SlideShare a Scribd company logo
1 of 29
Download to read offline
Webinar with Melinda Ballou
Program Director , IDC
Big Data, Big Problems:
Avoid System Failure
with Quality Analysis
CAST Confidential 1
Speakers
Melinda Ballou
Program Director, Application
Life-Cycle Management
IDC
Pete Pizzutillo
Director, Product Marketing
CAST
Sep-13© 2013 IDC 2
One Long Hot Week in August!!
One week
(from Aug 19 to Aug 26)
In the last
two weeks
Sep-13© 2013 IDC 3
“Process Gap”- High Cost of Inertia
Evolve Beyond Traditional ASQ to Better Address Risk
CloudMobile
Development Practices Complex SourcingLess Budget
Social Analytics
Sep-13© 2013 IDC 4
Industry Highlights: Disruptive Trends
 Diverse deployment demands for mobile, cloud, embedded drive corporate need for
architectural impact analysis for application portfolio, business dynamism is enabled by
software quality analysis -- & cost prohibitive
 Organizations re-invest, seeking to do more with fewer resources with financial and
staffing constraints; leveraging efficient approaches to restore and sustain high
performing, timely, business-critical software.
 Complex sourcing/off-shoring plus use of open source need strong teaming, effective
code management, testing, and metrics enabled by SQAM; Services driven environment
(SaaS/cloud, Devops emergence)
 Global economic competition and local compliance across geographies demand
quality, change and portfolio management, adaptability and rigor
 Flexible development paradigm with services creation increasingly drive technology
and business collaboration – strong agile emergence
 Emerging security issues (as driver) and virtualization/cloud (as enabling technology)
for SQAM adoption; ad hoc approaches unsustainable
 End-user experience and business impact challenges of rich Internet, mobile,
embedded, with social media collaboration/community opportunities
 Very public software failures increasing
Sep-13© 2013 IDC 5
“Quality Gap”- High Cost of Failure
Poor Quality = Increased Business Risk
Lost Revenue
($$$$$)
Lost Customers
Lost Productivity
Increased Costs
Lower ProfitsDamaged Brand
Sep-13© 2013 IDC 6
• Software Quality Analysis and Measurement: software tools that
enable organizations to observe, measure, and evaluate software
complexity, size, productivity, and risk (including technical &
structural quality, non-functional testing)
• Architectural assessment of design consequences (on software
performance, stability, adaptability, and maintainability)
• Static analysis and dynamic analysis
• Quality metrics for complexity, size, risk, and productivity to establish
baselines and to help judge project progress and resource capabilities
• Application portfolio evaluation through understanding the impact of
architectural flaws and dependencies
• In-phase prevention of additional software problems not easily
observable through typical ASQ tools.
SQAM Definition: Establishing a Strategy
Sep-13© 2013 IDC
Barriers to Traditional Testing –
SQAM Drivers
• Agile velocity demands immediate, frequent, iterative testing
• Lack of system resources constrains testing usage – expense limits
ability to mirror production configurations (mobile issues)
• Lack of architectural and design context for multi-modal deployment need
for management & coordination
• Challenges to test system configuration and impact to performance and
adaptability of design
• Lack of visibility into consequences of poor architecture with significant
impact to business or failed software
• Increasing occurrences of business critical failures are driving
engagement and interest in software quality analysis and measurement
7
Sep-13© 2013 IDC
ASQ Forecast with IDC Software
Quality Analysis & Mgmnt Segment
0
500
1,000
1,500
2,000
2,500
3,000
3,500
2009 2010 2011 2012 2013 2014 2015 2016 2017
$M
ASQ (6/13) SQAM (9/13 est)
19%
29%
Sep-13© 2013 IDC 9
IT and Business Challenges: Silos, Gaps
 Today’s applications are high-visibility, and carry a high cost-of-
failure -- customer self-serve, supplier/channel; key internal business
applications
 “Network effect” – failure in one leads to other failures
 The need for SQAM as part of quality life-cycle is key since G2000
organizations are split across groups:
– Business/users stakeholders
– Architects, Designers and Developers
– QA professionals
– Operational staff
 Must extend the Quality life-cycle across geographies, life cycle
phases and groups
Sep-13© 2013 IDC 10
Goals of Effective IT/Business
Alignment
New Business
Value
Reduced
Exposure
Innovation:
Maximize Upside
Through Technology-
Enabled Business
Processes
Compliance:
Minimize Downside
Through Risk
Management
Sep-13© 2013 IDC
CIO’s 2013 Personal Agenda
Q. In 2013, which of the following goals will be top of your personal agenda as CIO?
Please select your top 3 goals.
0% 5% 10% 15% 20% 25%
Implement a more rigorous process to evaluate
new ideas for IT to take on
Re-skill existing IT talent
More effectively attract new IT talent
Carve out more IT budget for new
projects/innovative projects
Focus IT organization on better understanding
the requirements of the consumers
Better align IT with the business
Foster a culture within IT where IT more often
provides a qualified "yes" to the business
Foster a culture within IT that drives more
innovation
Focus the IT organization more on business
strategy than technology strategy
US
WE
Total
n = 70
WE respondents = 21; US respondents = 49
Source: IDC 2013 CIO Agenda Survey, Fall 2012
5
Sep-13© 2013 IDC
By 2016, LOB executives will be directly
involved in 80% of new IT investments
It is Time to Revisit IT Planning, Quality
Governance and Portfolio Management Methods
Of the new internal IT projects initiated at your
company this year, what percentage will be led
under the following scenarios?
N = 57
Source: IDC 2013 CIO Sentiment
Survey, Fall 2012
Prediction
 58% of new IT investments in 2013 will
involve direct participation by LOB executives
 Companies will initiate an average of 40 new
IT projects in 2013 (with or without IT)
 Line of business’ participation in IT projects
will grow to 80% in 3 years
 The implications are vast on how the CIO
works with the line of business
Situation Assessment
 Cloud, social and mobile services are the
great equalizers, the balance-wheel of the
corporate machinery
 Notable instances of CEOs and CFOs driving
the migration to Cloud and Managed Services
8%
17%
33%
42%
0% 10% 20% 30% 40% 50%
Project solely led /
managed by the LOBs
Project led / managed by
LOBs, but subject to
review by IT
Project jointly led /
managed by IT and the
LOBs
Project solely led /
managed by IT
9
Sep-13© 2013 IDC
Three Key Challenges for IT
IT must deliver new applications that have greater business value
and higher quality, while managing costs …
in the face of these 3 key challenges:
 Increasing criticality of applications to the business
 Increasing complexity of software systems
– From web to mobile to embedded… encompassing social systems of
engagement to feed systems of record, performance demand with Big
Data Analytics for business optimization
 Increasingly distributed teams with multi-sourcing
– From onshore to offshore to open source
13
Sep-13© 2013 IDC
Source: IDC CloudTrack Survey, Winter 2012
n=493
Mean rating by
respondents
Q. How concerned are you about cloud...?
(1-5 scale; 5 = extremely concerned)
Security Tops Concerns: Risk Major Role
Sep-13© 2013 IDC 15
Coordinating across the Life-Cycle
• Coordinating architectural design, requirements, software analysis,
quality and operational performance is key across emerging technologies
• Failures and slow response time costs prohibitive for business areas
• Organizations should leverage quality automation through design,
requirements, unit test, system integration, pre-deployment & application
performance testing with emerging cloud / mobile /social platforms
• Evaluating software analysis with automation can help teams react and
manage user application experience
• As business requirements change, a cogent life-cycle approach enables
adaptive software analysis and responses
• Look to SQAM alternatives initially as an on-ramp to mobile, cloud and
multi modal dev – strategize through to deployment
Sep-13© 2013 IDC 16
IDC Calls to Action
• Across industries, poorly designed and problematic software leads
to brand perception impact above and beyond individual problems –
demand response
• The challenges of increased complexity and high-end development
across diverse platforms increase code problems, increase costs
and drive debilitating consequences resulting from defects pre- and
post-deployment
• Companies must become better educated about the business
consequences and labor costs of poor software design since
optimism masks the need for change
• Organizations should evaluate SQAM tools to supplement
traditional ASQ along with appropriate process and organizational
approaches
Sep-13© 2013 IDC 17
Summary
 Coordinate a Quality Life-Cycle approach that targets pragmatic
approaches to SQAM from design through to deployment to obtain
benefits
 Evaluate your organization’s current strategies for design,
application portfolio review, effective quality processes and
automated tools adoption
 Schisms between business, architects, development, testers and
operations must be addressed -- IT groups and the business must
build a common language, common metrics, and common tools and
practices that include SQAM
 Drive towards an effective quality strategy to help cut costs, increase
efficiency and business agility, to sustain brand, address competitive
challenges
Analyzing and Measuring Software Risks
CAST Confidential 19
Industry starting to pay attention to code quality
But code quality & hygiene, things traditional safe
guards identify are only a small part of the solution.
Sources: Li, et al. (2011). Characteristics of multiple component defects and
architectural hotspots: A large system case study. Empirical Software Engineering
“Tracking programming practices at the Unit Level alone may not translate into the
anticipated business impact,…most devastating defects can only be detected at the
System Level.”
8%
90%
Unit-Level
Flaws
System-
Level Flaws
% of
apps
defects
% of
repair
effort
92%
8%
52%
48% of downtime caused by
8% of system-level defects!
CAST Confidential
Business
Characteristic
Good Coding Practices
@ Unit-Level
Good Architectural Practices
@ Technology/System Levels
RELIABILITY Protecting state in multi-threaded environments
Safe use of inheritance and polymorphism
Resource bounds management, Complex code
Managing allocated resources, Timeouts
Multi-layer design compliance
Software manages data integrity and consistency
Exception handling through transactions
Class architecture compliance
PERFORMANCE
EFFICIENCY
Compliance with Object-Oriented best practices
Compliance with SQL best practices
