Trends and New Directions in Software Architecture
|
|
|
- Lambert Holland
- 10 years ago
- Views:
Transcription
1 Trends and New Directions in Software Architecture Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Chief Scientist, Software Solutions Division SEI Fellow
2 Copyright 2015 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected]. ATAM is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. Team Software Process SM and TSP SM are service marks of Carnegie Mellon University. DM
3 Software Architecture The quality and longevity of a softwarereliant system is largely determined by its architecture. Recent US studies identify architectural issues as a systemic cause of software problems in government systems (OSD, NASA, NDIA, National Research Council). Architecture is of enduring importance because it is the right abstraction for performing ongoing analyses throughout a system s lifetime. 3
4 Software Architecture Thinking High-level system design providing system-level structural abstractions and quality attributes, which help in managing complexity Makes engineering tradeoffs explicit 4
5 Quality Attributes Quality attributes properties of work products or goods by which stakeholders judge their quality stem from business and mission goals. need to be characterized in a system-specific way Quality attributes include Performance Availability Interoperability Modifiability Usability Security Etc. 5
6 Central Role of Architecture IMPLEMENT AND EVOLVE DESIGN IMPLEMENT BUSINESS AND MISSION GOALS ARCHITECTURE SYSTEM SATISFY CONFORM SATISFY 6
7 Our View: Architecture-Centric Engineering 7
8 Advancements Over the Years Architectural patterns Component-based approaches Company specific product lines Model-based approaches Frameworks and platforms Standard interfaces 8
9 What HAS Changed? Increased connectivity Scale and complexity decentralization and distribution big data increased operational tempo inter-reliant ecosystems vulnerability collective action Disruptive and emerging technologies 9
10 Technology Trends 10
11 Software Development Trends Application frameworks Open source Cloud strategies NoSQL Machine Learning MDD Incremental approaches Dashboards Distributed development environments DevOps 11
12 Technical Challenges 12
13 The Intersection and Architecture At the intersections there are difficult tradeoffs to be made in structure, process, time, and cost. Architecture is the enabler for tradeoff analyses. 13
14 Architecture and Accelerated Capability How much architecture design is enough? Can architecture design be done incrementally? There is a difference between being agile and doing agile. Agility is enabled by architecture not stifled by it. Managing technical debt is key. 14
15 Managing Technical Debt* A design or construction approach that's expedient in the short term but that creates a technical context that increases complexity and cost in the long term. Some examples include: continuing to build on a foundation of poor quality legacy code prototype that turns into production code increasing use of "bad patches, which increases number of related systems that must be changed in parallel * Term first used by Cunningham, W The WyCash Portfolio Management System. OOPSLA '92 Experience Report. 15
16 Technical Debt Impact From: Jim Highsmith
17 Technical Debt Landscape invisible results of past decisions about software that negatively affect its future deferred investment opportunities or poorly managed risks Kruchten, P. Nord, R.L., Ozkaya, I Technical Debt: From Metaphor to Theory and Practice, IEEE Software, 29(6), Nov/Dec
18 Making Hard Choices About Technical Debt In the quest to become market leader, players race to release a quality product to the marketplace. The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, options, and technical debt. Hard Choices Strategy Game to Communicate Value of Architecture Thinking game downloadable from 18
19 19
20 Our Current Research What code and design indicators that correlate well with project measures allow us to manage technical debt? t i t j 5 detection Plugin Project Artifacts (defects, effort) Analyzers (e.g. SonarQube, CAST, Lattix) dataset Dataset Source Code (C,Java,Cobol..) Design Artifacts (arch models, requirements) Eclipse IDE TD Dashboard visualization Client 1. time technical debt is incurred 2. time technical debt is recognized 3. time to plan and re-architect 4. time until debt is actually paid-off 5. continuous monitoring 20
21 Architecture Done Incrementally Bolsa Mexicana de Valores (BMV) operates the Mexican Financial Markets on behalf of the Mexican government. Bursatec is the technology arm of the BMV. BMV desired a new stock trading engine to drive the market. BMV performed a build vs. buy analysis and determined that Bursatec would replace their three existing trading engines with one in-house developed system. Bursatec committed to deliver a trading engine in 8-10 quarters. High performing Reliable and of high quality Scalable 21
