D.Re.S. – Environment data reading evaluation
(i) Readings made using a hardware tool
a. evaluation of the hardware reading tool
1. the data reading tool has an officially approved technical quality certification
YesNo
2. the data reading tool is a tool that has already been tested and marketed by the manufacturer
YesNo
3. the data reading tool has already been used in other projects or research activities with publicly available project documentation
YesNo
4. the components of the data reading tool have officially approved quality documentation and technical certification
Yes, allYes, partlyNo
5. the data reading tool deals exclusively with reading the requested data, without providing reading of other parameters
YesNo
6. the data reading tool deals with the reading of several parameters, but it is used exclusively for reading the requested data
YesNo
The data reading tool deals exclusively with reading the requested data
7. the data reading tool has been calibrated by an expert
YesNo
Calibration is not required for this tool
b. evaluation of data collection and data processing inside the reading tool
1. the data reading technology used by the chosen tool is
The best currently available on the marketo
Of excellent quality, but there are more sophisticated technologies
In common use, better technologies are readily available
One of the least reliable
2. the reading tool carries out a multiple sampling before formalizing the reading of the data
Yes, with sampling greater than 3 values
Yes, with sampling between 2 and 3 values
No
3. the reading tool is able to discard clearly incorrect values
YesNo
Any value is potentially permissible
4. in case of wrong values, the reading tool is able to autonomously carry out a new reading
YesNo
5. the data reading frequency complies with the technical capacity of the tool used
YesPartlyNo
6. the data reading frequency complies with the technical capacity of the entire hardware / software system created
YesNo
7. the reading tool also coincides with the main archiving system
YesNo
8. the reading tool stores the data in its own memory system before communicating it to the main filing system
Yes
Yes, only for the time necessary to sample the values
No
9. if there are any errors, the reader can notify the system administrator
YesNo
10. the reading tool is responsible for carrying out operations on the collected data before communicating them to the main filing system
YesNo
c. evaluation of the compatibility of the chosen tool with the application environment
1. the reading tool
has been specifically designed for the application environment in which it is used
is suitable for operating in more complex environments than the application one
is basically able to operate without problems in the required application environment, even though it has been designed to operate in less complex environments
has been adapted to operate in the required application environment
2. the reading tool is capable of long-term operation in the application environment of use
YesNo
3. the reading tool is able to return to operation in the event of a sudden stop
YesPartlyNo
4. the reading tool is able to become accessible again in the event of a sudden stop
YesPartlyNo
d. evaluation of the accessibility of the reading tool
1. the frequency of maintenance activities required by the reading tool is consistent with the accessibility of the same by the persons in charge
YesNo
2. maintenance of the reading tool
can be carried out at any time, both remotely and via an on-site operatorcan be done at any time, only remotelycan be done at any time, only on sitecan only be done seasonally on site
3. the reading tool is monitorable
Yes, remotelyYes, only on siteNo
4. the reading tool can be monitored by an automation system
YesNo
5. the reading tool is programmable
Yes, remotelyYes, only on siteNo
6. the reading tool is programmable by an automation system
YesNo
7. The reading tool firmware and software are upgradeable
Yes, remotelyYes, only on siteNo
8. the reading tool has a readable error log
Yes, remotelyYes, only on siteNo
9. the reader has a readable warning log
Yes, remotelyYes, only on siteNo
10. the reader has a readable action log
Yes, remotelyYes, only on siteNo
(ii) readings made exclusively by software
a. evaluation of the data source
1. the data source is an officially certified entity
Yes and recognized in the countries of marketing or interest of the software in question
Yes but not recognized in the countries of marketing or interest of the software in question
No
2. the data source has a certification of reliability or self-certification of reliability that can be freely consulted on the data provided
Yes, with an excellent score
Yes, with an average score
Yes, with poor score
No
3. the data source is officially recognized or publicly used within other projects or products
YesNo
4. the data provided by the source are stored in a database
which adopts the most reliable safety standards
which adopts common safety standards
which does not adopt any valid safety standard
5. the message that crosses the communication channel between the data stored on the storage medium of the data source and the reading routine of the software being analyzed
is encrypted by adopting the most reliable security standards
is encrypted using common security standards
is transmitted in clear text
b. evaluation of the data reading routine
1. the data reading routine
has been specially designed for this purpose
has been adapted to carry out these readings
2. the data reading routine
only reads the requested data
it also reads other superfluous data
3. the data is retrieved
via API call or other similar method
by reading documents or web pages
through direct access to the database
4. the data collected is protected by encryption
YesNo
5. the retrieved data are subjected to manipulation before they are communicated to the main filing system
YesPartlyNo
6. the data reading routine is able to discard clearly incorrect values
YesNo
Any value is potentially permissible
7. the data reading routine carries out a sampling of the collected values
Yes, with sampling greater than 3 values
Yes, with sampling between 2 and 3 values
No
Sampling is not required for the requested data type
8. the data reading routine
immediately communicates the collected value
it keeps in memory the collected value only for the sampling time
it keeps in memory the collected value and communicates it together with other readings of the same data according to predetermined time intervals
9. the data reading routine is able, in the event of a sudden system shutdown
to autonomously resume the continuation without losing the values stored within the runtime level variables
to autonomously resume the continuation by resetting all the runtime level variables
to resume the continuation with manual start without losing the values stored in the runtime level variables
to resume the continuation with manual start, resetting all the runtime level variables
is not able to resume the continuation without any kind of external intervention
10. the data reading routine is monitorable
Yes, remotelyYes, only on siteNo
11. the data reading routine is monitorable by an automation system
YesNo
12. the data reading routine is programmable
Yes, remotelyYes, only on siteNo
13. the data reading routine is programmable by an automation system
YesNo
14. The firmware and software of the data reading routine are upgradeable
Yes, remotelyYes, only on siteNo
15. the data reading routine has a readable error log
Yes, remotelyYes, only on siteNo
16. the data reading routine has a readable warning log
Yes, remotelyYes, only on siteNo
17. the data reading routine has a readable action log
Yes, remotelyYes, only on siteNo
c. evaluation of the compatibility of the reading routine with the type of data to be recovered
1. the reading routine
is the most suitable software tool for collecting the requested data
is an excellent software tool for collecting the required data even if there are better or more dedicated applications
is poorly suited to the required activity
2. the data reading routine with respect to different international standards of measurement and representation such as units of measurement, date format, decimal / thousands separator, etc.
it does not show any criticality, the conversion into the format adopted within the software is carried out in the routine itself
it does not show any criticality, the data is communicated in a raw way and the conversion into the format adopted within the software is carried out during the storage phase
it is only suitable for working with data belonging to a specific standard, without recognition and evaluation of the representation formats
(iii) readings carried out by a human operator
a. evaluation of the operator in the context of interest
1. the operator in charge of reading the data
is an expert about this data
has a good education about the information to read
has no particular basic knowledge about the data to be read
2. the operator in charge of reading the data
knows how to recognize clearly wrong values
is unable to recognize clearly incorrect values
3. the operator in charge of reading the data carries out only the readings of interest
YesNo
b. evaluation of the operator's compatibility with the data reading environment
1. the operator in charge of reading the data, to complete his activity is in possession
of the best tools available for the sector concerned
of excellent technical instrumentation specially designed
of common tools of medium quality
of no technical instrumentation specially designed
no instrumentation is needed for the affected readings
2. the operator in charge of reading the data is able to use the tools made available to carry out his reading activity
Yes, completelyYes
PartlyNo
D.Re.S. – Data collecting evaluation
(i) evaluation of the data collection and sending tool
a. tool evaluation
1. the data collection tool is able to identify values entered in a clearly incorrect way
YesNo
Any value is potentially permissible
2. The data collection tool is an independent tool compared to the data reading tool
YesNo
3. The data collection tool is able to keep the data in memory and send it again in case of temporary network absence
YesNo
4. the data collection tool is able to identify if the message has been successfully delivered to the data receiving medium and, in case of failure, to repeat the sending
YesNo
5. the data collection tool is capable of alerting the system administrator in the event of a malfunction
YesNo
6. the data collection tool performs an encryption of the data before passing it to the communication channel
