Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This was part of our Systems Engineering class, something like this: https://web.mit.edu/6.033/2014/wwwdocs/assignments/therac25....


Thanks for posting this. The Leveson article is IMO the definitive study on this incident. I’m going to repost at top level for emphasis.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: