The document discusses software architecture and the Unified Modeling Language (UML). It provides an overview of key concepts in software architecture including:
- Architecting at different scales from a dog house to a high rise requires different levels of modeling, processes, and tools.
- Modern architecture has progressed due to advances in materials, analysis, and the ability to build structures at larger scales than previous civilizations.
- Software architecture encompasses significant design decisions about a system's organization, behavior, structure, and composition. It also involves concerns like usage, functionality, and constraints.
- The UML was created through the collaboration of leading methodologists and aims to provide a common language for visualizing, specifying
Antivirus específicos para entornos virtualizadosNextel S.A.
Ponencia de Álvaro Sierra, Major Account Manager de Trend Micro, durante la Jornada Tecnológica 2011 de Nextel S.A.
http://www.nextel.es/eventos_/jornada-tecnologica/
This document provides advice on how companies can survive an economic recession through their IT strategies. It suggests that agility, fast responses, and readiness for change can help small businesses remain competitive. It then outlines five plans: be prepared for changes with a dynamic IT infrastructure; keep solutions simple; cut costs during development and operations through approaches like virtualization and open source; be more energy efficient in data management; and fully utilize existing business information and applications. The conclusion emphasizes that successful companies will be those that can best adapt to changes through technology like model-driven environments.
1) Gulf Insurance conducted intensive JAD sessions in 1990 to define their computing architecture and critical applications at a high level. This resulted in enterprise data and process models that were used to craft a development plan.
2) Gulf has since implemented 30 projects identified from the JAD sessions, focusing initially on the most critical applications to support the business. This has delivered several successful client/server applications running on a 3-tier architecture using OS/2, Novell, and IBM mainframes.
3) The key applications delivered include Submission, Reinsurance, Producer, Policy and Diary systems. Gulf has had success with their OS/2 desktop environment but may evaluate porting some applications to Windows in the future.
Model-driven prototyping for corporate software specification Thomas Memmel
Model-driven prototyping is proposed as an approach to address increasing complexity in automotive human-machine interface development. Currently, development processes are predominantly paper-based and supported by heterogeneous tools. This leads to communication problems, unnecessary work, and delays. The proposed approach defines a domain-specific modeling language for automotive interfaces based on concepts identified by domain experts. Formal specifications can then be used to generate interactive prototypes early in development, allowing for rapid feedback. This standardized and model-driven process aims to improve flexibility, avoid duplicate work, and facilitate cross-discipline collaboration.
Opportunities in challenging_times-steve_robinsonIBM
The document summarizes a presentation given at an IBM Rational Software conference in 2009 during challenging economic times. It discusses how customers are focusing on efficiency, stability, and innovation. It also outlines opportunities for IBM Rational in helping customers lower costs through maturity, reuse, and automation while enabling innovation through services, smarter products, and software-enabled capabilities. Cross-sell opportunities within IBM Rational's large customer base are highlighted to pursue new revenue.
Enabling Your Service Desk to be the Front Face to ITCA Nimsoft
Your service desk should be the one stop shop for internal and external customers. But, in order for IT to be the orchestrator of knowledge and the service catalogue, you need to provide excellent service and quick response times. Join Forrester and Nimsoft for this one hour webcast and discover the most current recommendations for service delivery and management best practices.
Visit http://www.nimsoft.com/solutions/nimsoft-service-desk for more information.
Eight deadly defects in systems engineering and how to fix themJoseph KAsser
Any organization desirous to adopt or improve systems engineering needs to be aware that research into the nature of systems engineering has identified a number of defects in the current systems engineering paradigm. This paper discusses eight of these defects and ways to fix or compensate for them.
Software enginnering unit 01 by manoj kumar sonimanojsonikgn
Configuration management involves establishing and maintaining the integrity of software products throughout the software life cycle. It includes identifying configuration items, controlling changes, and recording and reporting change implementation status. The key activities of configuration management are configuration management planning, change management, version management, and system building. Configuration management aims to explain the importance of software configuration management and describe these main configuration management activities.
Antivirus específicos para entornos virtualizadosNextel S.A.