Yes, adopting the most reliable safety standards
Yes, it is encrypted using common security standards
No, it is transmitted in clear text
b. accessibility of the tool
1. the data collection tool is monitorable
Yes, remotelyYes, only on siteNo
2. the data collection tool is monitorable by an automation system
YesNo
3. the data collection tool is programmable
Yes, remotelyYes, only on siteNo
4. the data collection tool is programmable by an automation system
YesNo
5. the data collection tool has a readable error log
Yes, remotelyYes, only on siteNo
6. the data collection tool has a readable warning log
Yes, remotelyYes, only on siteNo
7. the data collection tool has a readable action log
Yes, remotelyYes, only on siteNo
8. the data collection tool is able to return to operation in the event of a sudden stop
YesPartlyNo
9. the data collection tool is able to become accessible again in the event of a sudden stop
YesPartlyNo
(ii) evaluation of the sending data channel
a. channel evaluation
1. Communication within the channel is carried out
On standard protocol (e.g. TCP)
On proprietary protocol created ad hoc
2. The communication channel
is collision-safe
is not collision-safe but all collisions are detected and corrected
is not collision-safe but collisions are mostly detected and corrected
is not collision-safe, collisions can be detected but not corrected
is not collision-safe and collisions cannot be detected
3. The communication channel protects the data by encryption
Yes, adopting the most reliable safety standards
Yes, it is encrypted using common security standards
No, it is transmitted in clear text
4. The communication of the data is correlated by hash or other integrity verification systems such as CRC, checksum, etc ...
YesNo
5. The communication channel is
PublicPrivate
(iii) evaluation of the data reception tool
a. tool evaluation
1. the data receiving tool is able to identify values received but clearly incorrect and non-compliant with respect to the properties of the value to be read
Yes
No
2. the data receiving tool is a tool independent of the data reading and collection tool
Yes
No
3. the data receiving tool is a tool independent of the data storage system
Yes
No
4. the data receiving tool is able to keep the data in memory in case of lack of communication with the filing system
Yes
No
5. the data receiving tool is able to identify if the message has been correctly received without alterations or collisions during communication
Yes
No
6. the data receiving tool can notify the system administrator in the event of a malfunction
Yes
No
b. accessibility of the tool
1. the data receiving tool is monitorable
Yes, remotelyYes, only on siteNo
2. the data receiving tool is monitorable by an automation system
YesNo
3. the data receiving tool is programmable
Yes, remotelyYes, only on siteNo
4. the data receiving tool is programmable by an automation system
YesNo
5. the data receiving tool has a readable error log
Yes, remotelyYes, only on siteNo
6. the data receiving tool has a readable warning log
Yes, remotelyYes, only on siteNo
7. the data receiving tool has a readable action log
Yes, remotelyYes, only on siteNo
8. the data receiving tool is able to return to operation in the event of a sudden stop
YesPartlyNo
9. the data receiving tool is able to become accessible again in the event of a sudden stop
YesPartlyNo
D.Re.S. – Data store tools and methods evaluation
(i) evaluation of storage hardware tool
a. support features evaluation
1. The storage media
was specifically designed for the purpose
is suitable for operating in more complex contexts than the application one
is basically able to satisfy project requests without problems, even though it has been designed to operate in less complex contexts
has been adapted to operate in the required application environment, but still represents a poor quality solution
2. The storage media uses
the best hardware on the market
A great set of hardware components
A mid-level hardware
A low-level hardware
3. The storage media is able to contain data
much more than the required
more than the required
equal to the required
less than the required
4. The storage media, due to the physical properties of the components with which it was made, has in excellent conditions a durability
Much longer than the project demands
Longer than the project demands
Equal to the project requests
Shorter than the project demands
5. The storage media can handle for extended periods
an intense interrogation phase
a moderate interrogation phase
a short interrogation phase
6. The storage media can handle for short periods
an intense interrogation phase
a moderate interrogation phase
a short interrogation phase
7. The storage media has an officially approved technical quality certification
YesNo
8. The storage media is a tool already tested and marketed by the manufacturer
YesNo
9. The storage media has already been used in other projects or research activities with publicly available project documentation
YesNo
10. The storage media components have officially recognized documentation and technical quality certification
Yes, allPartlyNo
11. The storage media is solely concerned with storing the required data, without providing storage media for other values or projects
