SlideShare a Scribd company logo
1 of 7
ASIET KALADY
Software Engineering
Failures
Object Oriented Software Engineering
Respa Peter
10/7/2013
RespaPeter
M Tech CS
ASIET Kalady
Roll no:12
Software EngineeringFailures
ASIET Kalady
Major engineering failures due to software related course
 Year 1900bug
 Leap year bug
 Interface Misuse
 Security
 Late and over budget
 On time delivery
 Unnecessarycomplexity
Year 1900Bug
o The year 1900 problem concerns the misinterpretation of years recorded by only their
last two digits, and whether they occurred before or after the year 1900. Unlike the year
2000 problem, it is not tied to computer software alone, since the problem existed before
electronic computers did and has also cropped up in manual systems.
o The most common issue raised by the year 1900 problem regards people's ages. Often, a
person's birth year was registered with only two digits, on the assumption that either it
was not important exactly how old a person is, or that no one lives longer than one
hundred years.
For example:
o In 1992, Mary from Winona, Minnesota received an invitation to attend a kindergarten.
Mary was 104 at that time.
o In several countries, especially in Europe, a national identification number was
introduced (often in the 1950s), including two-digit information about the birth year.
o The largest unwelcome side effect from this is people 100 or more years old being
mistaken for young children or in some cases, young children being mistaken for adults
Software EngineeringFailures
ASIET Kalady
Leap Year Bug
o Leap year bug ( Leap year problem) is a problem for both digital (computer-related)
and non-digital documentation and data storage situations which results from the wrong
calculation of which years are leap years.
o A supermarket was fined $1000 for having meat around 1 day too long on February 29,
1988.
o The computer program that printing the expiration date on the meat labels did not take
into account that 1988 was a leap year.
There are several types of leap year bugs.
o In 2012, Gmail's chat history showed a date of 12/31/69 for all chats saved on Feb 29,
2012. On the same day Microsoft's cloud computing solution Azure went down for 8
hours caused by a leap year bug.
o Some digital systems have wrongly calculated which years are leap years. The best-
known case occurred in Sony's PlayStation 3: The system treated 2010 as a leap year, so
a non-existent date February 29, 2010 was shown on March 1, 2010, and caused program
error.
o Microsoft Excel has, since its earliest versions, incorrectly considered 1900 to be a leap
year, and therefore that February 29, 1900 comes between February 28 and March 1 of
that year. The bug originated from Lotus 1-2-3, and was purposely implemented in Excel
for the purpose of backward compatibility.
o A leading multinational corporation’s cloud computing service outage, which affected
Governments and consumers, was caused by the additional day in February this year.
o The same leap year date bug also affected an Australian payment system used by the
health industry, resulting in 150,000 customers being prevented from using private health
care cards for medical transactions for two days.
Software EngineeringFailures
ASIET Kalady
Interface Misuse
o Interface Misuse is a type of interface error.
o A calling component call another component and makes an error in its use of
its interface
Eg: Parameters in wrong order.
o Misuse of interface, These are faults arising from a misunderstanding of the
required interface among separate units.
o On April 10, 1990, in London, an underground train left the station without
its driver.
o The driver had trapped the button that started the train, relying on the system
that prevented the train from moving when doors were open.
o The train operatorhad left his train to close a doorwhich was stuck.
o When the doorwas finally shut, the train simply left.
Security
o Security failure can arise from any aspect of the operations. Incidents might be man-made
or natural in origin.
o It is impossible to prevent all security failure, but focussing on the key risk mitigation,
management and prevention (deterrence) for certain risks will help maintain a cost-
effective and pragmatic security risk management approach.
o The cost of security will be outweighed many times by the cost of security failure which
may lead to business-critical exposure.
Software EngineeringFailures
ASIET Kalady
o CERT (Computer Emergency Response Team) at the software Engineering Institute is a
government-funded organization for assisting the community in dealing with security
incidents, vulnerabilities, and security know-how.
o The number of security incidents reported to CERT from the United States increased
from 252 incidents I 1900 to 21,756 in 2000 and more than 40,000 incidents were
reported in 2001.
Late and over budget
o In 1995, bugs in the automated luggage system of the new Denver
International Airport caused suitcases to be chewed up. The airport opened
16 months late. $3.2 billion over budget, with a mostly manual luggage
system.
o In 2002, the Swanick Air Traffic Control system covers all the enroute air
traffic over England and Wales.
o The system was delivered substantially over budget (cost £623 million,
originally planned at £350 million) and 6 years late. Two major upgrades of
the system were delivered after training of the traffic controllers had started.
On time delivery
o Attaining acceptable delivery performance is the most significant manufacturing
challenge faced by many organizations.
o ƒ Metrics of excellence in customer service are on-time pickup and on-time delivery.
o Success or failure results with or beyond the carrier’s control Success or failure occurs
from the synergy of several SNI actions.
o These service metrics occur in the context of other operational measures budgetary
targets utilization of driver associates equipment availability safety requirements
Software EngineeringFailures
ASIET Kalady
o After 18 months of development, a $200-million system was delivered to a health
insurance company in Wisconsin in 1984.
o However, the system did not work correctly: $60 million in overpayments were issued.
The system took 3 years to fix.
Unnecessarycomplexity
o The C-17 cargo plane by McDonnell Douglas ran $500 million over budget
because of problems with its avionics software.
o The C-17 included 19 onboard computers, 80 microprocessors, and 6 different
programming languages.
o Each of these failures resulted from a software related problem. In some
cases, developers did not anticipate seldom-occurring situations (a person
living more than 100 years, leap years impacting expiration dates).
o In other cases, developers did not anticipate the user actively misusing the
system (tapping down a button, exploiting security holes I network software).
o In yet other cases, system failures resulted from management failures (late
and over budget delivery, on time delivery of an incorrect system,
unnecessary complexity).
Software EngineeringFailures
ASIET Kalady

