224,056 research outputs found

    Y2K Interruption: Can the Doomsday Scenario Be Averted?

    Get PDF
    The management philosophy until recent years has been to replace the workers with computers, which are available 24 hours a day, need no benefits, no insurance and never complain. But as the year 2000 approached, along with it came the fear of the millennium bug, generally known as Y2K, and the computers threatened to strike!!!! Y2K, though an abbreviation of year 2000, generally refers to the computer glitches which are associated with the year 2000. Computer companies, in order to save memory and money, adopted a voluntary standard in the beginning of the computer era that all computers automatically convert any year designated by two numbers such as 99 into 1999 by adding the digits 19. This saved enormous amount of memory, and thus money, because large databases containing birth dates or other dates only needed to contain the last two digits such as 65 or 86. But it also created a built in flaw that could make the computers inoperable from January 2000. The problem is that most of these old computers are programmed to convert 00 (for the year 2000) into 1900 and not 2000. The trouble could therefore, arise when the systems had to deal with dates outside the 1900s. In 2000, for example a programme that calculates the age of a person born in 1965 will subtract 65 from 00 and get -65. The problem is most acute in mainframe systems, but that does not mean PCs, UNIX and other computing environments are trouble free. Any computer system that relies on date calculations must be tested because the Y2K or the millennium bug arises because of a potential for “date discontinuity” which occurs when the time expressed by a system, or any of its components, does not move in consonance with real time. Though attention has been focused on the potential problems linked with change from 1999 to 2000, date discontinuity may occur at other times in and around this period.

    Federated Robust Embedded Systems: Concepts and Challenges

    Get PDF
    The development within the area of embedded systems (ESs) is moving rapidly, not least due to falling costs of computation and communication equipment. It is believed that increased communication opportunities will lead to the future ESs no longer being parts of isolated products, but rather parts of larger communities or federations of ESs, within which information is exchanged for the benefit of all participants. This vision is asserted by a number of interrelated research topics, such as the internet of things, cyber-physical systems, systems of systems, and multi-agent systems. In this work, the focus is primarily on ESs, with their specific real-time and safety requirements. While the vision of interconnected ESs is quite promising, it also brings great challenges to the development of future systems in an efficient, safe, and reliable way. In this work, a pre-study has been carried out in order to gain a better understanding about common concepts and challenges that naturally arise in federations of ESs. The work was organized around a series of workshops, with contributions from both academic participants and industrial partners with a strong experience in ES development. During the workshops, a portfolio of possible ES federation scenarios was collected, and a number of application examples were discussed more thoroughly on different abstraction levels, starting from screening the nature of interactions on the federation level and proceeding down to the implementation details within each ES. These discussions led to a better understanding of what can be expected in the future federated ESs. In this report, the discussed applications are summarized, together with their characteristics, challenges, and necessary solution elements, providing a ground for the future research within the area of communicating ESs

    Healthcare choice: Discourses, perceptions, experiences and practices

    Get PDF
    Policy discourse shaped by neoliberal ideology, with its emphasis on marketisation and competition, has highlighted the importance of choice in the context of healthcare and health systems globally. Yet, evidence about how so-called consumers perceive and experience healthcare choice is in short supply and limited to specific healthcare systems, primarily in the Global North. This special issue aims to explore how choice is perceived and utilised in the context of different systems of healthcare throughout the world, where choice, at least in policy and organisational terms, has been embedded for some time. The articles are divided into those emphasising: embodiment and the meaning of choice; social processes associated with choice; the uncertainties, risks and trust involved in making choices; and issues of access and inequality associated with enacting choice. These sociological studies reveal complexities not always captured in policy discourse and suggest that the commodification of healthcare is particularly problematic

    Trust, regulatory processes and NICE decision-making: Appraising cost-effectiveness models through appraising people and systems.

    Get PDF
    This article presents an ethnographic study of regulatory decision-making regarding the cost-effectiveness of expensive medicines at the National Institute for Health and Care Excellence (NICE) in England. We explored trust as one important mechanism by which problems of complexity and uncertainty were resolved. Existing studies note the salience of trust for regulatory decisions, by which the appraisal of people becomes a proxy for appraising technologies themselves. Although such (dis)trust in manufacturers was one important influence, we describe a more intricate web of (dis)trust relations also involving various expert advisors, fellow committee members and committee Chairs. Within these complex chains of relations, we found examples of both more blind-acquiescent and more critical-investigative forms of trust as well as, at times, pronounced distrust. Difficulties in overcoming uncertainty through other means obliged trust in some contexts, although not in others. (Dis)trust was constructed through inferences involving abstract systems alongside actors’ oral and written presentations-of-self. Systemic features and ‘forced options’ to trust indicate potential insidious processes of regulatory capture

    A survey on cyber security for smart grid communications

    Get PDF
    A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. It requires security frameworks for distributed communications, pervasive computing and sensing technologies in smart grid. However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure, even consequential disaster to both utilities and consumers. In this paper, we summarize the cyber security requirements and the possible vulnerabilities in smart grid communications and survey the current solutions on cyber security for smart grid communications. © 2012 IEEE
    • 

    corecore