{"id":510,"date":"2022-01-26T01:22:09","date_gmt":"2022-01-26T01:22:09","guid":{"rendered":"https:\/\/www.cybermedian.com\/pt\/?p=510"},"modified":"2022-03-31T13:56:06","modified_gmt":"2022-03-31T05:56:06","slug":"fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis","status":"publish","type":"post","link":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/","title":{"rendered":"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz"},"content":{"rendered":"<p id=\"c5fa\" class=\"graf graf--p graf-after--h3\"><span>A an\u00e1lise de \u00e1rvore de falhas \u00e9 um dos m\u00e9todos mais usados \u200b\u200bna an\u00e1lise de confiabilidade do sistema.\u00a0\u00c9 um processo de projeto ou melhoria do sistema, analisando v\u00e1rios fatores que podem levar \u00e0 falha do sistema, incluindo hardware, software, ambiente, fatores humanos, etc. Ao desenhar a \u00e1rvore de falhas, podemos determinar as poss\u00edveis combina\u00e7\u00f5es de modos e a probabilidade de a causa da falha do sistema.\u00a0A probabilidade de falha do sistema \u00e9 calculada e as medidas correspondentes s\u00e3o tomadas.<\/span><\/p>\n<p id=\"aa4a\" class=\"graf graf--p graf-after--p\"><span>FTA \u00e9 uma an\u00e1lise de projeto e m\u00e9todos de avalia\u00e7\u00e3o para melhorar a confiabilidade do sistema.\u00a0\u00c9 frequentemente usado no processo de Seis Sigma, especialmente na fase de an\u00e1lise do processo de melhoria de neg\u00f3cios Seis Sigma.<\/span><\/p>\n<h3 id=\"a88a\" class=\"graf graf--h3 graf-after--p\"><span id=\"How_to_perform_fault_tree_analysis\"><span>Como realizar a an\u00e1lise da \u00e1rvore de falhas<\/span><\/span><\/h3>\n<p id=\"1330\" class=\"graf graf--p graf-after--h3\"><span>Suponha que voc\u00ea tenha uma \u00e1rvore de an\u00e1lise de falhas do sistema de banco de dados que come\u00e7a com uma falha de banco de dados e analisa os fatores que podem causar falhas no banco de dados e no aplicativo.<\/span><\/p>\n<p id=\"606b\" class=\"graf graf--p graf-after--p\"><span>A an\u00e1lise da \u00e1rvore de falhas \u00e9 um processo de esgotamento das causas da falha.\u00a0\u00c9 uma an\u00e1lise de cima para baixo onde come\u00e7amos com os sintomas, tomamos como exemplo um \u00f4nibus perdido e depois listamos as poss\u00edveis causas de forma hier\u00e1rquica formando uma estrutura em \u00e1rvore.\u00a0A estrutura em \u00e1rvore de nomes vem dos v\u00e1rios ramos que podem causar sintomas.<\/span><\/p>\n<figure id=\"6207\" class=\"graf graf--figure graf-after--p\"><a href=\"https:\/\/online.visual-paradigm.com\/repository\/images\/6cdecc47-eb89-45ce-9190-312a4cd346b2\/infographics-design\/benefits-and-harms-of-coffee-infographic.png?s=360\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0_JEI18w7qS9fIk-q.png\" data-image-id=\"0*_JEI18w7qS9fIk-q.png\" data-width=\"904\" data-height=\"822\" data-is-featured=\"true\" \/><\/a><\/figure>\n<h3 id=\"da95\" class=\"graf graf--h3 graf-after--figure\"><span id=\"FTA_Notation\"><span>Nota\u00e7\u00e3o FTA<\/span><\/span><\/h3>\n<p id=\"20d3\" class=\"graf graf--p graf-after--h3\"><span>Uma An\u00e1lise de \u00c1rvore de Falhas usa alguns s\u00edmbolos b\u00e1sicos para delinear v\u00e1rios pontos, causas e efeitos em um processo.\u00a0Existem muitos s\u00edmbolos, mas aqui est\u00e3o alguns dos princ\u00edpios b\u00e1sicos para ajud\u00e1-lo a come\u00e7ar a projetar um diagrama de \u00e1rvore de falhas.