• Functional Safety

Type

Industry

Language

Region

Topic

« 1 »

Basic training type approval process (EU) 2018/858

From September 1st, 2020, the new framework regulation (EU) 2018/858 is mandatory for the approval of vehicle types and their equipment. Of course, all training courses from Mark Haacke Training & Consulting are based on the new requirements. About: The compliance with all legal requirements during the development, production and use of vehicles is an important factor for companies to minimize costs and risks. It is important to find a reasonable balance between the costs that arise to provide all required proof and the risks that can arise from a deviation from these requirements. With the appropriate knowledge you understand how you as a supplier can meet the requirements of OEM and authorities and how you can fulfill the approval relevant requirements for your product during the development. As an employee of a vehicle manufacturer, the acquired knowledge will help you to understand your obligations, from product development to recycling, and to be able to derive the right measures to minimize the risk of withdrawal/refusal of approval, import stops in certain markets or extensive recall actions. This ensures that beginners as well as the "old hands" gain a high level of practical knowledge and a comprehensive understanding from the training, which is recommended not only for employees from homologation/certification, quality assurance, production and development. The training can also benefit sales or marketing staff in that the knowledge of the approval relevant requirements in different regions of the world helps to evaluate the follow-up costs. The training includes the following learning units: The development of a road traffic law Basic knowledge of legislation / legal framework regulation / framework directive Authorities and technical services for Europe Who are the economic actors in the approval procedure and related processes Who are the economic actors in the approval procedure and related processes? Overview national /European / international procedures Objectives of the authorization procedure and safeguard clause- Authorization procedure Practical exercises and quizzes to consolidate the acquired knowledge- Learning success control

Quality Management, Management, Functional Safety, Lab Tests, Product Safety, Project Management, Approval Related Requirements
Mark Haacke Training & Consulting

BYT - Build your Training (EU) 2018/858

From September 1st, 2020, the new framework regulation (EU) 2018/858 is mandatory for the approval of vehicle types and their equipment. Of course, all training courses from Mark Haacke Training & Consulting are based on the new requirements. About: You have training needs regarding requirements relevant to approval and would like to refresh your existing knowledge and compare it with the development of legislation and its implementation in practice? But you do not find the contents relevant to you in the standard training courses? Talk to me! I can offer you a solution that fits like a good Italian tailor-made suit? My training program consists of approx. 100 individual modules with the respective focal points. Quiz questions, proven practical exercises and discussion points are also available. This pool as learning blocks allows me to put together the right training for you with little effort. Your advantage: your tailor-made suit fits! the lead time is only a few days - short-term appointments are possible! the price is identical to the standard training!

Quality Management, Management, Functional Safety, Lab Tests, Product Safety, Project Management, Approval Related Requirements
Mark Haacke Training & Consulting

Consulting and Extended Problem-Solving II

Are you facing a major restructuring? Are you looking for ways to fundamentally improve yourself and your company?We as external consultants offer a new and fresh perspective directly out of a Start-Up Environment!   Taliox Who are we? We are a successful start-up from Hamburg that offers a variety of services in the field of information technology. Taliox was founded in 2016 by four IT specialists and has since been helping its customers to benefit from innovative and state-of-the-art technologies. As today's digital natives, our team can deliver innovative software solutions by combining an intrinsic technical understanding with the latest research. As an innovative digitizer, we optimize processes, design digital strategies, and carry out feasibility studies. We realize our customers' ideas, whether it is a web or desktop application, an app, or a website. Furthermore, with a platform for advanced digital quality planning and an Audit Assistant, we have a constantly expanding product portfolio.   Industry sectorsIT consulting, automotive, consumer goods, software development Areas of applicationproject management, process management, strategy development, concept development, team management, IT security, digitization, software development, performance optimization ProductWe provide organizational consulting, develop information strategies for your company, carry out feasibility studies and calculate the solution costs.With the aim of solving the actual problems directly! Building up on our consulting methods from Problem-Solving and Consulting I we will build a first solution for your problem in this process and test its suitability for you.  We will concentrate on the first three steps of our methodological consulting, based on our experience, will adapt to your needs in this process.  Methods IDEATE  PROTOTYPE TEST Our way of working is divided into three activities according to our consulting work. In the first step, the information shared with us is used to generate and evaluate different ideas based on your challenges. We then switch to prototyping mode after detailed elaboration to create prototypes that will be used for evaluation.The prototype can be very versatile and depends on your ideas. This can range from a web or desktop application, a website to an app! Finally, the prototype that has now been built is used to generate actual user feedback.Instead of working at the concept level, this format is more of a practical type to generate results that might as well be used in future project phases. Companies with whom we can work can break down stuck thinking patterns with our help and make the best future-oriented decisions in intensive cooperation with us. Our working concept effectively structures our cooperation with the aim of your maximum success

