119 research outputs found

    Critical Aspects of Modern Open Source SoftwareTechnology to Support Emerging Demands

    Full text link
    Software has gained immense importance in our everyday lifeand is handling each and every aspect of today's technologicalworld. The idea of software at initial phase was implemented bya very precise minority of individual and now it's everywherewhether one's personal life or an organization .Financiallystrong organization and people who can purchase this bounty oftechnological era can fulfill their desires efficiently. For sure it's not a generalized case that one is financially strong and caneasily afford the desired software. There are numerous userswho cannot do so. Open source software has a way out for theseusers it provides them the same facilities and functionalities asin their equivalent software irrespective of any financialpressure. So the financially constrained personals ororganization can make use of open source software forachievement of their desired tasks. In this research paper ananalysis of open source software has been presented byproviding a brief comparison of Ubuntu as an emerging highquality open source modern operating system with well knownMicrosoft windows operating systemComment: 7 pages, 3 table

    The development and technology transfer of software engineering technology at NASA. Johnson Space Center

    Get PDF
    The United State's big space projects of the next decades, such as Space Station and the Human Exploration Initiative, will need the development of many millions of lines of mission critical software. NASA-Johnson (JSC) is identifying and developing some of the Computer Aided Software Engineering (CASE) technology that NASA will need to build these future software systems. The goal is to improve the quality and the productivity of large software development projects. New trends are outlined in CASE technology and how the Software Technology Branch (STB) at JSC is endeavoring to provide some of these CASE solutions for NASA is described. Key software technology components include knowledge-based systems, software reusability, user interface technology, reengineering environments, management systems for the software development process, software cost models, repository technology, and open, integrated CASE environment frameworks. The paper presents the status and long-term expectations for CASE products. The STB's Reengineering Application Project (REAP), Advanced Software Development Workstation (ASDW) project, and software development cost model (COSTMODL) project are then discussed. Some of the general difficulties of technology transfer are introduced, and a process developed by STB for CASE technology insertion is described

    Insights into Software Development Approaches: Mining Q&A Repositories

    Full text link
    Context: Software practitioners adopt approaches like DevOps, Scrum, and Waterfall for high-quality software development. However, limited research has been conducted on exploring software development approaches concerning practitioners discussions on Q&A forums. Objective: We conducted an empirical study to analyze developers discussions on Q&A forums to gain insights into software development approaches in practice. Method: We analyzed 13,903 developers posts across Stack Overflow (SO), Software Engineering Stack Exchange (SESE), and Project Management Stack Exchange (PMSE) forums. A mixed method approach, consisting of the topic modeling technique (i.e., Latent Dirichlet Allocation (LDA)) and qualitative analysis, is used to identify frequently discussed topics of software development approaches, trends (popular, difficult topics), and the challenges faced by practitioners in adopting different software development approaches. Findings: We identified 15 frequently mentioned software development approaches topics on Q&A sites and observed an increase in trends for the top-3 most difficult topics requiring more attention. Finally, our study identified 49 challenges faced by practitioners while deploying various software development approaches, and we subsequently created a thematic map to represent these findings. Conclusions: The study findings serve as a useful resource for practitioners to overcome challenges, stay informed about current trends, and ultimately improve the quality of software products they develop

    Deployment pipeline development at scale: automating software as a service

    Get PDF
    In recent years, adaptability has become the most important aspect of software. As technology companies grow, sustainable scalability and increased security become the main goals for developers, while the company's goals become increased scalability and decreased development time. In this overlap of goals, the delivery model of Software as a Service has gained particular notoriety. This model has inspired the development of new types of tools, such as Content Management Systems, Continuous Integration Continuous Deployment Pipelines, and Progressive Delivery Tools. These tools, while beneficial, offer persistent disadvantages to the development of Software as a Service applications, such as high costs or high initial development time. Many companies, in all size classifications, have decided to build multiple applications for multiple clients, despite a large aggregate of code and design shared between apps. Within this market, there is a need for tools that allow developers to automate the process of creating SaaS apps. In this thesis, a new tool has been developed that allows for the automatic style change and packaging of any web application for use by many companies at once. The tool, titled Banquet, is a command-line tool and API which will allow programmers to create CICD pipelines in a fraction of the time of normal development. This enables a low-cost, low development time solution for building Software as a Service that is abstract and multifaceted to fulfill as many use cases as possible. The tool utilizes some of the most prominent technologies of pipeline development and is open for customization to allow more technologies to be added. This makes Banquet essential for serving elaborate apps for many companies.Includes bibliographical references

