
Duncan HallInstitute of Electrical and Electronics Engineers | IEEE · Computer Society
Duncan Hall
Master of Business Administration
About
142
Publications
13,127
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Introduction
Skills and Expertise
Publications
Publications (142)
The SABSA (Sherwood Applied Business Security Architecture) framework is a useful generic means of exploring users’ preferences for reducing residual risks to acceptable levels given budgetary (financial, resource, time frames etc.) constraints while traceably supporting business objectives.
This talk presents why and how SABSA can be used in the...
Some memories, reflections, stories and vignettes about the times, people and the formation of Wellington Astronomical Society, of which I was a foundation member, in 1973.
On 2023-02-06, the USA’s National Institute for Standards and Technology (NIST) requested comments on the initial public draft of Special Publication 800-223, HPC Security: Architecture, Threat Analysis, and Security Posture (NIST SP 800-223 ipd).
NIST’s Computer Security Resource Center (CSRC) notes that:
“Executive Order 13702 established the Na...
How antipodeans - from the European point of view, i.e. ANZACs - enforce the end of time allotted to a speaker at a cybersecurity conference
Answers the query: What can be deduced from open source evidence (or, open source intelligence, OSINT) about:
[1] Countries' success at managing impacts of COVID-19, and
[2] How long it will likely take for COTS Exascale computers (at reasonable cost) to become available
[1] Data downloaded from the Top500 Website, information to 2023-06
[2] Graphical analyses of [1]
[3] Underlying method and formulae made openly available
For NIST's High Performance Computing Security Working Group meeting, general introduction to SABSA, and a discussion of the potential benefits SABSA could provide to the NIST HPC Security WG’s activities.
The SABSA Institute (TSI) via the SABSA Enhanced NIST Cyber Security Framework (SENC) team recommends additions to the NIST Cyber Security Framework (CSF) v2 related to Themes #4, #5 and #6 outlined in the NIST CSF V2 Concept Paper.
In my capacity as a member of TSI's SENC, I contributed to this document.
The document is also available on NIST's...
[1] Context: The title pays homage to Bob Pease's columns in Electronic Design
[2] 'Normalisation of deviance' defined:
The process in which deviance from correct or proper behaviour or rule becomes normalised in a government or corporate culture
https://en.wikipedia.org/wiki/Normalization_of_deviance
[3] An existence proof: a black swan, illustrat...
Did humankind’s confrontation with the coronavirus disease in late 2019 impact progress on delivering Commercial Off The Shelf computers that will process 10^18 floating operations per second?
Video of presentation is at: https://www.youtube.com/watch?v=L_6SbApOst8
Historical record of Top500 and Green500 data and Excel charts derived from that data
Presented at Wellington, New Zealand
Source data and charts for 2020-02-20 presentation at Multicore World 2020
Unpredictability: The counterintuitive world of real options
A two minute unconference lightning talk: most slides were lightly skipped over
Frameworks I found useful for career planning
Helpful heuristics
What didn’t go according to plan
Lessons I learned along the way
Summary, Q&A
A presentation that traverses the Ptolomaic and Copernican explanations of solar motion to inform an understanding of how digital sundials have been designed
Briefing paper to Wellington College Board of Trustees describing the joint Wellington Astronomical Society - Gifford Observatory Trust plans to enhance the Gifford Observatory using funds from the Syd Cretney bequest
Summary presentation following attendance at 2016-05-19 Ethereum conference
• Billions of dollars • Thousands of participants • Decades of refinement • At last, a direct detection …
A presentation that covers the fundamentals of synthesising images from astronomical radio signals, how arrays of antennas are used to capture radio signals, and some of the less well known engineering considerations and constraints to radio astronomy imaging.
Phishing exploits: Phishing is а common "social engineering" technique used bу fraudsters..
The purpose of the Guide to the Software Engineering Body of Knowledge is to provide a consensually validated characterization of the bounds of the software engineering discipline and to provide a topical access to the Body of Knowledge supporting that discipline.
The Body of Knowledge is subdivided into fifteen software engineering Knowledge Areas...
Elicitation and analyses of selected non-functional requirements for the proposed Square Kilometre Array (SKA) radio telescope system. The SKA is a global next-generation radio telescope project involving institutions from over 20 countries. The SKA will be the largest and most capable radio telescope ever constructed. Its name derives from an ulti...
A presentation in which I talk about: - Engineering degree student work at the University of Canterbury and Mt John University Observatory; - Subsequent contributions to amateur optical astronomy; and - The ’dark matters’ I encountered in Manchester. Mostly ’sociological’, but includes discussion of some software cost estimation models, some engine...