More Related Content

What's hot

Computer organization
Computer organization Computer organization
Computer organization vishnu973656
 
60780174 49594067-cs1403-case-tools-lab-manual
60780174 49594067-cs1403-case-tools-lab-manual60780174 49594067-cs1403-case-tools-lab-manual
60780174 49594067-cs1403-case-tools-lab-manualChitrarasan Kathiravan
 
Project Planning in Software Engineering
Project Planning in Software EngineeringProject Planning in Software Engineering
Project Planning in Software EngineeringFáber D. Giraldo
 
Chapter 4 software project planning
Chapter 4 software project planningChapter 4 software project planning
Chapter 4 software project planningdespicable me
 
Characterizing the Software Process: A Maturity Framework
Characterizing the Software Process:  A Maturity FrameworkCharacterizing the Software Process:  A Maturity Framework
Characterizing the Software Process: A Maturity FrameworkSachin Hiriyanna
 
System Programming Unit III
System Programming Unit IIISystem Programming Unit III
System Programming Unit IIIManoj Patil
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing FundamentalsChankey Pathak
 
What is objectives of software testing
What is objectives of software testingWhat is objectives of software testing
What is objectives of software testingSoftware Testing Books
 
Compiler Construction introduction
Compiler Construction introductionCompiler Construction introduction
Compiler Construction introductionRana Ehtisham Ul Haq
 
software process improvement
software process improvementsoftware process improvement
software process improvementMohammad Xaviar
 
Timing and-control-unit
Timing and-control-unitTiming and-control-unit
Timing and-control-unitAnuj Modi
 
ppt on sOFTWARE DEVELOPMENT LIFE CYCLE
 ppt on sOFTWARE DEVELOPMENT LIFE CYCLE ppt on sOFTWARE DEVELOPMENT LIFE CYCLE
ppt on sOFTWARE DEVELOPMENT LIFE CYCLESwarnima Tiwari
 

What's hot (20)

Computer organization
Computer organization Computer organization
Computer organization
 
System Programming Overview
System Programming OverviewSystem Programming Overview
System Programming Overview
 
60780174 49594067-cs1403-case-tools-lab-manual
60780174 49594067-cs1403-case-tools-lab-manual60780174 49594067-cs1403-case-tools-lab-manual
60780174 49594067-cs1403-case-tools-lab-manual
 
Project Planning in Software Engineering
Project Planning in Software EngineeringProject Planning in Software Engineering
Project Planning in Software Engineering
 
Chapter 4 software project planning
Chapter 4 software project planningChapter 4 software project planning
Chapter 4 software project planning
 
Characterizing the Software Process: A Maturity Framework
Characterizing the Software Process:  A Maturity FrameworkCharacterizing the Software Process:  A Maturity Framework
Characterizing the Software Process: A Maturity Framework
 
Introduction to Compiler design
Introduction to Compiler design Introduction to Compiler design
Introduction to Compiler design
 
