This document discusses the role of an architect and the architect's job. It begins by outlining the characteristics of an architect's job, which include being client-centered, having a systems orientation, using models, certifying construction, and requiring multidisciplinary skills. It then describes the activities an architect performs, such as understanding needs, devising concepts, producing engineering views, and overseeing construction. The document provides examples of typical views an architect might produce and principles for views. It also discusses supporting activities, organizing architects, and MITRE's work related to architecture.
Architectural Engineering Construction AEC ProjectsSunny Marks
Hi-Tech iSolutions LLP considers ourselves as a leading service provider and consultant of mechanical designs. We are an outsourcing firm passionate about the creation of all types of mechanical designs like machine designs and tools designs. We pride itself in combining innovation in AutoCAD technology to provide comprehensive, accurate and quality mechanical designs as per your requirements. for more information visit our website: www.hitechos.com
TrueCADD - Leading Engineering and Design Services provider in India. We have executed more than 5000+ projects related to Architectural Engineering, Construction and Industrial Services.
Specializes in:
- CAD Design & Drafting Services
- Rapid Prototyping
- FEA/CFD Analysis & Simulation
- Reverse Engineering
- 3D Rendering & Modeling
- Industrial Product Design & Simulation
- BIM 2D/3D/4D/5D/6D/7D Modeling
- Energy Modeling & Simulation
- eQuest Modeling
- MEP Design Drafting
- Structural Design Drafting
- Steel & Rebar Detailing Services
If you would like to discuss your requirements with our executive, please visit us at http://www.truecadd.com
For any queries, email us: info@truecadd.com
Eight deadly defects in systems engineering and how to fix themJoseph KAsser
Any organization desirous to adopt or improve systems engineering needs to be aware that research into the nature of systems engineering has identified a number of defects in the current systems engineering paradigm. This paper discusses eight of these defects and ways to fix or compensate for them.
Architectural Engineering Construction AEC ProjectsSunny Marks
Hi-Tech iSolutions LLP considers ourselves as a leading service provider and consultant of mechanical designs. We are an outsourcing firm passionate about the creation of all types of mechanical designs like machine designs and tools designs. We pride itself in combining innovation in AutoCAD technology to provide comprehensive, accurate and quality mechanical designs as per your requirements. for more information visit our website: www.hitechos.com
TrueCADD - Leading Engineering and Design Services provider in India. We have executed more than 5000+ projects related to Architectural Engineering, Construction and Industrial Services.
Specializes in:
- CAD Design & Drafting Services
- Rapid Prototyping
- FEA/CFD Analysis & Simulation
- Reverse Engineering
- 3D Rendering & Modeling
- Industrial Product Design & Simulation
- BIM 2D/3D/4D/5D/6D/7D Modeling
- Energy Modeling & Simulation
- eQuest Modeling
- MEP Design Drafting
- Structural Design Drafting
- Steel & Rebar Detailing Services
If you would like to discuss your requirements with our executive, please visit us at http://www.truecadd.com
For any queries, email us: info@truecadd.com
Eight deadly defects in systems engineering and how to fix themJoseph KAsser
Any organization desirous to adopt or improve systems engineering needs to be aware that research into the nature of systems engineering has identified a number of defects in the current systems engineering paradigm. This paper discusses eight of these defects and ways to fix or compensate for them.
Sustainable Facade Design and Engineering Conferencecassie111
"Balancing Aesthetics and Sustainable Design to Maximize Profitability
IQPC’s Sustainable Façade and Design Engineering Conference is the 3rd event in our series of global façade engineering events. This conference will review the most recent in sustainable design including hydroponically grown vegetation and rainwater, highlight the interest in Green Buildings and innovation, how to compete with other countries who are implementing such designs to their construction projects and up-to-date information on emerging technology as it rapidly changes. Joins us as we explore the newest in façade engineering.
"
Iasa Architect responsibilities in the cloudiasaglobal
Cloud platforms drive marketing campaigns that offer to simplify the hardest challenges of information technology. From resilience to scalability, disaster recovery to management, the cloud platforms offer to take the challenge off of the table forever! It can be easy to ?buy in? to the platform. Too often, we find out later that our responsibility as architects cannot ?end at the door? to the provider, that there are provisos and implementation considerations we discover ? often after the provider falls down.
