Fact-checked by Grok 2 weeks ago
References
-
[1]
Defensive Design for the Web: How to improve error messages, help ...30-day returnsMar 2, 2004 · Defensive design is like defensive driving brought to the Web. The same way drivers must always be on the lookout for slick roads, reckless ...
-
[2]
Getting Started With Defensive Web Design - Smashing MagazineMay 27, 2011 · Defensive design anticipates both user and website error. Then, it tries to prevent those errors and provide help to get the user back on track.Missing: principles | Show results with:principles
-
[3]
Animation that fails safely: Defensive design for motion-sensitive users### Summary of Defensive Design for Motion-Sensitive Animations
-
[4]
Defensive ProgrammingJul 22, 2016 · Defensive programming is an approach to coding based on minimizing assumptions made by the programmer. Assumes that things will go wrong.
-
[5]
What is Defensive Design? - Simplicable GuideAug 16, 2016 · Defensive design is the practice of mistake proofing a design. It is based on the assumption that if there is a "wrong way" to use something ...Missing: engineering | Show results with:engineering
-
[6]
[PDF] Notes 1/25 - EECS InstructionalDefensive programming means that each module takes responsibility for checking the validity of all inputs sent to it.
-
[7]
Mistakeproofing – P2SL Project Production Systems LaboratoryPeople make mistakes – to err is human – but we can reduce the likelihood that a mistake will occur or alleviate the impact of a mistake that has occurred.
- [8]
-
[9]
The Principle of Fail-Safe - AIChE ChEnectedIn fail-safe design, consider the worst-case scenario if a key part suddenly stopped functioning. If this outcome is intolerable, then safeguards must be ...
-
[10]
[PDF] Defensive Programming - Penn State○ Allow only a well‐defined set of safe values. ○ Better than blacklisting “bad” characters. • May forget to filter out some characters. 48. Page 49 ...
-
[11]
[PDF] Fail-Safe and Safe-Life Designs And Factor of Safety Factors of ...Benefits of fail-safe designs include being able to manage the unexpected and mitigating damage if failure occurs. There is no method to help determine which if ...
-
[12]
NoneBelow is a merged and comprehensive summary of security design principles from NIST SP 800-160v1r1 related to anticipating misuse, validation, fail-safe, graceful degradation, modularity, redundancy, authentication, and access controls. The information is synthesized from all provided segments, retaining all details, page references, and URLs. To maximize density and clarity, the core principles are presented in a table format (CSV-style), followed by additional context and URLs. Page numbers are included where specified, and principles are cross-referenced across sections of the document (e.g., Appendix E, main text, etc.).
-
[13]
Input Validation - OWASP Cheat Sheet SeriesThis article is focused on providing clear, simple, actionable guidance for providing Input Validation security functionality in your applications.
-
[14]
The Protection of Information in Computer Systems### Key Design Principles for Protection Mechanisms
-
[15]
[PDF] Reliability inthe Apollo Program - NASAstrict and thorough implementation of cor¬ rective actions. Other Marshall engineers shared von Braun's view that reliability assurance was the inherent ...
-
[16]
Error Detecting and Error Correcting Codes - Hamming - 1950Error Detecting and Error Correcting Codes - Hamming - 1950 - Bell System Technical Journal - Wiley Online Library.
-
[17]
[PDF] Reliability and Failure in NASA MissionsJul 16, 2015 · The Apollo 1 fire was mistakenly unanticipated. After that tragedy, the Apollo program gave much more attention to safety.Missing: fault- | Show results with:fault-
-
[18]
The Art of Computer Programming (TAOCP)These books were named among the best twelve physical-science monographs of the century by American Scientist, along with: Dirac on quantum mechanics, Einstein ...Missing: robust | Show results with:robust
-
[19]
[PDF] A History of the Survivability Design of Military Aircraft - DTICGuns and missiles we»* added for self-defense, fuel systems were protected from fire and explosions, better tactics were developed, electronic countermeasures.
-
[20]
[PDF] C++ exceptions and alternatives - Bjarne Stroustrup - Open StandardsNov 18, 2019 · The origins of exception handling lie in the problems experienced managing a variety of error-handling approaches, such as C's errno, error- ...
-
[21]
Car safety: History and Requirements of ISO 26262 - Automotive IQJun 29, 2015 · ISO 26262 was first published in 2011 to address this increase, to provide a framework that enables the identification of potential risks of ...
-
[22]
The Automotive Standard ISO 26262, the Innovative Driver for ...The inaugurated international Standard ISO-26262 as an adaptation of the generic Standard IEC 61508: “Functional safety of electrical/electronic/programmable ...
