|
. t: @0 B2 c4 V. u6 }+ g4 r- C6 r' u: C; z" w- `- r
| DSH 295
+ ~: X' D2 Z- {- C# A2 z | Object
) x0 d% y K) O, | m" S2 {7 D | 1.2
7 T5 I, O6 l: q# i2 t( ` | 61010-1(ed.1);am1;am2
! j7 D3 u8 B% n4 ?0 ] | ( K% [+ y' J/ T+ M
& j! r8 z" b% y9 d. L: p
Standard:
2 U' ^! @. O* w# S! E' A0 sIEC 61010-1:1990, e% i! x0 K( w
+A1:1992+A2:1995
' c( d* A7 @0 O0 X7 e" X8 F/ w8 uSub clause:) o7 `# b( T, F" @3 }& B" U2 u1 k+ |9 O
1.21 \/ d! _6 B3 Y3 t
Sheet n. 295
8 k7 |9 B, A3 l$ m' nPage 1(1)
1 k, e( ~& R& J6 Q8 cSubject:0 _' }9 y* o; a8 r/ Z$ N( i! v7 ~
Object
0 [# h3 j6 o- ^8 m) U* p) P- kKey words:5 I- ]9 w/ D9 j4 `2 f# M& r X, I' n
- Scope
5 ], n3 `0 m% c- Software Safety! w/ b" ^1 r% w1 U$ a+ y5 Y+ g/ l! ?
Decision taken by
+ _! _$ _/ z4 S' T' A( KETF3 and confirmed
3 W: F: ^! W: Y& Uby CTL at its 38th0 B: o$ T; u4 f+ I
meeting, in Toronto
$ x' t/ G4 m5 E) ~; P: G$ j7 LQuestion:
, X6 J9 {* E; Q# eIf safety is dependent on Software, what criteria do laboratories employ to ensure5 f, h- G* o6 `6 a
compliance?
* F2 n6 T% v; n+ T6 Y" j+ @, q/ fDecision:
- G7 F* T: l) x: j3 @/ CSoftware safety is not specifically addressed in IEC 61010-1 at present and therefore, there
$ [6 }9 h3 K: S' I$ F9 [are no specific guidelines for this work. A draft collateral standard is in preparation and also
e- D# |3 @( u4 g/ S1 C k- W7 AIEC 61508 deals with this topic.
5 `; S& J# i1 n) LGenerally, it is advised that devices should not be dependent on software alone for their
( Q$ P9 ^/ L/ ^, [+ J2 J1 Wsafety. There should be a separate independent means provided which acts to prevent a
1 I; i% G* Q- H- v% Rdangerous condition arising.+ [ p" U" ~! u. I! V+ k1 k
Explanation:
2 o$ o- N, V9 k2 hExperience shows that the analysis of software systems to ensure their safe operation is very4 z0 n+ p5 M# u# p( j& j, n
difficult and in practice, can only provide a measure of confidence. Additionally, the
' P: V0 Y' U9 H Q$ l0 rmethods of performing the examination are not widely agreed upon and therefore, subject to% \8 W" I1 N; d2 e% K
doubt. In these circumstances, it is preferred to adopt safety limit methods known from! O% L6 l& z0 v* ]% H2 l4 j: g0 a! @
experience to be effective.$ \ P0 D% \- q9 F5 f/ B9 H
) F4 [# d& T* g! \
- j& U$ N( ]) B( j9 y+ D8 O
5 Z1 U* B' U; }+ v6 }8 _, c
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?注册安规
x
|