Technical Cleanliness, VDA 6.3, Strategy Consulting, Quality Management, Management, Functional Safety, Damage Analysis, ISO Standards, Health Management, Data Security Management, Product Safety, VDA Standards, Project Management, Work Safety Management
taliox
s
Europe
Q
85.00 € Per Hour

Functional Safety Expert/Auditor – ISO 26262

Einführung: Funktionale Sicherheit ist ein Teilbereich der Produktsicherheit. Die funktionale Sicherheit garantiert die reibungslose Funktion eines Systems (Produktes) im normalen Betrieb sowie bei Ausfällen und Fehlern. Betrachtet werden hierbei elektrische, elektronische und programmierbare Bestandteile eines Produktes. Ein Produkt gilt dann als funktional sicher, wenn seine Bestandteile auch bei Fehlfunktionen und Störungen keine Schäden in der Umgebung des Geräts hervorrufen. Im Rahmen unserer funktionalen Sicherheitsschulungen lernen Sie, die gesetzlichen Anforderungen zu erfüllen, das Sicherheitsniveau Ihrer Produkte zu steigern und Restrisiken effizient zu minimieren.    Ziel: Das Seminar gibt eine Einführung in die Entwicklung sicherheitsrelevanter E/E-Systeme unter Berücksichtigung der ISO 26262. Es werden grundlegende Aspekte der ISO 26262 vorgestellt und ihre Rolle innerhalb des Sicherheitslebenszyklus diskutiert. Schwerpunkte sind die Konzeptphase mit der Gefahren- und Risikoanalyse (GuR) und die nachfolgende System-, Hardware- und Softwareentwicklung unter Berücksichtigung des empfohlenen Vorgehens sowie der Spielräume bei der Erreichung der normativen Vorgaben.   Inhalt: Grundlagen der funktionalen Sicherheit> intuitiver Sicherheitsbegriff, Schaden, Risiko, Risikoreduktion> systematische und zufällige Fehler, Abweichungen und Ausfälle> Sicherheit vs. funktionale Sicherheit> Standards und Standardisierungsprozess   Einführung in die ISO 26262> Überblick> Scope> ISO 26262 Sicherheitslebenszyklus Konzeptphase> Item Definition> Gefahren- und Risikoanalyse (GuR) einschließlich ASIL-Bestimmung> Festlegung der Sicherheitsziele> funktionales Sicherheitskonzept> ASIL-Dekomposition Entwicklung auf Systemebene (I)> technisches Sicherheitskonzept> Hardware-Software-Interface Entwicklung auf Hardwareebene> Hardware-Sicherheitsanforderungen> Hardware-Design> Analyse und Bewertung des Hardware-Designs: Arten von Hardware-Fehlern, Hardware Archi   tekturmetriken, Diagnosedeckungsgrad, Sicherheitsanalysen> Hardware-Integration und -Test Entwicklung auf Softwareebene (I)> Software-Sicherheitsanforderungen> Software-Design> Software-Implementierung> Software-Test und Verifikation der Software-Sicherheitsanforderungen Entwicklung auf Systemebene (II)> Hardware-Software-Integration und -Test> Sicherheitsvalidierung> Sicherheitsnachweisführung und Produktionsfreigabe Management der funktionalen Sicherheit> Overall Safety Management> Sicherheitsplanung> Bestätigungsmaßnahmen. Confirmation Reviews, Safety Audit, Safety Assessment Spezialthemen> Management und Verfolgbarkeit von Sicherheitsanforderungen> Arbeitsteilung zwischen OEM und Lieferanten (DIA)> Sicherheitsanalysetechniken (FMEA)> funktionale Sicherheit während des Einsatzes, im Service und bei Außerbetriebnahme> Qualifizierung von Entwicklungswerkzeugen> modellbasierte Software-Entwicklung> Besonderheiten bei FUSI Audits > Auditierung nach ISO 26262     Voraussetzungen: Grundlegende Kenntnisse zu Entwicklungsprozessen oder vergleichbaren Sicherheitsstandards wie zum Beispiel IEC 61508 sind vorteilhaft, aber keine zwingende Voraussetzung. Bei dem Functional Safety Auditor wird eine Ausbildung nach ISO 19011 vorausgesetzt.   Zielgruppe: Unser Seminarangebot im Bereich funktionale Sicherheit richtet sich unter anderem an Projektleiter, Produktmanager, Entwicklungsleiter, Entwickler für Hardware und Software, Safety Manager und Ingenieure.   Dauer: 2-3 Tage   Literatur: Seminarunterlagen   Preis: 649,00 EUR pro Teilnehmer