-
[23]
Anti-homeless spikes are part of a wider phenomenon of 'hostile ...Jun 13, 2014 · The benches are part of a recent generation of urban architecture designed to influence public behaviour, known as hostile architecture.Missing: features 2010s
-
[24]
Defensive architecture: designing the homeless out of citiesDec 30, 2015 · Defensive architecture can involve gating off the doorways and left-over urban spaces, which provide some refuge for those who have to sleep rough in cities.
-
[25]
Code Complete, 2nd Edition [Book] - O'ReillyDesign for minimum complexity and maximum creativity. Reap the benefits of collaborative development. Apply defensive programming techniques to reduce and flush ...
-
[26]
Lesson: Exceptions (The Java™ Tutorials > Essential Java Classes)This section covers how to catch and handle exceptions. The discussion includes the try, catch, and finally blocks, as well as chained exceptions and logging.Catching and Handling · The try Block · What Is an Exception? · The catch Blocks
-
[27]
Different Types of Fuses & Circuit Protection Devices | Arrow.comJan 5, 2020 · We'll discuss some of the most common types of circuit protection you see in modern circuits, such as diodes, thyristors, fuses, and inductors.
-
[28]
How to Choose the Right Protection for Your Circuit - Analog DevicesMany traditional and historically proven protection methodologies—such as diodes, fuses, and TVS devices—retain their go-to status, but these are often ...
-
[29]
A Designers Guide to Watchdog Timers | DigiKeyMay 2, 2012 · The watchdog timer is the last line of defense against crashed code, and as such, must be well designed and implemented.
- [30]
-
[31]
To ECC or Not To ECC - Coding HorrorNov 19, 2015 · ECC memory is used in most computers where data corruption cannot be tolerated under any circumstances, such as for scientific or financial ...
-
[32]
Reliability analysis of the triple modular redundancy system under ...Sep 7, 2023 · Triple modular redundancy (TMR) is a robust technique utilized in safety-critical applications to enhance fault-tolerance and reliability.
-
[33]
Triple-triple redundant 777 primary flight computer - IEEE XploreThe triple modular redundancy (TMR) concept also applies to the PFC architectural design. Further, the N-version dissimilarity issue is integrated to the ...
-
[34]
What is EMI Shielding and Why is it Important for Your Design?Environmental factors like temperature extremes, humidity, salt spray, and vibration can significantly impact EMI shielding performance over time. For instance ...
-
[35]
Safety and functional safety - IECThe IEC 61508 series provides functional safety standards for the lifecycle of electrical, electronic or programmable electronic (E/E/PE) systems and products.
-
[36]
[PDF] The London Spikes Controversy: Homelessness, Urban ...This article examines an ostensibly new feature of the securitised urban landscape: 'hostile architecture'. Following controversy in 2014 London over 'anti‐ ...
-
[37]
[PDF] Security by Design: Protection of public spaces from terrorist attacksEuropean Union, 2022. The reuse policy of European Commission documents is implemented by Commission. Decision 2011/833/EU of 12 December 2011 on the reuse ...
-
[38]
Ramming attacks, pedestrians, and the securitization of streets and ...Over the last decade, vehicles have been used as weapons to target, kill, and injure pedestrians in cities such as London, New York, and Berlin.
-
[39]
Architectural Standards - (U.S. National Park Service)Aug 19, 2025 · vandal/graffiti resistant materials and finishes; repairable and capable of refinishing. Hardware and anchors shall be concealed to a ...
-
[40]
[PDF] City of Richmond Urban Design Guidelines - RVA.govSite furnishings should have vandal-resistant features. Replacement parts or components should be readily available and easily installed. Finish colors ...
-
[41]
Hostile architecture is making our cities even less welcomingJan 21, 2024 · Uncomfortable benches, poles to lean against, walls embedded with metal fins... The use of defensive design means that our cities now exude a sense of menace.Missing: implementations | Show results with:implementations
-
[42]
Should the city be for everyone? The relationship between ...Jul 25, 2024 · This research explores the psychological underpinnings of the approval of hostile design (AoHD) measures.
-
[43]
[PDF] Creating Defensible Space - HUD UserThis design succeeds in making public the entire ground surface of the four-block area. All the grounds of the project must be maintained by management and ...
-
[44]
[PDF] CPTED, Hostile Architecture, and the Erasure of Democratic Public ...May 22, 2020 · By using hostile design typologies, cities can render public spaces unusable to undesirable citizens, and erase images of poverty, social decay ...
-
[45]
Confirmation Dialogs Can Prevent User Errors (If Not Overused)Feb 18, 2018 · Consider using progressive disclosure to allow users to find out more about the consequences of their command before they commit, while still ...
