It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The F-35's flight plan appears to have delays written all over it. A previously unreleased memo from Michael Gilmore, the Department of Defense's director for Operational Test and Evaluation (OT&E), details a list of problems that will likely hold up the testing of the final configuration of the aircraft—and will mean the "Block 2B" aircraft now being delivered to the Marine Corps soon will continue to be full of software bugs for years to come. But officials with the F-35's Joint Program Office (JPO) have downplayed the seriousness of Gilmore's concerns, with one military member of the office taking to the Facebook page of a defense publication to call the memo "whining."
tripling the rate at which weapons delivery events have historically been conducted,
Emphasis mine.
The software is still a work in progress, and testing of potential security vulnerabilities—which could potentially keep aircraft from being able to take off—has largely been deferred for now while Lockheed Martin and the JPO focus on getting the software to actually work as intended.
Schedule driven decisions are sometimes necessary. I had a boss who had a saying: "Time to shoot the engineer and ship the product." We are perfectionist sometimes. But, I have also tested First Customer Ship (FCS) software in the past, that was schedule driven, and all of the critical functionality wasn't even in place! A whole test plan scrapped because the UI had nothing but stubs behind it.
And rather than fix Block 3i, the JPO made a "schedule driven decision,"
True. But there should still be at least some limited security testing even in the Unit Tests. And, if you consider the finish line as the point where some actual features are becoming available for functional testing, that is a perfect time to start some security testing related to those available features. It's better to find any major security flaws while the system is still somewhat fluid.
Because one reason is you start to do security checks (of course take security into consideration from the start), when you´re seeing the finish line. Before that, there are too much changes.
This was the first thing that I thought of when I read your reply.
The biggest problem is that if someone can get into the unclassified side they may be able to backdoor into the classified side.
Yep, been there. Then there is usually the option of "fixing" the hardware bug in the software.
"Oh it´s software, we can fix that any time. Let´s do the hardware stuff first."
Years ago, one of my mentors referred to that as "a memorable debugging session." There are bugs, and then there are BUGS. The BUGS are the ones that you remember for the rest of your life.
The result was a orgy of debugging, both on soft and hardware side for weeks.
I have no doubt that the folks designing and building those systems are quite capable. I've worked with a few of those folks who come from the defense and aerospace sectors, and they are quite "high-end" engineers. But as you said before, with several million lines of code even the best are going to come across unforeseen issues.
But then, I suppose there are capable people there, they should know what they´re doing. Oh wait, we were too
Years ago, one of my mentors referred to that as "a memorable debugging session." There are bugs, and then there are BUGS. The BUGS are the ones that you remember for the rest of your life.
originally posted by: grey580
F-35 software overrun with bugs, DoD testing chief warns
originally posted by: verschickter
a reply to: mbkennel
It´s somehow understandable that laymen people think it´s not a problem to write clean code without bugs but the witch hunt they make about is funny.
Source: writer of buggy software, sometimes, like everyone else ;-)
Mistakes happen if not you are not human