The Institute of Town Planners, India, owes its origin to a small group of Town Planners of Delhi, who in 1947 decided to set up a professional Town Planning Institute on the lines similar to the Royal Town Planning Institute, London. The number of planners, which then did not exceed six, was too small for a registered society to be set up and therefore, the small group formed itself into an Indian Board of Town Planners and started working towards establishing a professional Institute.
Setting up practise, Income Tax, Service Tax, Establishing firm, Space, Capital investment, Sources of funds. Organisation
Income Tax, Service Tax, Insurance
Provident Fund
Architect's Act 1972 of India, Registration of Architects, Practise of Architecture, Standards of Education & traning of an Architect, Council of Architecture
Sustainable Facade Design and Engineering Conferencecassie111
"Balancing Aesthetics and Sustainable Design to Maximize Profitability
IQPC’s Sustainable Façade and Design Engineering Conference is the 3rd event in our series of global façade engineering events. This conference will review the most recent in sustainable design including hydroponically grown vegetation and rainwater, highlight the interest in Green Buildings and innovation, how to compete with other countries who are implementing such designs to their construction projects and up-to-date information on emerging technology as it rapidly changes. Joins us as we explore the newest in façade engineering.
"
Iasa Architect responsibilities in the cloudiasaglobal
Cloud platforms drive marketing campaigns that offer to simplify the hardest challenges of information technology. From resilience to scalability, disaster recovery to management, the cloud platforms offer to take the challenge off of the table forever! It can be easy to ?buy in? to the platform. Too often, we find out later that our responsibility as architects cannot ?end at the door? to the provider, that there are provisos and implementation considerations we discover ? often after the provider falls down.
The Institute of Town Planners, India, owes its origin to a small group of Town Planners of Delhi, who in 1947 decided to set up a professional Town Planning Institute on the lines similar to the Royal Town Planning Institute, London. The number of planners, which then did not exceed six, was too small for a registered society to be set up and therefore, the small group formed itself into an Indian Board of Town Planners and started working towards establishing a professional Institute.
Setting up practise, Income Tax, Service Tax, Establishing firm, Space, Capital investment, Sources of funds. Organisation
Income Tax, Service Tax, Insurance
Provident Fund
Architect's Act 1972 of India, Registration of Architects, Practise of Architecture, Standards of Education & traning of an Architect, Council of Architecture
Software Architecture by Reuse, Composition and Customization Ivano Malavolta
Ivano Malavolta.
Research Fellow at the Computer Science Department of the University of L'Aquila (Italy).
PhD thesis presentation, University of L'Aquila, March 2012.
The full PhD thesis is available here:
http:www.di.univaq.it/malavolta/files/IvanoMalavoltaPhDThesis.pdf
A Top 10 Key to Success for Architects, delivered by author Pete Eeles, IBM, hosted on the "Good Design is Good Business" group on developerWorks: https://www.ibm.com/developerworks/mydeveloperworks/blogs/669242b1-dd91-4d63-a08f-231314c793bb/entry/top_10_success_secrets_for_software_architects_good_design_is_good_business_series?lang=en
Increasing Operational Efficiency with Actionable Architectures:
The influx of technological and operational developments in the DoD has created a consistent need for architectural collaboration and integration. Conducting thorough life-cycle analyses of equipment and addressing issues such as compatibility and data-sharing are keys to creating structures that are cost-efficient and fully executable. In effect, a constant meeting of minds is necessary for the development and implementation of the latest and most efficient DoD architectures.
IDGA’s 9th annual DoD Architectures aims to provide a venue for topic experts and decision makers to compare research and incorporate solutions that will decide what will best deliver required system capabilities.
The goal of the conference is to provide DoD CIO’s, managers, and architects with access to current, accurate, and reliable information in order to create and maintain compliant and optimized architectures.
Software Architecture: views and viewpointsHenry Muccini
This is an introductory lecture to Software Architecture Views and Viewpoints, part of the Advanced Software Engineering course, at the University of L'Aquila, Italy (www.di.univaq.it/muccini/SE+/2012)
"Increasing Operational Efficiency with Actionable Architectures!