System Programming Unit III
System Programming Unit IIISystem Programming Unit III
System Programming Unit III
 
Unit 7
Unit 7Unit 7
Unit 7
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing Fundamentals
 
Two pass Assembler
Two pass AssemblerTwo pass Assembler
Two pass Assembler
 
Single Pass Assembler
Single Pass AssemblerSingle Pass Assembler
Single Pass Assembler
 
What is objectives of software testing
What is objectives of software testingWhat is objectives of software testing
What is objectives of software testing
 
Phases of Compiler
Phases of CompilerPhases of Compiler
Phases of Compiler
 
Assemblers
AssemblersAssemblers
Assemblers
 
Compiler Construction introduction
Compiler Construction introductionCompiler Construction introduction
Compiler Construction introduction
 
software process improvement
software process improvementsoftware process improvement
software process improvement
 
Timing and-control-unit
Timing and-control-unitTiming and-control-unit
Timing and-control-unit
 
ppt on sOFTWARE DEVELOPMENT LIFE CYCLE
 ppt on sOFTWARE DEVELOPMENT LIFE CYCLE ppt on sOFTWARE DEVELOPMENT LIFE CYCLE
ppt on sOFTWARE DEVELOPMENT LIFE CYCLE
 

Viewers also liked

2011 App Failures - Year in Review CAST
2011 App Failures  - Year in Review CAST2011 App Failures  - Year in Review CAST
2011 App Failures - Year in Review CASTCAST
 
Air Traffic System Technologies
Air Traffic System TechnologiesAir Traffic System Technologies
Air Traffic System TechnologiesÜlger Ahmet
 
Project Quality Management
Project Quality ManagementProject Quality Management
Project Quality ManagementGiO Friginal
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resourcesanuragmbst
 
Disaster At Chernobyl
Disaster At ChernobylDisaster At Chernobyl
Disaster At ChernobylBen Dover
 
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentSoftware Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentPersistent Systems Ltd.
 
Introduction to Software Review
Introduction to Software ReviewIntroduction to Software Review
Introduction to Software ReviewPhilip Johnson
 
Object Modelling in Software Engineering
Object Modelling in Software EngineeringObject Modelling in Software Engineering
Object Modelling in Software Engineeringguest7fe55d5e
 
Chapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and DisciplineChapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and DisciplineRayman Soe
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9Ian Sommerville
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8Siddharth Ayer
 
Employee Rights
Employee RightsEmployee Rights
Employee Rightssh_neha252
 
Software Engineering UPTU
Software Engineering UPTUSoftware Engineering UPTU
Software Engineering UPTURishi Shukla
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 

Viewers also liked (20)

Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
2011 App Failures - Year in Review CAST
2011 App Failures  - Year in Review CAST2011 App Failures  - Year in Review CAST
2011 App Failures - Year in Review CAST
 
Error Messages In Software Applications
Error Messages In Software ApplicationsError Messages In Software Applications
Error Messages In Software Applications
 
Air Traffic System Technologies
Air Traffic System TechnologiesAir Traffic System Technologies
Air Traffic System Technologies
 
Project Quality Management
Project Quality ManagementProject Quality Management
Project Quality Management
 
Software bugs
Software bugsSoftware bugs
Software bugs
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resources
 
Disaster At Chernobyl
Disaster At ChernobylDisaster At Chernobyl
Disaster At Chernobyl
 
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentSoftware Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@Persistent
 
Introduction to Software Review
Introduction to Software ReviewIntroduction to Software Review
Introduction to Software Review
 
Object Modelling in Software Engineering
Object Modelling in Software EngineeringObject Modelling in Software Engineering
Object Modelling in Software Engineering
 
Chapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and DisciplineChapter 13 Employee Rights and Discipline
Chapter 13 Employee Rights and Discipline
 
Unit 8
Unit 8Unit 8
Unit 8
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9
 
Nuclear accidents
Nuclear accidentsNuclear accidents
Nuclear accidents
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8
 
Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 
Employee Rights
Employee RightsEmployee Rights
Employee Rights
 
Software Engineering UPTU
Software Engineering UPTUSoftware Engineering UPTU
Software Engineering UPTU
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 

Similar to software failures

Software engineering unit 1
Software engineering  unit 1Software engineering  unit 1
Software engineering unit 1Sumit Paul
 
10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ict10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ictAllan Paterson
 
