119 research outputs found
Critical Aspects of Modern Open Source SoftwareTechnology to Support Emerging Demands
Software has gained immense importance in our everyday lifeand is handling
each and every aspect of today's technologicalworld. The idea of software at
initial phase was implemented bya very precise minority of individual and now
it's everywherewhether one's personal life or an organization
.Financiallystrong organization and people who can purchase this bounty
oftechnological era can fulfill their desires efficiently. For sure it's not a
generalized case that one is financially strong and caneasily afford the
desired software. There are numerous userswho cannot do so. Open source
software has a way out for theseusers it provides them the same facilities and
functionalities asin their equivalent software irrespective of any
financialpressure. So the financially constrained personals ororganization can
make use of open source software forachievement of their desired tasks. In this
research paper ananalysis of open source software has been presented
byproviding a brief comparison of Ubuntu as an emerging highquality open source
modern operating system with well knownMicrosoft windows operating systemComment: 7 pages, 3 table
The development and technology transfer of software engineering technology at NASA. Johnson Space Center
The United State's big space projects of the next decades, such as Space Station and the Human Exploration Initiative, will need the development of many millions of lines of mission critical software. NASA-Johnson (JSC) is identifying and developing some of the Computer Aided Software Engineering (CASE) technology that NASA will need to build these future software systems. The goal is to improve the quality and the productivity of large software development projects. New trends are outlined in CASE technology and how the Software Technology Branch (STB) at JSC is endeavoring to provide some of these CASE solutions for NASA is described. Key software technology components include knowledge-based systems, software reusability, user interface technology, reengineering environments, management systems for the software development process, software cost models, repository technology, and open, integrated CASE environment frameworks. The paper presents the status and long-term expectations for CASE products. The STB's Reengineering Application Project (REAP), Advanced Software Development Workstation (ASDW) project, and software development cost model (COSTMODL) project are then discussed. Some of the general difficulties of technology transfer are introduced, and a process developed by STB for CASE technology insertion is described
Insights into Software Development Approaches: Mining Q&A Repositories
Context: Software practitioners adopt approaches like DevOps, Scrum, and
Waterfall for high-quality software development. However, limited research has
been conducted on exploring software development approaches concerning
practitioners discussions on Q&A forums. Objective: We conducted an empirical
study to analyze developers discussions on Q&A forums to gain insights into
software development approaches in practice. Method: We analyzed 13,903
developers posts across Stack Overflow (SO), Software Engineering Stack
Exchange (SESE), and Project Management Stack Exchange (PMSE) forums. A mixed
method approach, consisting of the topic modeling technique (i.e., Latent
Dirichlet Allocation (LDA)) and qualitative analysis, is used to identify
frequently discussed topics of software development approaches, trends
(popular, difficult topics), and the challenges faced by practitioners in
adopting different software development approaches. Findings: We identified 15
frequently mentioned software development approaches topics on Q&A sites and
observed an increase in trends for the top-3 most difficult topics requiring
more attention. Finally, our study identified 49 challenges faced by
practitioners while deploying various software development approaches, and we
subsequently created a thematic map to represent these findings. Conclusions:
The study findings serve as a useful resource for practitioners to overcome
challenges, stay informed about current trends, and ultimately improve the
quality of software products they develop
Deployment pipeline development at scale: automating software as a service
In recent years, adaptability has become the most important aspect of software. As technology companies grow, sustainable scalability and increased security become the main goals for developers, while the company's goals become increased scalability and decreased development time. In this overlap of goals, the delivery model of Software as a Service has gained particular notoriety. This model has inspired the development of new types of tools, such as Content Management Systems, Continuous Integration Continuous Deployment Pipelines, and Progressive Delivery Tools. These tools, while beneficial, offer persistent disadvantages to the development of Software as a Service applications, such as high costs or high initial development time. Many companies, in all size classifications, have decided to build multiple applications for multiple clients, despite a large aggregate of code and design shared between apps. Within this market, there is a need for tools that allow developers to automate the process of creating SaaS apps. In this thesis, a new tool has been developed that allows for the automatic style change and packaging of any web application for use by many companies at once. The tool, titled Banquet, is a command-line tool and API which will allow programmers to create CICD pipelines in a fraction of the time of normal development. This enables a low-cost, low development time solution for building Software as a Service that is abstract and multifaceted to fulfill as many use cases as possible. The tool utilizes some of the most prominent technologies of pipeline development and is open for customization to allow more technologies to be added. This makes Banquet essential for serving elaborate apps for many companies.Includes bibliographical references
Integração contÃnua no 5GinFIRE
With the current evolution of network connectable devices, traffic demands are
becoming very high. Network operators need to ensure that they can provide new
services faster but with the same quality while keeping the costs low. Given the
traditional network architecture, that is not possible because the high demands require
new hardware, and its substitution is costly and not flexible. By introducing
the decoupling of network functions from traditional hardware, NFV is the technology
that enables the step that network operators are trying to take. However, this
approach also brings reliability concerns since it is mandatory to ensure that the
virtual network functions (VNFs) behave as expected. 5GinFIRE is a project that
aims to provide a 5G-NFV enabled experimental testbed. As this project handles
multiple VNFs from the various experimenters, it is necessary to have an automated
mechanism to validate VNFs. This dissertation provides a solution for the stated