Ponencia de Álvaro Sierra, Major Account Manager de Trend Micro, durante la Jornada Tecnológica 2011 de Nextel S.A.
http://www.nextel.es/eventos_/jornada-tecnologica/
This document provides advice on how companies can survive an economic recession through their IT strategies. It suggests that agility, fast responses, and readiness for change can help small businesses remain competitive. It then outlines five plans: be prepared for changes with a dynamic IT infrastructure; keep solutions simple; cut costs during development and operations through approaches like virtualization and open source; be more energy efficient in data management; and fully utilize existing business information and applications. The conclusion emphasizes that successful companies will be those that can best adapt to changes through technology like model-driven environments.
1) Gulf Insurance conducted intensive JAD sessions in 1990 to define their computing architecture and critical applications at a high level. This resulted in enterprise data and process models that were used to craft a development plan.
2) Gulf has since implemented 30 projects identified from the JAD sessions, focusing initially on the most critical applications to support the business. This has delivered several successful client/server applications running on a 3-tier architecture using OS/2, Novell, and IBM mainframes.
3) The key applications delivered include Submission, Reinsurance, Producer, Policy and Diary systems. Gulf has had success with their OS/2 desktop environment but may evaluate porting some applications to Windows in the future.
Model-driven prototyping for corporate software specification Thomas Memmel
Model-driven prototyping is proposed as an approach to address increasing complexity in automotive human-machine interface development. Currently, development processes are predominantly paper-based and supported by heterogeneous tools. This leads to communication problems, unnecessary work, and delays. The proposed approach defines a domain-specific modeling language for automotive interfaces based on concepts identified by domain experts. Formal specifications can then be used to generate interactive prototypes early in development, allowing for rapid feedback. This standardized and model-driven process aims to improve flexibility, avoid duplicate work, and facilitate cross-discipline collaboration.
Opportunities in challenging_times-steve_robinsonIBM
The document summarizes a presentation given at an IBM Rational Software conference in 2009 during challenging economic times. It discusses how customers are focusing on efficiency, stability, and innovation. It also outlines opportunities for IBM Rational in helping customers lower costs through maturity, reuse, and automation while enabling innovation through services, smarter products, and software-enabled capabilities. Cross-sell opportunities within IBM Rational's large customer base are highlighted to pursue new revenue.
Enabling Your Service Desk to be the Front Face to ITCA Nimsoft
Your service desk should be the one stop shop for internal and external customers. But, in order for IT to be the orchestrator of knowledge and the service catalogue, you need to provide excellent service and quick response times. Join Forrester and Nimsoft for this one hour webcast and discover the most current recommendations for service delivery and management best practices.
Visit http://www.nimsoft.com/solutions/nimsoft-service-desk for more information.
Eight deadly defects in systems engineering and how to fix themJoseph KAsser
Any organization desirous to adopt or improve systems engineering needs to be aware that research into the nature of systems engineering has identified a number of defects in the current systems engineering paradigm. This paper discusses eight of these defects and ways to fix or compensate for them.
Software enginnering unit 01 by manoj kumar sonimanojsonikgn
Configuration management involves establishing and maintaining the integrity of software products throughout the software life cycle. It includes identifying configuration items, controlling changes, and recording and reporting change implementation status. The key activities of configuration management are configuration management planning, change management, version management, and system building. Configuration management aims to explain the importance of software configuration management and describe these main configuration management activities.
IBM mainframe sales reps and distributors don't enjoy the pleasures and satisfaction of the whole
world's anticipation, speculation, or even the organized illicit intelligence gathering, which seems to be
common in Apple's i-world these days. There was a time, beyond the memories of most of the IT
community, when they did, but the world has changed and new technologies have driven the focus to a
broader audience that is less sophisticated in many respects. As a consequence, the “fun stuff” has shifted
a good deal from what's the biggest and fastest, toward what is the latest, and usually smaller, innovation
– the new gotten have. Computing, if you will, now is more personal and portable. Does anyone care
what all this stuff is connected to and what holds it together anymore? Not so much, apparently.
- Modeling for fun and profit discusses modeling and model-driven approaches. It provides examples of how modeling and code generation can be used to create software solutions and tools.
- Anyware Technologies is an IT company that provides open source solutions and services using modeling techniques. The document discusses modeling case studies and tools developed by Anyware.
- The Eclipse Modeling Project aims to provide an open source modeling framework and is led by IBM with contributions from companies like Anyware. It includes tools like EMF, GMF, and ATL for modeling, code generation, and transformations.
Software Measurement for Lean Application ManagementCAST
Learn how the Lean practices pioneered in the Toyota Production System apply to the Application Development and Maintenance (ADM) of business software. Applying Lean to ADM decreases total cost of ownership and improves business responsiveness and operational dependability.
The document discusses the growth of software as a service (SaaS) and cloud computing. Some key points:
- The SaaS market is expected to reach €10B in 2009 and grow at a 40% compound annual rate. 75% of companies currently use at least one SaaS application.
- By 2010, 45% of companies will spend over 25% of their IT budget on SaaS, up from 23% today.
- SaaS and cloud computing are disruptive for traditional IT channels and will require converting existing resellers and systems integrators or creating new vertical and aggregator channels.
Accelerate Microsoft Lync Deployments with Session Border ControllersAcmePacket
Presentation given at an event in New York City about accelerating your Lync deployments with session border controllers from Acme Packet, the leader in session border controllers.
The document discusses Wind River Simics, a full system simulator that allows developers to simulate hardware for complex embedded systems. It enables debugging software before hardware exists, reducing time-to-market and development costs. Simics transforms the product lifecycle by enabling hardware and software co-development, incremental integration, and access to virtual systems. This improves collaboration, reduces risks, and provides inexpensive target hardware for all teams.
ADempiere Community Edition is an enterprise-class, highly adaptable business system that can be deployed on-premise or in the cloud. It provides a broad set of integrated business functionality like accounting, purchasing, manufacturing, and more. Customizations can be made easily without programming through its visual dictionary editor. It offers a fraction of the cost of traditional ERP systems through an open source model and automated upgrades.
ESEconf2011 - Buschmann Frank: "What architects need to know"Aberla
This document discusses the role and qualifications of senior software architects at Siemens. It outlines a curriculum for certifying senior software architects that focuses on five key topics: requirements engineering, software architecture and development, testing and quality, business processes and strategy, and social skills and leadership. The certification process involves participants attending workshops and completing project phases over the course of a year with certification gates. The goal is to establish standards for software development and foster experience sharing among software architects.
EMC offers various solutions for real-time integrated business intelligence including virtualized computing environments to support on-demand resources, intelligent content management of analytical results, and collaborative business process management environments to drive discussion and decision making around business intelligence. EMC also provides infrastructures that link traditional transactional environments like SAP with real-time integrated business intelligence.
User Experience Monitoring presented at CA World 2011CA Nimsoft
Users don’t experience web servers. Or networks. Or databases. They experience applications. Nimsoft User Experience Monitoring gives you the confidence to know your applications and cloud services are available and meeting response time goals for your local and global users. In this session, product experts from Nimsoft will discuss how you can benefit from using Nimsoft User Experience Monitoring to dramatically improve service quality and reduce the costs of IT service delivery.
To learn more about Nimsoft User Experience Monitoring visit, http://nimsoft.com/solutions/nimsoft-monitor/user-experience.html.
The newsletter discusses BIM (Building Information Modeling) technology that SPC uses. It explains that BIM creates a virtual 3D model of a building and its components. SPC has experience with BIM and uses it for coordination, prefabrication, and facility maintenance. The newsletter also mentions that SPC employees placed first in a weightlifting competition and that the proceeds were donated to charity. Safety is emphasized as a top priority at SPC.
This document describes the career journey and experiences of Petros Maragkoudakis. It outlines his educational background in engineering and various roles he has held related to software engineering, testing, and project management. It provides details on the locations he has worked, technologies used, and certifications obtained throughout his career.
Novell Support Revealed! An Insider's Peek and Feedback OpportunityNovell
Don't miss the opportunity to interact with key members of the Novell Services team. We are eager to hear from the customers we serve and provide insights to you into our continuous improvement plans aimed at your satisfaction. In this session, you will learn how Novell has worked to maintain our world-class support standards in the face of intense, global economic pressures and challenging industry trends. Take a peek inside the processes of our global support organization, learn about our technological advancements, and provide feedback on our support offerings.
Agility With Care: Managing Requirements Change with Agility In A Regulated P...Ken Wong
This presentation looks at some of the potential challenges involved in employing Agile requirements management approaches in a regulated product environment. The key is finding the right blend of agile and plan-driven methods depending upon the development context.
This document discusses the challenges of scaling traditional multipoint videoconferencing environments and how a next-generation architecture is changing the rules. Traditionally, video bridges required dedicated hardware appliances with high upfront and ongoing costs that did not scale well. However, new technologies have made it possible to virtualize key components of videoconferencing like video bridging. Virtualizing bridging allows organizations to deploy videoconferencing more cost-effectively and scale their environments more easily to meet growing demand.
Trying to understand the intersection between Business & TechnologyJean-François Caenen
This document discusses the changing relationship between business and technology. It notes that historically, IT organizations owned technology and saw themselves as cost centers, but business demands are now driving the need for faster delivery of user features. New technologies like cloud, big data, and social computing enable more dynamic and agile development approaches that focus on continuous delivery of business value rather than long development cycles. The future will require new engagement models and a shift in mindset where technology platforms enable business transformation rather than applications simply supporting business functions.
Calsoft Labs provides automotive product engineering services across various systems including telematics, infotainment, body electronics, and driver assistance systems. They have over 20 years of experience partnering with automotive OEMs and tier 1 suppliers. Calsoft Labs offers end-to-end product development capabilities from algorithm development to testing and validation on hardware-in-the-loop benches. They utilize flexible engagement models and a global delivery model to provide cost-effective solutions to customers.
The document discusses software architecture and the software architecture business cycle (ABC). It defines software architecture as the structure of a system, including elements, their properties, and relationships. The ABC involves business, technical, and stakeholder factors that influence architecture decisions. Architects must balance these concerns. The document provides examples to illustrate business models, value chains, and the complexity of architectural decisions. It explains that the role of architecture is to enable communication, make early design choices, guide quality attributes, and manage change over the system's lifecycle.
HP Enterprise Security provides security solutions to address challenges posed by evolving IT architectures, increasing cybercrime, and the limitations of traditional security approaches. The solutions are based on HP's Security Intelligence Platform, which provides unified visibility across applications, systems, and networks to analyze vulnerabilities and risks in order to build adaptive defenses. HP has security expertise from ArcSight, Fortify and TippingPoint and offers solutions such as the ArcSight Solution Architecture for security monitoring and the TippingPoint Network Defense System for network security.
1) HP Enterprise Security provides a security intelligence platform to help organizations proactively manage threats and risks across their IT infrastructure.
2) The platform offers universal log management, regulatory compliance, network security, and other solutions to establish complete visibility and analyze security events.
3) Key HP security products like ArcSight, Fortify, and TippingPoint provide advanced threat detection, application testing, and network defenses respectively.
George S. Patton was an American military leader from 1885-1945. As a general, he led troops during World War II and was known for his leadership skills and strategic abilities. However, the document does not provide any additional context or details about Patton or his military career.
Learn about Monitoring process to keep eye on systems or scheduled activities, to obtain real-time information to ease the overview or action in certain cases.For more information, visit http://ibm.co/PNo9Cb.
IBM mainframe sales reps and distributors don't enjoy the pleasures and satisfaction of the whole
world's anticipation, speculation, or even the organized illicit intelligence gathering, which seems to be
common in Apple's i-world these days. There was a time, beyond the memories of most of the IT
community, when they did, but the world has changed and new technologies have driven the focus to a
broader audience that is less sophisticated in many respects. As a consequence, the “fun stuff” has shifted
a good deal from what's the biggest and fastest, toward what is the latest, and usually smaller, innovation
– the new gotten have. Computing, if you will, now is more personal and portable. Does anyone care
what all this stuff is connected to and what holds it together anymore? Not so much, apparently.
- Modeling for fun and profit discusses modeling and model-driven approaches. It provides examples of how modeling and code generation can be used to create software solutions and tools.