Expensive computations in loops
Static connections versus connection pools
Compliance with garbage collection best practices
Appropriate interactions with expensive or remote resources
Data access performance and data management
Memory, network and disk space management
Centralized handling of client requests
Use of middle tier components vs. procedures/DB functions
SECURITY Use of hard-coded credentials
Buffer overflows
Missing initialization
Improper validation of array index
Improper locking
Uncontrolled format string
Input validation
SQL injection
Cross-site scripting
Failure to use vetted libraries or frameworks
Secure architecture design compliance
MAINTAINABILITY Unstructured and duplicated code
High cyclomatic complexity
Controlled level of dynamic coding
Over-parameterization of methods
Hard coding of literals
Excessive component size
Duplicated business logic
Compliance with initial architecture design
Strict hierarchy of calling between architectural layers
Excessive horizontal layers
Excessive multi-tier fan-in/fan-out
NUMBER OF ISSUES 90% of violations 10% of violations
BUSINESS IMPACT
52% of repair workload
10% of production downtime
48% of repair workload
90% of production downtime
Industry must focus on the flaws that matter
CAST Confidential
CAST Software Risk Prevention
 CAST solutions expose the weaknesses in complex multitier systems by identifying
the high severity engineering flaws undetectable by testing. CAST insures the
confidence that critical systems are free from vulnerabilities, either intentionally
designed into the software or accidentally inserted at anytime during its lifecycle.
1. Define the business-relevant software characteristics:
stability & resilience, performance efficiency, & security
important to your business.
2. Identify structural weaknesses and architectural hotspots
based on initial of applications.
3. Baseline and benchmark key risk indicators
against industry norms.
4. Monitor to ensure system do not degrade over time.
SOFTWARE RISK PREVENTION PROCESS
PEACE OF MIND - FROM THE INSIDE OUT.
CAST Confidential
Analysis strategy for typical IT application portfolio
22
Effort(ManDays/Year)
Importance to
Business
Highest Lowest
Critical Apps
Entire Application Portfolio
CAST AIP
 Deep Structural
Analysis
 Risk Detection
 Lean Application
Development
 Function Points &
Productivity
 Vendor Management
 Continuous
Improvement
CAST Highlight
 Fast Cloud-based
Delivery
 No source code
aggregation
 Key Metrics on Entire
Portfolio
 Size, Complexity and
Risk analytics
 Annual/Quarterly
Benchmark
CAST Confidential
Portfolio risk review with Highlight
23
QUICKLY SPOT SHORT TERM RISK – COMPLEX SYSTEMS LIKELY TO FAIL
CAST Confidential
ArchitectureCompliance
Enterprise IT applications require depth of analysis
24
 Intra-technology architecture
 Intra-layer dependencies
 Module complexity & cohesion
 Design & structure
 Inter-program invocation
 Security Vulnerabilities
Module Level
 Integration quality
 Architectural compliance
 Risk propagation
simulation
 Application security
 Resiliency checks
 Transaction integrity
 Function point & EFP
measurement
 Effort estimation
 Data access control
 SDK versioning
 Calibration across
technologies
System Level
Data FlowTransaction Risk
 Code style & layout
 Expression complexity
 Code documentation
 Class or program design
 Basic coding standards
Program Level
Propagation Risk
Java
EJB
PL/SQL
Oracle
SQL
Server
DB2
T/SQL
Hibernate
Spring
Struts
.NET
C#
VB
COBOL
C++
COBOL
Sybase IMS
Messaging
Java
Web
Services
1
2
3
JSP ASP.NETAPIs
CAST Confidential
CAST AIP - well beyond static analysis
Static Analysis
DependenciesCode
Pattern
Scanning
Data Flow Rule
Engine
Transaction
Finder Intelligent
Configuration
Content
Updater
The architectural assessment
of design consequences (on
software performance, stability,
adaptability, maintainability, and
security vulnerabilities) is an
area in which CAST excels and
successfully differentiates from
static analyzers.”
Architecture
Analysis
Behavioral
Simulation
Function
Points
CAST Confidential 26
Making risk management actionable
 Identify and stabilize are the tactical steps
 To harden and optimize is a move towards proactive
risk management that requires actionable processes
into the application lifecycle
 Quickly spot the riskiest applications
in your portfolio
 View overall Technical Quality
Risk Score
 View total number of critical
violations discovered.
CAST Confidential
• Upload Source Code
and documentation
• Complete a Technical
Survey
Application Assessment Process
TRANSFER
VALIDATE
INSIGHT
• CAST Consultant verifies
completeness of source code ,
artifacts, and technical survey.
• Verifies application boundaries.
• Results are published
to a private, secure portal
• Assessment report delivered
and presented to client
 Results by application
 Code Quality performance
 Benchmark across industry
Day 1 Day 2 – 4
Day 8
ANALYZE
• CAST Consultant performs the analysis.
• Using highly-sophisticated language
analyzers and more than 1000 industry-
best-practice rules, CAST assessment
identifies weakness in the application and
provides guidance on how to fix them.
• Verifies results with Client application
owner/SME
Day 4 – 7
CAST Confidential
Contact Information
Pete Pizzutillo
p.pizzutillo@castsoftware.com
www.castsoftware.com
blog.castsoftware.com
linkedin.com/company/cast
@OnQuality
slideshare.net/castsoftware

