|
! |9 D( S) Z4 [. h% C0 }8 ^) z3 z- u3 E7 O2 B# O4 u3 R: S7 d
| DSH 295
- ~& X: y* N% | | Object
* I" z- ?0 S1 `8 s& o | 1.21 p4 E9 V3 X2 F& ]
| 61010-1(ed.1);am1;am2' \! u# r/ l/ u |
|
0 k5 r/ U, B. Z& ^1 M# R5 I# O9 K" Y" _$ v. Y, Y, Z/ ]
Standard:2 c& e( v, m) G9 d& a' s
IEC 61010-1:1990, o5 X$ K4 P- C4 `6 i
+A1:1992+A2:1995+ L J% L+ I, k7 C" H3 k0 i5 s# O
Sub clause:1 p' h* J# P% v. r, A
1.28 L# `: U( ^: o0 b# I/ L* f
Sheet n. 295. Y8 s; Z- G3 D6 O: [
Page 1(1)
7 I0 O& ^: T, N; j6 E& `Subject:; F7 z7 B; O% T' h
Object
7 X* U1 H4 ]5 Z3 k4 ?Key words:
Y6 u8 e( i6 u- Scope
( j, y) G! d4 ~' z! m% S) P- Software Safety* O$ ?; Y' u, y: X+ I( @6 s/ N" U
Decision taken by. p9 @8 |/ [ i& K G, l1 O& A
ETF3 and confirmed# x4 z5 R' J- T
by CTL at its 38th
) u4 ?# M$ i/ f1 wmeeting, in Toronto
+ w8 z. _3 T4 \! I$ ?, |Question:
; `" V% s4 W( K5 z$ \+ x1 b3 PIf safety is dependent on Software, what criteria do laboratories employ to ensure8 U7 R) ]6 r! J5 g
compliance?
! V9 f8 X9 P4 O& _/ \Decision:# i$ ]/ ^! v( q
Software safety is not specifically addressed in IEC 61010-1 at present and therefore, there7 y1 d P' T: o6 K/ Y5 G( K. _3 R5 n
are no specific guidelines for this work. A draft collateral standard is in preparation and also+ b" f0 D8 w$ ?% i$ e% Q7 }$ D
IEC 61508 deals with this topic.
$ |/ i `9 U- N- ~$ nGenerally, it is advised that devices should not be dependent on software alone for their, f4 ^/ x& x- |: t8 U' Q7 S
safety. There should be a separate independent means provided which acts to prevent a
( G3 _; i! k; u5 Bdangerous condition arising.7 _; N9 u' x& f' N# H
Explanation:
- u$ n+ D v( s; M! u) G3 TExperience shows that the analysis of software systems to ensure their safe operation is very0 k. r3 t6 W0 V' Q5 E: `7 L
difficult and in practice, can only provide a measure of confidence. Additionally, the
. h5 j8 |; I3 e; D" omethods of performing the examination are not widely agreed upon and therefore, subject to. m% y) j7 I7 @) p% v6 N
doubt. In these circumstances, it is preferred to adopt safety limit methods known from
* L) p' s5 t. ?experience to be effective.- h2 r% y$ ]2 q3 m
, D& c3 \0 L) }0 d
1 w# V$ f3 i0 A* H0 h% Y5 t
7 O' }8 K) @1 t7 Q @* K |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?注册安规
x
|