Presentation to year 12 and 13 students at Niue High School
Recent work undertaken by the joint ASTRON-IBM DOME project confirms earlier work pointing towards exascale compute requirements for SKA Phase 1 image synthesis data processing. Required ingest data rates are estimated to be multiple terabits per second. What drives these extraordinarily challenging requirements? What would be required to sustainab...
Spreadsheets of Green 500 data downloaded from http://www.green500.org/greenlists and charts generated from cleansed data
Spoken eulogy on behalf of the New Zealand astronomical community at Graham Blow’s funeral service
Presentation to Wellington Astronomical Society addressing the options relating to acceptance of the Cretney bequest
Presentation at request of IPENZ to software engineering and computer science final year students at Victoria University of Wellington
Advice about friction, knots and climbing ropes; and the numbers 1, i, e and pi
This document provides a high level overview of the GEA-NZ v2.0 content, describing its structure and internal and external linkages.
It describes the motivations for constructing and using the GEA-NZ v2.0, such as the directives of the Government of New Zealand, good practices performed in other government administrations and good practices perfor...
Spreadsheet generating nomographs for % smearing (with intermediate isopleths of baseline, B, divided by receptor diameter, D) as a function of: - Chart 3: correlator dumps per second - Chart 4: fractional bandwidth
Presentation to the 2012 RASNZ (Royal Astronomical Society of New Zealand) Conference
Presentation to the UK Industry Cluster SKA Pre-Construction Phase Overview Conference
Spreadsheet showing links between risks identified in Software and Computing CoDR and generic risks for HPC identified in CMU-SEI Technical Note 2006 TN 039
The main aims of SKA CoDRs are to:
• Critically review candidate solutions, technology trends and alternative options
• Review the status of work done and underway by Precursors, Pathfinders and Design Studies
• Conduct preliminary investigations into requirements, interfaces, costs and risks
This document describes the plan for the Software and Computing Concept Design Review (CoDR) for the Square Kilometre Array (SKA) project.
This document describes matters related to the review itself, logistics of the review, and it includes a preliminary agenda for the review.
Presentation to the SKA Software and Computing Concept Design Review
This document supports risk management – identifying and proposing mitigation plans – for the Software and Computing CoDR, and in turn it informs the SKA System Level Risk Register.
Given the likely scope and scale of software development required for the SKA, development of software and computing architectures during the SKA’s Definition Phase should demonstrate that plans are in place to work towards levels of process maturity above CMMI Level 1.
Spreadsheet that reconstructs and adds to the tables and charts in EVLA Memo 77
- Progress since 2010 October - CoDR approach and expectations
This document summarises industry roadmaps for HPC and Exascale (considered as synonymous for this document) software and computing.
Presentation to the Third Generation Calibration Workshop II
This document addresses policies for software development work to be followed during Work Package 9 (software and computing) of the Pre-Construction Phase for the SKA.
It uses the well accepted Capability Maturity Model Integration (CMMI) framework to discuss software development process maturity and various development processes required in develo...
This document presents a two dimensional framework to describe the following aspects:
- ‘Things not to do’, also known as antipatterns – versus – ‘Things to do’, that is generally accepted good practices to be adopted in WP9
- Practices that are scale invariant – versus – practices that apply generally only to larger scale development such as that...
This is proposed as an interactive dialogue. - I’ll describe the imaging requirements for SKA Phase 1 - I’ll present a suggested framework to address the research and development activities required to work towards delivering the SKA Phase 1 requirements - I’ll seek a group consensus as to the priorities of these research and development activities
Presentation delivered to breakout session at SKA 2011 conference
Feedback from breakout session at SKA 2011 conference
- Progress since 2010 June - CoDR approach and expectations - Strategy, addressing risks - Next steps
Presentation to SKA System Delta Concept Design Review (CoDR)
This document’s purpose is to manifest contributions to the high level design of the software and computing domain supporting the PrepSKA Work Package 2.6 project:
- Input information
- Assumptions, also known as working hypotheses
- Constraints
- Decision rationale that would otherwise be tacit
This document defines the practices to be followed during Work Package 2.6 of the Preparatory Phase of the Square Kilometre Array project (PrepSKA WP2.6) to create architectures for – and estimate the costs of – the software and computing aspects of the SKA.
A summary of lessons learned from experience gained in creating and modifying spreadsheet models - manual and electronic - since 1983.