More Related Content

What's hot

Cloud or On-Premise Human Capital Management (HCM) System
Cloud or On-Premise Human Capital Management (HCM) SystemCloud or On-Premise Human Capital Management (HCM) System
Cloud or On-Premise Human Capital Management (HCM) SystemNet at Work
 
Ten tech-enabled business trands to watch - August 10
Ten tech-enabled business trands to watch - August 10Ten tech-enabled business trands to watch - August 10
Ten tech-enabled business trands to watch - August 10Carl Terrantroy
 
Best Practices for Global MES Rollouts
Best Practices for Global MES RolloutsBest Practices for Global MES Rollouts
Best Practices for Global MES RolloutsCognizant
 
Surprising Discoveries and Key Takeaways on Warehouse Efficiency
Surprising Discoveries and Key Takeaways on Warehouse EfficiencySurprising Discoveries and Key Takeaways on Warehouse Efficiency
Surprising Discoveries and Key Takeaways on Warehouse EfficiencyIvanti
 
Critical Incident Response: Why Good Enough is Just Not Good Enough
Critical Incident Response: Why Good Enough is Just Not Good EnoughCritical Incident Response: Why Good Enough is Just Not Good Enough
Critical Incident Response: Why Good Enough is Just Not Good EnoughEnterprise Management Associates
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM BudgetsCAST
 
DevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital BusinessDevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital BusinessEnterprise Management Associates
 
Infrastructure management services in india
Infrastructure management services in indiaInfrastructure management services in india
Infrastructure management services in indiaZinnov
 
Lectura 2.5 don t-just_maintain_busin
Lectura 2.5   don t-just_maintain_businLectura 2.5   don t-just_maintain_busin
Lectura 2.5 don t-just_maintain_businMatias Menendez
 
Six sigma implementation in it software product industry – a case study
Six sigma implementation in it software product industry – a case studySix sigma implementation in it software product industry – a case study
Six sigma implementation in it software product industry – a case studyIAEME Publication
 
Does Application Security Pay? Measuring the Business Impact of Software Secu...
Does Application Security Pay? Measuring the Business Impact of Software Secu...Does Application Security Pay? Measuring the Business Impact of Software Secu...
Does Application Security Pay? Measuring the Business Impact of Software Secu...Mainstay
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapInfo-Tech Research Group
 
In Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. BuyIn Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. BuyMelissa Luongo
 

What's hot (20)

Cloud or On-Premise Human Capital Management (HCM) System
Cloud or On-Premise Human Capital Management (HCM) SystemCloud or On-Premise Human Capital Management (HCM) System
Cloud or On-Premise Human Capital Management (HCM) System
 
Ten tech-enabled business trands to watch - August 10
Ten tech-enabled business trands to watch - August 10Ten tech-enabled business trands to watch - August 10
Ten tech-enabled business trands to watch - August 10
 
Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers
 
Best Practices for Global MES Rollouts
Best Practices for Global MES RolloutsBest Practices for Global MES Rollouts
Best Practices for Global MES Rollouts
 
Surprising Discoveries and Key Takeaways on Warehouse Efficiency
Surprising Discoveries and Key Takeaways on Warehouse EfficiencySurprising Discoveries and Key Takeaways on Warehouse Efficiency
Surprising Discoveries and Key Takeaways on Warehouse Efficiency
 
Critical Incident Response: Why Good Enough is Just Not Good Enough
Critical Incident Response: Why Good Enough is Just Not Good EnoughCritical Incident Response: Why Good Enough is Just Not Good Enough
Critical Incident Response: Why Good Enough is Just Not Good Enough
 
Build an Application Integration Strategy
Build an Application Integration StrategyBuild an Application Integration Strategy
Build an Application Integration Strategy
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets
 
DevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital BusinessDevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
 
Infrastructure management services in india
Infrastructure management services in indiaInfrastructure management services in india
Infrastructure management services in india
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
Lectura 2.5 don t-just_maintain_busin
Lectura 2.5   don t-just_maintain_businLectura 2.5   don t-just_maintain_busin
Lectura 2.5 don t-just_maintain_busin
 
Six sigma implementation in it software product industry – a case study
Six sigma implementation in it software product industry – a case studySix sigma implementation in it software product industry – a case study
Six sigma implementation in it software product industry – a case study
 
Does Application Security Pay? Measuring the Business Impact of Software Secu...
Does Application Security Pay? Measuring the Business Impact of Software Secu...Does Application Security Pay? Measuring the Business Impact of Software Secu...
Does Application Security Pay? Measuring the Business Impact of Software Secu...
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
HR in the Cloud
HR in the CloudHR in the Cloud
HR in the Cloud
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
 
In Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. BuyIn Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. Buy
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Erpppt
ErppptErpppt
Erpppt
 

Viewers also liked

Big data requirements
Big data requirementsBig data requirements
Big data requirementsparry prabhu
 
Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...
Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...
Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...DataValueTalk
 
IDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunityIDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunityalain Clapaud
 
Internet Data Center the Business
Internet Data Center   the BusinessInternet Data Center   the Business
Internet Data Center the BusinessMehmet Cetin
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sonajayconde
 
Simplex Cyprus Data Center Presentation
Simplex Cyprus Data Center PresentationSimplex Cyprus Data Center Presentation
Simplex Cyprus Data Center PresentationSimplex
 
Datacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in ChinaDatacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in ChinaTerry Graham
 
Factors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural IdentityFactors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural Identitydrboon
 
Mobile Internet Connectivity
Mobile Internet ConnectivityMobile Internet Connectivity
Mobile Internet Connectivitynayakslideshare
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use casesAllied Consultants
 
Challenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in IndiaChallenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in IndiaAPNIC
 
PAETEC Disaster Recovery & Business Continuity Solutions
PAETEC Disaster Recovery & Business Continuity SolutionsPAETEC Disaster Recovery & Business Continuity Solutions
PAETEC Disaster Recovery & Business Continuity SolutionsMark Lawrence Peay
 
TM360 Apptio on Category Creation Presentation
TM360 Apptio on Category Creation PresentationTM360 Apptio on Category Creation Presentation
TM360 Apptio on Category Creation PresentationApptio
 
New IDC Research on Software Analysis & Measurement
New IDC Research on Software Analysis & MeasurementNew IDC Research on Software Analysis & Measurement
New IDC Research on Software Analysis & MeasurementCAST
 