YesNo
b. evaluation of the installation environment
1. The storage media is placed in a place with environmental characteristics of temperature, humidity, stress, etc.
fully suited to the properties of the hardware used
largely suitable with the properties of the hardware used
partially suitable with the properties of the hardware used
not suitable with the properties of the hardware used
2. The storage media is able to operate in more complicated environmental conditions than suitable ones
YesPartlyNo
3. The data storage media is placed in an easily accessible position by the data receiving tool (pre-storage phase)
YesNo
4. The storage media is placed in an easily accessible position by the data reading tool (post-storage phase)
YesNo
5. The storage media is placed in an easily accessible location by new digital communication channels
YesNo
6. the storage media placement environment facilitates access by software or authorized third parties
YesNo
7. the storage media placement environment is different or physically distant from the data reading environment
YesNo
8. the storage media placement environment is different or physically distant from the data collection environment
YesNo
c. evaluation of the accessibility of the media
1. the frequency of maintenance activities required by the media storage is consistent with the accessibility of the same by the persons in charge
YesNo
2. Storage media maintenance
can be carried out at any time, both remotely and via an on-site operator
can be done at any time, only remotely
can be done at any time, only on site
can only be done seasonally on site
3. The storage media is monitorable
Yes, remotelyYes, only on siteNo
4. The storage media is monitorable by an automation system
YesNo
5. storage media firmware and software are upgradeable
Yes, remotelyYes, only on siteNo
6. The storage media has a readable error log
Yes, remotelyYes, only on siteNo
7. The storage media has a readable warning log
Yes, remotelyYes, only on siteNo
8. The storage media has a readable action log
Yes, remotelyYes, only on siteNo
d. media security evaluation
1. The storage media is physically
Guarded and exclusively accessible to authorized staff
Unattended and exclusively accessible to authorized staff
Guarded but publicly accessible
Unattended and publicly accessible
2. The storage media is digitally
Guarded by the best protection algorithms currently present
Guarded exclusively by passwords or medium protection algorithms
Guarded by simple protection algorithms
Unguarded
3. The storage media is physically guarded by keys, access tokens or other devices
Periodically changed
Unchanged over timeNo
4. The storage media is digitally guarded by keys, access tokens, or other methods
Periodically changed
Unchanged over timeNo
5. The storage media is
Hidden
Placed together with numerous similar devices, therefore difficult to recognize "on sight"
Easily identifiable
6. The storage media is adequately protected against fire
YesNo
7. The storage media is adequately protected against flooding
YesNo
8. The storage media is adequately protected against theft
YesNo
9. The storage media can be remotely geolocated
YesNo
(ii) evaluation of the storing model
a. evaluation of the characteristics of the storing model
1. Archiving is done
On digital media
On paper or other physical tool
2. The storage model chosen
allows the fastest consultation of the stored data
allows a good speed of consultation of the stored data
is inefficient for consulting stored data
3. The storage model chosen
allows saving a large amount of data without penalizing its performance
allows the saving of a large amount of data at the expense of performance in the reading phase
4. The data storage model chosen uses indexing systems to improve performance
YesNo
5. The data storage model was developed specifically for the project
YesNo
6. The data storage model exploits technologies or methodologies already in use and widely spread on the market
YesNo
7. The data storage model is
The best solution currently available or achievable
A valid alternative among those available
A low quality solution
8. The data storage model you choose is capable of restoring erroneously changed records
Yes, even a long time after the modificationa