Functional Safety
Bertel & Partner

Grundlagen Funktionale Sicherheit nach ISO 26262

  Einführung: Funktionale Sicherheit ist ein Teilbereich der Produktsicherheit. Die funktionale Sicherheit garantiert die reibungslose Funktion eines Systems (Produktes) im normalen Betrieb sowie bei Ausfällen und Fehlern. Betrachtet werden hierbei elektrische, elektronische und programmierbare Bestandteile eines Produktes. Ein Produkt gilt dann als funktional sicher, wenn seine Bestandteile auch bei Fehlfunktionen und Störungen keine Schäden in der Umgebung des Geräts hervorrufen. Im Rahmen unserer funktionalen Sicherheitsschulungen lernen Sie, die gesetzlichen Anforderungen zu erfüllen, das Sicherheitsniveau Ihrer Produkte zu steigern und Restrisiken effizient zu minimieren.    Ziel: Das Seminar gibt eine Einführung in die Entwicklung sicherheitsrelevanter E/E-Systeme unter Berücksichtigung der ISO 26262. Es werden grundlegende Aspekte der ISO 26262 vorgestellt und ihre Rolle innerhalb des Sicherheitslebenszyklus diskutiert. Schwerpunkte sind die Konzeptphase mit der Gefahren- und Risikoanalyse (GuR) und die nachfolgende System-, Hardware- und Softwareentwicklung unter Berücksichtigung des empfohlenen Vorgehens sowie der Spielräume bei der Erreichung der normativen Vorgaben.   Inhalt: Grundlagen der funktionalen Sicherheit> intuitiver Sicherheitsbegriff, Schaden, Risiko, Risikoreduktion> systematische und zufällige Fehler, Abweichungen und Ausfälle> Sicherheit vs. funktionale Sicherheit> Standards und Standardisierungsprozess   Einführung in die ISO 26262> Überblick> Scope> ISO 26262 Sicherheitslebenszyklus Konzeptphase> Item Definition> Gefahren- und Risikoanalyse (GuR) einschließlich ASIL-Bestimmung> Festlegung der Sicherheitsziele> funktionales Sicherheitskonzept> ASIL-Dekomposition Entwicklung auf Systemebene (I)> technisches Sicherheitskonzept> Hardware-Software-Interface Entwicklung auf Hardwareebene> Hardware-Sicherheitsanforderungen> Hardware-Design> Analyse und Bewertung des Hardware-Designs: Arten von Hardware-Fehlern, Hardware Archi   tekturmetriken, Diagnosedeckungsgrad, Sicherheitsanalysen> Hardware-Integration und -Test Entwicklung auf Softwareebene (I)> Software-Sicherheitsanforderungen> Software-Design> Software-Implementierung> Software-Test und Verifikation der Software-Sicherheitsanforderungen Entwicklung auf Systemebene (II)> Hardware-Software-Integration und -Test> Sicherheitsvalidierung> Sicherheitsnachweisführung und Produktionsfreigabe Management der funktionalen Sicherheit> Overall Safety Management> Sicherheitsplanung> Bestätigungsmaßnahmen. Confirmation Reviews, Safety Audit, Safety Assessment Spezialthemen> Management und Verfolgbarkeit von Sicherheitsanforderungen> Arbeitsteilung zwischen OEM und Lieferanten (DIA)> Sicherheitsanalysetechniken (FMEA)> funktionale Sicherheit während des Einsatzes, im Service und bei Außerbetriebnahme> Qualifizierung von Entwicklungswerkzeugen> modellbasierte Software-Entwicklung> ISO 26262 Second Edition       Voraussetzungen: Grundlegende Kenntnisse zu Entwicklungsprozessen oder vergleichbaren Sicherheitsstandards wie zum Beispiel IEC 61508 sind vorteilhaft, aber keine zwingende Voraussetzung. Zielgruppe: Unser Seminarangebot im Bereich funktionale Sicherheit richtet sich unter anderem an Projektleiter, Produktmanager, Entwicklungsleiter, Entwickler für Hardware und Software, Safety Manager und Ingenieure.   Dauer: 2 Tage, Kompaktkurs für Führungskräfte 0,5 bis 1,0 Tage   Literatur: Seminarunterlagen   Preis: 649,00 EUR pro Teilnehmer

