Iec 61508-7 Guide
Elena frowned. “That’s expensive.”
She meant the Safety Lifecycle phase. But I heard the unspoken accusation: You didn’t think of everything.
Not fancy. Not new. Just a table. On the left: “Technique.” On the right: “Recommended SIL.” Buried in the footnotes:
That’s when I opened the heavy, blue-covered binder: . The nerdy sibling. Part 1 is management. Part 2 is hardware. Part 3 is software. Part 7? That’s the “overview of techniques and measures.” Most engineers treat it like an encyclopedia you only touch during a TÜV audit. I treated it like a prayer book. iec 61508-7
I spent that night cross-referencing. Section B.6.9 (Software error effect analysis) with D.2.2 (Diverse programming). I realized: our single codebase was the real hazard. The counter overflow was trivial to fix. But what other latent overflows were sleeping in the memory?
I retreated to my office, a tomb of stacked binders and coffee cups. On my screen was the post-mortem: a single, latent software fault. A counter variable in the obstacle-avoidance logic would overflow after 32,767 wheel rotations. Not on day one. Not on day ten. But on day forty-seven—today. The truck thought it had traveled negative distance. It “forgot” the rock pile.
“It’s in the standard,” I said, sliding the open binder toward her. Page 147. Table C.5: “Diverse programming – Recommended for SIL 3 and SIL 4.” Elena frowned
“Eight weeks. No hardware spin. Just a second firmware image and a comparator.”
And somewhere in a German standards committee meeting, a ghost editor smiled. Because they wrote that volume for exactly this moment: when the rules run out, and only the principles remain.
Big Ned’s twin-brain system caught a second latent fault last Tuesday. This time, it was a temperature sensor drift on the LiDAR. The wheel-tick algorithm said “clear path.” The LiDAR algorithm said “soft ground.” The comparator threw a fault, the truck coasted to a stop, and a technician found a smoldering bearing. Not fancy
And there it was. Clause C.4.3: “Analysis of potentially dangerous sequences of states and events.”
61508-7 doesn’t give you answers. It gives you . It lists 91 different techniques: from “assertion programming” to “watchdog timers” to “codified hazard checklists.” Each one rated for SIL 1 through SIL 4. But the real magic is in the combination .
The next morning, I didn’t propose a new hardware architecture. I proposed a : two independent software teams, two different compilers, two different algorithms for obstacle detection—running in lockstep. One calculates distance by wheel ticks. The other by LiDAR odometry. If they disagree by more than 2%, the truck stops immediately —not because of a sensor, but because of a logical contradiction.