Applying the Incremental Commitment Model to Brownfield System Development

Size: px
Start display at page:

Download "Applying the Incremental Commitment Model to Brownfield System Development"

Transcription

1 Applying the Incremental Commitment Model to Brownfield System Development Barry Boehm 1 1 University of Southern California, USA, boehm@usc.edu Abstract The Incremental Commitment Model (ICM) is a risk-driven process model generator for which common risk patterns generate common special-case system definition and development process models. The increasing importance of Brownfield (legacyconstrained) vs. Greenfield (unconstrained) application systems created a challenge of determining an ICM Brownfield risk pattern and an associated set of special-case process guidelines. This paper presents a case study of a failed Brownfield project, and shows how the concurrent-engineering activities, risk assessments, and anchor point milestones of the ICM could have avoided the failure. It compares the resulting ICM special-case Brownfield process with two leading Brownfield approaches, the CMU-SEI SMART approach and the IBM Brownfield approach, and finds them compatible and complementary. Keywords software-intensive systems engineering, brownfield development, Incremental Commitment Model, legacy systems, software re-engineering, refactoring, lifecycle models, service-oriented architecture, software process. implementation, but was dropped at a cost of $40 million after two failed tries to provide continuity of service, due primarily to the infeasibility of incrementally phasing out the legacy software and business processes compatibly with the new system s incremental capabilities. 1 Introduction Today and increasingly in the future, most large softwareintensive system (SIS) developments will be constrained by the need to provide continuity of service while migrating their services away from poorly structured and documented legacy software applications. The International Data Corporation has estimated that there are 200 billion lines of such legacy codes in current operation [1]. Yet most SIS process models contain underlying assumptions that an application project starts from scratch in an unconstrained Greenfield approach to developing requirements and solutions. The Incremental Commitment Model (ICM) is a risk-driven process model generator for which common risk patterns generate common special-case system definition and development process models. The increasing importance of Brownfield (legacy-constrained) vs. Greenfield (unconstrained) application systems created a challenge of determining an ICM Brownfield risk pattern and an associated set of special-case process guidelines. This paper presents a case study of a failed Brownfield project, and shows how the concurrent-engineering activities, risk assessments, and anchor point milestones of the ICM would have avoided the failure. In the failed project, a major US corporation used a Greenfield systems engineering and development approach to develop a new Central Corporate System to replace a patchedtogether collection of strongly-coupled and poorly documented COBOL business data processing programs. The system included an early Enterprise Resource Planning (ERP) system that was well matched to the corporation s overall financial needs, but not to its detailed business processes, which included various workarounds to compensate for difficulties with the legacy software. The new system was well organized to support incremental The ICM organizes concurrent systems engineering and acquisition processes around anchor point milestones at which the concurrent activities can synchronize and stabilize, and at which the project s risks of going forward can be better assessed and fitted into a risk-driven stakeholder resource commitment process. The paper presents the two primary views of the ICM and shows how the risk-driven commitment milestones enable stakeholders to determine which special case process best fits their situation. In particular, the ICM s concurrent activities of Understanding Needs, Envisioning Opportunities, System Scoping and Architecting, Feasibility Evidence Development, and Risk/Opportunity Assessment enable projects to focus specifically on their legacy system constraints and on opportunities to deal with them. With respect to the failed-project case study, the paper shows how the application of the ICM to the full Brownfield corporate situation could have avoided the failures of the Greenfield development. Its Understanding Needs activity could have determined the ways in which the legacy system had intertwined financial and other business services. For examples, Project included budgeting and scheduling, work breakdown system accounting, earned value management intertwined with requirements, version and configuration management; Contract included expenditure category management, billing, and receivables management intertwined with deliverables management and engineering change proposal tracking; with similar intertwining in Personnel and Marketing.

2 The ICM s Envisioning Opportunities activity could have identified opportunities to decouple the financial and nonfinancial elements of these services in ways that could make it feasible for them to interoperate with a element. Its System Scoping and Architecting activity could have repackaged the legacy software and developed the new architecture in ways that could support incremental phaseout of the legacy system, and its Feasibility Evidence Development activity could have assessed any outstanding risks and covered them with risk management plans that could be tracked to ensure project success. The paper concludes with a comparison of the resulting ICM special-case Brownfield process with two leading Brownfield approaches, the CMU-SEI SMART approach and the IBM Brownfield approach, and finds them compatible and complementary. 2 The ICM Activity Level View In order to rapidly and successfully adapt to increasing rates of change, projects need to be able to concurrently rather than sequentially assess and manage opportunities and risks; requirements, solutions, plans, and business cases; and hardware, software and human factors. Figure 1 extends the Rational Unified Process hump diagram in [2] to show how these are concurrently pursued with the ICM [3,4]. As with the RUP version, it should be emphasized that the magnitude and shape of the levels of effort will be riskdriven and likely to vary from project to project. In particular, they are likely to have mini risk/opportunitydriven peaks and valleys, rather than the smooth curves shown for simplicity in Figure 1. The main intent of this view is to emphasize the necessary concurrency of the primary success-critical activities shown as rows in Figure 1. Thus, in interpreting the Exploration column, although system scoping is the primary objective of the Exploration phase, doing it well involves a considerable amount of activity in understanding needs, envisioning opportunities, identifying and reconciling stakeholder goals and objectives, architecting solutions, life cycle planning, evaluation of alternatives, and negotiation of stakeholder commitments. For example, if one were exploring the initial scoping of a system of systems (SoS) for a metropolitan area s disaster relief, one would not just interview a number of stakeholders and compile a list of their expressed mission needs. One would also envision and explore opportunities for reusing (parts of) other metropolitan-area disaster relief systems; for obtaining development funds from federal agencies; and for applying maturing virtual collaboration technologies. In the area of understanding needs, one would concurrently assess the capability and compatibility of existing disaster relief systems in the metropolitan area to determine which would need the most work to reengineer into a SoS. One would also assess the scope of authority and responsibility of each existing system to determine whether the best approach would be a truly integrated and centrally-managed SoS or a best-effort interoperable set of systems. And one would explore alternative architectural concepts for developing and evolving the system; develop alternative phased plans to determine which improvements would provide the best early benefits and foundations for future growth; evaluate their relative feasibility, benefits, and risks for stakeholders to review; and negotiate commitments of further resources to proceed into a Valuation phase. Similar concurrency is needed all the way down to small time-constrained web applications. Every year, we use the ICM to teach software engineering by having over a dozen student teams define, design, develop, and deploy web applications for real clients in a fixed 24-week time period, with a 92% success rate. 2.1 How is All This Concurrent Engineering Synchronized and Stabilized? Figure 1 indicates that a great deal of concurrent activity occurs within and across the various ICM phases. To make this concurrency work, the anchor point milestone reviews are the mechanism by which the many concurrent activities are synchronized, stabilized, and risk-assessed at the end of each phase [5,6]. Each of these anchor point milestone reviews, labeled at the top of Figure 1, is focused on developer-produced evidence, instead of PowerPoint charts and Unified Modeling Language (UML) diagrams, to help the key stakeholders determine the next level of commitment. For example, the developer of a system with a requirement for a one-second real-time task completion for a safety-critical system should provide evidence based on prototyping, benchmarking, modeling, or simulation using representative workloads that the system as designed will meet the task completion time requirement, rather than just promise to "build it now and tune it later," as is frequently the practice in ad-hoc development or when using agile methods. If the requirement had been for a 1-second desirable, 3-seconds acceptable user response time for a non-critical system, agile would generally be fine. For the Exploration Commitment Review (ECR), the focus is on a review of an Exploration Phase plan with the proposed scope, schedule, deliverables, and required resource commitment, by a key subset of stakeholders. The plan content is risk-driven, and could therefore be put on a single page for a small and non-controversial Exploration phase since there is minimal risk of getting it wrong. A much riskier Exploration phase would require a more detailed plan outlining how the risks will be re-evaluated and managed going forward. For the Valuation Commitment Review (VCR), the risk-driven focus is similar; the content includes the Exploration phase results and a Valuation phase plan; and a review by all of the stakeholders involved in the Valuation phase. The Foundations Commitment Review (FCR) and the Development Commitment Review (DCR) reviews are based on the highly successful AT&T Architecture Review

