Iac - 10 . D 1 . 5 . 4 How Do We Fix System Engineering ?

نویسنده

  • Michael D. Griffin
چکیده

The now half-century-old multidisciplinary, interdisciplinary discipline that we call "system engineering" is the classic half-empty, half-full glass; optimists and pessimists can look at the same thing and draw opposing conclusions. Optimistically, the maturing of system engineering into a recognized discipline from its roots in large aerospace and defense programs has been, and will remain, an enabling factor in the ability of societies to deal with the macroscale problems facing us in energy, environment, and other key areas. Pessimistically, system engineers have some explaining to do. How is it that we continue to encounter failure of important and complex systems where everything thought to be necessary in the way of process control was done, and yet despite these efforts the system failed? Each time this occurs, we as an engineering community vow to redouble our efforts to control the engineering process, and yet such events continue to occur. The answer cannot lie in continuing to do more of the same thing while expecting a different outcome. We need to rise above process, to examine the technical, cultural, and political mix that is "system engineering", and to examine the education and training we are providing to those who would practice this discipline. This paper will discuss that training from a new perspective, the perspective of design elegance, how we identify it, and how we can design with elegance as a value.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intra-arterial chemotherapy for retinoblastoma: report No. 1, control of retinal tumors, subretinal seeds, and vitreous seeds.

OBJECTIVE To describe tumor control following intra-arterial chemotherapy (IAC) for retinoblastoma. METHODS A retrospective interventional series in which 17 patients were treated with ophthalmic artery injection of melphalan, 5 mg, was undertaken to determine retinoblastoma control. RESULTS Of 190 children with retinoblastoma, 17 (9%) were treated with IAC. Catheterization was successful i...

متن کامل

Guest Editors' Introduction - Fresh from Y2K, What's Next for Cobol?

0 7 4 0 7 4 5 9 / 0 0 / $ 1 0 . 0 0 © 2 0 0 0 I E E E ground. We agree with F.G. Harold’s concept of “optimal heterophily”1 and use the term software engineering to include information technology. Y2K presented a formidable (albeit welldefined) challenge: find the date problems and fix them (see our “Congratulations” in the accompanying sidebar). Post-Y2K presents a more formidable challenge: a...

متن کامل

Prevention of bacterial leakage at implant-abutment connection level: an in vitro study of the efficacy of three different implant systems.

Peri-implantitis is the main cause of implant failures. Peri-implantitis is provoked by the presence of bacterial infiltration around Implant-Abutment Connection (IAC). Reduction of bacterial leakage may be achieved by improving the accuracy and precision of the two pieces of IAC. The aim of the present in vitro study was to evaluate bacterial microleakage from the inside to the outside of the ...

متن کامل

Analyzing and predicting effort associated with finding and fixing software faults

Context: Software developers spend a significant amount of time fixing faults. However, not many papers have addressed the actual effort needed to fix software faults. Objective: The objective of this paper is twofold: (1) analysis of the effort needed to fix software faults and how it was affected by several factors and (2) prediction of the level of fix implementation effort based on the info...

متن کامل

Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study

To what extent do investments in secure software engineering pay off? Right now, many development companies are trying to answer this important question. A change to a secure development lifecycle can pay off if it decreases significantly the time, and therefore the cost required to find, fix and address security vulnerabilities. But what are the factors involved and what influence do they have...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010