- Anyware Technologies is an IT company that provides open source solutions and services using modeling techniques. The document discusses modeling case studies and tools developed by Anyware.
- The Eclipse Modeling Project aims to provide an open source modeling framework and is led by IBM with contributions from companies like Anyware. It includes tools like EMF, GMF, and ATL for modeling, code generation, and transformations.
Software Measurement for Lean Application ManagementCAST
Learn how the Lean practices pioneered in the Toyota Production System apply to the Application Development and Maintenance (ADM) of business software. Applying Lean to ADM decreases total cost of ownership and improves business responsiveness and operational dependability.
The document discusses the growth of software as a service (SaaS) and cloud computing. Some key points:
- The SaaS market is expected to reach €10B in 2009 and grow at a 40% compound annual rate. 75% of companies currently use at least one SaaS application.
- By 2010, 45% of companies will spend over 25% of their IT budget on SaaS, up from 23% today.
- SaaS and cloud computing are disruptive for traditional IT channels and will require converting existing resellers and systems integrators or creating new vertical and aggregator channels.
Accelerate Microsoft Lync Deployments with Session Border ControllersAcmePacket
Presentation given at an event in New York City about accelerating your Lync deployments with session border controllers from Acme Packet, the leader in session border controllers.
The document discusses Wind River Simics, a full system simulator that allows developers to simulate hardware for complex embedded systems. It enables debugging software before hardware exists, reducing time-to-market and development costs. Simics transforms the product lifecycle by enabling hardware and software co-development, incremental integration, and access to virtual systems. This improves collaboration, reduces risks, and provides inexpensive target hardware for all teams.
ADempiere Community Edition is an enterprise-class, highly adaptable business system that can be deployed on-premise or in the cloud. It provides a broad set of integrated business functionality like accounting, purchasing, manufacturing, and more. Customizations can be made easily without programming through its visual dictionary editor. It offers a fraction of the cost of traditional ERP systems through an open source model and automated upgrades.
ESEconf2011 - Buschmann Frank: "What architects need to know"Aberla
This document discusses the role and qualifications of senior software architects at Siemens. It outlines a curriculum for certifying senior software architects that focuses on five key topics: requirements engineering, software architecture and development, testing and quality, business processes and strategy, and social skills and leadership. The certification process involves participants attending workshops and completing project phases over the course of a year with certification gates. The goal is to establish standards for software development and foster experience sharing among software architects.
EMC offers various solutions for real-time integrated business intelligence including virtualized computing environments to support on-demand resources, intelligent content management of analytical results, and collaborative business process management environments to drive discussion and decision making around business intelligence. EMC also provides infrastructures that link traditional transactional environments like SAP with real-time integrated business intelligence.
User Experience Monitoring presented at CA World 2011CA Nimsoft
Users don’t experience web servers. Or networks. Or databases. They experience applications. Nimsoft User Experience Monitoring gives you the confidence to know your applications and cloud services are available and meeting response time goals for your local and global users. In this session, product experts from Nimsoft will discuss how you can benefit from using Nimsoft User Experience Monitoring to dramatically improve service quality and reduce the costs of IT service delivery.
To learn more about Nimsoft User Experience Monitoring visit, http://nimsoft.com/solutions/nimsoft-monitor/user-experience.html.
The newsletter discusses BIM (Building Information Modeling) technology that SPC uses. It explains that BIM creates a virtual 3D model of a building and its components. SPC has experience with BIM and uses it for coordination, prefabrication, and facility maintenance. The newsletter also mentions that SPC employees placed first in a weightlifting competition and that the proceeds were donated to charity. Safety is emphasized as a top priority at SPC.
This document describes the career journey and experiences of Petros Maragkoudakis. It outlines his educational background in engineering and various roles he has held related to software engineering, testing, and project management. It provides details on the locations he has worked, technologies used, and certifications obtained throughout his career.