The influx of technological and operational developments in the DoD has created a consistent need for architectural collaboration and integration. Conducting thorough life-cycle analyses of equipment and addressing issues such as compatibility and data-sharing are keys to creating structures that are cost-efficient and fully executable. In effect, a constant meeting of minds is necessary for the development and implementation of the latest and most efficient DoD architectures.
IDGA’s 9th annual DoD Architectures aims to provide a venue for topic experts and decision makers to compare research and incorporate solutions that will decide what will best deliver required system capabilities.
The goal of the conference is to provide DoD CIO’s, managers, and architects with access to current, accurate, and reliable information in order to create and maintain compliant and optimized architectures.
"
An introduction and overview to IEEE Std 1471:2000 aka ISO/IEC 42010:2007: Recommended Practice for Architecture Description of Software Intensive Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
A tale of scale & speed: How the US Navy is enabling software delivery from l...
The architect's job: 1996 version
1. 1
DII-AF Chief Architects’ Office
The Architect’s Job
6 June 1997
Rich Hilliard
(v 2.0)
current email: r.hilliard@computer.org
2. 2
Acknowledgements
DII-AF Chief Architects’ Office
• This briefing has been evolving since 1995. The original version
was called “Dick & Jane” and was created by Jeff Hustad, David
Emery for Army SBIS. Tim Rice and Kevin Heideman contributed
to “DISA Dick & Jane” in 1996 which added the results on the
SBIS Architecture. Subsequent versions added details on
MITRE’s work on Architecture Quality Assessment, and the
Architecture Description Framework.
• The latest versions start to define the major activities that the
Architect engages in and the activities needed to support that.
• Jim Moore, Eric Skoog, Jerry Friedman, David Emery all offered
comments on this version.
3. 3
Outline
DII-AF Chief Architects’ Office
• What is architecture?
• Why have architects?
• What does the architect do?
• What does the architect need to do his job?
• MITRE’s work in architecture
4. 4
Why Architecture?
DII-AF Chief Architects’ Office
• Explicitly “architected” systems seem to turn out faster, better
and cheaper
• Separation of concerns:
- Essential system characteristics
- Multiple system stakeholders
- Separate long-term goals, and evolution from immediate
construction concerns
- Current systems are “contractor-architected”
! Not incentivized for the long-term
! Limited client (buyer) flexibility
! Narrows marketplace for mission functionality
• “Architecture” as response to failure of the waterfall to address
non-user, non-functional requirements of other stakeholders
5. 5
What is “Architecture”?
DII-AF Chief Architects’ Office
• An architecture is the highest-level concept of a system in its
environment
- IEEE Architecture Working Group
• An architectural description is a model of the structure and
behavior of the whole system
- It shows how the system fulfills the needs in the context of its
environment
- It identifies major system components, their interconnections
and dependencies, and the limits within which they must
operate
6. 6
The Architect’s Domain (I): Roles
DII-AF Chief Architects’ Office
Users Testers
Client
Program
Architect Manager Maintainers
Chief Developers
Operators Engineer
Installers
reporting-to and
influences relations
7. 7
The Architect’s Domain (II): Products
DII-AF Chief Architects’ Office
Policies Available
Vision Funding
Technology
Trends
Architecture ...n
Goals Design
3
Legacy Design
2
Systems Design1
Needs
Design
Emerging Detailed
Open Stds System Requirements
Requirements
Operational
Requirements
Life cycle Phases
Requirements & Concepts
Architecture
Design & Implementation • • •
8. 8
Characteristics of Architect’s Job
DII-AF Chief Architects’ Office
The ideal architect should be a man of letters, a skillful draftsman, a
mathematician, familiar with historical studies, a diligent student of
philosophy, aquainted with music, not ignorant of medicine, learned in
the responses of jurisconsults, familiar with astronomy and astronomical
calculations.
— Vitruvius, De Architectura (25 BC)
• Client-centered
- Architect works for the client
• Systems orientation: bridging problem definition and solution
conceptualization
- Architect’s job is to understand client’s needs to produce one
or more models (potential solutions)
9. 9
Characteristics of Architect’s Job (continued)
DII-AF Chief Architects’ Office
• Model-based
- Architect then works with engineer
- Engineer’s job is to design and implement architect’s model
• Certification of construction
- Architect oversees construction, ensuring actual
implementation meets design
• Determines acceptance of built system
10. 10
Characteristics of Architect’s Job (concluded)
DII-AF Chief Architects’ Office
• Multidisciplinary Synthesis: technical, programmatic, managerial
- Artistic, Heuristic
No person who is not a great sculptor or painter can be an architect. If
he is not a sculptor or painter, he can only be a builder.
— John Ruskin, Lectures on Architecture and Painting (1853)
11. 11
Activities and Definitions:
Architect a System (context)
DII-AF Chief Architects’ Office
client and other system
stakeholder priorities
architectural standards
known
requirements Architect
architectural specifications
a
System*
building permits and certificates
A0
* Where “system” ranges over: individual applications, usual programs,
product families, product lines, systems of systems or the whole enterprise.
12. 12
Activities and Definitions:
Architect a System
DII-AF Chief Architects’ Office
I1 C1
formal client and stakeholder priorities
reqts
Understand needs, goals community standards:
Needs and and vision JTA, DII COE, etc.
Environment
A1
architectural
Devise rules O1
Architectural
Concepts
A2
appropriate
Produce architectural specifications
technologies O2
Engineering
Views
A3
Oversee
Construction
O3
design artifacts A4 approvals
and built system to proceed,
system
acceptance
13. 13
Architectural Description
DII-AF Chief Architects’ Office
• An architecture is documented as a model
• A model is comprised of one or more views
- A view represents the whole system to focus on one or more
critical concerns
- Support multiple audiences each with their own concerns
- Reduce perceived complexity through separation of concerns
14. 14
Activities and Definitions:
Produce Engineering Views
DII-AF Chief Architects’ Office
C1 C2
critical stakeholder architectural
architectural
concerns, programmatic standards and
rules
and technical issues constraints
predefined
views Define
Views
1
Analyze
architectural concepts documented engineering views
Each
I1 View O1
2
inconsistencies
Check
View inter-view links
Consistency
3
open issues
Verify
Satisfaction
of Needs &
Constraints needs, goals
4 vision traceability
matrix
16. 16
Principles of Views
DII-AF Chief Architects’ Office
• Each view presents the whole system from a chosen viewpoint
- Complete relative to that viewpoint
- Consistent with respect to other views
• Each view is modeled in terms of components, connections and
constraints (governed by a “meta model”)
• Views are linked to increase understanding, consistency and
completeness
17. 17
Example: Application View
DII-AF Chief Architects’ Office
Presentation Presents Information
Motif or MS Windows XVT
User Interface Prepares Information
API, Style Guide Ada
Application Transforms Information
API, Logical Data Model Ada, XDR, IDL
Data Access Stores/Retrieves Information
SQL, Physical Data Model, RDA RDBMS, File System, OLTP
Data Storage Maintains Information
legend
Connection
Component Connection Component Function
Technology
18. 18
Example: Data View
DII-AF Chief Architects’ Office
DOD Data
IRDS
DOD Enterprise Dictionary Unified Repository
Data Model Data Model
ERA Diagrams
(IDEF1X format) <- ERA Diagrams (IDEF1X format) ->
Logical Legacy
Common Application COTS/GOTS
Data Models Data
Reference Data Models Data Models
Models
Data Model
SQL
ICD Interface
Data Stores Integrated
Database
Legacy
19. 19
Example: Distribution View
DII-AF Chief Architects’ Office
Force XXI In Garrison
Server
Database
...
...
Intelligent PCs
• Application distribution via Remote
Remote Procedure Call
•Data distribution via OLTP
accessing split data
Database
Server
... Deployed Split Base
20. 20
Example: Security View
DII-AF Chief Architects’ Office
Operational Security
Security Procedures Network Security
I&A
Encryption
Fortezza
Least Switch Routers
Privilege
LAN
Apps
Hubs
Secure
RPC
Data
Stores
21. 21
Example: Developer-Maintainer View (partial)
DII-AF Chief Architects’ Office
from
system requirements Distributed
source View
documents
system requirements legacy system
capture and edit considerations
system
system requirements threads legacy systems
from
traces to Data
system component View
requirements ID and allocation software
HW, SW threads legacy software
software and DBMS
components threads
components components
behaviors
system software requirements considerations
system performance requirements definition software legacy S/W
modeling software threads
SW requirements
components
software top-level
software performance threads design
modeling behaviors
to Detailed Design to Testing
22. 22
Supporting Activities (Mechanisms)
DII-AF Chief Architects’ Office
• Operational modeling
• Doctrine and strategic studies
• Financial planning and analysis, ROI
• Requirements analysis
• Simulation
• Ergonomics, time-motion studies
• Prototyping
• Enabling technology studies: e.g., messaging, image processing,
information retrieval, multimedia
• Formal Specification
• Design and implementation techniques and methods
23. 23
Supporting Activities (Mechanisms)
DII-AF Chief Architects’ Office
• Collaboration
• Self-criticism and architectural assessment
• Project development and management
• Planning and scheduling
• “Process”
• Contracting
• Design reviews, inspections and audits
• Compliance, conformance testing and analysis
• Quality assurance
24. 24
Organizing Architects
DII-AF Chief Architects’ Office
Where do architects and designers get their ideas? The answer,
of course, is mainly from other architects and designers, so is it
mere casuistry to distinguish between tradition and plagiarism?
— Stephen Bayley, Commerce and Culture (1989)
• Participative/collaborative: the critique is an essential ingredient
in “real” firms
• The architecture firm
• Methods: heuristic, patterns, reuse of solutions, experience base
• Tools: Creating, Assessment, Delivery, Certification
• Not a consulting firm
25. 25
Community Support
DII-AF Chief Architects’ Office
• What help can we get from outside organizations?
- DII-AF
- DII COE
- Product Lines
• Architectural Standards
- DISA, CISA, JTA, ISO, IEEE
- Standards are a support and also a constraint
26. 26
If Architecture were Software ...
Architectural Maturity Model
DII-AF Chief Architects’ Office
• Level 0: Briefware (Total Chaos)
- “adjective architecture”
- cartoons and clip art
• Level 1: Developer-centric (Initial)
- Yesterday’s CASE techniques (IDEF, RDD-100, Teamwork)
now with “architecture”in the model names
- Ad hoc coordination between programs
- Overemphasis on structural aspects:
! CSCIs, modules, classes, ...
! e.g., Garlan and Shaw on software architecture
27. 27
If Architecture were Software ...
Architectural Maturity Model
DII-AF Chief Architects’ Office
• Level 2: Master Builder (Repeatable)
- Distinct Architect / Developer roles
- Recognition of multiple stakeholders of a system
! and techniques for addressing their diverse needs
• Level 3: Self-Awareness (Defined)
- Recognition of architectural discipline
! Distinct from systems and software engineering
! Means to create and contract for architectural
specifications
- e.g., Rechtin and Maier
28. 28
If Architecture were Software ...
Architectural Maturity Model
DII-AF Chief Architects’ Office
• Level 4: Architect Firms (Managed)
- Architects organized to support their discipline
- Tools to support that discipline
- Independent analysis of delivered architectural specifications
• Level 5: “Pre-fab” construction (Optimizing)
- Architectures as real engineering objects
- True separation of architectural specification from system
implementation
- Architectural evolution to support technology insertion
29. 29
The Architectural Metaphor:
Implications for Systems Engineering
DII-AF Chief Architects’ Office
• Systems are situated in their environments
• Inherently “multi-viewpointed”
- no essential or ‘correct’ single view
• The architect is one actor mediating among
- client, users and other stakeholders
- developers, vendors, maintainers
• What’s important are the descriptions
• Descriptions can be unified with appropriate meta model
- One set of “rendering primitives” with open semantics
dependent on the view
30. 30
Our Work
DII-AF Chief Architects’ Office
• Technical foundations of software systems architecture
- DARPA Domain-Specific Software Architecture C2 Reference
Model (1990)
• Practical Architecture Method
- WCCS Force-level study (1992)
- Sustaining Base Information Services (1994)
- Army Reserve Component Automation System (1995)
- Missile Warning Laptop (1996)
- Theater Battle Management Core Systems (ongoing)
• Architecture Quality Assessment (AQA) (1996 - )
• Architecture Description Framework (1997- )
• Standardization: IEEE Architecture Working Group (1995 - )
31. 31
Architecture Quality Assessment:
Goals
DII-AF Chief Architects’ Office
• Repeatable method yielding objective results
- Evaluation based on documentation, not “hearsay”
• Based on “open sources”
- Architects will know the criteria on which architectures will be
judged
- Availability of the criteria may improve overall quality
• Independent from life cycle, documentation, methodology
- Cannot assume traditional deliverables and milestones
- No widely accepted architectural methods
- Don’t assume a Contractor is the Architect
32. 32
Architecture Quality Assessment:
Uses of an AQA
DII-AF Chief Architects’ Office
• Evaluate a candidate (proposed) architecture
• Review technical progress during ongoing architecture
development
• Assess a complete, delivered architecture prior to
acceptance/implementation
• Compare two or more architectures in a consistent fashion
33. 33
Status: Architecture Quality Assessment (AQA)
DII-AF Chief Architects’ Office
• Several “partial” uses
- FAA STARS acquisition
- National Missile Defense
- C2IPS
• Transition to TBMCS
• Identified by C2 Chief Architects Council for use in Architect’s
Toolkit
• Paper in MITRE’s Software Engineering & Economics Conference
(April 1997)
34. 34
Architecture Description Framework (ADF)
DII-AF Chief Architects’ Office
• Premise: To move “architecture” from buzzword to engineering
practice, we need techniques for architectural description
• Develop automation base for representing, manipulating, and
analyzing architectural models
- Allow information sharing between tools
- Provide a semantically rich delivery format (e.g., between
Contractors and Government)
• Demonstrate industrial-strength basis for architectural
description
• Status: Phase 1 (6 months) funded as MSR
35. 35
The Challenge
DII-AF Chief Architects’ Office
• Despite current interest in “architecture”
- No solid foundations for architectural description and
specification
• Our Contractors use off-the-shelf tools to produce “architectural”
deliverables
- IDEF, RDD-100, UML, OMT, ...
• Meanwhile, research community is developing next-generation
“architecture description languages”
- Rapide, Wright, Dicam, UniCon, ArTek, ACME, FR, MetaH,
Gestalt, Resolve, ...
37. 37
ADF Schedule
DII-AF Chief Architects’ Office
Phase 1: Phase 2: Phase 3:
• Design ADF • TBMCS trial use • Integrate with
• Small Experiments • IDL Implementation Architecture
• Host to Catalyst Quality
Assessment
• Provide to IEEE
6 (months) 12 18
38. 38
“Community Outreach”
DII-AF Chief Architects’ Office
• IEEE Architecture Working Group
- “Design phase” leading to
! Recommended Practice for Architectural Description
• soft-sys-arch@spectre.mitre.org
- Internet discussion list for architecture issues
39. 39
References
DII-AF Chief Architects’ Office
• R. Hilliard, Representing Software Systems Architectures or,
Components, Connections, and (why not?), first-class Constraints and
Views. Proceedings of the SIGSOFT’96 2nd International Workshop on
the Architecture of Software Systems, October 15-16, 1996, San
Francisco.
• D. Emery, R. Hilliard, T. Rice, Experiences Applying a Practical
Architectural Method. In Reliable Software Technologies - Ada Europe
’96, Alfred Strohmeier (editor), Springer-Verlag, Lecture Notes in
Computer Science, volume 1088.
• R. Hilliard, Architectural View Selection, ESC Second Architecture
Technical Interchange Meeting, Gunter AFB, 5 December 1995.
• S. Schwarm, T. Rice, R. Hilliard, The Architectural Metaphor as a
Foundation for Systems Engineering. Proceedings INCOSE ’96
Symposium.
• D. Emery and R. Hilliard, “Architecture,” methods and open issues.
Proceedings First International Workshop on Software Architectures,
Seattle, WA, April 24-25 1995.
40. 40
References (Concluded)
DII-AF Chief Architects’ Office
• R. Hilliard, On The Notion of ‘Architecture’ in Model-Based Software Engineering.
Proceedings DARPA Workshop on Domain-Specific Software Architectures,
Hidden Valley, PA, 1990.
• W. Ellis, R. Hilliard, P. Poon, D. Rayford, T. Saunders, B. Sherlund and R. Wade,
Toward a Recommended Practice for Architectural Description. Proceedings of
2nd IEEE International Conference on Engineering of Complex Computer
Systems, Montreal, 1996.