SlideShare a Scribd company logo
1 of 29
#ITFAIL
IN 2011
Application Failures

        In a year when we saw one major outage,
          malfunction and security breach after
       another befall organizations that rely upon
          technology, we should heed a lesson.

         The sad part is nearly all, if not all of these
          outages, malfunctions and breaches had
          in common a structural flaw somewhere
         down in the bowels of the application that
                   had gone undetected.

CAST Confidential     2           Achieve Insight. Deliver Excellence.
April Patch Tuesday: released a
          record-tying 17 bulletins
patching a record 64 vulnerabilities
           including kernel patches



              November Patch Tuesday: avoided patching
              a zero-day vulnerability used in the Duqu
              malware attacks that allowed hackers to run
              arbitrary code in kernel mode

                  http://blog.castsoftware.com/it%E2%80%99s-tuesday-do-you-know-where-your-patches-are/
                                                        http://blog.castsoftware.com/microsoft-ducks-duqu/
Apple has a bug in its new iOS 5 operating
system that causes serious battery drain issues
       with the new iPhone 4S handset

                              http://blog.castsoftware.com/marketing-over-matter/
Dropbox encounters
a bug during a code
update that disables
customer passwords
for several hours




                       http://blog.castsoftware.com/dropbox-drops-the-ball/
JP Morgan, Chase & Capital One reveal that
email management vendor Epsilon detected an
"unauthorized entry" into its system, exposing
    customer names and e-mail addresses
Hackers backed by a foreign
      government steal 24K
 sensitive files by exploiting
software vulnerabilities at a
 Dept of Defense contractor

                                   Defense Secretary Leon Panetta




                                 http://blog.castsoftware.com/the-enemy-within/
Sony suffers more than a dozen attacks
   at the hands of the LulzSec Group,
  which exposes customer accounts via
                SQL Injection attacks
                                              Sony president Howard Stringer




                Attacks result in 55 class action
                law suits and cost Sony $178M

                                     http://blog.castsoftware.com/sony-oops-i-did-it-again/
London Stock Exchange
                          halts trading on its main
                          market due to a technical
                          fault in its barely 2-week-
                          old MilleniumIT trading
                          system




http://blog.castsoftware.com/london-bourse-is-falling-down-%E2%80%93-time-to-analyze-its-structure/
A malware attack exposes
 names, account numbers
     and email addresses
       of around 200,000
     Citigroup customers




                           http://blog.castsoftware.com/hackers-are-getting-smarter/
A spate of computer outages in the
  airline industry was blamed on bad
hardware, corrupted software & failure
      of backup systems to kick in




                         http://blog.castsoftware.com/stranded-by-software/
A technical fault causes levels to be
           incorrectly displayed for nearly an hour
           following the start of trading on Euronext



    Borsa Italiana suspends
trading for almost six hours
    blaming technical issues


 Australian Stock Exchange has trading halted
 due to an ICT systems error traced back to a
 software problem


                     http://blog.castsoftware.com/stock-exchange-failures-what-next/
A computer service vendor of
Boston’s Beth Israel Hospital
failed to restore proper security
settings on a computer following
maintenance, leading it to be
infected with a virus that
transmitted data files to an
unknown location



        http://blog.castsoftware.com/hacking-up-a-hospital/
discovers data leak vulnerability
                                             resulting from pre-existing
                                             security hole from old Froyo
                                             operating system




 More than 50 malicious
applications infect Android                         Google pulls Gmail app
      devices through                               from iPhone App stores
  DroidDream malware



                                                    due to a bug that causes
                                                     a “notification error”
             http://blog.castsoftware.com/serving-up-some-humble-pie-with-google%E2%80%99s-%E2%80%98ice-
                                                                                        cream%E2%80%99/
RSA allowed their own
   information to be stolen
when a phishing email with
a zero-day exploit installed
     a backdoor through an
 Adobe Flash vulnerability




                         http://blog.castsoftware.com/to-be-forewarned-is-to-be-forearmed/
RIM experiences worldwide outage of
the BlackBerry system when a software
  upgrade on its database resulted in
 corruption problems and attempts to
  switch back to older version led to
         collapse of system


                          http://blog.castsoftware.com/falling-off-the-rim/
Researchers demonstrate hackers have
capabilities to send radio signals that exploit
  vulnerabilities in embedded software and
could reprogram or shut down devices such
      as pacemakers or insulin pumps




                           http://blog.castsoftware.com/hacking-the-heart-of-the-matter/
Dept of Energy contractor
 Pacific Northwest National
Laboratory shuts down most
    of its internal network
  services when a sustained
     cyber attack exploits
undisclosed bug in the server



     http://blog.castsoftware.com/seeking-independence-from-being-hacked/
Bank of America customers
                            are unable to log in to their
                            online bank accounts due to
                            problems following routine
                            software upgrades.




Later in year their website
goes off-line due to a “Denial
of Service” attack



                                 http://blog.castsoftware.com/stock-exchange-failures-what-next/
A computer virus infects
  software that manages
Predator and Raptor drones

               http://blog.castsoftware.com/what-we-dont-know-is-hurting-us/
UK’s East Coast Main Line left
more than 3,000 rail passengers
  stranded or delayed for more
 than five hours on a Saturday
    afternoon due to software
 malfunction that knocked out
signaling system and its backup



                                  http://blog.castsoftware.com/when-good-software-goes-bad/
39 recalls of medical devices resulting
from software defects and malfunctions
                    http://blog.castsoftware.com/software-quality-is-a-matter-of-life-death/
PREVENT
 #ITFAIL
   WITH
APPLICATION
STRUCTURAL
  QUALITY
Application Structural Quality


       Whatever the reason these
   structural quality errors happened,
          they shouldn’t have.
  Hopefully in 2012, companies will look back
  on all the problems in 2011 and realize that
 they need to increase the structural analysis of
   their application software to ensure they
            won’t be the next victim.

CAST Confidential   24           Achieve Insight. Deliver Excellence.
CAST Structural Quality Metrics


         Most enterprises measure everything but the product delivered to the business
            CAST Application Intelligence Platform (AIP) measures the product itself



                                           Process       Product

                                                                                 Robustness
                                                                                 Performance
                                           Time &       Quality                  Security          CAST AIP
                     Planning             Duration     &Size                    Changeability
                     Estimation                                                 Transferability
                     Scheduling                                                 Size
                     Time Tracking
                     Cost Tracking                                             Requirements
                                                        Function &
                                      Effort & Budget
                                                          Scope
                                                                                Earned Value
                                                                                User Acceptance
                                                                                Usability




CAST Confidential                     25                    Achieve Insight. Deliver Excellence.
CAST Inserts Actionable Visibility

         CAST Application Intelligence Center                                          CxO & VP, …
                                                                                       Dashboard, reports
                               CAST Application
                               Intelligence PlatformTM
                                 AI Management Studio
                                 Knowledge Base
                                 Approx one thousand rules and
                                   best practices                                      PM, QA, Architects…
                                 Decade of software engineering                        Std enforcement
                                   expertise                                            Early ID of violations
               CAST Application Analysis Engine                                         Drill down to root cause

             CAST Native       CAST UA       3rd party
            Analyzers (28)      scripts     analyzers




     Delivered Source Code:                                                            Dev Teams, Suppliers
        CICS, IMS, COBOL, DB2 z/OS, PL/I                                               Arch. visibility / Quick wins
        J2EE, .NET and all Major RDBMS                                                 Software engineering expertise
        Web Apps, BI, EAI, C/C++, VB, PB                                               Continuous training/coaching
        Siebel, SAP, PSFT, OBS, Amdocs




CAST Confidential                     26                       Achieve Insight. Deliver Excellence.
Tangible and Measured Value

        Mitigate business risks with improved structural quality
               Better applications for higher business resiliency and continuity
               Risk-proofed projects more likely to deliver business benefits on time
        Make IT and suppliers more productive
               Eliminate waste in ADM
                       Prevent coding errors in development: 10x savings in rework per coding error
                       Keep technical debt from growing: up to 10% saving in maintenance cost
                       Benchmark then optimize resources: maintenance savings potential
                       Better reuse of frameworks and components: up to 10% of dev budget
               Reduce waste in operations
                       Improve efficiency of large complex transactions & batch processes: up to 5% mips
                       Reduce troubleshooting and rollover costs: lower Ops staff overtime
               Apply consistent measurement & KPIs for superior visibility
                       Up to 10% of ADM budget, esp. ADM outsourcing

               “Applying the principles of lean manufacturing to ADM can increase productivity
                  by 20 to 40 percent while improving the quality and speed of execution.”
                                                - Ranjit Tinaikar, Principal, Head of NA IT Management Practice


CAST Confidential                          27                           Achieve Insight. Deliver Excellence.
Market Leader and Pioneer
              250 Global Leaders Rely on CAST




SIsUse/Resell CAST
SIs Resell CAST                                                           Industry Groups Engage CAST




             Key Influencers Endorse CAST




 CAST Confidential                28            Achieve Insight. Deliver Excellence.
Learn more about CAST

     www.castsoftware.com
      blog.castsoftware.com
 www.facebook.com/castonquality
 www.slideshare.net/castsoftware
       Twitter: @OnQuality

More Related Content

What's hot

Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
 
Parsec's Cisco Applications
Parsec's Cisco ApplicationsParsec's Cisco Applications
Parsec's Cisco ApplicationsPRANJOL SAIKIA
 
Aeroscout 2008 Architecture
Aeroscout 2008 ArchitectureAeroscout 2008 Architecture
Aeroscout 2008 ArchitectureMarc
 
Unified Visibility Solutions
Unified Visibility SolutionsUnified Visibility Solutions
Unified Visibility SolutionsAndreas Schütte
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Aeroscout Random2
Aeroscout Random2Aeroscout Random2
Aeroscout Random2Marc
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversysKrishnendu Paul
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceSymantec
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagementbreenmachine
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1Ivanti
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9Tracy Payne
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityCA API Management
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesCyber Security Alliance
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalRobin Lutchansky
 

What's hot (20)

Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
Parsec's Cisco Applications
Parsec's Cisco ApplicationsParsec's Cisco Applications
Parsec's Cisco Applications
 
Aeroscout 2008 Architecture
Aeroscout 2008 ArchitectureAeroscout 2008 Architecture
Aeroscout 2008 Architecture
 
Layer 7 SecureSpan Solution
Layer 7 SecureSpan SolutionLayer 7 SecureSpan Solution
Layer 7 SecureSpan Solution
 
Unified Visibility Solutions
Unified Visibility SolutionsUnified Visibility Solutions
Unified Visibility Solutions
 
Dmz aa aioug
Dmz aa aiougDmz aa aioug
Dmz aa aioug
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Aeroscout Random2
Aeroscout Random2Aeroscout Random2
Aeroscout Random2
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagement
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
 

Viewers also liked

Viewers also liked (8)

Air Traffic System Technologies
Air Traffic System TechnologiesAir Traffic System Technologies
Air Traffic System Technologies
 
Project Quality Management
Project Quality ManagementProject Quality Management
Project Quality Management
 
software failures
 software failures software failures
software failures
 
Disaster At Chernobyl
Disaster At ChernobylDisaster At Chernobyl
Disaster At Chernobyl
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Nuclear accidents
Nuclear accidentsNuclear accidents
Nuclear accidents
 
Failure of nokia
Failure of nokiaFailure of nokia
Failure of nokia
 
Apple's 16 October 2014 iPad and Mac Event
Apple's 16 October 2014 iPad and Mac EventApple's 16 October 2014 iPad and Mac Event
Apple's 16 October 2014 iPad and Mac Event
 

Similar to 2011 App Failures - Year in Review CAST

Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET Journal
 
It For Dummies Kamens 081107
It For Dummies Kamens 081107It For Dummies Kamens 081107
It For Dummies Kamens 081107kamensm02
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security TestingAlan Kan
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018Ivanti
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaHamilton Oliveira
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411Scott Althouse
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaSftculotta27
 
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti MohulCsa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti MohulCloud Security Alliance, UK chapter
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionhearme limited company
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...University of Antwerp
 
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdffantasiatheoutofthef
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 

Similar to 2011 App Failures - Year in Review CAST (20)

Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
It For Dummies Kamens 081107
It For Dummies Kamens 081107It For Dummies Kamens 081107
It For Dummies Kamens 081107
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti MohulCsa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solution
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
 
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 

More from CAST

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsCAST
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsCAST
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportCAST
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCAST
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCAST
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...CAST
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeCAST
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM BudgetsCAST
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsCAST
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitCAST
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesCAST
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityCAST
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurementCAST
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCAST
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysisCAST
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtCAST
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platformsCAST
 

More from CAST (20)

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systems
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical Systems
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in code
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based Contracts
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurement
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance Infographic
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysis
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platforms
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

2011 App Failures - Year in Review CAST

  • 2. Application Failures In a year when we saw one major outage, malfunction and security breach after another befall organizations that rely upon technology, we should heed a lesson. The sad part is nearly all, if not all of these outages, malfunctions and breaches had in common a structural flaw somewhere down in the bowels of the application that had gone undetected. CAST Confidential 2 Achieve Insight. Deliver Excellence.
  • 3. April Patch Tuesday: released a record-tying 17 bulletins patching a record 64 vulnerabilities including kernel patches November Patch Tuesday: avoided patching a zero-day vulnerability used in the Duqu malware attacks that allowed hackers to run arbitrary code in kernel mode http://blog.castsoftware.com/it%E2%80%99s-tuesday-do-you-know-where-your-patches-are/ http://blog.castsoftware.com/microsoft-ducks-duqu/
  • 4. Apple has a bug in its new iOS 5 operating system that causes serious battery drain issues with the new iPhone 4S handset http://blog.castsoftware.com/marketing-over-matter/
  • 5. Dropbox encounters a bug during a code update that disables customer passwords for several hours http://blog.castsoftware.com/dropbox-drops-the-ball/
  • 6. JP Morgan, Chase & Capital One reveal that email management vendor Epsilon detected an "unauthorized entry" into its system, exposing customer names and e-mail addresses
  • 7. Hackers backed by a foreign government steal 24K sensitive files by exploiting software vulnerabilities at a Dept of Defense contractor Defense Secretary Leon Panetta http://blog.castsoftware.com/the-enemy-within/
  • 8. Sony suffers more than a dozen attacks at the hands of the LulzSec Group, which exposes customer accounts via SQL Injection attacks Sony president Howard Stringer Attacks result in 55 class action law suits and cost Sony $178M http://blog.castsoftware.com/sony-oops-i-did-it-again/
  • 9. London Stock Exchange halts trading on its main market due to a technical fault in its barely 2-week- old MilleniumIT trading system http://blog.castsoftware.com/london-bourse-is-falling-down-%E2%80%93-time-to-analyze-its-structure/
  • 10. A malware attack exposes names, account numbers and email addresses of around 200,000 Citigroup customers http://blog.castsoftware.com/hackers-are-getting-smarter/
  • 11. A spate of computer outages in the airline industry was blamed on bad hardware, corrupted software & failure of backup systems to kick in http://blog.castsoftware.com/stranded-by-software/
  • 12. A technical fault causes levels to be incorrectly displayed for nearly an hour following the start of trading on Euronext Borsa Italiana suspends trading for almost six hours blaming technical issues Australian Stock Exchange has trading halted due to an ICT systems error traced back to a software problem http://blog.castsoftware.com/stock-exchange-failures-what-next/
  • 13. A computer service vendor of Boston’s Beth Israel Hospital failed to restore proper security settings on a computer following maintenance, leading it to be infected with a virus that transmitted data files to an unknown location http://blog.castsoftware.com/hacking-up-a-hospital/
  • 14. discovers data leak vulnerability resulting from pre-existing security hole from old Froyo operating system More than 50 malicious applications infect Android Google pulls Gmail app devices through from iPhone App stores DroidDream malware due to a bug that causes a “notification error” http://blog.castsoftware.com/serving-up-some-humble-pie-with-google%E2%80%99s-%E2%80%98ice- cream%E2%80%99/
  • 15. RSA allowed their own information to be stolen when a phishing email with a zero-day exploit installed a backdoor through an Adobe Flash vulnerability http://blog.castsoftware.com/to-be-forewarned-is-to-be-forearmed/
  • 16. RIM experiences worldwide outage of the BlackBerry system when a software upgrade on its database resulted in corruption problems and attempts to switch back to older version led to collapse of system http://blog.castsoftware.com/falling-off-the-rim/