Yes, for a few hours after the change
Yes, but only immediately after the change
No
9. The data storage model you choose is capable of restoring erroneously deleted records
Yes, even a long time after elimination
Yes, for a few hours after elimination
Yes, but only immediately after elimination
No
10. The data storage model includes a readable error log
Yes, remotely
Yes, only on site
No
11. The data storage model includes a warning log that can be consulted
Yes, remotely
Yes, only on site
No
12. The data storage model includes an action log that can be consulted
Yes, remotely
Yes, only on site
No
b. security evaluation of the storage model
1. the data storage model you choose protects your data
using the most advanced safety standards
through high-level security standards
through medium-level security standards
through low-level security standards or with no additional security of any kind
2. the data storage model includes the periodic generation of backup copies
YesNo
3. the data storage model uses RAID technologies or other redundancy methods to increase its robustness to failures or data loss
YesNo
4. the data storage model performs uniqueness checks on the identifiers of the data entered
YesNo
5. the data storage model carries out integrity checks on the foreign keys for the data entered
YesNo
6. the data storage model is able to notify the system administrator in case of non-compliance of the data entered
YesNo
D.Re.S. – Database Reading evaluation
(i) Evaluation of the reading carried out by software
a. evaluation of the data reading routine
1. the data reading routine
has been specially designed for this purpose
has been adapted to carry out these readings
2. the data reading routine
only reads the requested data
it also reads other superfluous data such as system statistics or other environment values
3. the data are retrievedi
via API call or other similar tool
by reading documents or web pages
through direct access to the database
4. the retrieved data are protected by encryption
YesNo
5. the retrieved data are subjected to manipulation before they are communicated to the representation system
YesPartly
No
6. the data reading routine is able to discard clearly incorrect values
YesNo
Any value is potentially permissible
7. the data reading routine
immediately communicates the value read
keeps in memory the collected value only for the sampling time
keeps in memory the collected value and communicates it together with other readings of the same data according to predetermined time intervals
8. the data reading routine is able, in the event of a sudden system shutdown
to autonomously resume the continuation without losing the values stored within the runtime level variables
to autonomously resume the continuation by resetting all the runtime level variables
to resume the continuation with manual start without losing the values stored in the runtime level variables
to resume the continuation with manual start, resetting all the runtime level variables
it is not able to resume the continuation without any kind of external intervention
9. the data reading routine is monitorable
Yes, remotelyYes, only on site
No
10. the data reading routine is monitorable by an automation system
YesNo
11. the data reading routine is programmable
Yes, remotelyYes, only on site
No
12. the data reading routine is programmable by an automation system
YesNo
13. the data reading routine is updatable
Yes, remotelyYes, only on site
No
14. the data reading routine provides a readable error log
Yes, remotelyYes, only on site
No
15. the data reading routine provides a readable warning log
Yes, remotelyYes, only on site
No
16. the data reading routine provides a readable action log
Yes, remotelyYes, only on site
No
b. evaluation of the compatibility of the reading routine with the type of use
1. the data reading routine
is the most suitable software tool for reading the requested data
is an excellent software tool for reading the required data even if there are better or more dedicated applications
is poorly suited to the required activity
2. the data reading routine with respect to different international standards of measurement and representation such as units of measurement, date format, decimal / thousands separator, etc.