problem by having a system that verifies the syntax, semantics, and references of a
VNF in an automated way without needing any further human interaction. As a result,
a fully integrated testing platform is deployed in the 5GinFIRE infrastructure,
and the results of the tests are issued in this Document.Com a evolução dos equipamentos com capacidade de se ligar à rede, as exigências
de tráfego tornam-se muito altas. Os operadores precisam de garantir que oferecem
os seus serviços rapidamente, com a mesma qualidade, mas mantendo os custos
baixos. Dada a arquitetura tradicional de redes, isso não é possÃvel uma vez que
para alcançar essas necessidades é fundamental a aquisição de novos equipamentos,
sendo que a sua substituição é cara e pouco flexÃvel. Com a proposta de separação
de funções de rede do seu hardware especÃfico, NFV é a tecnologia que permite
aos operadores alcançar o pretendido. No entanto, esta abordagem traz consigo
problemas relacionados com a fiabilidade do código produzido, uma vez que é
imperativo assegurar que as funções de rede implementadas (VNFs) se comportam
como esperado. O 5GinFIRE é um projeto que tem como objetivo manter uma
plataforma de experimentação de 5G-NFV. Como este projeto lida com múltiplas
VNFs de vários colaboradores, é necessário haver um mecanismo automatizado
que valida as mesmas. Esta dissertação aborda a solução referenciada tendo em si
descrito um sistema que valida a sintaxe, semântica e referências de uma VNF de
uma forma totalmente automatizada e sem qualquer necessidade de intervenção
humana. Assim, o 5GinFIRE contém já uma plataforma de testes totalmente
integrada no seu sistema e os seus resultados são analisados neste Documento.Mestrado em Engenharia de Computadores e Telemátic
A Multivocal Literature Review on Non-Technical Debt in Software Development: An Insight into Process, Social, People, Organizational, and Culture Debt
Software development encompasses various factors beyond technical considerations. Neglecting non-technical elements like individuals, processes, culture, and social and organizational aspects can lead to debt-like characteristics that demand attention. Therefore, we introduce the non-technical debt (NTD) concept to encompass and explore these aspects. This indicates the applicability of the debt analogy to non-technical facets of software development. Technical debt (TD) and NTD share similarities and often arise from risky decision-making processes, impacting both software development professionals and software quality. Overlooking either type of debt can lead to significant implications for software development success. The current study conducts a comprehensive multivocal literature review (MLR) to explore the most recent research on NTD, its causes, and potential mitigation strategies. For analysis, we carefully selected 40 primary studies among 110 records published until October 1, 2022. The study investigates the factors contributing to the accumulation of NTD in software development and proposes strategies to alleviate the adverse effects associated with it. This MLR offers a contemporary overview and identifies prospects for further investigation, making a valuable contribution to the field. The findings of this research highlight that NTD's impacts extend beyond monetary aspects, setting it apart from TD. Furthermore, the findings reveal that rectifying NTD is more challenging than addressing TD, and its consequences contribute to the accumulation of TD. To avert software project failures, a comprehensive approach that addresses NTD and TD concurrently is crucial. Effective communication and coordination play a vital role in mitigating NTD, and the study proposes utilizing the 3C model as a recommended framework to tackle NTD concerns
Knowledge-based cyber physical security at smart home: a review
Smart home systems represent the future of modern building infrastructure, integrating numerous devices and applications to elevate the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic control to monitor and manage the physical environment. However, ensuring robust security in smart homes, alongside securing the smart devices themselves, presents a formidable challenge. A substantial part of security solutions for smart homes rely on data-driven approaches (e.g., machine/deep learning) to identify and mitigate potential threats. These approaches involve training models on extensive datasets, distinguishing them from knowledge-driven methods. In this survey, we delve into the role of knowledge within smart homes, focusing on understanding and reasoning about various events and their utility towards securing smart homes. We propose a taxonomy to characterise the categorisation of decision-making approaches. By specifying the most common vulnerabilities, attacks, and threats, we are able to analyse and assess the countermeasures against them. We have also examined how smart homes have been evaluated in the reviewed papers. Furthermore, we explore the challenges inherent to smart homes and investigate existing solutions that aim to overcome these limitations. Finally, we take a look at key smart home security research gaps while defining future research directions of knowledge-driven schemes
Counter-terrorism in cyber–physical spaces:Best practices and technologies from the state of the art
Context: The demand for protection and security of physical spaces and urban areas increased with the escalation of terroristic attacks in recent years. We envision with the proposed cyber–physical systems and spaces, a city that would indeed become a smarter urbanistic object, proactively providing alerts and being protective against any threat. Objectives: This survey intend to provide a systematic multivocal literature survey comprised of an updated, comprehensive and timely overview of state of the art in counter-terrorism cyber–physical systems, hence aimed at the protection of cyber–physical spaces. Hence, provide guidelines to law enforcement agencies and practitioners providing a description of technologies and best practices for the protection of public spaces. Methods: We analyzed 112 papers collected from different online sources, both from the academic field and from websites and blogs ranging from 2004 till mid-2022. Results: (a) There is no one single bullet-proof solution available for the protection of public spaces. (b) From our analysis we found three major active fields for the protection of public spaces: Information Technologies, Architectural approaches, Organizational field. (c) While the academic suggest best practices and methodologies for the protection of urban areas, the market did not provide any type of implementation of such suggested approaches, which shows a lack of fertilization between academia and industry. Conclusion: The overall analysis has led us to state that there is no one single solution available, conversely, multiple methods and techniques can be put in place to guarantee safety and security in public spaces. The techniques range from architectural design to rethink the design of public spaces keeping security into account in continuity, to emerging technologies such as AI and predictive surveillance.</p
- …