Novell Support Revealed! An Insider's Peek and Feedback OpportunityNovell
Don't miss the opportunity to interact with key members of the Novell Services team. We are eager to hear from the customers we serve and provide insights to you into our continuous improvement plans aimed at your satisfaction. In this session, you will learn how Novell has worked to maintain our world-class support standards in the face of intense, global economic pressures and challenging industry trends. Take a peek inside the processes of our global support organization, learn about our technological advancements, and provide feedback on our support offerings.
Agility With Care: Managing Requirements Change with Agility In A Regulated P...Ken Wong
This presentation looks at some of the potential challenges involved in employing Agile requirements management approaches in a regulated product environment. The key is finding the right blend of agile and plan-driven methods depending upon the development context.
This document discusses the challenges of scaling traditional multipoint videoconferencing environments and how a next-generation architecture is changing the rules. Traditionally, video bridges required dedicated hardware appliances with high upfront and ongoing costs that did not scale well. However, new technologies have made it possible to virtualize key components of videoconferencing like video bridging. Virtualizing bridging allows organizations to deploy videoconferencing more cost-effectively and scale their environments more easily to meet growing demand.
Trying to understand the intersection between Business & TechnologyJean-François Caenen
This document discusses the changing relationship between business and technology. It notes that historically, IT organizations owned technology and saw themselves as cost centers, but business demands are now driving the need for faster delivery of user features. New technologies like cloud, big data, and social computing enable more dynamic and agile development approaches that focus on continuous delivery of business value rather than long development cycles. The future will require new engagement models and a shift in mindset where technology platforms enable business transformation rather than applications simply supporting business functions.
Calsoft Labs provides automotive product engineering services across various systems including telematics, infotainment, body electronics, and driver assistance systems. They have over 20 years of experience partnering with automotive OEMs and tier 1 suppliers. Calsoft Labs offers end-to-end product development capabilities from algorithm development to testing and validation on hardware-in-the-loop benches. They utilize flexible engagement models and a global delivery model to provide cost-effective solutions to customers.
The document discusses software architecture and the software architecture business cycle (ABC). It defines software architecture as the structure of a system, including elements, their properties, and relationships. The ABC involves business, technical, and stakeholder factors that influence architecture decisions. Architects must balance these concerns. The document provides examples to illustrate business models, value chains, and the complexity of architectural decisions. It explains that the role of architecture is to enable communication, make early design choices, guide quality attributes, and manage change over the system's lifecycle.
HP Enterprise Security provides security solutions to address challenges posed by evolving IT architectures, increasing cybercrime, and the limitations of traditional security approaches. The solutions are based on HP's Security Intelligence Platform, which provides unified visibility across applications, systems, and networks to analyze vulnerabilities and risks in order to build adaptive defenses. HP has security expertise from ArcSight, Fortify and TippingPoint and offers solutions such as the ArcSight Solution Architecture for security monitoring and the TippingPoint Network Defense System for network security.
1) HP Enterprise Security provides a security intelligence platform to help organizations proactively manage threats and risks across their IT infrastructure.
2) The platform offers universal log management, regulatory compliance, network security, and other solutions to establish complete visibility and analyze security events.
3) Key HP security products like ArcSight, Fortify, and TippingPoint provide advanced threat detection, application testing, and network defenses respectively.
George S. Patton was an American military leader from 1885-1945. As a general, he led troops during World War II and was known for his leadership skills and strategic abilities. However, the document does not provide any additional context or details about Patton or his military career.
Learn about Monitoring process to keep eye on systems or scheduled activities, to obtain real-time information to ease the overview or action in certain cases.For more information, visit http://ibm.co/PNo9Cb.
This document discusses Extol Corp, an information and communications technology security solutions provider in Malaysia. It provides details on Extol's 25 years in business, growth from general IT trading to a leading security provider, and research and development successes creating antivirus and authentication software. The document also outlines Extol's human capital and certifications, as well as selected security products. It then provides snapshots of the information security landscape, including policies, threats, and trends, before discussing general trends in attacks becoming cheaper and more proactive while defenses become more expensive and reactive. Potential research areas are outlined around developing a comprehensive artificial intelligence framework and optimizing individual AI APIs.