    Integração contínua no 5GinFIRE

    Get PDF
    With the current evolution of network connectable devices, traffic demands are becoming very high. Network operators need to ensure that they can provide new services faster but with the same quality while keeping the costs low. Given the traditional network architecture, that is not possible because the high demands require new hardware, and its substitution is costly and not flexible. By introducing the decoupling of network functions from traditional hardware, NFV is the technology that enables the step that network operators are trying to take. However, this approach also brings reliability concerns since it is mandatory to ensure that the virtual network functions (VNFs) behave as expected. 5GinFIRE is a project that aims to provide a 5G-NFV enabled experimental testbed. As this project handles multiple VNFs from the various experimenters, it is necessary to have an automated mechanism to validate VNFs. This dissertation provides a solution for the stated problem by having a system that verifies the syntax, semantics, and references of a VNF in an automated way without needing any further human interaction. As a result, a fully integrated testing platform is deployed in the 5GinFIRE infrastructure, and the results of the tests are issued in this Document.Com a evolução dos equipamentos com capacidade de se ligar à rede, as exigências de tráfego tornam-se muito altas. Os operadores precisam de garantir que oferecem os seus serviços rapidamente, com a mesma qualidade, mas mantendo os custos baixos. Dada a arquitetura tradicional de redes, isso não é possível uma vez que para alcançar essas necessidades é fundamental a aquisição de novos equipamentos, sendo que a sua substituição é cara e pouco flexível. Com a proposta de separação de funções de rede do seu hardware específico, NFV é a tecnologia que permite aos operadores alcançar o pretendido. No entanto, esta abordagem traz consigo problemas relacionados com a fiabilidade do código produzido, uma vez que é imperativo assegurar que as funções de rede implementadas (VNFs) se comportam como esperado. O 5GinFIRE é um projeto que tem como objetivo manter uma plataforma de experimentação de 5G-NFV. Como este projeto lida com múltiplas VNFs de vários colaboradores, é necessário haver um mecanismo automatizado que valida as mesmas. Esta dissertação aborda a solução referenciada tendo em si descrito um sistema que valida a sintaxe, semântica e referências de uma VNF de uma forma totalmente automatizada e sem qualquer necessidade de intervenção humana. Assim, o 5GinFIRE contém já uma plataforma de testes totalmente integrada no seu sistema e os seus resultados são analisados neste Documento.Mestrado em Engenharia de Computadores e Telemátic

    A Multivocal Literature Review on Non-Technical Debt in Software Development: An Insight into Process, Social, People, Organizational, and Culture Debt

    Get PDF
    Software development encompasses various factors beyond technical considerations. Neglecting non-technical elements like individuals, processes, culture, and social and organizational aspects can lead to debt-like characteristics that demand attention. Therefore, we introduce the non-technical debt (NTD) concept to encompass and explore these aspects. This indicates the applicability of the debt analogy to non-technical facets of software development. Technical debt (TD) and NTD share similarities and often arise from risky decision-making processes, impacting both software development professionals and software quality. Overlooking either type of debt can lead to significant implications for software development success. The current study conducts a comprehensive multivocal literature review (MLR) to explore the most recent research on NTD, its causes, and potential mitigation strategies. For analysis, we carefully selected 40 primary studies among 110 records published until October 1, 2022. The study investigates the factors contributing to the accumulation of NTD in software development and proposes strategies to alleviate the adverse effects associated with it. This MLR offers a contemporary overview and identifies prospects for further investigation, making a valuable contribution to the field. The findings of this research highlight that NTD's impacts extend beyond monetary aspects, setting it apart from TD. Furthermore, the findings reveal that rectifying NTD is more challenging than addressing TD, and its consequences contribute to the accumulation of TD. To avert software project failures, a comprehensive approach that addresses NTD and TD concurrently is crucial. Effective communication and coordination play a vital role in mitigating NTD, and the study proposes utilizing the 3C model as a recommended framework to tackle NTD concerns

    Software Engineering 2021 : Fachtagung vom 22.-26. Februar 2021 Braunschweig/virtuell

    Get PDF

    Knowledge-based cyber physical security at smart home: a review

    Get PDF
    Smart home systems represent the future of modern building infrastructure, integrating numerous devices and applications to elevate the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic control to monitor and manage the physical environment. However, ensuring robust security in smart homes, alongside securing the smart devices themselves, presents a formidable challenge. A substantial part of security solutions for smart homes rely on data-driven approaches (e.g., machine/deep learning) to identify and mitigate potential threats. These approaches involve training models on extensive datasets, distinguishing them from knowledge-driven methods. In this survey, we delve into the role of knowledge within smart homes, focusing on understanding and reasoning about various events and their utility towards securing smart homes. We propose a taxonomy to characterise the categorisation of decision-making approaches. By specifying the most common vulnerabilities, attacks, and threats, we are able to analyse and assess the countermeasures against them. We have also examined how smart homes have been evaluated in the reviewed papers. Furthermore, we explore the challenges inherent to smart homes and investigate existing solutions that aim to overcome these limitations. Finally, we take a look at key smart home security research gaps while defining future research directions of knowledge-driven schemes

    Proceedings of the 15th International Conference on Product-Focused Software Process Improvement (PROFES 2014) : Volume 2

    Get PDF

    Counter-terrorism in cyber–physical spaces:Best practices and technologies from the state of the art

    Get PDF
    Context: The demand for protection and security of physical spaces and urban areas increased with the escalation of terroristic attacks in recent years. We envision with the proposed cyber–physical systems and spaces, a city that would indeed become a smarter urbanistic object, proactively providing alerts and being protective against any threat. Objectives: This survey intend to provide a systematic multivocal literature survey comprised of an updated, comprehensive and timely overview of state of the art in counter-terrorism cyber–physical systems, hence aimed at the protection of cyber–physical spaces. Hence, provide guidelines to law enforcement agencies and practitioners providing a description of technologies and best practices for the protection of public spaces. Methods: We analyzed 112 papers collected from different online sources, both from the academic field and from websites and blogs ranging from 2004 till mid-2022. Results: (a) There is no one single bullet-proof solution available for the protection of public spaces. (b) From our analysis we found three major active fields for the protection of public spaces: Information Technologies, Architectural approaches, Organizational field. (c) While the academic suggest best practices and methodologies for the protection of urban areas, the market did not provide any type of implementation of such suggested approaches, which shows a lack of fertilization between academia and industry. Conclusion: The overall analysis has led us to state that there is no one single solution available, conversely, multiple methods and techniques can be put in place to guarantee safety and security in public spaces. The techniques range from architectural design to rethink the design of public spaces keeping security into account in continuity, to emerging technologies such as AI and predictive surveillance.</p
    • …
    corecore