes of SoftwaresTpes of Softwares
Tpes of Softwares
 
Information technology for business
Information technology for business Information technology for business
Information technology for business
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacks
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining Techniq
 
Database
DatabaseDatabase
Database
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Managing software development
Managing software developmentManaging software development
Managing software development
 
Data mining
Data miningData mining
Data mining
 
Knime
KnimeKnime
Knime
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Matrix multiplicationdesign
Matrix multiplicationdesignMatrix multiplicationdesign
Matrix multiplicationdesign
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...
 
Matrix chain multiplication
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplication
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

software failures

  • 1. ASIET KALADY Software Engineering Failures Object Oriented Software Engineering Respa Peter 10/7/2013 RespaPeter M Tech CS ASIET Kalady Roll no:12
  • 2. Software EngineeringFailures ASIET Kalady Major engineering failures due to software related course  Year 1900bug  Leap year bug  Interface Misuse  Security  Late and over budget  On time delivery  Unnecessarycomplexity Year 1900Bug o The year 1900 problem concerns the misinterpretation of years recorded by only their last two digits, and whether they occurred before or after the year 1900. Unlike the year 2000 problem, it is not tied to computer software alone, since the problem existed before electronic computers did and has also cropped up in manual systems. o The most common issue raised by the year 1900 problem regards people's ages. Often, a person's birth year was registered with only two digits, on the assumption that either it was not important exactly how old a person is, or that no one lives longer than one hundred years. For example: o In 1992, Mary from Winona, Minnesota received an invitation to attend a kindergarten. Mary was 104 at that time. o In several countries, especially in Europe, a national identification number was introduced (often in the 1950s), including two-digit information about the birth year. o The largest unwelcome side effect from this is people 100 or more years old being mistaken for young children or in some cases, young children being mistaken for adults
  • 3. Software EngineeringFailures ASIET Kalady Leap Year Bug o Leap year bug ( Leap year problem) is a problem for both digital (computer-related) and non-digital documentation and data storage situations which results from the wrong calculation of which years are leap years. o A supermarket was fined $1000 for having meat around 1 day too long on February 29, 1988. o The computer program that printing the expiration date on the meat labels did not take into account that 1988 was a leap year. There are several types of leap year bugs. o In 2012, Gmail's chat history showed a date of 12/31/69 for all chats saved on Feb 29, 2012. On the same day Microsoft's cloud computing solution Azure went down for 8 hours caused by a leap year bug. o Some digital systems have wrongly calculated which years are leap years. The best- known case occurred in Sony's PlayStation 3: The system treated 2010 as a leap year, so a non-existent date February 29, 2010 was shown on March 1, 2010, and caused program error. o Microsoft Excel has, since its earliest versions, incorrectly considered 1900 to be a leap year, and therefore that February 29, 1900 comes between February 28 and March 1 of that year. The bug originated from Lotus 1-2-3, and was purposely implemented in Excel for the purpose of backward compatibility. o A leading multinational corporation’s cloud computing service outage, which affected Governments and consumers, was caused by the additional day in February this year. o The same leap year date bug also affected an Australian payment system used by the health industry, resulting in 150,000 customers being prevented from using private health care cards for medical transactions for two days.
  • 4. Software EngineeringFailures ASIET Kalady Interface Misuse o Interface Misuse is a type of interface error. o A calling component call another component and makes an error in its use of its interface Eg: Parameters in wrong order. o Misuse of interface, These are faults arising from a misunderstanding of the required interface among separate units. o On April 10, 1990, in London, an underground train left the station without its driver. o The driver had trapped the button that started the train, relying on the system that prevented the train from moving when doors were open. o The train operatorhad left his train to close a doorwhich was stuck. o When the doorwas finally shut, the train simply left. Security o Security failure can arise from any aspect of the operations. Incidents might be man-made or natural in origin. o It is impossible to prevent all security failure, but focussing on the key risk mitigation, management and prevention (deterrence) for certain risks will help maintain a cost- effective and pragmatic security risk management approach. o The cost of security will be outweighed many times by the cost of security failure which may lead to business-critical exposure.
  • 5. Software EngineeringFailures ASIET Kalady o CERT (Computer Emergency Response Team) at the software Engineering Institute is a government-funded organization for assisting the community in dealing with security incidents, vulnerabilities, and security know-how. o The number of security incidents reported to CERT from the United States increased from 252 incidents I 1900 to 21,756 in 2000 and more than 40,000 incidents were reported in 2001. Late and over budget o In 1995, bugs in the automated luggage system of the new Denver International Airport caused suitcases to be chewed up. The airport opened 16 months late. $3.2 billion over budget, with a mostly manual luggage system. o In 2002, the Swanick Air Traffic Control system covers all the enroute air traffic over England and Wales. o The system was delivered substantially over budget (cost £623 million, originally planned at £350 million) and 6 years late. Two major upgrades of the system were delivered after training of the traffic controllers had started. On time delivery o Attaining acceptable delivery performance is the most significant manufacturing challenge faced by many organizations. o ƒ Metrics of excellence in customer service are on-time pickup and on-time delivery. o Success or failure results with or beyond the carrier’s control Success or failure occurs from the synergy of several SNI actions. o These service metrics occur in the context of other operational measures budgetary targets utilization of driver associates equipment availability safety requirements
  • 6. Software EngineeringFailures ASIET Kalady o After 18 months of development, a $200-million system was delivered to a health insurance company in Wisconsin in 1984. o However, the system did not work correctly: $60 million in overpayments were issued. The system took 3 years to fix. Unnecessarycomplexity o The C-17 cargo plane by McDonnell Douglas ran $500 million over budget because of problems with its avionics software. o The C-17 included 19 onboard computers, 80 microprocessors, and 6 different programming languages. o Each of these failures resulted from a software related problem. In some cases, developers did not anticipate seldom-occurring situations (a person living more than 100 years, leap years impacting expiration dates). o In other cases, developers did not anticipate the user actively misusing the system (tapping down a button, exploiting security holes I network software). o In yet other cases, system failures resulted from management failures (late and over budget delivery, on time delivery of an incorrect system, unnecessary complexity).