IT Cost Transparency Infographic
IT Cost Transparency InfographicIT Cost Transparency Infographic
IT Cost Transparency InfographicApptio
 
Technology Business Management: Managing the Cost, Quality and Value of IT Se...
Technology Business Management: Managing the Cost, Quality and Value of IT Se...Technology Business Management: Managing the Cost, Quality and Value of IT Se...
Technology Business Management: Managing the Cost, Quality and Value of IT Se...Apptio
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Likan Patra
 
Project Report On Data Center Management
Project Report On Data Center ManagementProject Report On Data Center Management
Project Report On Data Center ManagementDipak Bora
 

Viewers also liked (20)

Big data requirements
Big data requirementsBig data requirements
Big data requirements
 
Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...
Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...
Ing Lease Uk - The relationship between Risk & Compliance and Data Quality - ...
 
IDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunityIDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunity
 
Internet Data Center the Business
Internet Data Center   the BusinessInternet Data Center   the Business
Internet Data Center the Business
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
 
Simplex Cyprus Data Center Presentation
Simplex Cyprus Data Center PresentationSimplex Cyprus Data Center Presentation
Simplex Cyprus Data Center Presentation
 
Datacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in ChinaDatacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in China
 
Factors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural IdentityFactors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural Identity
 
Mobile Internet Connectivity
Mobile Internet ConnectivityMobile Internet Connectivity
Mobile Internet Connectivity
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use cases
 
Challenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in IndiaChallenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in India
 
PAETEC Disaster Recovery & Business Continuity Solutions
PAETEC Disaster Recovery & Business Continuity SolutionsPAETEC Disaster Recovery & Business Continuity Solutions
PAETEC Disaster Recovery & Business Continuity Solutions
 
TM360 Apptio on Category Creation Presentation
TM360 Apptio on Category Creation PresentationTM360 Apptio on Category Creation Presentation
TM360 Apptio on Category Creation Presentation
 
New IDC Research on Software Analysis & Measurement
New IDC Research on Software Analysis & MeasurementNew IDC Research on Software Analysis & Measurement
New IDC Research on Software Analysis & Measurement
 
Big data for Telco: opportunity or threat?
Big data for Telco: opportunity or threat?Big data for Telco: opportunity or threat?
Big data for Telco: opportunity or threat?
 
IT Cost Transparency Infographic
IT Cost Transparency InfographicIT Cost Transparency Infographic
IT Cost Transparency Infographic
 
Technology Business Management: Managing the Cost, Quality and Value of IT Se...
Technology Business Management: Managing the Cost, Quality and Value of IT Se...Technology Business Management: Managing the Cost, Quality and Value of IT Se...
Technology Business Management: Managing the Cost, Quality and Value of IT Se...
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
 
Project Report On Data Center Management
Project Report On Data Center ManagementProject Report On Data Center Management
Project Report On Data Center Management
 
Big data – solution architect
Big data – solution architectBig data – solution architect
Big data – solution architect
 

Similar to Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar with IDC analyst

Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliverySOASTA
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...SOASTA
 
2 application aware storage drives business agility & competitive advantage
2 application aware storage drives business agility & competitive advantage2 application aware storage drives business agility & competitive advantage
2 application aware storage drives business agility & competitive advantageDr. Wilfred Lin (Ph.D.)
 
Continuous Delivery Operating Model for Insurers: Building a Software “Value-...
Continuous Delivery Operating Model for Insurers: Building a Software “Value-...Continuous Delivery Operating Model for Insurers: Building a Software “Value-...
Continuous Delivery Operating Model for Insurers: Building a Software “Value-...Cognizant
 
Seamless Cloud Integration: Leveraging Application Modernization for Business...
Seamless Cloud Integration: Leveraging Application Modernization for Business...Seamless Cloud Integration: Leveraging Application Modernization for Business...
Seamless Cloud Integration: Leveraging Application Modernization for Business...basilmph
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudGoogle
 
Get Smart About Technical Debt
Get Smart About Technical DebtGet Smart About Technical Debt
Get Smart About Technical DebtCAST
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee
 
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeDeveloping a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeFresche Solutions
 
TUNI: Business-driven Cloud Adoption
TUNI: Business-driven Cloud AdoptionTUNI: Business-driven Cloud Adoption
TUNI: Business-driven Cloud AdoptionTero Peltola
 
2013 good design is good business industry frameworks
2013 good design is good business industry frameworks2013 good design is good business industry frameworks
2013 good design is good business industry frameworksRoger Snook
 
Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...
Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...
Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...Cognizant
 
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Cognizant
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Cognizant
 
Application modernization
Application modernizationApplication modernization
Application modernizationDaniel Sapir
 
Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...
Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...
Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...Cognizant
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 

Similar to Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar with IDC analyst (20)

Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous Delivery
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
 
2 application aware storage drives business agility & competitive advantage
2 application aware storage drives business agility & competitive advantage2 application aware storage drives business agility & competitive advantage
2 application aware storage drives business agility & competitive advantage
 
Continuous Delivery Operating Model for Insurers: Building a Software “Value-...
Continuous Delivery Operating Model for Insurers: Building a Software “Value-...Continuous Delivery Operating Model for Insurers: Building a Software “Value-...
Continuous Delivery Operating Model for Insurers: Building a Software “Value-...
 
