SlideShare a Scribd company logo
1 of 10
Download to read offline
CAST ARCHITECTURE CHECKER

Even the most beautiful architecture
can be ruined by a single line of code.
Gartner Research
Architectural Challenges

Confidential

The integration of systems, applications into products
and services provides most of the differentiated value
in today's marketplace. Simultaneously integration
challenges represent the primary sources of
uncertainty, complexity, and cost of developing and
maintaining systems. The ability to monitor system
adherence to architecture is central to successful
system modifications and ensuring system integrity.
Architectural challenges:
•

Complexity - As systems evolve its complexity
increases unless work is done to maintain or
reduce it.

•

Ivory tower - Grand designs are thrust from above
with little implementation guidance.

•

Developer / Architect Disconnect - Developer’s
don’t understand the architecture and architects
don’t understand the code - and there’s no check
that implementation matches the design.

•

Big architecture upfront in an agile world - Trying
to do everything upfront when an evolutionary
approach is needed.

“There are two ways of
constructing a software
design: One way is to make
it so simple that there are
obviously no deficiencies,
and the other way is to make
it so complicated that there
are no obvious deficiencies.
The first method is far more
difficult.”
C.A.R. Hoare
CAST Confidential

2
Value of Visibility into Architecture
Protects design patterns from degradation
Developers lack of understanding of architectural
decisions and design patterns contributes to
architectural drift over time. Lack of visibility into
the implementation prevent objective assessment
of architecture state versus its intended design.

Confidential

Creates more secure systems
50% of security problems result from design flaws.
You cannot find design defects by staring at code higher-level architectural risk analysis and checks
are essential to building secure systems.
Reduces the impact of architectural defects
Architectural defects or multi-component code
Defects (MCD) require changes to multiple
components. Although they consist of less than
10% of known defects they require 20 times more
changes to remediate – accounting over 50% of all
remediation effort. Eliminating MCDs represents
the single greatest opportunity to reduce technical
debt.

“Most software today
is very much like an
Egyptian pyramid with
millions of bricks piled on
top of each other, with no
structural integrity, but
just done by brute force
and thousands of slaves.”

(Gary McGraw in Build Security In)

Alan Kay

Li, et al., ( 2011). Characteristics of multi-component defects and architectural hotspots: A large
system case study. Empirical Software Engineering, 16 (5), 667-702.

CAST Confidential

3
CAST Architecture Checker
CAST Architecture Checker allows you describe the
layers and dependencies of a system to enable an
automated verification of the implementation
against its design.
Through a visual interface you can describe the
architecture, system dependencies and define rules
that are used to verify the architecture.

Confidential

As part of the CAST Application Intelligence
Platform, Architecture Checker enhances
architectural analysis with code quality metrics and
application health scores along with the compliance
feedback of the actual applications construction.
Architecture conformance ensures that the system:



Adheres to the stated architectural principles
such as open source.



4

Adheres to the stated standards including syntax
and semantic rules specified.



CAST Confidential

Provides the required functionality.

Is implemented as designed and verifies code
reuse and frameworks.
Visually Define Critical Applications

Confidential

Access library of layers or
objects to describe your
application.

Drag and drop library components
to define application layers.

A Layer is a list of conditions generated from a CAST analysis. Drag and drop from
the Layer & Sets menu to define the various layers and their relationships.
CAST Confidential

5
Confidential

Define Application Layers and Dependencies

Define authorized or
forbidden dependencies

Depending on your requirement, you can describe an application by defining
authorized dependencies between layers or define forbidden dependencies.
CAST Confidential

6
Interactive Architecture Compliance Checking

The architectural description
becomes a CAST Quality Rule.

Confidential

The rule is used to verify the
application each time a CAST
analysis is performed.

Reports of rule compliance informs adoption of frameworks and reuse practices.
CAST Confidential

7
Confidential

Automated Compliance Against Design

Select the Red links to view a
list of violations. You can see
both the caller and the called
object as well the source code.