Functional Safety
Bertel & Partner

Information Security Audit based on the newest technological standards

Audit procedure for the identification of insecure and risky system components The security of infrastructures and IT systems requires an appropriate use of cryptography and security tools. A wrong use or faulty instantiations often have a tremendous impact on the security of complete IT infrastructures. They represent the gateway for attackers and malware. Quantum computers represent an advancing technology that break all currently applied public key cryptosystems. The security is threatened to an unprecedented extent. Resulting financial losses and reputational damages due to lack of prevention and appropriate protection measures may affect the situation of the company in the short and long term. Due to the complexity of software applications and IT systems, it is important to check and monitor the security of the system in terms of the correct use of cryptographic algorithms and tools. It is therefore important to have the right protection measures in place. To this end, the security system has to be assessed with respect to compliance with the security requirements. In a first step, the security requirements have to be determined. Subsequently, the security of the system under consideration is screened and checked in order to identify risky and insecure components that do not satisfy the requirements. This also includes the correct usage of crypto libraries, crypto functions and other tools. Furthermore, components that are vulnerable to quantum computer attacks are separately identified. The various parts then have to be assessed according to their risk and will be classified into different risk classes.  In the next stage, the conception of an appropriate IT security strategy is carried out. It contains an action plan and roadmap that transforms the IT infrastructure into the desired shape ensuring the desired security goals while being protected against any quantum computer attacks. Immediate action requests can be addressed using the solutions provided by QuantiCor Security. This holistic approach allows to capture individual circumstances and to treat them in a very targeted manner. Is your company also immune against threats arising from new technologies? In our analysis and consulting services, we take all kinds of threats into account. These also include those arising from new technologies and innovations, such as quantum computers. We take special care to recommendations of BSI (Federal Office for Information Security) and NIST. After a positive evaluation of your systems, it is possible to obtain a TÜV-label that is issued in cooperation with TÜV Nord. Beside other benefits it demonstrates quantum computer resistance of your systems to your customers.    You want to… learn more about the risk posed by quantum computers? determine your security level and your current need for action? Let's do the quick check: Initial consultation Individual questionnaire, analysis and evaluation Concrete recommendations for action  About QuantiCor Security QuantiCor Security is an IT security partner and expert for the security risk of quantum computers and multi-party computation. We are part of the innovation cluster for cyber security and support companies from all industries with resource-saving and future-proof solutions (incl. OTA updates). Our approach: Analysis, technology development, product integration and support. With pleasure we support you as: -Project partner and consultant-Technology developer-Provider for quantum-safe software solutions Lets increase your security level together!  

