ESC Boston and BIOMED Boston is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ESC Boston 2019 Schedule Viewer


Welcome to the Biomed Boston & ESC Boston 2019 Presentation Store. Here you can view and download conference and/or show floor theater presentations before, during, and after the event. If you’re looking for a presentation from a specific session that you’re unable to find here, note that it’s likely because the presenter has not provided permission for external use or has not yet shared their presentation with us. Please check back after the event for a more complete catalogue of available presentations.

Are Open Source & Critical Software Like Oil & Water?

Jay Thomas  (Director, Field Engineering , LDRA)

Location: 107B

Date: Wednesday, May 15

Time: 3:15 pm - 4:00 pm

Track: ESC Boston, Track B: Embedded Software Design & Verification

Vault Recording: TBD

The requirements-based development processes dictated by functional safety standards such as IEC 61508, ISO 26262, IEC 62304, and EN 51028 suggest that, like oil and water, Open Source Software (OSS) and mission-critical embedded systems should never be mixed. And yet free access to combined efforts of an invisible army of developers has an obvious commercial appeal, and presents huge incentive for developers of mission-critical embedded systems to leverage from the burgeoning open source community. The ecosystem surrounding the process standards is designed to reflect the process models championed by the standards, with the expectation that the code has been (or is being) designed and developed following a best-practice development process. Starting from a position with OSS where there is code but no requirements turns the ideal process on its head. And yet there are many examples where companies have upgraded existing products to comply with one standard or another, so clearly a "reverse engineering" approach IS possible.

This presentation will debate whether that same "reverse engineering" approach can justifiably be deployed to accommodate OSS into critical systems. It will reference various functional safety standards to highlight in context the challenges in embracing OSS. And it will propose an OSS deployment process for use in tandem with established automation methods to create appropriate supporting artifacts.


Attendees will mostly be aware of the commercial advantages of deploying open source software, but will learn how it can be integrated into their application without compromising its integrity.

Presentation File