<\/span><\/p>\n<p id=\"23c2\" class=\"graf graf--p graf-after--p\"><span>Os s\u00edmbolos s\u00e3o usados \u200b\u200bpara representar v\u00e1rios eventos e descrever relacionamentos:<\/span><\/p>\n<h3 id=\"6c14\" class=\"graf graf--h3 graf-after--p\"><span id=\"Gate_Symbols\"><span>S\u00edmbolos de port\u00e3o<\/span><\/span><\/h3>\n<figure id=\"4c74\" class=\"graf graf--figure graf-after--h3\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0gPoI1_erR4n2prGX.png\" data-image-id=\"0*gPoI1_erR4n2prGX.png\" data-width=\"91\" data-height=\"91\" \/><\/figure>\n<p id=\"d35c\" class=\"graf graf--p graf-after--figure\"><strong class=\"markup--strong markup--p-strong\">And gate<\/strong>\u200a\u2014\u200arepresents a condition in which all the events shown below the gate (input gate) must be present for the event shown above the gate (output event) to occur. This means the output event will occur only if all of the input events exist simultaneously.<\/p>\n<figure id=\"7b3b\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0JJ4IaSGGIXpCcndq.png\" data-image-id=\"0*JJ4IaSGGIXpCcndq.png\" data-width=\"91\" data-height=\"101\" \/><\/figure>\n<p id=\"9267\" class=\"graf graf--p graf-after--figure\"><strong class=\"markup--strong markup--p-strong\">Or gate<\/strong>\u200a\u2014\u200arepresents a situation in which any of the events shown below the gate (input gate) will lead to the event shown above the gate (output event). The event will occur if only one or any combination of the input events exists.<\/p>\n<h3 id=\"7077\" class=\"graf graf--h3 graf-after--p\"><span id=\"Event_symbols\">Event symbols<\/span><\/h3>\n<p id=\"6f6d\" class=\"graf graf--p graf-after--h3\">There are five types of event symbols:<\/p>\n<figure id=\"f0d6\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0awHUVD2NbC3EhQqZ.png\" data-image-id=\"0*awHUVD2NbC3EhQqZ.png\" data-width=\"103\" data-height=\"70\" \/><\/figure>\n<p id=\"5b77\" class=\"graf graf--p graf-after--figure\"><strong class=\"markup--strong markup--p-strong\"><span>Ret\u00e2ngulo<\/span><\/strong><span>\u00a0\u200a\u2014 O ret\u00e2ngulo \u00e9 o principal bloco de constru\u00e7\u00e3o da \u00e1rvore anal\u00edtica.\u00a0Ele representa o evento negativo e est\u00e1 localizado no topo da \u00e1rvore e pode ser localizado em toda a \u00e1rvore para indicar outros eventos que podem ser decompostos ainda mais.\u00a0Este \u00e9 o \u00fanico s\u00edmbolo que ter\u00e1 uma porta l\u00f3gica e eventos de entrada abaixo dela.<\/span><\/p>\n<figure id=\"35b9\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0LjzJtQbTPkwrepR0.png\" data-image-id=\"0*LjzJtQbTPkwrepR0.png\" data-width=\"91\" data-height=\"91\" \/><\/figure>\n<p id=\"10ce\" class=\"graf graf--p graf-after--figure\"><strong class=\"markup--strong markup--p-strong\"><span>C\u00edrculo<\/span><\/strong><span>\u00a0\u200a\u2014 Um c\u00edrculo representa um evento base na \u00e1rvore.\u00a0Estes s\u00e3o encontrados nas camadas inferiores da \u00e1rvore e n\u00e3o requerem mais desenvolvimento ou divis\u00e3o.\u00a0N\u00e3o h\u00e1 port\u00f5es ou eventos abaixo do evento base.<\/span><\/p>\n<figure id=\"e522\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0QTBjxnMrlzGNPpWb.png\" data-image-id=\"0*QTBjxnMrlzGNPpWb.png\" data-width=\"118\" data-height=\"101\" \/><\/figure>\n<p id=\"128d\" class=\"graf graf--p graf-after--figure\"><strong class=\"markup--strong markup--p-strong\"><span>Diamante<\/span><\/strong><span>\u00a0\u200a\u2014 O diamante identifica um evento terminal n\u00e3o desenvolvido.\u00a0Tal evento n\u00e3o \u00e9 totalmente desenvolvido por falta de informa\u00e7\u00e3o ou signific\u00e2ncia.\u00a0Um galho de \u00e1rvore de falhas pode terminar com um diamante.\u00a0Por exemplo, a maioria dos projetos requer pessoal, procedimentos e hardware.