3 Figure 1 - The ICM activity categories and level of effort. Board procedures described in [6]. For the FCR, only highrisk aspects of the Operational Concept, Requirements, Architecture, and Plans are elaborated in detail. And it is sufficient to provide evidence that at least one combination of those artifacts satisfies the Feasibility Evidence criteria shown in Figure 2 (similar to the RUP Life Cycle Objectives milestone), as compared to demonstrating this at the DCR for the particular choice of artifacts to be used for development. 3 The ICM Phase View Figure 2 emphasizes that shortfalls in feasibility evidence are sources of risk, and should be addressed by risk management plans. The degree of risk in going forward into the next phase is the key decision criterion that stakeholders need to consider in committing their resources to support going forward into the next phase. An overview of the ICM life cycle stages and phases is shown in Figure 3. It identifies the major life cycle stages of System Definition (Stage I) and System Development, Operations, and Production (Stage II). It shows the Stages concurrently engineered life cycle phases, the stakeholder commitment review points, and their use of feasibility rationales to assess the compatibility, feasibility and risk

4 Pass/Fail Feasibility Evidence Description Evidence provided by developer and validated by independent experts that if the system is built to the specified architecture, it will: Satisfy the requirements: capability, interfaces, level of service, and evolution Support the operational concept Be buildable within the budgets and schedules in the plan Generate a viable return on investment Generate satisfactory outcomes for all of the successcritical stakeholders Shortfalls in evidence are sources of risk All major risks resolved or covered by risk management plans Serves as basis for stakeholders commitment to proceed associated with the concurrently-engineered artifacts; and the major focus of each life cycle phase. There are a number of alternatives at each commitment point. These are: (1) the risks are negligible and no further analysis and evaluation activities are needed to complete the next phase; (2) the risk is acceptable and work can proceed to the next life cycle phase: (3) the risk is addressable but requires backtracking; or (4) the risk is too great and the development process should be rescoped or halted. These risks are assessed by the system s success-critical stakeholders, whose commitment will be based on whether the current level of system definition gives sufficient evidence that the system will satisfy their value propositions. Thus there are many risk-driven paths through the life cycle. A more risk-seeking set of stakeholders will tend to go forward or skip phases at a decision point; for the same level of risk, a more risk-averse set of stakeholders may choose to extend the previous phase, rescope, or discontinue the project. Figure 2 Pass/Fail FED Overview. Figure 3 Overview of the Incremental Commitment Life Cycle Processes.

5 4 Applying ICM to the Case Study 4.1 Understanding Needs The first step in understanding the needs for an initiative is to determine its protagonist, who provided the primary impetus for it. In this case, it was the corporate sector President, based on several experiences of financial losses due to missed deadlines or errors in financial reporting, making payments, or tracking receivables. The next step is to identify and query success-critical stakeholders with respect to their perceptions of the needs and opportunities. Some examples of their responses would have been: Accounting and Finance: We have many reporting and payment deadlines with significant financial and corporate image problems if we miss them or get the responses wrong: taxes, contracts, invoices, accounts payable and receivable, etc. We have to hire too many people to do redundant data entry, data conversion, and data checking. These lead to convoluted internal and external business workflows. And we re always behind on finding and fixing side effects from changes in the software. Project Management: We need too many Program Office people to straighten out problems with our budgets, schedules, earned value management systems, purchases, travel and other direct costs. Our technical people spend way too much time dealing with these as well. And it takes the IT people way too long to fix the problems that we find. IT : We have too many change requests and problem reports, and not enough people to do more than patch our tangled mass of old software, run some old regression tests, and hope for the best. We know that this causes problems and makes future changes harder, but there s no time or staff to work the underlying problems. And we need to provide continuity of service; there s no time that we can shut things down until they re fixed. Besides these stakeholders, there are several other classes of internal and external success-critical stakeholders that are important to involve to fully understand the needs and to subsequently set priorities. These include enterpriselevel corporate personnel; customers; critical supply chain personnel; software development, database administration, and clerical personnel; marketing and sales personnel; etc. These people can help both in understanding the problem symptoms, but also in understanding their root causes and identifying opportunities for improvement. 4.2 Root Cause Analysis Results Prioritization of the stakeholder needs confirmed that fixing the central financial data processing situation was the toppriority issue needing resolution. The primary root cause of most of its problems, and of the challenges in migrating to a new system while providing continuity of service, was the highly coupled tangle of financial and non-financial services among the business software packages. Compounding the difficulties was the fact that these were organized around services other than financial services, such as contract services and project services, as shown in Figure 4. Contract Legacy Business Budgeting Project Staffing Deliverables Management Billing Work Breakdown Structure Earned Value Management Subcontracting Scheduling Progress Tracking Change Tracking Reqs, Configuration Management Figure 4 Legacy systems, patched, highly coupled financial and non-financial services. 5 Envisioning opportunities; System Scoping The major opportunity identified in discussions with the stakeholders, with related organizations, and technical experts was to re-engineer the legacy software into a service-oriented architecture (SOA) in a way that the financial software services could be independently addressed. To provide continuity of service, it was also important to organize the transition into increments of development that corresponded to the re-engineered legacy components, and to predicate cutover to new increments of software on their passage of a much more comprehensive set of regression tests and parallel operations with the legacy system. This approach corresponds to a macro version of the test-driven refactoring approach developed by the agile methods community [7]. However, refactoring the legacy software and performing incremental development of the replacement software are only one of several initiatives that are key to achieving the resulting benefits of faster and more reliable business process execution, reduced clerical staff, more satisfied customers, and improve financial performance. A good way to identify these complementary initiatives is the use the DMR Consulting Group s Results Chain approach [8], which links Initiatives to Contributions and Outcomes, subject to Assumptions. Additional initiatives critical to achieving the desired outcomes here would include reengineering the relevant business processes and workflows; coordinating interfaces with corporate financial operations and external interoperators; data conversions; and training and re-careering of clerical personnel. The ICM includes an extension of the Results Chain, called the Benefits Chain, that includes the identification of success-critical stakeholders [9].