Frameworks have taken a huge place in IT
appl. Dev Still this not well mastered by IT
& SI teams, thus need for strong checks

End-to-end analysis of different languages, technologies and roles
is mandatory for objective and effective architectural analysis.
CAST Confidential

8
Automated Architectural Compliance
Visibility - IT leaders in large organizations must be
certain that the software architectural design is
being implemented and adhered to. But in an era
when more developers are deploying and coding
faster than ever, architectural reviews need to
happen at the speed of your development teams’
deployment.

Confidential

Define architectural guidelines at the beginning of
your project. Then perform consistent checks with
each new iteration to ensure compliance.

Avoid Risk – Catching architectural errors early
will reduce the cost and risk of outages in the
short term while reducing the maintenance
effort of the system over its lifespan.
Communicate – Documenting and sharing
architectural dependencies while including real
time feedback to development teams leads to
high quality and high performing systems.

“He that will not
apply new remedies
must expect new
evils; for time is the
greatest innovator. ”
Francis Bacon

CAST Confidential

9
About CAST

Confidential

CAST is a pioneer and world leader in Software
Analysis and Measurement, with unique
technology resulting from more than $100
million in R&D investment. CAST introduces
fact-based transparency into application
development and sourcing to transform it
into a management discipline. More than 250
companies across all industry sectors and
geographies rely on CAST to prevent business
disruption while reducing hard IT costs.
CAST is an integral part of software delivery
and maintenance at the world's leading IT
service providers such as IBM and Capgemini.
Founded in 1990, CAST is listed on NYSEEuronext (Euronext: CAS) and serves IT intensive
enterprises worldwide with a network of offices
in North America, Europe and India. For more
information, visit www.castsoftware.com
“Out of clutter
find simplicity.”
Albert Einstein
CAST Confidential

10

More Related Content

What's hot

Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1
Siddharth Ayer
 
Requirement prioritization
Requirement prioritizationRequirement prioritization
Requirement prioritization
Abdul Basit
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 

What's hot (19)

Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
 
Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1
 
Using Generative AI
Using Generative AIUsing Generative AI
Using Generative AI
 
Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
 
Requirement prioritization
Requirement prioritizationRequirement prioritization
Requirement prioritization
 
CHATGPT : La creación automática de textos académicos con Inteligencia artifi...
CHATGPT : La creación automática de textos académicos con Inteligencia artifi...CHATGPT : La creación automática de textos académicos con Inteligencia artifi...
CHATGPT : La creación automática de textos académicos con Inteligencia artifi...
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Online jobportal
Online jobportalOnline jobportal
Online jobportal
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
AI101 guide
AI101 guideAI101 guide
AI101 guide
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
KIIT University ACM Student Chapter
KIIT University ACM Student ChapterKIIT University ACM Student Chapter
KIIT University ACM Student Chapter
 
Fairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsFairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML Systems
 
Use Case TABLE with Actors & Goals
Use Case TABLE with Actors & Goals Use Case TABLE with Actors & Goals
Use Case TABLE with Actors & Goals
 
ChatGPT in Cybersecurity
ChatGPT in CybersecurityChatGPT in Cybersecurity
ChatGPT in Cybersecurity
 
Ch04 agile development models
Ch04 agile development modelsCh04 agile development models
Ch04 agile development models
 

Viewers also liked

CAST AIP Support of Industry Security Standards
CAST AIP Support of Industry Security StandardsCAST AIP Support of Industry Security Standards
CAST AIP Support of Industry Security Standards
CAST
 

Viewers also liked (6)

Managing Software Risk with CAST
Managing Software Risk with CASTManaging Software Risk with CAST
Managing Software Risk with CAST
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
 
Accenture Customer Story_CAST
Accenture Customer Story_CASTAccenture Customer Story_CAST
Accenture Customer Story_CAST
 
CAST AIP Support of Industry Security Standards
CAST AIP Support of Industry Security StandardsCAST AIP Support of Industry Security Standards
CAST AIP Support of Industry Security Standards
 
Cast vs sonar
Cast vs sonarCast vs sonar
Cast vs sonar
 
Research design and Proposal Writing
Research design and Proposal WritingResearch design and Proposal Writing
Research design and Proposal Writing
 

Similar to CAST Architecture Checker

Avoiding Software Insanity
Avoiding Software InsanityAvoiding Software Insanity
Avoiding Software Insanity
josephnaveen
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ - Consortium for IT Software Quality
 
A summary of software architecture guide
A summary of software architecture guideA summary of software architecture guide
A summary of software architecture guide
Triet Ho
 

Similar to CAST Architecture Checker (20)

CAST for the Architect
CAST for the ArchitectCAST for the Architect
CAST for the Architect
 
Unsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsUnsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable Apps
 
Avoiding Software Insanity
Avoiding Software InsanityAvoiding Software Insanity
Avoiding Software Insanity
 
Unit 2
Unit 2Unit 2
Unit 2
 
Chapter1
Chapter1Chapter1
Chapter1
 
CAST Imaging: Map & Master Your Software
CAST Imaging: Map & Master Your SoftwareCAST Imaging: Map & Master Your Software
CAST Imaging: Map & Master Your Software
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptx
 
Ports adapters architecture (hexagonal architecture)
Ports adapters architecture (hexagonal architecture)Ports adapters architecture (hexagonal architecture)
Ports adapters architecture (hexagonal architecture)
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
 
MicroServices-Part-1.pdf
MicroServices-Part-1.pdfMicroServices-Part-1.pdf
MicroServices-Part-1.pdf
 
Continuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureContinuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on Azure
 
iSAQB gathering 2021 keynote - Architectural patterns for rapid, reliable, fr...
iSAQB gathering 2021 keynote - Architectural patterns for rapid, reliable, fr...iSAQB gathering 2021 keynote - Architectural patterns for rapid, reliable, fr...
iSAQB gathering 2021 keynote - Architectural patterns for rapid, reliable, fr...
 
Microservice final final
Microservice final finalMicroservice final final
Microservice final final
 
A summary of software architecture guide
A summary of software architecture guideA summary of software architecture guide
A summary of software architecture guide
 
Microservices Architecture - Bangkok 2018
Microservices Architecture - Bangkok 2018Microservices Architecture - Bangkok 2018
Microservices Architecture - Bangkok 2018
 
Microservices: A Step Towards Modernizing Healthcare Applications
Microservices: A Step Towards Modernizing Healthcare ApplicationsMicroservices: A Step Towards Modernizing Healthcare Applications
Microservices: A Step Towards Modernizing Healthcare Applications
 
Micro services Architecture
Micro services ArchitectureMicro services Architecture
Micro services Architecture
 
Microservices Architecture & Testing Strategies
Microservices Architecture & Testing StrategiesMicroservices Architecture & Testing Strategies
Microservices Architecture & Testing Strategies
 
Microservices Architecture & Testing Strategies
Microservices Architecture & Testing StrategiesMicroservices Architecture & Testing Strategies
Microservices Architecture & Testing Strategies
 

More from CAST

Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical Systems
CAST
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
CAST
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
CAST
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
CAST
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
CAST
 

More from CAST (20)

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systems
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical Systems
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in code
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based Contracts
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurement
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance Infographic
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysis
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platforms
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

CAST Architecture Checker

  • 1. CAST ARCHITECTURE CHECKER Even the most beautiful architecture can be ruined by a single line of code. Gartner Research
  • 2. Architectural Challenges Confidential The integration of systems, applications into products and services provides most of the differentiated value in today's marketplace. Simultaneously integration challenges represent the primary sources of uncertainty, complexity, and cost of developing and maintaining systems. The ability to monitor system adherence to architecture is central to successful system modifications and ensuring system integrity. Architectural challenges: • Complexity - As systems evolve its complexity increases unless work is done to maintain or reduce it. • Ivory tower - Grand designs are thrust from above with little implementation guidance. • Developer / Architect Disconnect - Developer’s don’t understand the architecture and architects don’t understand the code - and there’s no check that implementation matches the design. • Big architecture upfront in an agile world - Trying to do everything upfront when an evolutionary approach is needed. “There are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult.” C.A.R. Hoare CAST Confidential 2
  • 3. Value of Visibility into Architecture Protects design patterns from degradation Developers lack of understanding of architectural decisions and design patterns contributes to architectural drift over time. Lack of visibility into the implementation prevent objective assessment of architecture state versus its intended design. Confidential Creates more secure systems 50% of security problems result from design flaws. You cannot find design defects by staring at code higher-level architectural risk analysis and checks are essential to building secure systems. Reduces the impact of architectural defects Architectural defects or multi-component code Defects (MCD) require changes to multiple components. Although they consist of less than 10% of known defects they require 20 times more changes to remediate – accounting over 50% of all remediation effort. Eliminating MCDs represents the single greatest opportunity to reduce technical debt. “Most software today is very much like an Egyptian pyramid with millions of bricks piled on top of each other, with no structural integrity, but just done by brute force and thousands of slaves.” (Gary McGraw in Build Security In) Alan Kay Li, et al., ( 2011). Characteristics of multi-component defects and architectural hotspots: A large system case study. Empirical Software Engineering, 16 (5), 667-702. CAST Confidential 3
  • 4. CAST Architecture Checker CAST Architecture Checker allows you describe the layers and dependencies of a system to enable an automated verification of the implementation against its design. Through a visual interface you can describe the architecture, system dependencies and define rules that are used to verify the architecture. Confidential As part of the CAST Application Intelligence Platform, Architecture Checker enhances architectural analysis with code quality metrics and application health scores along with the compliance feedback of the actual applications construction. Architecture conformance ensures that the system:   Adheres to the stated architectural principles such as open source.  4 Adheres to the stated standards including syntax and semantic rules specified.  CAST Confidential Provides the required functionality. Is implemented as designed and verifies code reuse and frameworks.
  • 5. Visually Define Critical Applications Confidential Access library of layers or objects to describe your application. Drag and drop library components to define application layers. A Layer is a list of conditions generated from a CAST analysis. Drag and drop from the Layer & Sets menu to define the various layers and their relationships. CAST Confidential 5
  • 6. Confidential Define Application Layers and Dependencies Define authorized or forbidden dependencies Depending on your requirement, you can describe an application by defining authorized dependencies between layers or define forbidden dependencies. CAST Confidential 6
  • 7. Interactive Architecture Compliance Checking The architectural description becomes a CAST Quality Rule. Confidential The rule is used to verify the application each time a CAST analysis is performed. Reports of rule compliance informs adoption of frameworks and reuse practices. CAST Confidential 7
  • 8. Confidential Automated Compliance Against Design Select the Red links to view a list of violations. You can see both the caller and the called object as well the source code. Frameworks have taken a huge place in IT appl. Dev Still this not well mastered by IT & SI teams, thus need for strong checks End-to-end analysis of different languages, technologies and roles is mandatory for objective and effective architectural analysis. CAST Confidential 8
  • 9. Automated Architectural Compliance Visibility - IT leaders in large organizations must be certain that the software architectural design is being implemented and adhered to. But in an era when more developers are deploying and coding faster than ever, architectural reviews need to happen at the speed of your development teams’ deployment. Confidential Define architectural guidelines at the beginning of your project. Then perform consistent checks with each new iteration to ensure compliance. Avoid Risk – Catching architectural errors early will reduce the cost and risk of outages in the short term while reducing the maintenance effort of the system over its lifespan. Communicate – Documenting and sharing architectural dependencies while including real time feedback to development teams leads to high quality and high performing systems. “He that will not apply new remedies must expect new evils; for time is the greatest innovator. ” Francis Bacon CAST Confidential 9
  • 10. About CAST Confidential CAST is a pioneer and world leader in Software Analysis and Measurement, with unique technology resulting from more than $100 million in R&D investment. CAST introduces fact-based transparency into application development and sourcing to transform it into a management discipline. More than 250 companies across all industry sectors and geographies rely on CAST to prevent business disruption while reducing hard IT costs. CAST is an integral part of software delivery and maintenance at the world's leading IT service providers such as IBM and Capgemini. Founded in 1990, CAST is listed on NYSEEuronext (Euronext: CAS) and serves IT intensive enterprises worldwide with a network of offices in North America, Europe and India. For more information, visit www.castsoftware.com “Out of clutter find simplicity.” Albert Einstein CAST Confidential 10

Editor's Notes

  1. I getyour point but i have the impression thatyou are advocating for a retro engineering tool