\u00a0O desenvolvedor da \u00e1rvore pode decidir se concentrar no aspecto pessoal do procedimento e n\u00e3o no hardware ou nos aspectos processuais.\u00a0Nesse caso, o desenvolvedor usaria diamantes para mostrar \u201cprocedimentos\u201d e \u201chardware\u201d como eventos de terminal n\u00e3o desenvolvidos.<\/span><\/p>\n<figure id=\"30bc\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0obhk2nIt-lMQnbSu.png\" data-image-id=\"0*obhk2nIt-lMQnbSu.png\" data-width=\"91\" data-height=\"71\" \/><\/figure>\n<p id=\"6163\" class=\"graf graf--p graf-after--figure\"><strong class=\"markup--strong markup--p-strong\"><span>Oval<\/span><\/strong><span>\u00a0\u200a\u2014 Um s\u00edmbolo oval representa uma situa\u00e7\u00e3o especial que s\u00f3 pode acontecer se ocorrerem certas circunst\u00e2ncias.\u00a0Isso est\u00e1 escrito no s\u00edmbolo oval.\u00a0Um exemplo disso pode ser se os interruptores devem ser acionados em uma sequ\u00eancia espec\u00edfica antes que uma a\u00e7\u00e3o ocorra.<\/span><\/p>\n<figure id=\"b9f2\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0roGJGiYnAulWOymD.png\" data-image-id=\"0*roGJGiYnAulWOymD.png\" data-width=\"91\" data-height=\"75\" \/><\/figure>\n<p id=\"dd6e\" class=\"graf graf--p graf-after--figure\"><strong class=\"markup--strong markup--p-strong\"><span>Tri\u00e2ngulo<\/span><\/strong><span>\u00a0\u200a\u2014 O tri\u00e2ngulo significa uma transfer\u00eancia de um galho de \u00e1rvore de falha para outro local dentro da \u00e1rvore.\u00a0Onde um tri\u00e2ngulo se conecta \u00e0 \u00e1rvore com uma seta, tudo mostrado abaixo do ponto de conex\u00e3o \u00e9 transferido para outra \u00e1rea da \u00e1rvore.\u00a0Esta \u00e1rea \u00e9 identificada por um tri\u00e2ngulo correspondente que est\u00e1 conectado \u00e0 \u00e1rvore com uma linha vertical.\u00a0Letras, n\u00fameros ou figuras identificam um conjunto de s\u00edmbolos de transfer\u00eancia de outro.\u00a0Para manter a simplicidade da \u00e1rvore anal\u00edtica, o s\u00edmbolo de transfer\u00eancia deve ser usado com modera\u00e7\u00e3o.<\/span><\/p>\n<h3 id=\"d5b1\" class=\"graf graf--h3 graf-after--p\"><span id=\"Fault_Tree_Diagram_Example_Light_cannot_turn_on\"><span>Exemplo de diagrama de \u00e1rvore de falhas \u2014 a luz n\u00e3o pode acender<\/span><\/span><\/h3>\n<p id=\"ad89\" class=\"graf graf--p graf-after--h3\"><span>Vejamos um exemplo de uma an\u00e1lise b\u00e1sica de \u00e1rvore de falhas: voc\u00ea aperta um interruptor para acender uma luz, mas a luz n\u00e3o acende.\u00a0A condi\u00e7\u00e3o de falha \u00e9 &#8220;Sem luz na sala&#8221;, ent\u00e3o esse \u00e9 o in\u00edcio do diagrama<\/span><\/p>\n<p id=\"fef6\" class=\"graf graf--p graf-after--p\"><span>Em seguida, quais s\u00e3o as poss\u00edveis raz\u00f5es pelas quais a luz n\u00e3o acendeu?<\/span><\/p>\n<figure id=\"be20\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0Q3DncvuPwcJIm6j.png\" data-image-id=\"0*Q3DncvuPwcJIm6j-.png\" data-width=\"564\" data-height=\"494\" \/><\/figure>\n<p id=\"b63a\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/diagrams.visual-paradigm.com\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/f5c93b5a-e4ad-4c73-9971-be33ef77cb50.xml&amp;name=No%20Light%20in%20Room\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/diagrams.visual-paradigm.com\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/f5c93b5a-e4ad-4c73-9971-be33ef77cb50.xml&amp;name=No%20Light%20in%20Room\"><span>Editar este diagrama<\/span><\/a><\/p>\n<h3 id=\"e9bd\" class=\"graf graf--h3 graf-after--p\"><span id=\"Fault_Tree_Example_System_no_Warning_Template\"><span>Exemplo