The document discusses DDS (Data Distribution Service), a middleware standard for distributed real-time systems. It provides an overview of DDS technology including its data-centric publish-subscribe model, quality of service capabilities, and ability to integrate external systems. The document also discusses RTI's implementation of the DDS standard and how it provides high performance, scalability and other benefits for building distributed real-time systems.
NGSOFT is an advanced software development company established in 1992 with over 150 employees across two locations. It is part of the BATM companies group listed on the London and Tel Aviv stock exchanges. NGSOFT offers expertise in real-time and embedded systems across various operating systems, enterprise applications, automated testing, user experience design, and web and mobile development. It provides complete software solutions and services for clients across several industries including hi-tech, finance, defense, telecom, and media.
FewebPlus @ microsoft 19 april 2010 cloud continuumTom Crombez
This document discusses the fifth generation of computing and Microsoft's vision for cloud computing. It introduces Microsoft's Windows Azure platform, which provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document outlines the benefits of the Windows Azure platform for independent software vendors (ISVs), agencies, and provides an example scenario of how it could improve a real-life event registration process. It also discusses Windows Azure pricing models and resources for training.
The document discusses Wind River's medical device solutions including their VxWorks, Linux, and Android operating systems. It highlights key medical market trends around cost pressures, safety, security, and interconnectivity. Wind River provides services across the medical value chain from silicon to hospitals. Their professional services help address technology and process needs through consulting, turnkey design, and certification services.
Software Factories in the Real World: How an IBM® WebSphere® Integration Fact...Prolifics
“Getting any software development team to effectively scale to meet the needs of a large integration project is actually harder than it sounds. For a large Automotive Retailer based in Florida, this is exactly what they needed to do. They needed a large amount of integration to be built between their brand new Point of Sales system and their new SAP back-end. In this session, you will hear about how tools such as Rational Software Architect and WebSphere Message Broker Toolkit were integrated with a Rational Team Concert-based development environment to set up super efficient software factory employing techniques such as Model-Driven Development and Continuous Integration to help this retailer keep their customers’ wheels on the road.”
This document summarizes an IT solutions company called Electric Cloud. It discusses:
1. The company was founded in 2002 and has grown to 90 employees, shipping products since 2004 and being cash flow positive and ahead of operating plan.
2. Electric Cloud's vision is to lead the market for Software Production Management solutions to remove software production bottlenecks and increase productivity up to 15 times.
3. Electric Cloud's solutions include ElectricCommander to automate processes, ElectricAccelerator to accelerate builds up to 20 times faster, and ElectricInsight for analytics.
Extracting value from Big Data is not easy. The field of technologies and vendors is fragmented and rapidly evolving. End-to-end, general purpose solutions that work out of the box don’t exist yet, and Hadoop is no exception. And most companies lack Big Data specialists. The key to unlocking real value /// extracting the gold nuggets at the end of the rainbow (???) /// lies with mapping the business requirements smartly against the emerging and imperfect ecosystem of technology and vendor choices.
There is a long list of crucial questions to think about. How fast is the data flying at you? Are your Big Data analyses tightly integrated with existing systems? Or parallel and complex? Can you tolerate a minute of latency? Do you accept data loss or generous SLAs? Is imperfect security good enough?
The answer to Big Data ROI lies somewhere between the herd and nerd mentality. Thinking hard and being smart about each use case as early as possible avoids costly mistakes.
This talk will illustrate how Deutsche Telekom follows this segmentation approach to make sure every individual use case drives architecture design and technology selection.
Presentation of Vincent Desveronnieres, Oracle at the TMT.CloudComputing'11 Warsaw conference organized in Warsaw, Poland on February 10th, 2011 by New Europe Events
Cloud computing is more than an opportunity to lower the costs of IT as it has been; it's a chance to re-envision IT as fundamentally more connected, more immediate, and more responsive to the needs of tomorrow's competitive environment.
SmartConnect Technologies is an enterprise communications and solutions company founded in 2010 with offices in India, Dubai, and South Africa. It focuses on unified interaction management across channels and industries. The company offers mobile solutions through its SmartMobi platform, which provides mobile device management, application development, and integration with enterprise systems. SmartConnect has over 30 employees including an experienced management team with over 100 years of collective experience in unified interaction management.
