Welcome to the Biomed Boston & ESC Boston 2019 Presentation Store. Here you can view and download conference and/or show floor theater presentations before, during, and after the event. If you’re looking for a presentation from a specific session that you’re unable to find here, note that it’s likely because the presenter has not provided permission for external use or has not yet shared their presentation with us. Please check back after the event for a more complete catalogue of available presentations.
Jay Thomas (Director, Field Engineering , LDRA)
Date: Wednesday, May 15
Time: 3:15pm - 4:00pm
Track: ESC Boston, Track B: Embedded Software Design & Verification
Vault Recording: TBD
The requirements-based development processes dictated by functional safety standards such as IEC 61508, ISO 26262, IEC 62304, and EN 51028 suggest that, like oil and water, Open Source Software (OSS) and mission-critical embedded systems should never be mixed. And yet free access to combined efforts of an invisible army of developers has an obvious commercial appeal, and presents huge incentive for developers of mission-critical embedded systems to leverage from the burgeoning open source community. The ecosystem surrounding the process standards is designed to reflect the process models championed by the standards, with the expectation that the code has been (or is being) designed and developed following a best-practice development process. Starting from a position with OSS where there is code but no requirements turns the ideal process on its head. And yet there are many examples where companies have upgraded existing products to comply with one standard or another, so clearly a "reverse engineering" approach IS possible.
This presentation will debate whether that same "reverse engineering" approach can justifiably be deployed to accommodate OSS into critical systems. It will reference various functional safety standards to highlight in context the challenges in embracing OSS. And it will propose an OSS deployment process for use in tandem with established automation methods to create appropriate supporting artifacts.
Attendees will mostly be aware of the commercial advantages of deploying open source software, but will learn how it can be integrated into their application without compromising its integrity.