22 Approach Attribute-Driven Quality Attribute Workshop Design Business Thread Workshop IMPLEMENT AND EVOLVE TSP Weekly Meetings Views&Beyond and Checkpoint ARID and TSP Relaunch DESIGN IMPLEMENT BUSINESS AND MISSION GOALS TSP TSP Launch ARCHITECTURE TSP Postmortem TSP SYSTEM SATISFY CONFORM Architecture Tradeoff Analysis Method (ATAM) SATISFY TSP Weekly Meetings and Checkpoint Team Software Process (TSP) and Architecture-Centric Engineering 22
23 Effort in Percent over Cycles 1 Reqts: Requirements HLD/Arch: High level Design / Architecture DLD: Detailed Design (UML) Code: Coding (no detailed design) Test: Testing 23
24 Effort in Percent over Cycles 2 Reqts: Requirements HLD/Arch: High level Design / Architecture DLD: Detailed Design (UML) Code: Coding (no detailed design) Test: Testing 24
25 Effort in Percent over Cycles 3 Reqts: Requirements HLD/Arch: High level Design / Architecture DLD: Detailed Design (UML) Code: Coding (no detailed design) Test: Testing 25
26 Effort in Percent over Cycles 4 The fourth cycle of three weeks was used to rethink garbage collection handling and cleaning up. No effort data was collected during that cycle. 26
27 Effort in Percent over Cycles 5 Reqts: Requirements HLD/Arch: High level Design / Architecture DLD: Detailed Design (UML) Code: Coding (no detailed design) Test: Testing 27
28 Effort in Percent over Cycles 6 Reqts: Requirements HLD/Arch: High level Design / Architecture DLD: Detailed Design (UML) Code: Coding (no detailed design) Test: Testing 28
29 Results Results Target Actual Latency 1ms 0.1ms Throughput (transactions per second) 1, ,000 Schedule (months) Quality (defects/kloc found during validation testing)
30 Deployment Challenges The DevOps movement continues what Agile started. 30
31 DevOps: State of the Practice Focus is on culture and teaming process and practices value stream mapping continuous delivery practices Lean thinking tooling, automation, and measurement tooling to automate repetitive tasks static analysis automation for monitoring architectural health performance dashboards 31
32 Architecture and DevOps Design decisions that involve deploymentrelated limitations can blindside teams. 32
33 DevOps Tips Don t let designing for deployability be an afterthought. Use measurable deployability quality attributes. Consider architectural tactics that promote modifiability, testability, and operational resilience. Use architectural abstractions to reason about deployability implications of design options and tradeoffs. Establish monitoring mechanisms. 33
34 Architecture and Scale Cloud strategies Cloud strategies for mobility Big data Scale Changes Everything 34
35 Two Perspectives of Software Architecture in Cloud Computing = Two potentially different sets of business goals and quality attributes 35
36 Cloud Computing and Architecting SLAs cannot prevent failures. In cloud environments, cloud consumers have to design and architect systems to account for lack of full control over important quality attributes. cloud providers have to design and architect infrastructures and systems that provide the most efficient way to manage resources and keep promises made in SLAs. 36
37 Mobile Device Trends 37
38 Architecture Trends: Cyber-Foraging Edge Computing Using external resource-rich surrogates to augment the capabilities of resource-limited devices code/computation offload data staging Industry is starting to build on this concept to improve mobile user experience and decrease network traffic. Our research: cloudlet-based cyber-foraging brings the cloud closer to the user Nokia Siemens Networks Liquid Applications Cisco Systems Fog Computing 38
39 Big Data Systems Two very distinct but related technological thrusts Data analytics Infrastructure Analytics is typically a massive data reduction exercise data to decisions. Computation infrastructure necessary to ensure the analytics are fast scalable secure easy to use 39
40 Big Data State of the Practice The problem is not solved Building scalable, assured big data systems is hard. Building scalable, assured big data systems is expensive. 40
41 Big Data Survey 41
42 Architecture and Big Data System costs must grow more slowly than system capacity. Approaches scalable software architectures scalable software technologies scalable execution platforms Scalability reduces as implementation complexity grows. NoSQL models are not created equal. You can t manage what you don t monitor. 42
43 Our Current Research Lightweight Evaluation and Architecture Prototyping for Big Data (LEAP4BD) QuABase: A Knowledge Base for Big Data System Design semantics-based knowledge model o o general model of software architecture knowledge populated with specific big data architecture knowledge dynamic, generated, and queryable content knowledge visualization 43
44 Architecture and Software Assurance 44
45 Architectural Models capture architecture in a form amenable to analysis, which contributes to assurance range from informal (e.g., visio diagrams) to formal (e.g., with precisely defined execution semantics) In safety critical systems formality is warranted. 45