Presentation to JPL giving an overview of challenges in the SKA software and computing domain
Spreadsheet calculating annualised breakdown of costs for a notional large data centre
Presentation with key message that Exaflop/s at 'reasonable' power consumption (~10MW) will require computational efficiencies of order Teraflops per Watt; 1,000 time more efficient than 2010 reported best performances
Presentation delivered jointly with Marcel Loose and Ronald Nijboer (with input from Tim Cornwell and Athol Kemball) to the WP2 Meeting
Presentation jointly delivered with Chris Broekema to the WP2 Meeting
Diagram showing parameters and relationships of cost drivers for an HPC required to process SKA Phase 1 uv data
These requirements have been triaged into a MusCoW (Must have – Could have – Won’t have) framework. “Won’t have” has not been analysed for this draft.
’Appetizer’ presentation to CALIM 2010: - Motivation - Phase 1 in a nutshell - Benchmark from 2001 [EVLA Memo 24] - Some questions
Report for SKA International Engineering Advisory Committee (IEAC) meeting
5: WBS definition 6: Coordination of work activities 7: Key parameters driving image processing 8: Estimating the scale of required hardware 9: Estimating the power required 10: Estimating the scale of software development
1: Example results from technology watch 2: Software activities and tools 3: Evaluate re-use of existing applications 4: Collaborate with industry 5: WBS definition 6: Coordination of work activities 7: Key parameters driving image processing 8: Estimating the scale of required hardware 9: Estimating the power required 10: Estimating the scale of s...
Report for SKA International Engineering Advisory Committee (IEAC) meeting
Spreadsheet of parameters, their sources, and relationships for a high level costing for HPC hardware
Presentation on progress to SKA Program Development Office
1 Unique Components of Software Estimation
2 Cost Estimation: Size and Effort
3 An Expert Opinion
4 What Are The Typical Elements of Cost in Developing Software?
5 General Approaches to Estimating Size and Effort
5.1 Problem Space Decomposition
5.2 Empirical Models
5.3 Experience-Based ‘Expert Judgement’
Aim of Software and Computing (S&C) Domain Group: • Collaborate in working towards WP2.6 deliverables • Costed high level architecture designs for software and computing • CoDR expected end 2011 • Share ideas, provide alternative perspectives, peer review
Spreadsheet converting Capers Jones estimating models into charts for presentation.
Spreadsheet containing source parametric equations and data. Produces charts for presentations.
Presentation for SKA System Concept Design Review
This document defines the practices to be followed during Work Package 2 of the Preparatory Phase of the Square Kilometre Array project (PrepSKA WP2) to estimate the costs of the SKA.
Quoted in Robert Este’s ”Raising the Alarm: Innovation and Philosophical Denial” ISBN 9462092826
• Progress in Software and Computing • Cost estimation to date • Decisions required to move forward • Possible implementations • Key work streams required • Summary
Presentation to the HPC in Observational Astronomy Conference
Presentation to the Marie Curie Conference and Training (MCCT) SKADS Workshop: “Towards 3rd generation calibration in radio astronomy”
Presentation to European Research Forum on Research Infrastructures (ESFRI) forum at EGEE (Enabling Grids for E-sciencE) Conference
Compliance to a professional society's code of ethics carries obligations beyond minimum standards of behavior.
Members of software engineering professional societies should also serve the public interest and promote the common good.
[Final prepublication draft]
Presentation to the 2009 eXtremely Large Data Base (XLDB) conference
Contributions towards scoping estimates for the scale and estimated costs of the proposed Square Kilometre Array
Presentation to CERN’s IT Department
A recap: 2008 November 11 Estimating the cost of software Can large software really be that hard? Why is large software so hard? We can’t “wish” the hardness away But wait – there’s more So what should we do? The role of architecture Summary
Impressions through an engineer’s eyes following a petite tour de Europe taking in (amongst various other attractions) the Pont du Gard and Cologne Cathedral
A presentation shared with the University of Otago MBA11 cohort at our 20 years on reunion
Book review published in IPENZ's e.nz magazine
Enterprise Architecture is about designing and building successful enterprises. Therefore Enterprise Architects need frameworks to organise their understanding of: • How organisations are structured • How people in organisations behave • How to work effectively in organisational environments.
Enterprise Architecture is about designing and building successful enterprises. Therefore Enterprise Architects need frameworks to organise their understanding of:
• How organisations are structured
• How people in organisations behave
• How to work effectively in organisational environments.
Invited presentation to final year software engineering students at Victoria University of Wellington
Presentation for workshop at launch of IPENZ’s Good Practice Guidelines for Software Engineering in New Zealand
Fictional case study prepared for workshop
Published by the Institution of Professional Engineers New Zealand (IPENZ) and available for free download in its Learned & Technical Papers - Guidelines and Advice section, this document identifies some sources of software engineering specific process standards to which practising professional engineers in New Zealand might want to refer, and it i...