Group 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaGroup 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaBluepie1
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Semicon west monetizing the internet of things
Semicon west   monetizing the internet of thingsSemicon west   monetizing the internet of things
Semicon west monetizing the internet of thingsPaul Brody
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docxMIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docxannandleola
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter  66.1 Changes, Fears, and QuestionsComputers free u.docxChapter  66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docxtidwellveronique
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information societySomerco Research
 
Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Julian Matthews
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis MPhil/MRes/BSc
 
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxIntel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxnormanibarber20063
 
The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1Michael Denis
 
Scrooge” and our Software Industry
Scrooge” and our Software Industry Scrooge” and our Software Industry
Scrooge” and our Software Industry eswc
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 
A Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A ReviewA Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A ReviewIRJET Journal
 

Similar to software failures (20)

Software engineering unit 1
Software engineering  unit 1Software engineering  unit 1
Software engineering unit 1
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ict10 09 27 computer weekly on isle of man ict
10 09 27 computer weekly on isle of man ict
 
Group 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaGroup 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb idea
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Semicon west monetizing the internet of things
Semicon west   monetizing the internet of thingsSemicon west   monetizing the internet of things
Semicon west monetizing the internet of things
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docxMIS Quarterly Executive Vol. 6 No. 2  June 2007 67© 2007 Univ.docx
MIS Quarterly Executive Vol. 6 No. 2 June 2007 67© 2007 Univ.docx
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter  66.1 Changes, Fears, and QuestionsComputers free u.docxChapter  66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxIntel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docx
 
The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1The Internet of Flying Things - Part 1
The Internet of Flying Things - Part 1
 
Scrooge” and our Software Industry
Scrooge” and our Software Industry Scrooge” and our Software Industry
Scrooge” and our Software Industry
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 
A Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A ReviewA Summary of Comparative Study of Software Reliability: A Review
A Summary of Comparative Study of Software Reliability: A Review
 

More from Respa Peter

Tpes of Softwares
Tpes of SoftwaresTpes of Softwares
Tpes of SoftwaresRespa Peter
 
Information technology for business
Information technology for business Information technology for business
Information technology for business Respa Peter
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacksRespa Peter
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining TechniqRespa Peter
 
Managing software development
Managing software developmentManaging software development
Managing software developmentRespa Peter
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithmRespa Peter
 
Matrix multiplicationdesign
Matrix multiplicationdesignMatrix multiplicationdesign
Matrix multiplicationdesignRespa Peter
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Respa Peter
 
Matrix chain multiplication
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplicationRespa Peter
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 

More from Respa Peter (14)

Tpes of Softwares
Tpes of SoftwaresTpes of Softwares
Tpes of Softwares
 
Information technology for business
Information technology for business Information technology for business
Information technology for business
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacks
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining Techniq
 
Database
DatabaseDatabase
Database
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Managing software development
Managing software developmentManaging software development
Managing software development
 
Data mining
Data miningData mining
Data mining
 
Knime
KnimeKnime
Knime
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Matrix multiplicationdesign
Matrix multiplicationdesignMatrix multiplicationdesign
Matrix multiplicationdesign
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...
 
Matrix chain multiplication
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplication
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 