de \u00e1rvore de falhas &#8211; Modelo sem sistema de aviso<\/span><\/span><\/h3>\n<figure id=\"e97e\" class=\"graf graf--figure graf-after--h3\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0xOFMf13Aj7DHtHbf.png\" data-image-id=\"0*xOFMf13Aj7DHtHbf.png\" data-width=\"986\" data-height=\"764\" \/><\/figure>\n<p id=\"3404\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/diagrams.visual-paradigm.com\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/58495657-e28b-4910-929c-2514290a380c.xml&amp;name=System%20no%20Warning\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/diagrams.visual-paradigm.com\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/58495657-e28b-4910-929c-2514290a380c.xml&amp;name=System%20no%20Warning\"><span>Editar este diagrama<\/span><\/a><\/p>\n<p id=\"5581\" class=\"graf graf--p graf-after--p\"><span>Mais exemplos de FTA<\/span><\/p>\n<figure id=\"e2b4\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0toBxRoRDLvjLgRdU.png\" data-image-id=\"0*toBxRoRDLvjLgRdU.png\" data-width=\"658\" data-height=\"698\" \/><\/figure>\n<p id=\"03eb\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/187e0f3f-c76e-4316-b404-c760210a457a.xml&amp;name=Fault%20Tree%20Missed%20Bus%20Example\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/187e0f3f-c76e-4316-b404-c760210a457a.xml&amp;name=Fault%20Tree%20Missed%20Bus%20Example\"><span>Exemplo de Barramento Perdido da \u00c1rvore de Falhas<\/span><\/a><\/p>\n<figure id=\"98f4\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0USFYpuHLAC_LaH3T.png\" data-image-id=\"0*USFYpuHLAC_LaH3T.png\" data-width=\"996\" data-height=\"782\" \/><\/figure>\n<p id=\"7c38\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/58495657-e28b-4910-929c-2514290a380c.xml&amp;name=System%20no%20Warning\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/58495657-e28b-4910-929c-2514290a380c.xml&amp;name=System%20no%20Warning\"><span>Sistema sem aviso<\/span><\/a><\/p>\n<figure id=\"a60c\" class=\"graf graf--figure graf-after--p\"><a href=\"https:\/\/online.visual-paradigm.com\/repository\/images\/6cdecc47-eb89-45ce-9190-312a4cd346b2\/infographics-design\/benefits-and-harms-of-coffee-infographic.png?s=360\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0OaBpeou1Yc4A3Kp5.png\" data-image-id=\"0*OaBpeou1Yc4A3Kp5.png\" data-width=\"574\" data-height=\"513\" \/><\/a><\/figure>\n<p id=\"8e39\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/f5c93b5a-e4ad-4c73-9971-be33ef77cb50.xml&amp;name=No%20Light%20in%20Room\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/f5c93b5a-e4ad-4c73-9971-be33ef77cb50.xml&amp;name=No%20Light%20in%20Room\"><span>Sem luz no quarto<\/span><\/a><\/p>\n<figure id=\"9b4a\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0khUCcdkmGtO_OFZo.png\" data-image-id=\"0*khUCcdkmGtO_OFZo.png\" data-width=\"641\" data-height=\"586\" \/><\/figure>\n<p id=\"a169\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/a63c2ad3-7a98-4fea-b73e-76de2ab4c3fc.xml&amp;name=Fault%20Tree%20Diagram%20Illustration\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/a63c2ad3-7a98-4fea-b73e-76de2ab4c3fc.xml&amp;name=Fault%20Tree%20Diagram%20Illustration\"><span>Ilustra\u00e7\u00e3o do Diagrama de \u00c1rvore de Falhas<\/span><\/a><\/p>\n<figure id=\"7ff2\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0yi-CTiNP5H-HfML.png\" data-image-id=\"0*yi--CTiNP5H-HfML.png\" data-width=\"1663\" data-height=\"830\" \/><\/figure>\n<p