Seamless Cloud Integration: Leveraging Application Modernization for Business...
Seamless Cloud Integration: Leveraging Application Modernization for Business...Seamless Cloud Integration: Leveraging Application Modernization for Business...
Seamless Cloud Integration: Leveraging Application Modernization for Business...
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
Get Smart About Technical Debt
Get Smart About Technical DebtGet Smart About Technical Debt
Get Smart About Technical Debt
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27
 
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeDeveloping a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
 
TUNI: Business-driven Cloud Adoption
TUNI: Business-driven Cloud AdoptionTUNI: Business-driven Cloud Adoption
TUNI: Business-driven Cloud Adoption
 
2013 good design is good business industry frameworks
2013 good design is good business industry frameworks2013 good design is good business industry frameworks
2013 good design is good business industry frameworks
 
Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...
Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...
Continuous Delivery Operating Model for Entertainment Video Providers: Buildi...
 
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
 
Application modernization
Application modernizationApplication modernization
Application modernization
 
Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...
Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...
Digital Engineering: Top 5 Imperatives for Communications, Media and Technolo...
 
VASUDEO RANE
VASUDEO RANEVASUDEO RANE
VASUDEO RANE
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
ETCA_5
ETCA_5ETCA_5
ETCA_5
 

More from CAST

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsCAST
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsCAST
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportCAST
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCAST
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCAST
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...CAST
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeCAST
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsCAST
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitCAST
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesCAST
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityCAST
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurementCAST
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCAST
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysisCAST
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtCAST
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platformsCAST
 
CRASH Report 2014
CRASH Report 2014CRASH Report 2014
CRASH Report 2014CAST
 

More from CAST (20)

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systems
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical Systems
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in code
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based Contracts
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurement
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance Infographic
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysis
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platforms
 
CRASH Report 2014
CRASH Report 2014CRASH Report 2014
CRASH Report 2014
 

Recently uploaded

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Recently uploaded (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar with IDC analyst

