Software Engineers are Quality Assurance Managers

February 21, 2018

Have you ever noticed that Quality Assurance, ISO-9001,
and the Deming Cycle is taught only in Business Administration?

I have found that when Quality Assurance was taught in Engineering
Schools, it was in Engineering Management Classes.

Is Quality Assurance just an Engineering Management Problem? Is
a Software Engineer a Quality Assurance Manager?

Computer Programs are special Deming Plans to be Done at the
client’s site by a computer not by a human being.

Software Engineers are, in reality, Quality Assurance Managers.
For the most part, they do not realize this fact.

WHATIFWE taught Quality Assurance, ISO-9001, and the Deming
Cycle to all Engineers in our Engineering Schools?

Advertisements

1987 IMACS European Congress In Prague. Czechoslovakia

February 20, 2018

In 1987, I presented my second article on my personally
funded research at the IMACS European Congress In Prague.
Czechoslovakia. I performed my computer simulations on
my personal Heathkit H89 computer.

I have attached a scanned copy of this five page article to
this post. Prague was communist at that time and it amazed
the attendees that I could perform my research on my own
time and money. I took vacation time to attend the conference.

Please may I remind you that companies and organizations do
not make discoveries and inventions; Individuals do. May I
encourage you to turn off the TV set and work on your own
personal research project.

Prague-Article-1987-1-no_address

Prague-Article-1987-2

Prague-Article-1987-3

Prague-Article-1987-4

Prague-Article-1987-5

WhatifWe127 — My Internet Interface

February 18, 2018

Hopefully, this post will answer many of the questions that I have received about the Internet services that I am receiving.

First, please understand that I do not have a team. There is one of me and I am home based.

My Internet service is provided by Earthlink.

Recently I changed from DSL to a cable Internet communication process due to a major regional outage.

My blog is provided by the free WordPress site which may or may not add some advertising.

I also have a whatifwe Codeplex site and and a @whatifwe2048 Twitter site.

I designed my Website using Microsoft Front Page.

I have successfully accessed my web-site and blog on a LINUX, WINDOWS, and MAC machine.

My Comment Approval Criteria

February 17, 2018

Every day I receive between 50 and 100 comments requesting approval. There is only one of me managing the blog and hence must perform this function quickly and efficiently. To this end, each comment must:

1. Have a text message. For the most part, a comment with no text message will be deleted.

2. Be written in English using real words. I am not familiar with text message abbreviations.

3. Adhere to the basic principles of civilized behavior (I have had not problems with this so far).

4. Be consistent to the associated post and the purpose of the blog.

5. Be short. If it is over ten lines, I will delete it.

6. Not advertise any product, service or cause. I have been receiving a lot of promotions of solar panels for generating electric power which I have permanently deleted.

Thank You

PROGRESS REPORT

February 16, 2018

2018-02-10

RELATIVITY BOOK / TOASTMASTERS

The fifth segment of the Relativity book has been read at a Toastmaster’s
meeting. My effort at revising the book to make it more interesting and
understandable has been successful as indicated by their evaluation. Their
suggestion was to add some pictures to the presentation.

018-02-15

RELATIVITY BOOK / TOASTMASTERS

The sixth segment of the Relativity book has been prepared
and submitted to my mentor for comments.

Software “Breaks”!

February 14, 2018

A 17 year old sailor on a submarine must be able to
fix a critical piece of electronic equipment within
15 minutes.

Critical submarine hardware has the required subsystems
to facilitate the location of a failed replaceable components.

Most hardware these days has at least one computer within it.
This includes critical submarine systems.

Can the same 17 year old sailor on a submarine find and
correct a critical software failure within 15 minutes?

Does software “break”? Not really. but software fails when
it illegally or incorrectly writes some data.

Programmers have many ways of preventing illegal writes which
they use in checkout and then remove before delivery.

WHATIFWE used formal illegal write prevention code in delivered
software?

1985 IMACS World Congress In Oslo, Norway

February 13, 2018

In 1985, I presented my first article on my personally
funded research at the IMACS World Congress at Oslo, Norway.
I performed my computer simulations on my personal Heathkit
H89 computer.

I have attached a scanned copy of this four page article to
this post.

Please may I remind you that companies and organizations do
not make discoveries and inventions; Individuals do. May I
encourage you to turn off the TV set and work on your own
personal research project.

Oslo-1985-1-no_address

Oslo-1985-2

Oslo-1985-3

Oslo-1985-4

How I Protect My Proprietary Data

February 11, 2018

The original purpose of my blog was to provide me an easy
means of reporting my activity on my personally funded
research and development activities on error-free software
development methods.

My research and development activities produces a large
quantity of proprietary data. How do I protect this data?
Simple! I do not publish it on my blog or any other web-sites.

The purpose of “reporting my activity” involves establishing
the date at which a particular task was accomplished. The
task is sufficiently identified to enable me to identify
the associated proprietary data and daily log which is
stored on my machines, flash drives, and DVD’s.

Also, please let me remind you that when your machine is
not connected to the internet, hackers cannot access your
machine.

My Response to Large Quantity of Comments

February 10, 2018

I am the only one managing the blog and hence
have a limited amount of time to do so.

If there are less than 100 comments, I will examine
each comment to determine whether I will approve it
or delete it.

If there are more than 100 comments, I will examine
and approve comments according the following rules:

For each group of twenty comments, I will:
1. Find the first one that I can approve.
2. Approve the selected comment.
3. Delete the remaining 19 comments.

Thank You for your understanding.

PROGRESS REPORT

February 9, 2018

This purpose of this post is to publish single line
reports on the projects performed during the week.

**************************************************************
**************************************************************

2018-02-06

CLASS DEVELOPMENT

It is necessary to review the classcommontypedef, classcommonelement, and
classcommonarray libraries to enforce all alias names are in the name format.
If not, additional tests need to be added.

2018-02-07

CLASS DEVELOPMENT

The classcommontypedef, classcommonelement, and
classcommonarray libraries have been modified to enforce name format for
all alias names.