id=\"c452\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/5b2ada0d-1e93-473b-a6da-0cb3b3233dbf.xml&amp;name=Educational%20Fault%20Tree%20Analysis%20Example\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/5b2ada0d-1e93-473b-a6da-0cb3b3233dbf.xml&amp;name=Educational%20Fault%20Tree%20Analysis%20Example\"><span>Exemplo de An\u00e1lise de \u00c1rvore de Falhas Educacional<\/span><\/a><\/p>\n<figure id=\"d6f4\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0hE6B8VfPdEiClqn5.png\" data-image-id=\"0*hE6B8VfPdEiClqn5.png\" data-width=\"1073\" data-height=\"615\" \/><\/figure>\n<p id=\"48d7\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/4715f39c-2f9b-4fa5-9675-56168f2f2c43.xml&amp;name=Growth%20obstacles%20Fault%20Tree%20Analysis\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/4715f39c-2f9b-4fa5-9675-56168f2f2c43.xml&amp;name=Growth%20obstacles%20Fault%20Tree%20Analysis\"><span>Obst\u00e1culos ao crescimento An\u00e1lise da \u00e1rvore de falhas<\/span><\/a><\/p>\n<figure id=\"350a\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0ujcADjQCvsBLI3Wo.png\" data-image-id=\"0*ujcADjQCvsBLI3Wo.png\" data-width=\"907\" data-height=\"763\" \/><\/figure>\n<p id=\"0e63\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/7c39254b-f953-4ec6-a550-a207fe3aa42c.xml&amp;name=Component%20Flow%20Fault%20Tree%20Analysis\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/7c39254b-f953-4ec6-a550-a207fe3aa42c.xml&amp;name=Component%20Flow%20Fault%20Tree%20Analysis\"><span>An\u00e1lise da \u00e1rvore de falhas de fluxo de componentes<\/span><\/a><\/p>\n<figure id=\"cf98\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0fo6mpA9ZLMqmId5n.png\" data-image-id=\"0*fo6mpA9ZLMqmId5n.png\" data-width=\"824\" data-height=\"1153\" \/><\/figure>\n<p id=\"efab\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/9778d037-541c-4d06-8bf1-070cd3c63272.xml&amp;name=Fault%20Tree%20Analysis%20Sample\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/9778d037-541c-4d06-8bf1-070cd3c63272.xml&amp;name=Fault%20Tree%20Analysis%20Sample\"><span>Amostra de An\u00e1lise de \u00c1rvore de Falhas<\/span><\/a><\/p>\n<figure id=\"ee17\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0dl9cxQGAE8SOc7Od.png\" data-image-id=\"0*dl9cxQGAE8SOc7Od.png\" data-width=\"1296\" data-height=\"741\" \/><\/figure>\n<p id=\"00be\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/3f11f402-5763-4376-a7a4-9aaaef279ce3.xml&amp;name=Electrical%20Fault%20Tree%20Analysis\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/3f11f402-5763-4376-a7a4-9aaaef279ce3.xml&amp;name=Electrical%20Fault%20Tree%20Analysis\"><span>An\u00e1lise da \u00e1rvore de falhas el\u00e9tricas<\/span><\/a><\/p>\n<figure id=\"f12d\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0wbVGVdsNoWy7zsVz.png\" data-image-id=\"0*wbVGVdsNoWy7zsVz.png\" data-width=\"994\" data-height=\"790\" \/><\/figure>\n<p id=\"58b1\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/90430f41-0f52-4321-ba85-7fd932d2bfbf.xml&amp;name=Gas%20Pipes%20Fault%20Tree%20Analysis\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/90430f41-0f52-4321-ba85-7fd932d2bfbf.xml&amp;name=Gas%20Pipes%20Fault%20Tree%20Analysis\"><span>An\u00e1lise da \u00e1rvore de falhas de tubula\u00e7\u00f5es de g\u00e1s<\/span><\/a><\/p>\n<figure id=\"0ea8\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/08an7DyUNWX6WMQ_0.png\" data-image-id=\"0*8an7DyUNWX6WMQ_0.png\" data-width=\"1061\" data-height=\"1504\" \/><\/figure>\n<p id=\"a43b\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/1d1ce2c0-ce51-4cd2-bd70-11e3735c81cd.xml&amp;name=Mid%20Size%20Fault%20Tree%20Analysis%20Example\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/1d1ce2c0-ce51-4cd2-bd70-11e3735c81cd.xml&amp;name=Mid%20Size%20Fault%20Tree%20Analysis%20Example\"><span>Exemplo de an\u00e1lise de \u00e1rvore de falhas de tamanho m\u00e9dio<\/span><\/a><\/p>\n<figure id=\"6262\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0RrBKUhk_S-SJS-XG.png\" data-image-id=\"0*RrBKUhk_S-SJS-XG.png\" data-width=\"679\" data-height=\"777\" \/><\/figure>\n<p id=\"754e\" class=\"graf graf--p graf-after--figure\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/0caf3cac-96a9-4cb0-b573-aae7f440727b.xml&amp;name=Fault%20Tree%20Analysis%20Example\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/0caf3cac-96a9-4cb0-b573-aae7f440727b.xml&amp;name=Fault%20Tree%20Analysis%20Example\"><span>Exemplo de An\u00e1lise de \u00c1rvore de Falhas<\/span><\/a><\/p>\n<figure id=\"efc2\" class=\"graf graf--figure graf-after--p\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/www.cybermedian.com\/pt\/wp-content\/uploads\/sites\/11\/2022\/02\/0QHY-GeT6ImLtKAv0.png\" data-image-id=\"0*QHY-GeT6ImLtKAv0.png\" data-width=\"738\" data-height=\"585\" \/><\/figure>\n<p id=\"8fb3\" class=\"graf graf--p graf-after--figure graf--trailing\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/8ee11047-eb12-4523-aa29-be60d8881bbd.xml&amp;name=Basic%20Fault%20Tree%20Analysis\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/online.visual-paradigm.com\/app\/diagrams\/#diagram:proj=0&amp;type=FaultTreeAnalysis&amp;gallery=\/repository\/8ee11047-eb12-4523-aa29-be60d8881bbd.xml&amp;name=Basic%20Fault%20Tree%20Analysis\"><span>An\u00e1lise b\u00e1sica da \u00e1rvore de falhas<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A an\u00e1lise de \u00e1rvore de falhas \u00e9 um dos m\u00e9todos mais comumente usados na an\u00e1lise de confiabilidade do sistema. \u00c9 um processo de projeto ou melhoria do sistema atrav\u00e9s da an\u00e1lise de v\u00e1rios fatores que podem levar \u00e0 falha do sistema, incluindo hardware, software, ambiente, fatores humanos, etc. Ao desenhar a \u00e1rvore de falhas, podemos determinar as poss\u00edveis combina\u00e7\u00f5es de modos e a probabilidade da causa da falha do sistema. A probabilidade de falha do sistema \u00e9 calculada e as medidas correspondentes s\u00e3o tomadas.<\/p>\n","protected":false},"author":1,"featured_media":1610,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","footnotes":""},"categories":[10,13,15],"tags":[52,63,62,53],"class_list":["post-510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-brainstorming","category-online-diagrams","category-strategic-planning","tag-cn-done","tag-es-done","tag-ja-done","tag-tw-done"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz - Cibermediano<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz - Cibermediano\" \/>\n<meta property=\"og:description\" content=\"A an\u00e1lise de \u00e1rvore de falhas \u00e9 um dos m\u00e9todos mais comumente usados na an\u00e1lise de confiabilidade do sistema. \u00c9 um processo de projeto ou melhoria do sistema atrav\u00e9s da an\u00e1lise de v\u00e1rios fatores que podem levar \u00e0 falha do sistema, incluindo hardware, software, ambiente, fatores humanos, etc. Ao desenhar a \u00e1rvore de falhas, podemos determinar as poss\u00edveis combina\u00e7\u00f5es de modos e a probabilidade da causa da falha do sistema. A probabilidade de falha do sistema \u00e9 calculada e as medidas correspondentes s\u00e3o tomadas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Cibermediano\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-26T01:22:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-31T05:56:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png\" \/>\n<meta name=\"author\" content=\"vpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png\" \/>\n<meta name=\"twitter:creator\" content=\"@vpadmin\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"vpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/\"},\"author\":{\"name\":\"vpadmin\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/0122cdf8fc3b73482dd8a30c8500f75a\"},\"headline\":\"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz\",\"datePublished\":\"2022-01-26T01:22:09+00:00\",\"dateModified\":\"2022-03-31T05:56:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/\"},\"wordCount\":965,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png\",\"keywords\":[\"cn-done\",\"es-done\",\"ja-done\",\"tw-done\"],\"articleSection\":[\"Brainstorming\",\"Online Diagrams\",\"Strategic Planning\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/\",\"url\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/\",\"name\":\"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz - Cibermediano\",\"isPartOf\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png\",\"datePublished\":\"2022-01-26T01:22:09+00:00\",\"dateModified\":\"2022-03-31T05:56:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/0122cdf8fc3b73482dd8a30c8500f75a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage\",\"url\":\"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png\",\"contentUrl\":\"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png\",\"width\":\"1170\",\"height\":\"665\",\"caption\":\"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cybermedian.com\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/#website\",\"url\":\"https:\/\/www.cybermedian.com\/pt\/\",\"name\":\"Cibermediano\",\"description\":\"Aprendendo uma coisa nova todos os dias\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cybermedian.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/0122cdf8fc3b73482dd8a30c8500f75a\",\"name\":\"vpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3914788226b9b0af628488720662164f4641c6125d0bd38d90ae34f01c8c4ea3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3914788226b9b0af628488720662164f4641c6125d0bd38d90ae34f01c8c4ea3?s=96&d=mm&r=g\",\"caption\":\"vpadmin\"},\"sameAs\":[\"https:\/\/x.com\/vpadmin\"],\"url\":\"https:\/\/www.cybermedian.com\/pt\/author\/vpadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz - Cibermediano","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/","og_locale":"pt_PT","og_type":"article","og_title":"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz - Cibermediano","og_description":"A an\u00e1lise de \u00e1rvore de falhas \u00e9 um dos m\u00e9todos mais comumente usados na an\u00e1lise de confiabilidade do sistema. \u00c9 um processo de projeto ou melhoria do sistema atrav\u00e9s da an\u00e1lise de v\u00e1rios fatores que podem levar \u00e0 falha do sistema, incluindo hardware, software, ambiente, fatores humanos, etc. Ao desenhar a \u00e1rvore de falhas, podemos determinar as poss\u00edveis combina\u00e7\u00f5es de modos e a probabilidade da causa da falha do sistema. A probabilidade de falha do sistema \u00e9 calculada e as medidas correspondentes s\u00e3o tomadas.","og_url":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/","og_site_name":"Cibermediano","article_published_time":"2022-01-26T01:22:09+00:00","article_modified_time":"2022-03-31T05:56:06+00:00","og_image":[{"url":"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png","type":"","width":"","height":""}],"author":"vpadmin","twitter_card":"summary_large_image","twitter_image":"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png","twitter_creator":"@vpadmin","twitter_misc":{"Escrito por":"vpadmin","Tempo estimado de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#article","isPartOf":{"@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/"},"author":{"name":"vpadmin","@id":"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/0122cdf8fc3b73482dd8a30c8500f75a"},"headline":"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz","datePublished":"2022-01-26T01:22:09+00:00","dateModified":"2022-03-31T05:56:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/"},"wordCount":965,"commentCount":0,"image":{"@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png","keywords":["cn-done","es-done","ja-done","tw-done"],"articleSection":["Brainstorming","Online Diagrams","Strategic Planning"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/","url":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/","name":"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz - Cibermediano","isPartOf":{"@id":"https:\/\/www.cybermedian.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png","datePublished":"2022-01-26T01:22:09+00:00","dateModified":"2022-03-31T05:56:06+00:00","author":{"@id":"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/0122cdf8fc3b73482dd8a30c8500f75a"},"breadcrumb":{"@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#primaryimage","url":"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png","contentUrl":"https:\/\/online.visual-paradigm.com\/images\/features\/fault-tree-analysis-software\/fault-tree-analysis-software.png","width":"1170","height":"665","caption":"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybermedian.com\/pt\/fault-tree-analysis-fta-secret-weapon-for-root-cause-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cybermedian.com\/pt\/"},{"@type":"ListItem","position":2,"name":"An\u00e1lise de \u00e1rvore de falhas (FTA) \u2014 Arma secreta para an\u00e1lise de causa raiz"}]},{"@type":"WebSite","@id":"https:\/\/www.cybermedian.com\/pt\/#website","url":"https:\/\/www.cybermedian.com\/pt\/","name":"Cibermediano","description":"Aprendendo uma coisa nova todos os dias","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybermedian.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Person","@id":"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/0122cdf8fc3b73482dd8a30c8500f75a","name":"vpadmin","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.cybermedian.com\/pt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3914788226b9b0af628488720662164f4641c6125d0bd38d90ae34f01c8c4ea3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3914788226b9b0af628488720662164f4641c6125d0bd38d90ae34f01c8c4ea3?s=96&d=mm&r=g","caption":"vpadmin"},"sameAs":["https:\/\/x.com\/vpadmin"],"url":"https:\/\/www.cybermedian.com\/pt\/author\/vpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/posts\/510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/comments?post=510"}],"version-history":[{"count":5,"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/posts\/510\/revisions"}],"predecessor-version":[{"id":9977,"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/posts\/510\/revisions\/9977"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/media\/1610"}],"wp:attachment":[{"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/media?parent=510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/categories?post=510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybermedian.com\/pt\/wp-json\/wp\/v2\/tags?post=510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}