  • 17. Researchers demonstrate hackers have capabilities to send radio signals that exploit vulnerabilities in embedded software and could reprogram or shut down devices such as pacemakers or insulin pumps http://blog.castsoftware.com/hacking-the-heart-of-the-matter/
  • 18. Dept of Energy contractor Pacific Northwest National Laboratory shuts down most of its internal network services when a sustained cyber attack exploits undisclosed bug in the server http://blog.castsoftware.com/seeking-independence-from-being-hacked/
  • 19. Bank of America customers are unable to log in to their online bank accounts due to problems following routine software upgrades. Later in year their website goes off-line due to a “Denial of Service” attack http://blog.castsoftware.com/stock-exchange-failures-what-next/
  • 20. A computer virus infects software that manages Predator and Raptor drones http://blog.castsoftware.com/what-we-dont-know-is-hurting-us/
  • 21. UK’s East Coast Main Line left more than 3,000 rail passengers stranded or delayed for more than five hours on a Saturday afternoon due to software malfunction that knocked out signaling system and its backup http://blog.castsoftware.com/when-good-software-goes-bad/
  • 22. 39 recalls of medical devices resulting from software defects and malfunctions http://blog.castsoftware.com/software-quality-is-a-matter-of-life-death/
  • 23. PREVENT #ITFAIL WITH APPLICATION STRUCTURAL QUALITY
  • 24. Application Structural Quality Whatever the reason these structural quality errors happened, they shouldn’t have. Hopefully in 2012, companies will look back on all the problems in 2011 and realize that they need to increase the structural analysis of their application software to ensure they won’t be the next victim. CAST Confidential 24 Achieve Insight. Deliver Excellence.
  • 25. CAST Structural Quality Metrics Most enterprises measure everything but the product delivered to the business CAST Application Intelligence Platform (AIP) measures the product itself Process Product  Robustness  Performance Time & Quality  Security CAST AIP  Planning Duration &Size  Changeability  Estimation  Transferability  Scheduling  Size  Time Tracking  Cost Tracking  Requirements Function & Effort & Budget Scope  Earned Value  User Acceptance  Usability CAST Confidential 25 Achieve Insight. Deliver Excellence.
  • 26. CAST Inserts Actionable Visibility CAST Application Intelligence Center CxO & VP, … Dashboard, reports CAST Application Intelligence PlatformTM  AI Management Studio  Knowledge Base  Approx one thousand rules and best practices PM, QA, Architects…  Decade of software engineering  Std enforcement expertise  Early ID of violations CAST Application Analysis Engine  Drill down to root cause CAST Native CAST UA 3rd party Analyzers (28) scripts analyzers Delivered Source Code: Dev Teams, Suppliers  CICS, IMS, COBOL, DB2 z/OS, PL/I  Arch. visibility / Quick wins  J2EE, .NET and all Major RDBMS  Software engineering expertise  Web Apps, BI, EAI, C/C++, VB, PB  Continuous training/coaching  Siebel, SAP, PSFT, OBS, Amdocs CAST Confidential 26 Achieve Insight. Deliver Excellence.
  • 27. Tangible and Measured Value  Mitigate business risks with improved structural quality  Better applications for higher business resiliency and continuity  Risk-proofed projects more likely to deliver business benefits on time  Make IT and suppliers more productive  Eliminate waste in ADM  Prevent coding errors in development: 10x savings in rework per coding error  Keep technical debt from growing: up to 10% saving in maintenance cost  Benchmark then optimize resources: maintenance savings potential  Better reuse of frameworks and components: up to 10% of dev budget  Reduce waste in operations  Improve efficiency of large complex transactions & batch processes: up to 5% mips  Reduce troubleshooting and rollover costs: lower Ops staff overtime  Apply consistent measurement & KPIs for superior visibility  Up to 10% of ADM budget, esp. ADM outsourcing “Applying the principles of lean manufacturing to ADM can increase productivity by 20 to 40 percent while improving the quality and speed of execution.” - Ranjit Tinaikar, Principal, Head of NA IT Management Practice CAST Confidential 27 Achieve Insight. Deliver Excellence.
  • 28. Market Leader and Pioneer 250 Global Leaders Rely on CAST SIsUse/Resell CAST SIs Resell CAST Industry Groups Engage CAST Key Influencers Endorse CAST CAST Confidential 28 Achieve Insight. Deliver Excellence.
  • 29. Learn more about CAST www.castsoftware.com blog.castsoftware.com www.facebook.com/castonquality www.slideshare.net/castsoftware Twitter: @OnQuality