1,809 research outputs found

    Technical Debt Analysis and Project Architecturization of a Jenkins Platform based on Groovy

    Get PDF
    Actualment, el Deute TĂšcnic (DT) Ă©s un problema latent a la gran majoria de projectes software. A causa del rĂ pid creixement del mercat, la visiĂł empresarial estĂ  cada cop mĂ©s enfocada a reduir el time-to-market del producte, deixant de banda la qualitat interna del seu codi. Per aixĂČ, el cost global anual de mantenir aquest codi de mala qualitat, puja aproximadament a 81.000 € milions. La tesi se centra a analitzar profundament una plataforma corporativa amb molt DT i definir-ne una nova arquitectura, tenint en compte els seus requeriments i prioritzant la qualitat del producte mentre es redueix el seu deute tĂšcnic. Per aconseguir aixĂČ, es faran servir tĂšcniques de refactoritzaciĂł, implementaciĂł de noves funcionalitats i la definiciĂł de protocols interns per a l'equip. A la tesi queden documentats els passos a seguir per analitzar i rearquitecturitzar un projecte amb unes caracterĂ­stiques similars. A mĂ©s, es crea una forta consciĂšncia sobre el deute tĂšcnic i els seus problemes, una qĂŒestiĂł que afecta directament el codi i indirectament la salut mental dels seus desenvolupadors.Currently, Technical Debt (TD) is a latent problem in the vast majority of software projects. Due to the rapid growth of the market, its business vision is focusing on reducing the time-to-market of the product, leaving aside the internal quality of its code. As a result, the global annual cost of maintaining such poor quality code comes to approximately $85 billion. The thesis focuses on deeply analyzing a corporate platform with a heavy TD and defining a new architecture for it based on its requirements, prioritizing the quality of the product while reducing its technical debt. To achieve this, I will use refactoring techniques, implementation of new functionalities and the definition of internal protocols for the team. In the thesis, the steps to follow to analyze and re-architect a project with similar characteristics are documented. In addition, strong awareness is raised regarding the technical debt and its problems, an issue that directly affects the code and indirectly impacts the mental health of its developers

    MEAN Web Application Development with Agile Kanban

    Get PDF
    I spent one year developing a project management web application in order to gain a better understanding of the software engineering process. The software was built on a technology stack of MongoDB, ExpressJS, AngularJS, and Node.js which is more commonly referred to as the MEAN stack. The experience has exposed me to a new set of tools, software practices, and engineering principles that have left me with a deeper understanding of what it means to be a software engineer and the incredible amount of time and work that is involved in designing and implementing a full-scale software application

    Revista Economica

    Get PDF

    An anti-malware product test orchestration solution for multiple pluggable environments

    Get PDF
    The term automation gets thrown around a lot these days in the software industry. However, the recent change in test automation in the software engineering process is driven by multiple factors such as environmental factors, both external and internal as well as industry-driven factors. Simply, what we all understand about automation is - the use of some technologies to operate a task. The choice of the right tools, be it in-house or any third-party software, can increase effectiveness, efficiency and coverage of the security product testing. Often, test environments are maintained at various stages in the testing process. Developer’s test, dedicated test, integration test and pre-production or business readiness test are some common phrases in software testing. On the other hand, abstraction is often included between different architectural layers, ever-changing providers of virtualization platforms such as VMWare, OpenStack, AWS as test execution environments and many others with a different state of maintainability. As there is an obvious mismatch in configuration between development, testing and production environment; software testing process is often slow and tedious for many organizations due to the lack of collaboration between IT Operations and Software Development teams. Because of this, identifying and addressing test environmentrelated compatibility becomes a major concern for QA teams. In this context, this thesis presents a DevOps approach and implementation method of an automated test execution solution named OneTA that can interact with multiple test environments including isolated malware test environments. The study was performed to identify a common way of preparing test environments in in-house and publicly available virtualization platforms where distributed tests can run on a regular basis. The current solution allows security product testing in multiple pluggable environments in a single setup utilizing the modern DevOps practice to result minimum efforts. This thesis project was carried out in collaboration with F-Secure, a leading cyber security company in Finland. The project deals with the company’s internal environments for test execution. It explores the available infrastructures so that software development team can use this solution as a test execution tool

    Introductions

    Get PDF
    This is the introduction to the book with the overall description: This is a critical time in design. Concepts and practices of design are changing in response to historical developments in the modes of industrial design production and consumption. Indeed, the imperative of more sustainable development requires profound reconsideration of design today. Theoretical foundations and professional definitions are at stake, with consequences for institutions such as museums and universities as well as for future practitioners. This is ‘critical’ on many levels, from the urgent need to address societal and environmental issues to the reflexivity required to think and do design differently

    Concluding dialogue

    Get PDF
    This is a chapter in a book with the overall description: This is a critical time in design. Concepts and practices of design are changing in response to historical developments in the modes of industrial design production and consumption. Indeed, the imperative of more sustainable development requires profound reconsideration of design today. Theoretical foundations and professional definitions are at stake, with consequences for institutions such as museums and universities as well as for future practitioners. This is ‘critical’ on many levels, from the urgent need to address societal and environmental issues to the reflexivity required to think and do design differently

    Toyota recalls : revealing the value of secure supply chain

    Get PDF
    Thesis (S.M. in System Design and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2010.Vita. Cataloged from PDF version of thesis.Includes bibliographical references (p. 116-121) and index.Summary: The warning bells are ringing. Once a global auto giant with a gold-plated reputation for safety and reliability, Toyota has stumbled. Its engineering excellence and traditional craftsmanship are being watered down by years of nips and tucks. With a torrent of high-profile recalls at the beginning of the new decade and a series of highly publicized legal charges, Toyota is all over the headlines. Following a business strategy that sacrifices its customer-first focus but in favor of driving shareholder value, Toyota gradually has shifted away from the tenet of lean manufacturing. Seeking cost leadership and market leadership has gone too far, and differentiation through quality, reliability and fuel efficiency becomes blurred. The execution of such business strategy in the past few years has lured Toyota to rush into relationships with suppliers it has not adequately vetted and to apply questionable security measures as it sourced parts from all around the world. In so doing, Toyota has been constantly adding stress to the security of its supply chain. In the end, its risk mitigation capability does not improve and quality standards have lapsed. Globalization and commoditization have forced today's businesses to focus on cost-cutting and growth to achieve profits of struggle to survive. Consequently, offshoring and outsourcing have become common practice. In such a competitive environment, supply chain is the lifeblood of a business and supply chain security is well-recognized as a competitive advantage and even a marketing tool. Security Secure supply chain is critical in product quality assurance and combating counterfeit, for which authoritative product attribute service represents an urgent need. For a long time, product attribute service is considered a Business-to-Business application. Trading partners of a supply chain build and share product information amongst themselves. Consumers are basically excluded from accessing such information. On the other hand, typically, product information provided to the end consumers are maintained by individual retailers. Such an approach is heterogeneous, error-prone, inaccurate, incomplete, and it undermines consumer confidence. There is a gap for authoritative product attribute service (APAS) that can provide uniform, validated, timely and complete product info to the end consumers. With APAS, consumers will play an active role in monitoring and contributing to the security of the supply chain. With a mobile barcode scanner or mobile RFID reader in hand, consumers will become a vibrant force in combating counterfeits, detecting 'bogus' status and reducing illegal trade. Consumers will benefit from such new capability by protecting their rights to buy genuine products with correct status and through legitimate channels. In addition, a spectrum of important mobile commerce applications will be made possible, such as trustful product attributes retrieval, attribute-based product search and comparison, product rating and commenting. With APAS, brand owners and other supply chain partners will see unprecedented possibilities such as direct customer-facing product marketing e.g. product recommendation, individualized coupon promotion, as well as direct user feedback on feature request and defect report. All of this will allow them to build competitive advantages with shorter user interaction cycles, more fragile to user demand variation, targeted and efficient product design, responsive product recall, and more effective in attacking counterfeits. In this thesis, I strive to provide a timely in-depth analysis on the mechanisms behind Toyota's crisis, especially the linkage between business strategy and supply chain security. I will relate secure supply chain to competitive advantage, and authoritative product attribute service to secure supply chain. Based on this, I perform strategic analysis and propose an architectural design for product attribute service. As a proof of concept, I design and implement a prototype of APAS with decent size of APAS repository and support for both mobile and PC clients. To this end, I first formulate the problems and explain the motivations behind secure supply chain and product attribute service. I then give an overview of the journey of Toyota from the synonym of quality to the reminder for product recalls. To provide further more background knowledge, I will examine business strategy and competitive advantage, together with secure supply chain, in the following two chapters. In particular, I will be deliberating on the causality between business strategy and supply chain strategy, and how supply chain vision and strategy can lead to operational executions that are sources of QA crises. In the next section, I provide details on architectural design for Authoritative Product Attribute Service. Afterwards, I describe the prototyping and implementation of APAS that covers the backend product attribute repository, the web backend that powers the APAS, as well as the Android-based mobile frontend. Finally, I summarize with concluding remarks and outline directions for future research.by Xiaoyuan Gu.S.M.in System Design and Managemen

    Towards an understanding of business design within enterprise architecture management: a cautionary tale

    Get PDF
    Includes bibliographical references.Business Design represents a set of concepts that are described in the literature as providing a sound foundation for sustainable competitive advantage into the future. The particular values underpinning Business design are based on the enablement of a design thinking approach to solving the imponderable problems that organisations regularly encounter. In particular, the application of a design thinking approach to Business Design requires that resultant system designs are economically viable and technologically feasible. Enterprise Architecture Management plays a vital role in supporting these latter two requirements. Yet the definition of Enterprise Architecture Management as the 'normative restriction of design freedom' (Deitz, 2011) implies constraints that could impose limits on such business design. Consequently, the qualitative inductive research described in this document was undertaken to explore the perceived paradoxical relationship between Business Design and Enterprise Architecture Management. This dissertation recounts the process and results of this research initiative based on data recorded during interviews with a number of management level staff at a leading South African Insurance organisation. The participants were intimately involved in a programme to, amongst other objectives, establish a platform to support enterprise-wide Business Design within Enterprise Architecture Management, a programme that was experiencing a number of challenges and that was still underway at the time of completion of this research. Findings arising from this research were that the varying perceptions and levels of commitment of business and IT stakeholders associated with the programme and its requirements, contributed significantly to these challenges. In addition to providing a rich description of the case organisation's journey towards the establishment of a Business Design platform, a sensitising framework – 'The 6 Cs Framework in Support of the Successful Enablement of Business Design within Enterprise Architecture Management' – is proposed as a useful tool to assist organisations that might be considering a similar programme in the future

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications
    • 

    corecore