does not show any criticality, the conversion into the format adopted within the software is carried out in the routine itself
does not show any criticality, the data is communicated in a raw way and the conversion into the format adopted within the software is carried out during the representation phase
is only suitable for working with data belonging to a specific standard, without recognition and evaluation of the representation formats
no fixed pattern was followed during the entire project, there may be different standards that differ from each other
(ii) Evaluation of the reading carried out by a human operator
a. evaluation of the operator in the context of interest
1. the operator in charge of reading the data
is an expert
has a good grounding in the information to interpret
has no particular basic knowledge about the values treated
2. the operator in charge of reading the data
knows how to recognize clearly wrong values
is unable to recognize clearly incorrect values
3. the operator in charge of reading the data carries out only the readings of interest
Yes
No
b. evaluation of the operator's compatibility with the data reading environment
1. the operator in charge of reading the data, to carry out his activity is in possession
of the best tools available for the sector concerned
excellent technical equipment specially designed
of common tools of medium quality
of any technical tools specially designed
no tools is needed for the affected readings
2. the operator in charge of reading the data is able to use the tools made available to carry out his reading activity
Yes, completely
Yes, partly
No
(iii) Evaluation of the communication channel for sending data
a. evaluation of the communication channel for sending data
1. Communication within the channel is developed
On proprietary protocol created ad hoc
On standard protocol (e.g. TCP)
2. The communication channel
is collision-safe
is not collision-safe but all collisions are detected and corrected
is not collision-safe but collisions are mostly detected and corrected
is not collision-safe, collisions can be detected but not corrected
is not collision-safe and collisions cannot be detected
3. The communication channel protects the data through encryption
Yes, adopting the most reliable safety standards
Yes, it is encrypted using common security standards
No, it is transmitted in clear text
4. The communication of the data is correlated by hash or other integrity verification systems such as CRC, checksum, etc ...
YesNo
5. The communication channel is
PrivatePublic
D.Re.S. – Data Presentation Evaluation
(i) Evaluation of the exposure of the data to the end user
a. evaluation of data processing
1. The data to be represented undergoes transformations due to different measurement standards depending on the geographical region of the end user
YesNo
2. The data to be represented undergoes transformations due to different symbols and punctuation characteristic of the geographical region to which the end user belongs
YesNo
3. The data to be represented undergoes format transformations characteristic of the geographical region to which the end user belongs
YesNo
4. The data to be represented does not undergo any type of transformation regarding units of measurement, representation standards or exposure formats due to the geographical region to which the end user belongs, but the representative standards adopted are well exposed and clear, also through the use of examples
YesNo
The data is correctly adjusted according to the points mentioned above
5. The data to be represented requires the application of purely mathematical finishing formulas applied in the pre-representation phase
YesNo
6. The data to be represented requires the application of finishing formulas influenced by parallel readings of other values applied in the pre-representation phase
YesNo
7. The data to be represented undergoes other types of manipulation before being exposed to the end user
YesNo
b. evaluation of the data exposure
1. The data representation tools and routines are able to recognize and discard clearly incorrect values
YesNo
2. The data representation tools and routines are able to inform the system administration in case of detection of incorrect values or malfunctions
YesNo
3. The data representation tools and routines can be monitored
Yes, remotelyYes, only on siteNo
4. The data representation tools and routines can be monitored by an automation system
YesNo
5. The data representation tools and routines are programmable
Yes, remotelyYes, only on siteNo
6. The data representation tools and routines are programmable by an automation system
YesNo
7. The data representation tools and routines can be updated
Yes, remotelyYes, only on siteNo
8. The data representation tools and routines provide a readable error log
Yes, remotelyYes, only on siteNo
9. The data representation tools and routines provide a readable warning log
Yes, remotelyYes, only on siteNo
10. The data representation tools and routines provide a readable action log
Yes, remotelyYes, only on siteNo
Summary BOX
Environment Reading evaluation: | 0% |
Data collection evaluation: | 0% |
Data store tools and methods evaluation: | 0% |
Database Reading evaluation: | 0% |
Data Presentation Evaluation: | 0% |
Total | 0% |