  • 1. Webinar with Melinda Ballou Program Director , IDC Big Data, Big Problems: Avoid System Failure with Quality Analysis
  • 2. CAST Confidential 1 Speakers Melinda Ballou Program Director, Application Life-Cycle Management IDC Pete Pizzutillo Director, Product Marketing CAST
  • 3. Sep-13© 2013 IDC 2 One Long Hot Week in August!! One week (from Aug 19 to Aug 26) In the last two weeks
  • 4. Sep-13© 2013 IDC 3 “Process Gap”- High Cost of Inertia Evolve Beyond Traditional ASQ to Better Address Risk CloudMobile Development Practices Complex SourcingLess Budget Social Analytics
  • 5. Sep-13© 2013 IDC 4 Industry Highlights: Disruptive Trends  Diverse deployment demands for mobile, cloud, embedded drive corporate need for architectural impact analysis for application portfolio, business dynamism is enabled by software quality analysis -- & cost prohibitive  Organizations re-invest, seeking to do more with fewer resources with financial and staffing constraints; leveraging efficient approaches to restore and sustain high performing, timely, business-critical software.  Complex sourcing/off-shoring plus use of open source need strong teaming, effective code management, testing, and metrics enabled by SQAM; Services driven environment (SaaS/cloud, Devops emergence)  Global economic competition and local compliance across geographies demand quality, change and portfolio management, adaptability and rigor  Flexible development paradigm with services creation increasingly drive technology and business collaboration – strong agile emergence  Emerging security issues (as driver) and virtualization/cloud (as enabling technology) for SQAM adoption; ad hoc approaches unsustainable  End-user experience and business impact challenges of rich Internet, mobile, embedded, with social media collaboration/community opportunities  Very public software failures increasing
  • 6. Sep-13© 2013 IDC 5 “Quality Gap”- High Cost of Failure Poor Quality = Increased Business Risk Lost Revenue ($$$$$) Lost Customers Lost Productivity Increased Costs Lower ProfitsDamaged Brand
  • 7. Sep-13© 2013 IDC 6 • Software Quality Analysis and Measurement: software tools that enable organizations to observe, measure, and evaluate software complexity, size, productivity, and risk (including technical & structural quality, non-functional testing) • Architectural assessment of design consequences (on software performance, stability, adaptability, and maintainability) • Static analysis and dynamic analysis • Quality metrics for complexity, size, risk, and productivity to establish baselines and to help judge project progress and resource capabilities • Application portfolio evaluation through understanding the impact of architectural flaws and dependencies • In-phase prevention of additional software problems not easily observable through typical ASQ tools. SQAM Definition: Establishing a Strategy
  • 8. Sep-13© 2013 IDC Barriers to Traditional Testing – SQAM Drivers • Agile velocity demands immediate, frequent, iterative testing • Lack of system resources constrains testing usage – expense limits ability to mirror production configurations (mobile issues) • Lack of architectural and design context for multi-modal deployment need for management & coordination • Challenges to test system configuration and impact to performance and adaptability of design • Lack of visibility into consequences of poor architecture with significant impact to business or failed software • Increasing occurrences of business critical failures are driving engagement and interest in software quality analysis and measurement 7
  • 9. Sep-13© 2013 IDC ASQ Forecast with IDC Software Quality Analysis & Mgmnt Segment 0 500 1,000 1,500 2,000 2,500 3,000 3,500 2009 2010 2011 2012 2013 2014 2015 2016 2017 $M ASQ (6/13) SQAM (9/13 est) 19% 29%
  • 10. Sep-13© 2013 IDC 9 IT and Business Challenges: Silos, Gaps  Today’s applications are high-visibility, and carry a high cost-of- failure -- customer self-serve, supplier/channel; key internal business applications  “Network effect” – failure in one leads to other failures  The need for SQAM as part of quality life-cycle is key since G2000 organizations are split across groups: – Business/users stakeholders – Architects, Designers and Developers – QA professionals – Operational staff  Must extend the Quality life-cycle across geographies, life cycle phases and groups
  • 11. Sep-13© 2013 IDC 10 Goals of Effective IT/Business Alignment New Business Value Reduced Exposure Innovation: Maximize Upside Through Technology- Enabled Business Processes Compliance: Minimize Downside Through Risk Management
  • 12. Sep-13© 2013 IDC CIO’s 2013 Personal Agenda Q. In 2013, which of the following goals will be top of your personal agenda as CIO? Please select your top 3 goals. 0% 5% 10% 15% 20% 25% Implement a more rigorous process to evaluate new ideas for IT to take on Re-skill existing IT talent More effectively attract new IT talent Carve out more IT budget for new projects/innovative projects Focus IT organization on better understanding the requirements of the consumers Better align IT with the business Foster a culture within IT where IT more often provides a qualified "yes" to the business Foster a culture within IT that drives more innovation Focus the IT organization more on business strategy than technology strategy US WE Total n = 70 WE respondents = 21; US respondents = 49 Source: IDC 2013 CIO Agenda Survey, Fall 2012 5
  • 13. Sep-13© 2013 IDC By 2016, LOB executives will be directly involved in 80% of new IT investments It is Time to Revisit IT Planning, Quality Governance and Portfolio Management Methods Of the new internal IT projects initiated at your company this year, what percentage will be led under the following scenarios? N = 57 Source: IDC 2013 CIO Sentiment Survey, Fall 2012 Prediction  58% of new IT investments in 2013 will involve direct participation by LOB executives  Companies will initiate an average of 40 new IT projects in 2013 (with or without IT)  Line of business’ participation in IT projects will grow to 80% in 3 years  The implications are vast on how the CIO works with the line of business Situation Assessment  Cloud, social and mobile services are the great equalizers, the balance-wheel of the corporate machinery  Notable instances of CEOs and CFOs driving the migration to Cloud and Managed Services 8% 17% 33% 42% 0% 10% 20% 30% 40% 50% Project solely led / managed by the LOBs Project led / managed by LOBs, but subject to review by IT Project jointly led / managed by IT and the LOBs Project solely led / managed by IT 9
  • 14. Sep-13© 2013 IDC Three Key Challenges for IT IT must deliver new applications that have greater business value and higher quality, while managing costs … in the face of these 3 key challenges:  Increasing criticality of applications to the business  Increasing complexity of software systems – From web to mobile to embedded… encompassing social systems of engagement to feed systems of record, performance demand with Big Data Analytics for business optimization  Increasingly distributed teams with multi-sourcing – From onshore to offshore to open source 13
  • 15. Sep-13© 2013 IDC Source: IDC CloudTrack Survey, Winter 2012 n=493 Mean rating by respondents Q. How concerned are you about cloud...? (1-5 scale; 5 = extremely concerned) Security Tops Concerns: Risk Major Role
  • 16. Sep-13© 2013 IDC 15 Coordinating across the Life-Cycle • Coordinating architectural design, requirements, software analysis, quality and operational performance is key across emerging technologies • Failures and slow response time costs prohibitive for business areas • Organizations should leverage quality automation through design, requirements, unit test, system integration, pre-deployment & application performance testing with emerging cloud / mobile /social platforms • Evaluating software analysis with automation can help teams react and manage user application experience • As business requirements change, a cogent life-cycle approach enables adaptive software analysis and responses • Look to SQAM alternatives initially as an on-ramp to mobile, cloud and multi modal dev – strategize through to deployment
  • 17. Sep-13© 2013 IDC 16 IDC Calls to Action • Across industries, poorly designed and problematic software leads to brand perception impact above and beyond individual problems – demand response • The challenges of increased complexity and high-end development across diverse platforms increase code problems, increase costs and drive debilitating consequences resulting from defects pre- and post-deployment • Companies must become better educated about the business consequences and labor costs of poor software design since optimism masks the need for change • Organizations should evaluate SQAM tools to supplement traditional ASQ along with appropriate process and organizational approaches
  • 18. Sep-13© 2013 IDC 17 Summary  Coordinate a Quality Life-Cycle approach that targets pragmatic approaches to SQAM from design through to deployment to obtain benefits  Evaluate your organization’s current strategies for design, application portfolio review, effective quality processes and automated tools adoption  Schisms between business, architects, development, testers and operations must be addressed -- IT groups and the business must build a common language, common metrics, and common tools and practices that include SQAM  Drive towards an effective quality strategy to help cut costs, increase efficiency and business agility, to sustain brand, address competitive challenges
  • 19. Analyzing and Measuring Software Risks
  • 20. CAST Confidential 19 Industry starting to pay attention to code quality But code quality & hygiene, things traditional safe guards identify are only a small part of the solution. Sources: Li, et al. (2011). Characteristics of multiple component defects and architectural hotspots: A large system case study. Empirical Software Engineering “Tracking programming practices at the Unit Level alone may not translate into the anticipated business impact,…most devastating defects can only be detected at the System Level.” 8% 90% Unit-Level Flaws System- Level Flaws % of apps defects % of repair effort 92% 8% 52% 48% of downtime caused by 8% of system-level defects!
  • 21. CAST Confidential Business Characteristic Good Coding Practices @ Unit-Level Good Architectural Practices @ Technology/System Levels RELIABILITY Protecting state in multi-threaded environments Safe use of inheritance and polymorphism Resource bounds management, Complex code Managing allocated resources, Timeouts Multi-layer design compliance Software manages data integrity and consistency Exception handling through transactions Class architecture compliance PERFORMANCE EFFICIENCY Compliance with Object-Oriented best practices Compliance with SQL best practices Expensive computations in loops Static connections versus connection pools Compliance with garbage collection best practices Appropriate interactions with expensive or remote resources Data access performance and data management Memory, network and disk space management Centralized handling of client requests Use of middle tier components vs. procedures/DB functions SECURITY Use of hard-coded credentials Buffer overflows Missing initialization Improper validation of array index Improper locking Uncontrolled format string Input validation SQL injection Cross-site scripting Failure to use vetted libraries or frameworks Secure architecture design compliance MAINTAINABILITY Unstructured and duplicated code High cyclomatic complexity Controlled level of dynamic coding Over-parameterization of methods Hard coding of literals Excessive component size Duplicated business logic Compliance with initial architecture design Strict hierarchy of calling between architectural layers Excessive horizontal layers Excessive multi-tier fan-in/fan-out NUMBER OF ISSUES 90% of violations 10% of violations BUSINESS IMPACT 52% of repair workload 10% of production downtime 48% of repair workload 90% of production downtime Industry must focus on the flaws that matter
  • 22. CAST Confidential CAST Software Risk Prevention  CAST solutions expose the weaknesses in complex multitier systems by identifying the high severity engineering flaws undetectable by testing. CAST insures the confidence that critical systems are free from vulnerabilities, either intentionally designed into the software or accidentally inserted at anytime during its lifecycle. 1. Define the business-relevant software characteristics: stability & resilience, performance efficiency, & security important to your business. 2. Identify structural weaknesses and architectural hotspots based on initial of applications. 3. Baseline and benchmark key risk indicators against industry norms. 4. Monitor to ensure system do not degrade over time. SOFTWARE RISK PREVENTION PROCESS PEACE OF MIND - FROM THE INSIDE OUT.
  • 23. CAST Confidential Analysis strategy for typical IT application portfolio 22 Effort(ManDays/Year) Importance to Business Highest Lowest Critical Apps Entire Application Portfolio CAST AIP  Deep Structural Analysis  Risk Detection  Lean Application Development  Function Points & Productivity  Vendor Management  Continuous Improvement CAST Highlight  Fast Cloud-based Delivery  No source code aggregation  Key Metrics on Entire Portfolio  Size, Complexity and Risk analytics  Annual/Quarterly Benchmark
  • 24. CAST Confidential Portfolio risk review with Highlight 23 QUICKLY SPOT SHORT TERM RISK – COMPLEX SYSTEMS LIKELY TO FAIL
  • 25. CAST Confidential ArchitectureCompliance Enterprise IT applications require depth of analysis 24  Intra-technology architecture  Intra-layer dependencies  Module complexity & cohesion  Design & structure  Inter-program invocation  Security Vulnerabilities Module Level  Integration quality  Architectural compliance  Risk propagation simulation  Application security  Resiliency checks  Transaction integrity  Function point & EFP measurement  Effort estimation  Data access control  SDK versioning  Calibration across technologies System Level Data FlowTransaction Risk  Code style & layout  Expression complexity  Code documentation  Class or program design  Basic coding standards Program Level Propagation Risk Java EJB PL/SQL Oracle SQL Server DB2 T/SQL Hibernate Spring Struts .NET C# VB COBOL C++ COBOL Sybase IMS Messaging Java Web Services 1 2 3 JSP ASP.NETAPIs
  • 26. CAST Confidential CAST AIP - well beyond static analysis Static Analysis DependenciesCode Pattern Scanning Data Flow Rule Engine Transaction Finder Intelligent Configuration Content Updater The architectural assessment of design consequences (on software performance, stability, adaptability, maintainability, and security vulnerabilities) is an area in which CAST excels and successfully differentiates from static analyzers.” Architecture Analysis Behavioral Simulation Function Points
  • 27. CAST Confidential 26 Making risk management actionable  Identify and stabilize are the tactical steps  To harden and optimize is a move towards proactive risk management that requires actionable processes into the application lifecycle  Quickly spot the riskiest applications in your portfolio  View overall Technical Quality Risk Score  View total number of critical violations discovered.
  • 28. CAST Confidential • Upload Source Code and documentation • Complete a Technical Survey Application Assessment Process TRANSFER VALIDATE INSIGHT • CAST Consultant verifies completeness of source code , artifacts, and technical survey. • Verifies application boundaries. • Results are published to a private, secure portal • Assessment report delivered and presented to client  Results by application  Code Quality performance  Benchmark across industry Day 1 Day 2 – 4 Day 8 ANALYZE • CAST Consultant performs the analysis. • Using highly-sophisticated language analyzers and more than 1000 industry- best-practice rules, CAST assessment identifies weakness in the application and provides guidance on how to fix them. • Verifies results with Client application owner/SME Day 4 – 7
  • 29. CAST Confidential Contact Information Pete Pizzutillo p.pizzutillo@castsoftware.com www.castsoftware.com blog.castsoftware.com linkedin.com/company/cast @OnQuality slideshare.net/castsoftware