46 High Fault Leakage Drives Major Increase in Rework Cost 20.5% x Requirements Engineering System Design Aircraft industry has reached limits of affordability due to exponential growth in SW size and complexity. 80% late error discovery at high rework repair cost 70%, 3.5% 1x 10%, 50.5% 20x 0%, 9% 80x System Test Acceptance Test Total System Cost Boeing 777 $12B Boeing 787 $24B Software Architectural Design 70% Requirements & system interaction errors Component Software Design Software as % of total system cost 1997: 45% 2010: 66% 2024: 88% Post-unit test software rework cost : 50% of total system cost and growing 20%, 16% 5x Unit Test Integration Test Where faults are introduced Where faults are found The es2mated nominal cost for fault removal Sources: NIST Planning report 02-3, The Economic Impacts of Inadequate Infrastructure for Software Testing, May D. Galin, Software Quality Assurance: From Theory to Implementation, Pearson/Addison-Wesley (2004) B.W. Boehm, Software Engineering Economics, Prentice Hall (1981) Code Development 46
47 SAE Architecture Analysis & Design Language (AADL) Standard Suite (AS-5506 Series) Core AADL language standard (V2.1-Sep 2012, V1-Nov 2004) Strongly typed language with well-defined semantics Textual and graphical notation Standardized XMI interchange format Standardized AADL Extensions Error Model language for safety, reliability, security analysis ARINC653 extension for partitioned architectures Behavior Specification Language for modes and interaction behavior Data Modeling extension for interfacing with data models (UML, ASN.1, ) 47
48 Architecture-Centric Quality Attribute Analyses Single Annotated Architecture Model Addresses Impact Across Operational Quality Attributes Safety Reliability MTBF FMEA Hazard Analysis Data Quality Data precision/accuracy Temporal correctness Confidence Architecture Model Auto-generated analytical models Real-time Performance Execution time/deadline Deadlock/starvation Latency Security Intrusion Integrity Confidentiality Resource Consumption Bandwidth CPU time Power consumption 48
49 Conclusion Software architecture principles and their importance persist. Change brings new challenges. Software architecture practices and research are key to meeting these challenges. Much remains to be done. 49
50 At the SEI Felix Bachmann Stephany Bellomo Peter Feiler Ian Gorton James Ivers Rick Kazman John Klein Mark Klein Grace Lewis Ipek Ozkaya Rod Nord and many more This Is the Work of Many 50
51 More Information Related Blogs: Technical Debt: Agile Architecting: Cloudlets: AADL and Model-Based Engineering: 51
52 Contact Information SEI Fellow Chief Scientist Software Solutions Division Telephone: Website: U.S. Mail: Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI Fax:
Trends and New Directions in Software Architecture
#GHC14 Trends and New Directions in Software Architecture Linda Northrop Chief Scientist, Software Solutions Division SEI Fellow Software Engineering Institute (SEI) Carnegie Mellon University October
Agile Development and Software Architecture: Understanding Scale and Risk
Agile Development and Software Architecture: Understanding Scale and Risk Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert L. Nord SSTC, April 2012 In collaboration
A Systematic Method for Big Data Technology Selection
A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is based upon work funded
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
Moving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in
Contracting Officer s Representative (COR) Interactive SharePoint Wiki
Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Assurance Cases for Design Analysis of Complex System of Systems Software
Assurance Cases for Design Analysis of Complex System of Systems Software Presented at AIAA Infotech@Aerospace Conference Software Assurance Session 8 April 2009 Stephen Blanchette, Jr. Problem: SoS are
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
Extending AADL for Security Design Assurance of the Internet of Things
Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering
VoIP in Flow A Beginning
VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
Service Measurement Index Framework Version 2.1
Service Measurement Index Framework Version 2.1 July 2014 CSMIC Carnegie Mellon University Silicon Valley Moffett Field, CA USA Introducing the Service Measurement Index (SMI) The Service Measurement Index
A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering
Building a Business Case for Systems Engineering NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
Buyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University [email protected] Nader Mehravari Software
Data Management Maturity (DMM) Model Update
Data Management Maturity (DMM) Model Update Rawdon Young November 2012 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Contents / Agenda The DMM SEI Observations on Core
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
System Architecture Virtual Integration: An Industrial Case Study
System Architecture Virtual Integration: An Industrial Case Study Peter H. Feiler Jorgen Hansson Dionisio de Niz Lutz Wrage November 2009 TECHNICAL REPORT CMU/SEI-2009-TR-017 ESC-TR-2009-017 Research,
Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.
KVM and Hypervisor Security David Shepard and Matt Gaston CMU/SEI Cyber Innovation Center February 2012 2012 by Carnegie Mellon University. Published SEI PROPRIETARY INFORMATION. Distribution: Director
How To Use Elasticsearch
Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver [email protected] Sean Hutchison [email protected] January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported
SAP SE - Legal Requirements and Requirements
Finding the signals in the noise Niklas Packendorff @packendorff Solution Expert Analytics & Data Platform Legal disclaimer The information in this presentation is confidential and proprietary to SAP and
Cisco IT Takes Continuous Delivery from Vision to Reality
Cisco IT Takes Continuous Delivery from Vision to Reality Cisco IT Insights What Agile. Nimble. Relevant. Strategic. Cost efficient. Service provider. Service orchestrator. Take your pick. IT organizations
Getting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
Revel8or: Model Driven Capacity Planning Tool Suite
Revel8or: Model Driven Capacity Planning Tool Suite Liming Zhu 1,2, Yan Liu 1,2, Ngoc Bao Bui 1,2,Ian Gorton 3 1 Empirical Software Engineering Program, National ICT Australia Ltd. 2 School of Computer
High Performance Computing and Big Data: The coming wave.
High Performance Computing and Big Data: The coming wave. 1 In science and engineering, in order to compete, you must compute Today, the toughest challenges, and greatest opportunities, require computation
IBM Cognos Enterprise: Powerful and scalable business intelligence and performance management
: Powerful and scalable business intelligence and performance management Highlights Arm every user with the analytics they need to act Support the way that users want to work with their analytics Meet
NTT i 3 Cloud Services Orchestration Platform
NTT i 3 Cloud Services Orchestration Platform Enabling the Digital Business 2 Our Point of View Cloud computing is a business imperative, not just a technology trend IaaS, PaaS and SaaS are becoming mainstream,
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
CHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
Six ways to accelerate Android mobile application development
Six ways to accelerate Android mobile application Creating an integrated solution for collaboration among teams Contents 1 Weaving the invisible thread of innovation 2 Android : vast opportunities and
Software Engineering
1 Software Engineering Lecture 2: Software Life Cycles Stefan Hallerstede Århus School of Engineering 25 August 2011 2 Contents Naive Software Development Code & Fix Towards A Software Process Software
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
The IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
IBM Software Cloud service delivery and management
IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,
Common Testing Problems: Pitfalls to Prevent and Mitigate
: Pitfalls to Prevent and Mitigate AIAA Case Conference 12 September 2012 Donald Firesmith Software Engineering Institute (SEI) Carnegie Mellon University Pittsburgh, PA 15213 Clarification and Caveat
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Crossing the DevOps Chasm
SOLUTION BRIEF Application Delivery Solutions from CA Technologies Crossing the DevOps Chasm Can improved collaboration and automation between Development and IT Operations deliver business value more
Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
Virtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
SAVI Behavior Model Integration Virtual Integration Process
SAVI Behavior Model Integration Virtual Integration Process David Redman, AVSI Texas A&M University Copyright 2014 Boeing. All rights reserved. GPDIS_2015.ppt 1 Outline AVSI SAVI Motivation SAVI Program
A Comparison of Requirements Specification Methods from a Software Architecture Perspective
A Comparison of Requirements Specification Methods from a Software Architecture Perspective Len Bass John Bergey Paul Clements Paulo Merson Ipek Ozkaya Raghvinder Sangwan August 2006 TECHNICAL REPORT CMU/SEI-2006-TR-013
Software development for the on demand enterprise. Building your business with the IBM Software Development Platform
Software development for the on demand enterprise Building your business with the IBM Software Development Platform An on demand business is an enterprise whose business processes integrated end-to-end
can you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
Systems Engineering with RUP: Process Adoption in the Aerospace/ Defense Industry
March 2004 Rational Systems Engineering with RUP: Process Adoption in the Aerospace/ Defense Industry Why companies do it, how they do it, and what they get for their effort By Dave Brown, Karla Ducharme,
Applying 4+1 View Architecture with UML 2. White Paper
Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was
Software Architecture Professional Certificate
Software Architecture Professional Certificate The Software Architecture Professional Certificate program will equip you with state-of-the-art architecture practices and concepts. You will gain experience
Agile Model-Based Systems Engineering (ambse)
Agile Model-Based Systems Engineering (ambse) Bruce Powel Douglass, Ph.D. Chief Evangelist, Global Technology Ambassador IBM Rational [email protected] Twitter: @BruceDouglass Yahoo: tech.groups.yahoo.com/group/rt-uml/
Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan
Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan Arcade Game Team July 2003 Unlimited distribution subject to the copyright. This work is sponsored by the U.S. Department of Defense.
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
how can I deliver better services to my customers and grow revenue?
SOLUTION BRIEF CA Wily Application Performance Management May 2010 how can I deliver better services to my customers and grow revenue? we can With the right solution, you can be certain that you are providing
Managing Technical Debt in Software-Reliant Systems
Managing Technical Debt in Software-Reliant Systems Brown, N.*, Cai, Y.**, Guo, Y., Kazman, R.*,, Kim, M. +, Kruchten, P. #, Lim, E. #, MacCormack, A. ++, Nord, R*., Ozkaya, I.*, Sangwan, R. π, Seaman,
SAP Agile Data Preparation
SAP Agile Data Preparation Speaker s Name/Department (delete if not needed) Month 00, 2015 Internal Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may
An introduction to the benefits of Application Lifecycle Management
An introduction to the benefits of Application Lifecycle Management IKAN ALM increases team productivity, improves application quality, lowers the costs and speeds up the time-to-market of the entire application
SACAM: The Software Architecture Comparison Analysis Method
SACAM: The Software Architecture Comparison Analysis Method Christoph Stoermer Felix Bachmann Chris Verhoef December 2003 TECHNICAL REPORT CMU/SEI-2003-TR-006 ESC-TR-2003-006 Pittsburgh, PA 15213-3890
METHOD & TOOLS TO SECURE AND SUPPORT COLLABORATIVE ARCHITECTING OF CONSTRAINED SYSTEMS
METHOD & TOOLS TO SECURE AND SUPPORT COLLABORATIVE ARCHITECTING OF CONSTRAINED Jean-Luc Voirin Thales Aerospace Keywords: architecture modelling method early validation Abstract ARCADIA is a system & software
A NEW STRATEGIC DIRECTION FOR NTIS
A NEW STRATEGIC DIRECTION FOR NTIS U.S. Department of Commerce November 5, 2015 Refocusing NTIS to meet a 21st Century National Need 2 Overview Following a rigorous review of NTIS operations, the Commerce
CA Virtual Assurance for Infrastructure Managers
PRODUCT SHEET: CA Virtual Assurance for Infrastructure Managers CA Virtual Assurance for Infrastructure Managers agility made possible CA Virtual Assurance for Infrastructure Managers is an add-on product
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based
Cloud Computing and Enterprise Services
Defense Information Systems Agency A Combat Support Agency Cloud Computing and Enterprise Services Alfred Rivera Technical Program Director 29 July 2010 Peak of Inflated Expectations You Are Here Plateau
Software Security Engineering: A Guide for Project Managers
Software Security Engineering: A Guide for Project Managers Gary McGraw Julia H. Allen Nancy Mead Robert J. Ellison Sean Barnum May 2013 ABSTRACT: Software is ubiquitous. Many of the products, services,
Agil visualisering och dataanalys
Agil visualisering och dataanalys True Business and IT collaboration in Analytics Niklas Packendorff @packendorff SAPSA Impuls 2014 Legal disclaimer The information in this presentation is confidential
SAP Predictive Analytics
SAP Predictive Analytics What s the best that COULD happen? Bringing predictive analytics to the end user SAP Forum Belgium September 9, 2015 Waldemar Adams @adamsw SVP & GM Analytics SAP Europe, Middle-East
Plan-Driven Methodologies
Plan-Driven Methodologies The traditional way to develop software Based on system engineering and quality disciplines (process improvement) Standards developed from DoD & industry to make process fit a
Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.
Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not
Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum
Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Siva Ravada Senior Director of Development Oracle Spatial and MapViewer 2 Evolving Technology Platforms
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
SOA, Cloud Computing & Semantic Web Technology: Understanding How They Can Work Together. Thomas Erl, Arcitura Education Inc. & SOA Systems Inc.
SOA, Cloud Computing & Semantic Web Technology: Understanding How They Can Work Together Thomas Erl, Arcitura Education Inc. & SOA Systems Inc. Overview SOA + Cloud Computing SOA + Semantic Web Technology
Manage and monitor LTE with IBM Tivoli Netcool solutions
IBM Software Thought Leadership White Paper July 2011 Manage and monitor LTE with IBM Tivoli Netcool solutions Answers for today s data-dominant networks 2 Manage and monitor LTE with IBM Tivoli Netcool
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core