Strategy Consulting, Quality Management, Functional Safety, Data Security Management, Project Management
QuantiCor Security
s
Europe
Q
1,299.00 € Per Day

Market surveillance, field measures, recalls

About: The fulfilment of all legal requirements during the development, production and use of vehicles is an important factor for companies to minimize costs and risks, and it is important to find a reasonable balance between the costs incurred in providing all the required evidence and the risks that may arise from deviating from these requirements. With the appropriate knowledge, you will understand how you as a supplier can meet the requirements of OEM and authorities, who may and/or must communicate with the OEM or authorities and which measures can be taken for field and product monitoring. The training includes the following learning units- Summary of CoP and approval procedures- Product groups affected by market surveillance- Measures for active and passive market surveillance- Levels of recalls- Decision matrix- Organization and committees in the companys- Practical exercises and quizzes to consolidate the acquired knowledge- Learning success control

Sorting of Suspect Parts, Quality Management, Management, Functional Safety, Damage Analysis, Lab Tests, Product Safety, Project Management, Approval Related Requirements
Mark Haacke Training & Consulting

Problem-Solving and Consulting I

Taliox Who are we? We are a successful start-up from Hamburg that offers a variety of services in the field of information technology. Taliox was founded in 2016 by four IT specialists and has since been helping its customers to benefit from innovative and state-of-the-art technologies. As today's digital natives, our team can deliver innovative software solutions by combining an intrinsic technical understanding with the latest research. As an innovative digitizer, we optimize processes, design digital strategies, and carry out feasibility studies. We realize our customers' ideas, whether it is a web or desktop application, an app, or a website. Furthermore, with a platform for advanced digital quality planning and an Audit Assistant, we have a constantly expanding product portfolio.   Industry sectorsIT consulting, automotive, consumer goods, software development Areas of applicationproject management, process management, strategy development, concept development, team management, IT security, digitization, software development, performance optimization. ProductWe provide organizational consulting, develop information strategies for your company, carry out feasibility studies and calculate the solution costs. Derived from our work process, we focus our consulting service on understanding customer challenges, developing concepts and selecting the best possible solution to remedy identified defects. We will concentrate on the first three steps of our methodological consulting, based on our experience, will adapt to your needs in this process. In addition on focusing on the first three steps of our consulting method, tasks such as analyzing the data of a company, determining the requirements for the information system, submitting software and hardware recommendations, defining project objectives, compiling and presenting information are the cornerstone of our Way of working.  Methods EMPATHIZE DEFINE  IDEATE Understanding you, the first activity, is the fundamental step to approach your problem and put ourselves in your situation.We use systematic interviews, observations, and the information you share. In the second phase, your needs are further narrowed down and defined by techniques such as a Stakeholder map, the desk research method, ... In the end we get a clear picture of your current situation. The idea phase then serves to generate radical and alternative solutions.This phase is the most dynamic process of our advice and at the same time the most exciting for you.Experience shows that everything comes together here and results in well thought-out solutions.You can benefit the most from this phase. Participants in this consultation can use the full potential of our company in a short period of time and use it for themselves. We offer you, free of our own interests, to analyze your problems and to develop solutions together with you.Participants in this consultation open new perspectives, elegant solutions, and lucrative business ideas.

Technical Cleanliness, VDA 6.3, Strategy Consulting, Quality Management, Management, Functional Safety, Damage Analysis, ISO Standards, IRIS Standards, IATF 16949, Health Management, VDA Standards, Project Management, Work Safety Management, Human Performance
taliox
s
Europe
Q
85.00 € Per Hour
« 1 »