-
[46]
What is Progressive Disclosure? — updated 2025### Summary of Progressive Disclosure in UI Design and Its Benefits for Avoiding Overwhelm
-
[47]
Childproofing Your Home - Several Safety Devices to Help Protect ...Here are some safety practices, recommended product that meet safety standards, and child safety devices that can help reduce injuries to young children.Missing: ergonomic design rounded
-
[48]
Ergonomics Goes Beyond Styling - Machine DesignThis is why ergonomic tools have rounded contact areas and protective shields to prevent cuts. Properly designed pliers, for example, have no unnecessary sharp ...
-
[49]
Hand Tool Ergonomics - Tool Design - CCOHSThe recommended distance separating the handles is between 65-90 mm (2.5 to 3.5 in). Grips that are larger than 100 mm (4 in) will be difficult for some users.<|separator|>
-
[50]
Understanding Success Criterion 2.3.3: Animation from InteractionsPeople with vestibular disorders need control over movement triggered by interactions. Non-essential movement can trigger vestibular disorder reactions.
-
[51]
Permissions on Android | Privacy - Android DevelopersRuntime permissions, also known as dangerous permissions, give your app additional access to restricted data or let your app perform restricted actions that ...Declare app permissions · App permissions best practices · Permission-group
-
[52]
Keep Adaptive Battery & battery optimization on - Pixel Phone HelpTo have apps use your phone's battery only when you need them to, keep Adaptive Battery and battery optimization on. These settings are on by default.Missing: smartphone misuse
-
[53]
10 Usability Heuristics for User Interface Design - NN/GApr 24, 1994 · Jakob Nielsen's 10 general principles for interaction design. They are called "heuristics" because they are broad rules of thumb and not specific usability ...Missing: defensive | Show results with:defensive
-
[54]
Minimize the risk of downtime through Defensive Programming - BlogReduce downtime and increase efficiency with Defensive Programming. Discover how this concept helps companies anticipate and prevent software bugs, ...Missing: uptime | Show results with:uptime
-
[55]
Mastering Defensive Programming for Safer Code PracticesOct 30, 2025 · Defensive programming was first introduced by Brian W. Kernighan in his seminal work on data structures and algorithms.
-
[56]
[PDF] Memory Safe Languages: Reducing Vulnerabilities in Modern ...Jun 23, 2025 · However, several benefits, such as increased reliability, reduced attack surface, and decreased long-term costs, make a strong case for MSL ...
-
[57]
Defensive Programming - Friend or Foe? - Interrupt - MemfaultDec 15, 2020 · In this article, we'll dive into what defensive and offensive programming are, where defensive programming falls short, how developers should ...
-
[58]
Is “Defensive Programming” actually healthy? - DEV CommunityMay 8, 2019 · So your code is more error prone and less maintainable. Its also a violation of the DRY principle. Specifically if you want to add a new type, ...
-
[59]
Hostile Architecture: The Ethical Problem of Design as a Means of ...Dec 29, 2023 · Hostile architecture has never been a sustainable method for solving homelessness, and its use is rooted in harmful bias against unhoused people.
-
[60]
[PDF] How Hostile Architecture Impacts People Living With DisabilitiesOct 9, 2025 · See generally Understanding Hostile Architecture: The Cause and Effect of Restricting. Public Space, supra note 13 at 2 (stating that the ...
- [61]
- [62]
-
[63]
[PDF] Defensive Programming - EECS InstructionalOct 23, 2006 · Like defensive driving, but for code: – Avoid depending on others, so that if they do something unexpected, you won't crash – survive ...Missing: definition | Show results with:definition
-
[64]
Failure Modes & Effects Analysis (FMEA) and Failure Modes ... - DAUThe FMEA/FMECA is a reliability evaluation/design technique which examines potential failure modes within a system and its equipment.
-
[65]
Advanced security with SonarQube | SonarThrough advanced scanning techniques like SAST, taint analysis, and secrets detection, SonarQube helps teams catch vulnerabilities early, remediate issues ...
-
[66]
Guide to Failure Mode and Effect Analysis - FMEA - Juran InstituteApr 2, 2018 · Design FMEA (DFMEA) is a methodology used to analyze risks associated with a new, updated or modified product design and explores the ...
-
[67]
Defensive programming or paranoiac programming? - Scrum.orgDefensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances.
-
[68]
What is Design Failure Mode and Effect Analysis (DFMEA)? - AnsysOct 25, 2023 · DFMEA is a process that helps engineers understand the impact of potential risks associated with a design.
-
[69]
MTBF, MTTR, MTTF, MTTA: Understanding incident metrics - AtlassianSome of the industry's most commonly tracked metrics are MTBF (mean time before failure), MTTR (mean time to recovery, repair, respond, or resolve), MTTF (mean ...
-
[70]
How to Run Surveys at Every Stage of the Design Cycle - NN/GNov 24, 2023 · Below, we outline some common types of surveys that could be run at various stages of the design cycle, and some questions that it might be handy to ask.