6 Legacy Business Contract Project Contract Billing Subcontract payments Contract Non- Deliverables mgmt. Terms compliance General Accounting Budgeting Earned value Payroll General Non- Progress tracking Change tracking Project WBS Expenditure categories Project Non- Scheduling Staffing Reqs CM Figure 5 Result of Legacy System Re-Engineering 6 System Architecting, Life Cycle Planning, and Feasibility Evidence/Risk Assessment The result of refactoring the legacy software is shown in Figure 5. It reorganizes the legacy software into a set of services that preserve the previous Contract and Project, but that separate out the so that they can be replaced by new increments of software. As shown in Figure 3, the ICM approach to concurrent legacy re-engineering and architecture development of the new software proceeds in three Stage I system definition phases. In the Exploration phase, enough analysis of the legacy software and the proposed reengineering of it in Figure 5 is done to provide a Feasibility Evidence Description (FED) [10] that convinces the stakeholders that the risks of incrementally committing to the next phase of detailed prototyping and architecting are acceptable. Usually, by the end of the Exploration phase, the project has understood the SIS needs and opportunities well enough to decide which ICM special-case process is determined by the project s risk pattern. Table 1 shows three of the closest special cases to the case study, as documented in [11]; the discussion below indicates under what conditions each would have been selected. Table 1 Characteristics of the Risk-Driven Special Cases of the ICM Special Case Example Size, Complexity Change Rate (%/Month) Criticality NDI Support Organizational and Personnel Capability 3. Architected Agile 7. NDIintensive Business data processing Supply chain management 11. Brownfield Incremental legacy phaseout Med 1-10 Med-High Good; most in place Med-High Med-Very High NDI-driven architecture High-Very High Med-High NDI aids legacy replacement Legend: NDI: Non-Development Item; SOA: Service-Oriented Architecture. Agile-ready Med-high NDI- experienced; med-high Legacy-SOA reengineering In the case study as described, the project has acceptable risk levels with respect to the size, complexity, change rate, criticality, NDI support, and capability levels in the Brownfield row, and therefore fits the Brownfield special case project. However, if the legacy assessment concluded that the complexities of re-engineering the legacy software exceeded the capabilities of the available personnel but could be replaced by NDI software familiar to the organization and personnel, the project would have chosen the NDI-intensive special case to completely replace the legacy system. If the application were smaller and less critical and the organization had agile-ready personnel, the Architected Agile special case could be used to do besteffort refactoring of the legacy software.

7 In the Valuation phase, a similar FED-based risk assessment and commitment review are held. Here, the FED results are based on the prototyping and modelingbased evidence of system development return on investment resulting from a top-level cost-benefit analysis of the legacy re-engineering activities, the architecting and infrastructure determination of the new software, and the additional success-critical Initiatives. A more detailed FED- based risk assessment and commitment review are held at the Development Commitment Review at the end of the Foundations phase, which prepares the detailed build-to specifications and plans for the first increment of development and phaseout of the corresponding re-engineered legacy software. It also prepares decreasingly detailed baseline specifications and plans for the later increments of development and phaseout of the corresponding re-engineered legacy software, along with detailed evidence of feasibility and risk management plans for any remaining risks. Once the stakeholders commit their resources to proceed, the program enters the ICM Stage II of Incremental Development and Operations (and Production if hardware is involved), as shown in Figure 3. To ensure on-schedule delivery of each increment, its features are prioritized, and lower priority features are deferred to meet schedule. The development team is stabilized by keeping increments short and diverting potentially-destabilizing change traffic to a parallel systems engineering team, which handles the change traffic (including deferred features), and rebaselines the specifications and plans for the next increment, so that the development team is ready to go with another increment of stabilized development once they have completed the current increment. As shown in Figure 1, the systems engineering team is also pro-actively understanding new business needs and envisioning new solution opportunities that keep the application continuously competitive. Also, the team should be staffed with a sufficiently critical mass of talented personnel that they can keep the software from degrading into the poorly structured and documented legacy software problems of the past. 7 Comparison of ICM, CMU-SEI SMART, and IBM Brownfield Approaches Table 2 summarizes the major comparisons of the ICM, the CMU-SEI Service Migration and Reuse Technique (SMART) [12, 13], and the IBM Brownfield approach [14]. Table 2 Comparison of ICM, CMU-SEI SMART, and IBM Brownfield Approaches Activity ICM CMU-SEI SMART IBM Brownfield Understanding Needs Envisioning Opportunities System Scoping Architecting Solutions Life Cycle Planning Feasibility Evidence Enterprise objectives Current shortfalls Stakeholder inputs Root causes ERP, DBMS COTS packages Legacy re-engineering Service-oriented architecture Prototypes (GUI, COTS) Operational Concept Application priorities Increment priorities Evolutionary development End-state architecture Infrastructure determination Legacy-SOA re-engineering Incremental definition Evidence/risk-driven commitment reviews Incremental development and concurrent rebaselining Complementary initiatives Business case elaboration Technical, cost, and schedule feasibility evidence Expert-validated evidence Business drivers Legacy Environmment Stakeholder inputs; Service Migration Interview Guide Reference architectures Candidate services Legacy code analysis and restructuring tools Business processes Business goals Target SOA environment Quality of service levels Architectural views definition Legacy-SOA re-engineering Migration strategy identification and creation guidelines Ordering of increments SMART Tool support Complementary initiatives Top-level feasibility summary Gap analysis: cost, risk, legacy quality Pilot project Business context Legacy inventory Stakeholder views Site survey View-Inventory- Transformation-Artifacts conceptualization process Architectural frameworks Systems context Computation-independent, platform-independent, and platform-specific models Component model Operational model Performance model Engineering Plan: discovery, engineering, development, and test Size and effort estimation Test case generation Architecture testing: evidence of satisfactory model performance Code testing

8 As seen in Table 2, the three approaches share many similarities, but have particular unique strengths. The ICM s primary unique strengths are the strong emphasis on solution feasibility evidence as a basis of stakeholder review and commitment to proceed, and the evolutionary development approach featuring concurrent presentincrement stabilized development and next-increment change traffic handling and rebaselining. The SEI SMART approach s primary unique strengths are its Service Migration Interview Guide and its SMART Tool for producing a draft migration strategy and migration issues list. The IBM Brownfield approach s primary unique strengths are its View-Inventory-Transformation-Artifacts conceptualization process and its Discovery-Engineering- Development-Test implementation process. Overall, the three approaches are basically compatible and complementary. 8 Conclusions Application of the ICM to a case study of a failed Brownfield project showed that its risk patterns enabled it to generate a life cycle process for Brownfield projects that is basically compatible with two leading Brownfield approaches, the CMU-SEI SMART approach and the IBM Brownfield approach. The ICM s primary unique strengths are the strong emphasis on solution feasibility evidence as a basis of stakeholder review and commitment to proceed, and the evolutionary development approach featuring concurrent present-increment stabilized development and next-increment change traffic handling and rebaselining. However, the SMART and Brownfield approaches are stronger with respect to the specifics of Brownfield software development, and provide effective ways of pursuing Brownfield developments in concert with the ICM system definition and evolutionary development approach. 9 References [1] Price, H., and Morley, J. (2009), Create, Apply, and Amplify: A Story of Technology Development, SEI Monitor, February, p.2. [2] Kruchten, P. (1999), The Rational Unified Process, Addison Wesley. [3] Pew, R. W., and Mavor, A. S., (2007), Human-System Integration in the System Development Process: A New Look, National Academy Press. [4] Boehm, B. and Lane, J. (2007), Using the Incremental Commitment Model to Integrate System Acquisition, Systems Engineering, and Software Engineering, CrossTalk, October, pp [5] Boehm, B. (1996), Anchoring the Software Process, IEEE Software, July, pp [6] Maranzano, J. et al. (2005), Architecture Reviews: Practice and Experience, IEEE Software, March/April, pp [7] Fowler, M., Beck, K., et al. (1999), Refactoring, Addison Wesley. [8] Thorp, J. (1998), The Information Paradox: Realizing the Business Benefits of Information Technology, McGraw Hill. [9] Boehm, B., and Jain, A. (2006), "A Value-Based Theory of Systems Engineering," Proceedings, INCOSE [10] Boehm, B., and Lane, J. (2009), Better Management of Development Risks: Early Feasibility Evidence, Proceedings, CSER [11] Boehm, B., Lane, J., and Koolmanojwong, S. (2009), A Risk-Driven Process Decision Table to Guide System Development Rigor, submitted for presentation at the 2009 International Council on Systems Engineering (INCOSE) Symposium. [12] Seacord, R., Plakosh, D., and Lewis, G. (2003), Modernizing Legacy Systems, Addison Wesley. [13] Lewis, G. et al. (2008), SMART: Analyzing the Reuse Potential of Legacy Components on a Service- Oriented Architecture Environment, CMU/SEI-2008-TN [14] Hopkins, R., and Jenkins, K. (2008), Eating the IT Elephant: Moving from Greenfield Development to Brownfield, IBM Press.

A Data Item Description for System Feasibility Evidence

A Data Item Description for System Feasibility Evidence A Data Item Description for System Feasibility Evidence Barry Boehm, Jo Ann Lane, Supannika Koolmanojwong, USC Richard Turner, Stevens NDIA Systems Engineering Conference October 24, 2012 Summary Schedule-based

More information

Evidence-Based Software Processes

Evidence-Based Software Processes Evidence-Based Software Processes Barry Boehm 1, and Jo Ann Lane 1 1 University of Southern California 941 W. 37th Street Los Angeles, California, 90089 USA 1-213-740-8163 {boehm, jolane} at usc.edu Abstract.

More information

Evidence-Based Software Processes

Evidence-Based Software Processes Evidence-Based Software Processes Barry Boehm and Jo Ann Lane University of Southern California 941 W. 37th Street Los Angeles, California, 90089 USA 1-213-740-8163 {boehm,jolane}@usc.edu Abstract. Many

More information

An Overview of Software Process

An Overview of Software Process An Overview of Software Process Objectives To introduce the general phases of the software development life cycle (SDLC) To describe various generic software process models and discuss their pros and cons

More information

Parallel Development and The Incremental Commitment Spiral Model (ICSM)

Parallel Development and The Incremental Commitment Spiral Model (ICSM) Parallel Development and The Incremental Commitment Spiral Model (ICSM) Barry Boehm, USC ARR 2018, March 13, 2018 Outline Current and future process challenges The Four D s: Dynamism, Dependability, Doubtfulness,

More information

Complex Systems of Systems (CSOS) : Software Benefits,Risks,and Strategies

Complex Systems of Systems (CSOS) : Software Benefits,Risks,and Strategies Complex Systems of Systems (CSOS) : Software Benefits,Risks,and Strategies Barry Boehm, USC Vic Basili, Fraunhofer Maryland SIS Acquisition Conference January 28, 2003 10/22/02 USC-CSE 1 Complex Systems

More information

Using the Incremental Commitment Model (ICM) to Help Execute Competitive Prototyping (CP) Charts with Notes

Using the Incremental Commitment Model (ICM) to Help Execute Competitive Prototyping (CP) Charts with Notes Using the Incremental Commitment Model (ICM) to Help Execute Competitive Prototyping (CP) Charts with Notes Barry Boehm and Jo Ann Lane University of Southern California http://csse.usc.edu Outline Motivation

More information

Avoiding Overruns in the Specification of Non-Functional Requirements

Avoiding Overruns in the Specification of Non-Functional Requirements Avoiding Overruns in the Specification of Non-Functional Requirements Barry Boehm, USC CSSE GSAW 2016 March 2, 2016 Summary: Avoiding NFR Overruns The Multiplicative Effect of NFRs on Cost Response-time

More information

Introduction to the ICSM

Introduction to the ICSM Introduction to the ICSM What Is the ICSM? The ICSM is a principles-based, process framework or meta-model that supports the generation of lifecycle processes based on the characteristics, constraints

More information

Software Engineering

Software Engineering Software Engineering (CS550) Software Development Process Jongmoon Baik Software Development Processes (Lifecycle Models) 2 What is a S/W Life Cycle? The series of stages in form and functional activity

More information

7. Model based software architecture

7. Model based software architecture UNIT - III Model based software architectures: A Management perspective and technical perspective. Work Flows of the process: Software process workflows, Iteration workflows. Check Points of The process

More information

Using the Incremental Commitment Model to Integrate System Acquisition, Systems Engineering, and Software Engineering

Using the Incremental Commitment Model to Integrate System Acquisition, Systems Engineering, and Software Engineering Using the Incremental Commitment Model to Integrate System Acquisition, Systems Engineering, and Software Engineering Barry Boehm and Jo Ann Lane University of Southern California Center for Systems and

More information

Explore Comparative Analysis Software Development Life Cycle Models

Explore Comparative Analysis Software Development Life Cycle Models Explore Comparative Analysis Software Development Life Cycle Models Anshu Mishra Assistant Professor, Department of Information Science and Engineering Jyothy Institute of Technology, Bangalore Abstract-The

More information

The Incremental Commitment Model (ICM), with Ground Systems Applications

The Incremental Commitment Model (ICM), with Ground Systems Applications The Incremental Commitment Model (ICM), with Ground Systems Applications Barry Boehm, USC-CSSE http://csse.usc.edu (tech report 2009-500) Presented at GSAW 2009, March 25, 2009 Outline Challenges for developing

More information

Life Cycle Plan (LCP)

Life Cycle Plan (LCP) Life Cycle Plan (LCP) < LEMA Pilot School Integrated Family Accountability System> PROJECT TITLE LEMA FAMILY ACCOUNTABILITY SYSTEM TEAM NO #04 TEAM MEMBERS & ROLES NAME ROLES Teawon Han Project Manager

More information

System Development Process: The Incremental Commitment Model 1

System Development Process: The Incremental Commitment Model 1 System Development Process: The Incremental Commitment Model 1 PRINCIPLES TO ACHIEVE SUCCESSFUL SYSTEM DEVELOPMENT The ultimate goal of system development is to deliver a system that satisfies the needs

More information

Synthesis of Existing Cost Models to Meet System of Systems Needs

Synthesis of Existing Cost Models to Meet System of Systems Needs Paper #128 Synthesis of Existing Cost Models to Meet System of Systems Needs Jo Ann Lane University of Southern California Center for Software Engineering 941 W. 37th Place, SAL Room 328 Los Angeles, CA

More information

Question Paper Solution (75:25), April 2015 Subject : Software Project Management

Question Paper Solution (75:25), April 2015 Subject : Software Project Management Question Paper Solution (75:25), April 2015 Subject : Software Project Management Ques1. (a) Discuss the significance, of reducing the product size, on ROI (returns on investment). Explain, briefly, how

More information

Rational Unified Process (RUP) in e-business Development

Rational Unified Process (RUP) in e-business Development Rational Unified Process (RUP) in e-business Development Jouko Poutanen/11.3.2005 2004 IBM Corporation Agenda Characteristics of e-business Development Business Modeling with RUP and UML Rational Tools

More information

Oracle Unified Method (OUM) The OUM Implement Core Workflow The Key to Understanding and Applying OUM. An Oracle White Paper April 2012

Oracle Unified Method (OUM) The OUM Implement Core Workflow The Key to Understanding and Applying OUM. An Oracle White Paper April 2012 Oracle Unified Method (OUM) The OUM Implement Core Workflow The Key to Understanding and Applying OUM An Oracle White Paper April 2012 OUM Implement Core Workflow White Paper Introduction... 3 OUM is Iterative...

More information

Principles for Successful Systems Engineering

Principles for Successful Systems Engineering Available online at www.sciencedirect.com Procedia Computer Science 8 (2012) 297 302 New Challenges in Systems Engineering and Architecting Conference on Systems Engineering Research (CSER) 2012 St. Louis,

More information

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation Chapter 2 Software Processes Lecture 1 Software process descriptions When we describe and discuss processes, we usually talk about the activities in these processes such as specifying a data model, designing

More information

USDA Shared Services Journey

USDA Shared Services Journey USDA Shared Services Journey USDA was named as an SAP Federal Financial Shared Services Provider in May 2014, able to offer financial system services within the federal government. This was in response

More information

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2 Passit4Sure.OG0-093.221Questions Number: OG0-093 Passing Score: 800 Time Limit: 120 min File Version: 7.1 TOGAF 9 Combined Part 1 and Part 2 One of the great thing about pass4sure is that is saves our

More information

The Fourth Principle: Evidence and Risk-Based Decision Making

The Fourth Principle: Evidence and Risk-Based Decision Making 4 The Fourth Principle: Evidence and Risk-Based Decision Making Look before you leap Anonymous proverb He who hesitates is lost Anonymous proverb The Third Principle emphasizes having a variety of systems

More information

When Does Requirements Volatility Stop All Forward Progress?

When Does Requirements Volatility Stop All Forward Progress? When Does Requirements Volatility Stop All Forward Progress? Practical Software and Systems Measurement User s Group Conference Golden, Colorado July 2007 Jo Ann Lane and Barry Boehm University of Southern

More information

! How work in building software is done: ! e.g., waterfall process. ! e.g., object-oriented development. ! e.g., requirements inspection process

! How work in building software is done: ! e.g., waterfall process. ! e.g., object-oriented development. ! e.g., requirements inspection process Software Process Process CMPUT 401 Module 04! How work in building software is done:! e.g., waterfall process! e.g., object-oriented development! e.g., requirements inspection process Department of Computing

More information

Introduction of RUP - The Rational Unified Process

Introduction of RUP - The Rational Unified Process Introduction of RUP - The Rational Unified Process Jong-Hoon Lee Dependable Software Laboratory Konkuk University References Textbook: The Rational Unified Process Made Easy A Practitioner s Guide to the

More information

Process. CMPUT 401 Module 04. Department of Computing Science University of Alberta Ken Wong, 2008

Process. CMPUT 401 Module 04. Department of Computing Science University of Alberta Ken Wong, 2008 Process CMPUT 401 Module 04 Department of Computing Science University of Alberta Ken Wong, 2008 Software Process How work in building software is done: e.g., waterfall process e.g., object-oriented development

More information

CHAPTER 2: IMPLEMENTATION PHASES AND OFFERINGS

CHAPTER 2: IMPLEMENTATION PHASES AND OFFERINGS CHAPTER 2: IMPLEMENTATION PHASES AND OFFERINGS Objectives Introduction The objectives are: Describe the purpose of the phase planning activity, preconditions, and deliverables in the implementation methodology.

More information

Teaching the Elephant to Dance: Agility Meets Systems of Systems Engineering and Acquisition

Teaching the Elephant to Dance: Agility Meets Systems of Systems Engineering and Acquisition Barry Boehm University of Southern California boehm@sunset.usc.edu Teaching the Elephant to Dance: Agility Meets Systems of Systems Engineering and Acquisition Keynote, GSAW 2005 March 3, 2005 Outline

More information

ADM The Architecture Development Method

ADM The Architecture Development Method ADM The Development Method P Preliminary Phase Preliminary Phase Determine the Capability desired by the organization: Review the organizational context for conducting enterprise architecture Identify

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 Friday 30 th September 2016 - Morning Answer any THREE questions

More information

Architected Agile Solutions for Software-Reliant Systems

Architected Agile Solutions for Software-Reliant Systems Architected Agile Solutions for Software-Reliant Systems Barry Boehm, Jo Ann Lane, Supannika Koolmanojwong University of Southern California {boehm, jolane, koolmano} at usc.edu Richard Turner Stevens

More information

An Oracle White Paper February Oracle Unified Method (OUM) Oracle s Full Lifecycle Method for Deploying Oracle-Based Business Solutions

An Oracle White Paper February Oracle Unified Method (OUM) Oracle s Full Lifecycle Method for Deploying Oracle-Based Business Solutions An Oracle White Paper February 2014 Oracle Unified Method (OUM) Oracle s Full Lifecycle Method for Deploying Oracle-Based Business Solutions Executive Overview... 1 Introduction... 1 Standards Based...

More information

The Role of Architecture in Enterprise Processes

The Role of Architecture in Enterprise Processes Journal of Applied Business and Economics The Role of Architecture in Enterprise Processes Charles W. Butler Colorado State University This paper defines a strategy for implementing enterprise architecture

More information

Software Architecture Challenges for Complex Systems of Systems

Software Architecture Challenges for Complex Systems of Systems Software Architecture Challenges for Complex Systems of Systems Barry Boehm, USC-CSE CSE Annual Research Review March 6, 2003 (boehm@sunset.usc.edu) (http://sunset.usc.edu) 3/18/03 USC-CSE 1 Complex Systems

More information

Software Engineering II - Exercise

Software Engineering II - Exercise Software Engineering II - Exercise April 29 th 2009 Software Project Management Plan Bernd Bruegge Helmut Naughton Applied Software Engineering Technische Universitaet Muenchen http://wwwbrugge.in.tum.de

More information

Software Life Cycle. Main Topics. Introduction

Software Life Cycle. Main Topics. Introduction Software Life Cycle Main Topics Study the different life cycle models Study the difference between software maintenance and evolution Study product line engineering as a design methodology 2 Introduction

More information

System-of-Systems Cost Estimation: Analysis of. Lead System Integrator Engineering Activities

System-of-Systems Cost Estimation: Analysis of. Lead System Integrator Engineering Activities System-of-Systems Cost Estimation: Analysis of Lead System Integrator Engineering Activities Jo Ann Lane, University of Southern California, USA; E-mail: TUjolane@usc.eduUT Dr. Barry Boehm, University

More information

Development Process and Analysis. LTOOD/OOAD - Verified Software Systems 1

Development Process and Analysis. LTOOD/OOAD - Verified Software Systems 1 Development Process and Analysis LTOOD/OOAD - Verified Software Systems 1 Software Crisis Declared in the late 60 s Expressed by delays and failures of major software projects (unreached goals, unpredictable

More information

The Systems Development Lifecycle

The Systems Development Lifecycle Modelling and Systems Development Lecture 2 The Systems Development Lifecycle The four-phase model common to all system developments projects The project Major attributes of the Lifecycle Moves systematically

More information

Next Generation Trends:

Next Generation Trends: Next Generation Trends: Systems and Software Engineering Barry Boehm, USC-CSSE http://csse.usc.edu CSSE Annual Research Review April 15, 2015 4/15/2015 1 Motivation What helped me most in becoming a good

More information

TEN TIPS FOR A SUCCESSFUL INFOR IMPLEMENTATION

TEN TIPS FOR A SUCCESSFUL INFOR IMPLEMENTATION TEN TIPS FOR A SUCCESSFUL INFOR IMPLEMENTATION Copyright 2014 Panorama Consulting Solutions. All Rights Reserved. 720.515.1377 Panorama-Consulting.com Successfully implementing an Infor ERP system involves

More information

Process, Models, Methods, Diagrams Software Development Life Cyles. Part - II

Process, Models, Methods, Diagrams Software Development Life Cyles. Part - II Process, Models, Methods, Diagrams Software Development Life Cyles Part - II A bench-mark for measuring the maturity of an organization s software process CMM defines 5 levels of process maturity based

More information

03. Perspective Process Models

03. Perspective Process Models 03. Perspective Process Models Division of Computer Science, College of Computing Hanyang University ERICA Campus 1 st Semester 2017 Prescriptive Process Models advocates an orderly approach to software

More information

CTC/ITC 310 Program Management California State University Dominguez Hills First Exam Answer Key November 20, 2018 Instructor: Howard Rosenthal

CTC/ITC 310 Program Management California State University Dominguez Hills First Exam Answer Key November 20, 2018 Instructor: Howard Rosenthal CTC/ITC 310 Program Management California State University Dominguez Hills First Exam Answer Key November 20, 2018 Instructor: Howard Rosenthal There are 30 questions on this exam. Each question is worth

More information

This chapter illustrates the evolutionary differences between

This chapter illustrates the evolutionary differences between CHAPTER 6 Contents An integrated approach Two representations CMMI process area contents Process area upgrades and additions Project management concepts process areas Project Monitoring and Control Engineering

More information

Chapter 3 Prescriptive Process Models

Chapter 3 Prescriptive Process Models Chapter 3 Prescriptive Process Models - Generic process framework (revisited) - Traditional process models - Specialized process models - The unified process Generic Process Framework Communication Involves

More information

Processes. Object Orientated Analysis and Design. Benjamin Kenwright

Processes. Object Orientated Analysis and Design. Benjamin Kenwright Processes Object Orientated Analysis and Design Benjamin Kenwright Outline Review What are Processes? Why are they important in Object Orientated Analysis and Design Conclusion and Discussion Summary Revision

More information

Model Driven Development Needs More Than Product Models

Model Driven Development Needs More Than Product Models Model Driven Development Needs More Than Product Models Barry Boehm, USC USC-CSE Executive Workshop on MDA Mar. 16 th, 2005 3/16/2005 USC-CSE 1 Nature of Model Clashes Outline Among product, process, property,

More information

Feasibility Evidence Description (FED)

Feasibility Evidence Description (FED) Feasibility Evidence Description (FED) Improving Thai CDC: Client/Donor/Partner Communications and Project Tracking Tool Development Team 1 Katelyn Swift-Spong: Project Manager/Operational Concept Engineer

More information

The Work Breakdown Structure in the Systems Engineering Process. Abstract. Introduction

The Work Breakdown Structure in the Systems Engineering Process. Abstract. Introduction The Work Breakdown Structure in the Systems Engineering Process Mark A. Wilson Strategy Bridge International, Inc. 9 North Loudoun Street, Suite 208 Winchester, VA 22601-4798 mwilson@strategybridgeintl.com

More information

Succeed with Agile at Scale

Succeed with Agile at Scale IBM Software Group Succeed with Agile at Scale Alfred Tse/Osmond Ng Rational Software Technical Professionals Growth Markets Asia Pacific June 25, 2009 2008 IBM Corporation Agenda Agile Software Development

More information

Software Development Methodologies. CSC 440: Software Engineering Slide #1

Software Development Methodologies. CSC 440: Software Engineering Slide #1 Software Development Methodologies CSC 440: Software Engineering Slide #1 Topics 1. The Waterfall Model 2. Agile Software Development 3. The Unified Process 4. Object-Oriented Analysis and Design 5. The

More information

Object-Oriented Software Engineering Practical Software Development using UML and Java. Chapter 11: Managing the Software Process

Object-Oriented Software Engineering Practical Software Development using UML and Java. Chapter 11: Managing the Software Process Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 11: Managing the Software Process 11.1 What is Project Management? Project management encompasses all the

More information

What s in the Code Unraveling the Enigma of Legacy Systems. logical solutions. adjusted to the need

What s in the Code Unraveling the Enigma of Legacy Systems. logical solutions. adjusted to the need What s in the Code Unraveling the Enigma of Legacy Systems logical solutions adjusted to the need Wouldn t it be brilliant to have a logical solution to: IDENTIFY SERVICES: Start with your business analysis,

More information

Unified Process. Peter Dolog dolog [at] cs [dot] aau [dot] dk Information Systems March 3, 2008

Unified Process. Peter Dolog dolog [at] cs [dot] aau [dot] dk Information Systems March 3, 2008 Unified Process Peter Dolog dolog [at] cs [dot] aau [dot] dk 5.2.47 Information Systems March 3, 2008 2 Outline Model Driven Design Tutorial on Requirements Eng. and SCRUM reflections (D402a, s601c) Unified

More information

MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1

MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1 MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1 MIS 180: Principles of Information Systems 1. Explain the importance of determining information system requirements for all management

More information

Agility in Defense SE & Acquisition: Some Critical Success Factors

Agility in Defense SE & Acquisition: Some Critical Success Factors Agility in Defense SE & Acquisition: Some Critical Success Factors Barry Boehm, USC NDIA SE Conference October 30, 2014 10/30/2014 1 Summary Agile Defense SE & Acquisition and BBP 3.0 Better Buying Power

More information

System-of-Systems Influences on Acquisition Strategy Development

System-of-Systems Influences on Acquisition Strategy Development System-of-Systems Influences on Acquisition Strategy Development Rita Creel Robert J. Ellison June 23008 ABSTRACT: An acquisition strategy is a top-level roadmap that focuses on highlighting and managing

More information

COSOSIMO Parameter Definitions Jo Ann Lane University of Southern California Center for Software Engineering

COSOSIMO Parameter Definitions Jo Ann Lane University of Southern California Center for Software Engineering Constructive System-of-Systems Integration Cost Model COSOSIMO Parameter Definitions Jo Ann Lane University of Southern California Center for Software Engineering jolane@usc.edu Introduction The Constructive

More information

Rational Software White Paper TP 174

Rational Software White Paper TP 174 Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP 174 Table of Contents Abstract... 1 Introduction... 1 Level 2, Repeatable... 2 Requirements Management...

More information

SOA Research Agenda. Grace A. Lewis

SOA Research Agenda. Grace A. Lewis Workshop SOA Research Agenda Grace A. Lewis Workshop Approach Broadened the scope of the research agenda to show that we are interested in more than just SOA as an architectural style Performed an extensive

More information

Exam Questions OG0-091

Exam Questions OG0-091 Exam Questions OG0-091 TOGAF 9 Part 1 https://www.2passeasy.com/dumps/og0-091/ 1. According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of an overall

More information

IBM BPM on zenterprise

IBM BPM on zenterprise IBM BPM on zenterprise The world has turned Andreas Gröschl, Mainframe Architect groeschl@de.ibm.com The Modern Enterprise is a Network of Complex Interactions Powered by Mainframe Assets 70% of corporate

More information

A Comparison Between Two Software Engineering Processes, RUP And Waterfall Models

A Comparison Between Two Software Engineering Processes, RUP And Waterfall Models A Comparison Between Two Software Engineering Processes, RUP And Waterfall Models Mina zaminkar a, Mohammad R. Reshadinezhad b a Graduate student,, Department of Computer Science Research Branch, Islamic

More information

Soa Readiness Assessment, a New Method

Soa Readiness Assessment, a New Method ISSN : 8-96, Vol., Issue 8( Version ), August 0, pp.- RESEARCH ARTICLE OPEN ACCESS Soa Readiness Assessment, a New Method Ali Mirarab, Najmeh Ghasemi Fard and Abdol Reza Rasouli Kenari Electrical and Computer

More information

TOGAF usage in outsourcing of software development

TOGAF usage in outsourcing of software development Acta Informatica Pragensia 2(2), 2013, 68 76, ISSN 1805-4951 Section: Online: aip.vse.cz Peer-reviewed papers TOGAF usage in outsourcing of software development Aziz Ahmad Rais 1, Rudolf Pecinovsky 1 1

More information

A Framework to Assess Legacy Software Systems

A Framework to Assess Legacy Software Systems JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 2014 111 A Framework to Assess Legacy Software Systems Basem Y. Alkazemi Department of Computer Science, Umm Al-Qura University, Makkah, Saudi Arabia Email:

More information

Presented at the 2009 ISPA/SCEA Joint Annual Conference and Training Workshop - Making the Case for SOA Arlene F.

Presented at the 2009 ISPA/SCEA Joint Annual Conference and Training Workshop -   Making the Case for SOA Arlene F. Making the Case for SOA Arlene F. Minkiewicz Introduction A Service Oriented Architecture (SOA) is a computing environment in which applications are composed, rather than developed, through a set of standard

More information

Risk Management. Andrea Polini. Software Project Management MSc in Computer Science University of Camerino A.Y. 2016/2017

Risk Management. Andrea Polini. Software Project Management MSc in Computer Science University of Camerino A.Y. 2016/2017 Risk Management Andrea Polini Software Project Management MSc in Computer Science University of Camerino A.Y. 2016/2017 Andrea Polini Risk Management SPM A.Y. 2016/2017 1 / 31 Risks First, risk concerns

More information

Feasibility Evidence Description (FED)

Feasibility Evidence Description (FED) Feasibility Evidence Description (FED) LEMA Pilot School Integrated Scheduling System Team No. 12 Name Primary Role Secondary Role David Wiggins Project Manager Developer Aakash Shah Prototyper Developer

More information

tit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation

tit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation tit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation Date: 6 April 2011 Priority: Low Security level: In Confidence Report

More information

Chapter 3. Information Systems Development. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 3. Information Systems Development. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Information Systems Development McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 3-2 Describe the motivation for a system development process

More information

Software Engineering Modern Approaches

Software Engineering Modern Approaches Software Engineering Modern Approaches Chapter : Software Process Eric Braude and Michael Bernstein Maintenance Testing The Software Development Lifecycle Implementation Design Phase most relevant to this

More information

Software Engineering and Software Engineers

Software Engineering and Software Engineers CS2 Software Engineering note 1 Software Engineering and Software Engineers The aim of the Software Engineering thread in CS2 is to further develop the study of the engineering process involved in creating

More information

Rekayasa Perangkat Lunak 2 (IN043): Pertemuan 10. * Construction, Installation and Operations * Agile Method Software Development

Rekayasa Perangkat Lunak 2 (IN043): Pertemuan 10. * Construction, Installation and Operations * Agile Method Software Development Rekayasa Perangkat Lunak 2 (IN043): Pertemuan 10 * Construction, Installation and Operations * Agile Method Software Development Construction Construction is the development of all parts of the system,

More information

GAHIMSS Chapter. CPHIMS Review Session. Systems Analysis. Stephanie Troncalli, Healthcare IT Strategist Himformatics July 22, 2016

GAHIMSS Chapter. CPHIMS Review Session. Systems Analysis. Stephanie Troncalli, Healthcare IT Strategist Himformatics July 22, 2016 GAHIMSS Chapter CPHIMS Review Session Systems Analysis Stephanie Troncalli, Healthcare IT Strategist Himformatics July 22, 2016 CPHIMS Competency Areas CPHIMS Examination Content Outline (effective February,

More information

Integration Competency Center Deployment

Integration Competency Center Deployment Service Offering Integration Competency Center Deployment Achieve Higher Levels of Performance & Capability Benefits Experienced Informatica Professional Services managers provide invaluable insight Lower

More information

Software Development Software Development Activities

Software Development Software Development Activities Software Development Software Development Activities Problem Definition Requirements Analysis Implementation Planning High-level Design (or Architecture) Detailed Design Coding and Unit Testing (Debugging)

More information

COCOMO III. Brad Clark, PhD USC Center for Systems and Software Engineering 2017 Annual Research Review April 4, 2017

COCOMO III. Brad Clark, PhD USC Center for Systems and Software Engineering 2017 Annual Research Review April 4, 2017 COCOMO III Brad Clark, PhD USC 2017 Annual Research Review April 4, 2017 The COCOMO III Project COCOMO (COnstructure COst MOdel) is the most widely used, free, open source software cost estimation model

More information

Address system-on-chip development challenges with enterprise verification management.

Address system-on-chip development challenges with enterprise verification management. Enterprise verification management solutions White paper September 2009 Address system-on-chip development challenges with enterprise verification management. Page 2 Contents 2 Introduction 3 Building

More information

Chapter. Redesigning The Organization With Information Systems

Chapter. Redesigning The Organization With Information Systems Chapter Redesigning The Organization With Information Systems 1 Objectives Demonstrate how building new systems produces organizational change Explain how a company can develop information systems that

More information

Software Development Methodologies

Software Development Methodologies Software Development Methodologies Lecturer: Raman Ramsin Lecture 5 Integrated Object-Oriented Methodologies: USDP and EUP 1 Unified Software Development Process (USDP) Also known as Unified Process (UP)

More information

Chapter 3 Software Process Model

Chapter 3 Software Process Model Usman Akram COMSATS Institute of information Technology lahore musmanakram@ciitlahore.edu.pk March 8, 2015 About software process model Outline 1 About software process model Build and Fix Model Why Models

More information

Oracle Cloud Blueprint and Roadmap Service. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Cloud Blueprint and Roadmap Service. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Oracle Cloud Blueprint and Roadmap Service 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Cloud Computing: Addressing Today s Business Challenges Business Flexibility & Agility Cost

More information

Management Accounting Concepts

Management Accounting Concepts 1 First Issued February 1989 Revised March 1998 Management Accounting Concepts CONTENTS Paragraphs Introduction... 1-6 Evolution and Change in Management Accounting... 7-20 Management Accounting and the

More information

Objectives. The software process. Topics covered. Waterfall model. Generic software process models. Software Processes

Objectives. The software process. Topics covered. Waterfall model. Generic software process models. Software Processes Objectives Software Processes To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software

More information

QUALITY ASSURANCE PLAN OKLAHOMA DEPARTMENT OF HUMAN SERVICES ENTERPRISE SYSTEM (MOSAIC PROJECT)

QUALITY ASSURANCE PLAN OKLAHOMA DEPARTMENT OF HUMAN SERVICES ENTERPRISE SYSTEM (MOSAIC PROJECT) QUALITY ASSURANCE PLAN OKLAHOMA DEPARTMENT OF HUMAN SERVICES ENTERPRISE SYSTEM (MOSAIC PROJECT) MOSAIC Quality Assurance Plan v04.02 Prepared by: Approved by: QUALITY ASSURANCE PLAN APPROVALS QA/QC Program

More information

The Strengths and Weaknesses of Software Architecture Design in the RUP, MSF, MBASE and RUP-SOA Methodologies: A Conceptual Review

The Strengths and Weaknesses of Software Architecture Design in the RUP, MSF, MBASE and RUP-SOA Methodologies: A Conceptual Review Reyes-Delgado, P. Mora, M., Duran-Limon H., Rodriguez-Martnez, L., O'Connor, R.V. and Mendoza-Gonzalez, R., The Strengths and Weaknesses of Software Architecture Design in the RUP, MSF, MBASE and RUP-SOA

More information

Striking the Balance Between Risk and Reward

Striking the Balance Between Risk and Reward Experience the commitment Striking the Balance Between Risk and Reward in payments modernization Staying competitive in financial services requires meeting everincreasing customer expectations for digital

More information

Life Cycle Plan (LCP)

Life Cycle Plan (LCP) Life Cycle Plan (LCP) LINGGGO 3 Chicheng Ren Software Architect Dahai Li Quality Focal Point Dashun Wen Life Cycle Planner Kraingkrai Bumroungruksa Prototyper

More information

Sistemi ICT per il Business Networking

Sistemi ICT per il Business Networking Corso di Laurea Specialistica Ingegneria Gestionale Sistemi ICT per il Business Networking Requirements Engineering Docente: Vito Morreale (vito.morreale@eng.it) 17 October 2006 1 UP Phases 1. Inception

More information

Credit where Credit is Due. Lecture 2: Software Engineering (a review) Goals for this Lecture. What is Software Engineering

Credit where Credit is Due. Lecture 2: Software Engineering (a review) Goals for this Lecture. What is Software Engineering Credit where Credit is Due Lecture 2: Software Engineering (a review) Kenneth M. Anderson Object-Oriented Analysis and Design CSCI 6448 - Spring Semester, 2002 Some material presented in this lecture is

More information

Feasibility Evidence Description (FED)

Feasibility Evidence Description (FED) Feasibility Evidence Description (FED) LEMA Pilot School Integrated Scheduling System Team No. 12 Name Primary Role Secondary Role David Wiggins Project Manager Developer Aakash Shah Prototyper Developer

More information

Project Management. Agenda - What will you learn today? Theory Lecture Plan. A Software Life-cycle Model Which part will we talk about today?

Project Management. Agenda - What will you learn today? Theory Lecture Plan. A Software Life-cycle Model Which part will we talk about today? Theory Lecture Plan 2 Lecture 2 Software Engineering TDDC88/TDDC93 Autumn 2008 Slides by Presented by Kristian Sandahl Department of Computer and Information Science Linköping University, Sweden krisa@ida.liu.se

More information

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Software Processes Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Objectives To introduce software process models To describe three generic process models and when they may be

More information

Program Lifecycle Methodology Version 1.7

Program Lifecycle Methodology Version 1.7 Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated

More information