Recently uploaded

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

software failures

  • 1. ASIET KALADY Software Engineering Failures Object Oriented Software Engineering Respa Peter 10/7/2013 RespaPeter M Tech CS ASIET Kalady Roll no:12
  • 2. Software EngineeringFailures ASIET Kalady Major engineering failures due to software related course  Year 1900bug  Leap year bug  Interface Misuse  Security  Late and over budget  On time delivery  Unnecessarycomplexity Year 1900Bug o The year 1900 problem concerns the misinterpretation of years recorded by only their last two digits, and whether they occurred before or after the year 1900. Unlike the year 2000 problem, it is not tied to computer software alone, since the problem existed before electronic computers did and has also cropped up in manual systems. o The most common issue raised by the year 1900 problem regards people's ages. Often, a person's birth year was registered with only two digits, on the assumption that either it was not important exactly how old a person is, or that no one lives longer than one hundred years. For example: o In 1992, Mary from Winona, Minnesota received an invitation to attend a kindergarten. Mary was 104 at that time. o In several countries, especially in Europe, a national identification number was introduced (often in the 1950s), including two-digit information about the birth year. o The largest unwelcome side effect from this is people 100 or more years old being mistaken for young children or in some cases, young children being mistaken for adults
  • 3. Software EngineeringFailures ASIET Kalady Leap Year Bug o Leap year bug ( Leap year problem) is a problem for both digital (computer-related) and non-digital documentation and data storage situations which results from the wrong calculation of which years are leap years. o A supermarket was fined $1000 for having meat around 1 day too long on February 29, 1988. o The computer program that printing the expiration date on the meat labels did not take into account that 1988 was a leap year. There are several types of leap year bugs. o In 2012, Gmail's chat history showed a date of 12/31/69 for all chats saved on Feb 29, 2012. On the same day Microsoft's cloud computing solution Azure went down for 8 hours caused by a leap year bug. o Some digital systems have wrongly calculated which years are leap years. The best- known case occurred in Sony's PlayStation 3: The system treated 2010 as a leap year, so a non-existent date February 29, 2010 was shown on March 1, 2010, and caused program error. o Microsoft Excel has, since its earliest versions, incorrectly considered 1900 to be a leap year, and therefore that February 29, 1900 comes between February 28 and March 1 of that year. The bug originated from Lotus 1-2-3, and was purposely implemented in Excel for the purpose of backward compatibility. o A leading multinational corporation’s cloud computing service outage, which affected Governments and consumers, was caused by the additional day in February this year. o The same leap year date bug also affected an Australian payment system used by the health industry, resulting in 150,000 customers being prevented from using private health care cards for medical transactions for two days.
  • 4. Software EngineeringFailures ASIET Kalady Interface Misuse o Interface Misuse is a type of interface error. o A calling component call another component and makes an error in its use of its interface Eg: Parameters in wrong order. o Misuse of interface, These are faults arising from a misunderstanding of the required interface among separate units. o On April 10, 1990, in London, an underground train left the station without its driver. o The driver had trapped the button that started the train, relying on the system that prevented the train from moving when doors were open. o The train operatorhad left his train to close a doorwhich was stuck. o When the doorwas finally shut, the train simply left. Security o Security failure can arise from any aspect of the operations. Incidents might be man-made or natural in origin. o It is impossible to prevent all security failure, but focussing on the key risk mitigation, management and prevention (deterrence) for certain risks will help maintain a cost- effective and pragmatic security risk management approach. o The cost of security will be outweighed many times by the cost of security failure which may lead to business-critical exposure.
  • 5. Software EngineeringFailures ASIET Kalady o CERT (Computer Emergency Response Team) at the software Engineering Institute is a government-funded organization for assisting the community in dealing with security incidents, vulnerabilities, and security know-how. o The number of security incidents reported to CERT from the United States increased from 252 incidents I 1900 to 21,756 in 2000 and more than 40,000 incidents were reported in 2001. Late and over budget o In 1995, bugs in the automated luggage system of the new Denver International Airport caused suitcases to be chewed up. The airport opened 16 months late. $3.2 billion over budget, with a mostly manual luggage system. o In 2002, the Swanick Air Traffic Control system covers all the enroute air traffic over England and Wales. o The system was delivered substantially over budget (cost £623 million, originally planned at £350 million) and 6 years late. Two major upgrades of the system were delivered after training of the traffic controllers had started. On time delivery o Attaining acceptable delivery performance is the most significant manufacturing challenge faced by many organizations. o ƒ Metrics of excellence in customer service are on-time pickup and on-time delivery. o Success or failure results with or beyond the carrier’s control Success or failure occurs from the synergy of several SNI actions. o These service metrics occur in the context of other operational measures budgetary targets utilization of driver associates equipment availability safety requirements
  • 6. Software EngineeringFailures ASIET Kalady o After 18 months of development, a $200-million system was delivered to a health insurance company in Wisconsin in 1984. o However, the system did not work correctly: $60 million in overpayments were issued. The system took 3 years to fix. Unnecessarycomplexity o The C-17 cargo plane by McDonnell Douglas ran $500 million over budget because of problems with its avionics software. o The C-17 included 19 onboard computers, 80 microprocessors, and 6 different programming languages. o Each of these failures resulted from a software related problem. In some cases, developers did not anticipate seldom-occurring situations (a person living more than 100 years, leap years impacting expiration dates). o In other cases, developers did not anticipate the user actively misusing the system (tapping down a button, exploiting security holes I network software). o In yet other cases, system failures resulted from management failures (late and over budget delivery, on time delivery of an incorrect system, unnecessary complexity).