This document discusses complexity in enterprises and their information systems. It notes that complexity is one of the 21st century's biggest challenges for companies. An enterprise and its information system can be viewed as a complex system with many interacting parts. Measuring and managing complexity requires approaches like enterprise architecture, infrastructure modernization, standardization, and introducing modularity to reduce coupling between parts. The strategic goal is to tame information system complexity through these architectural and systematic methods.
Evento - Virtual Lab Despliegue de aplicaciones en Kubernetes #Ibm virtual la...Julio Pari
Este documento introduce los conceptos de contenedores y Kubernetes. Explica que los contenedores aíslan los procesos en lugar de máquinas virtuales completas, lo que hace que sean más livianos y portables. Luego describe cómo Kubernetes organiza contenedores en clústeres y los orquesta a través de un master y nodos trabajadores para implementar aplicaciones de manera escalable. Finalmente, proporciona contactos de especialistas de IBM para obtener más información.
Links kubernetes - Evento - Virtual Lab Despliegue de aplicaciones en KubernetesJulio Pari
Este documento anuncia dos talleres virtuales gratuitos sobre despliegue de aplicaciones en Kubernetes y envío de mensajes con Event Streams en IBM Cloud. Los talleres se llevarán a cabo el 28 de julio y el 11 de agosto respectivamente. Los interesados pueden registrarse en un enlace proporcionado para aprender a crear servicios utilizando tecnologías de código abierto en la nube de IBM.
Comandos - Evento - Virtual Lab Despliegue de aplicaciones en KubernetesJulio Pari
This document provides instructions for completing a lab tutorial on getting started with IBM Cloud container services. It includes steps to check version numbers for required tools, clone a GitHub repository, log in to IBM Cloud, build and push a Docker image, configure a Kubernetes cluster, deploy a sample application, and expose it via a service. The lab is split into two parts - the first focuses on building and pushing a container image, while the second covers deploying it on Kubernetes and making the application accessible.
Este documento presenta la estructura propuesta para un trabajo de tesis o proyecto profesional. Detalla los diferentes capítulos que debería contener el documento, como la introducción, marco teórico, objeto de estudio, y capítulos para la propuesta de solución, modelo de negocio, requerimientos, arquitectura y construcción del sistema, calidad y pruebas, y gestión del proyecto. El documento provee una guía general para la organización y contenido de cada capítulo con el fin de abordar un tema de investig
El documento describe la arquitectura tecnológica actual y recomendada para el sitio web de la Facultad de Ingeniería de Sistemas e Informática de la UNMSM. Actualmente se hospeda en un servidor dedicado con CentOS y Joomla, pero se recomienda migrar a una plataforma en la nube Jelastic que ofrece escalabilidad automática, balanceo de carga y alta disponibilidad con Liferay.
Jelastic provides a private cloud platform-as-a-service (PaaS) that allows developers to rapidly deploy scalable applications to the cloud without code changes. It delivers a fully managed private cloud infrastructure with automated scaling, high availability, and comprehensive management tools. Jelastic's per-server subscription model offers significant savings over traditional virtualization solutions or cloud building blocks.
El documento presenta la arquitectura de un sistema de ingeniería de software, incluyendo su nombre, objetivo, diagrama de contexto, diagrama de arquitectura general y las tecnologías a utilizar.
Solucion Examen Parcial Sistemas Digitales UNMSM FISIJulio Pari
El documento presenta las soluciones a un examen parcial de Sistemas Digitales impartido en la UNMSM, Facultad de Física, en julio. Contiene las respuestas a 8 preguntas del examen.
Práctica de Inventarios - Investigación Operativa IIJulio Pari
Este documento presenta una discusión sobre la teoría de inventarios a través de 30 páginas. Aborda temas como los modelos de inventarios, los costos asociados con el mantenimiento de inventarios y la toma de decisiones sobre los niveles óptimos de inventario.
Armas silenciosas para guerras tranquilasJulio Pari
Este documento resume la historia y el desarrollo de las "armas silenciosas" para la "guerra tranquila". En 1954, los poderosos decidieron llevar a cabo una guerra silenciosa contra el público estadounidense utilizando nuevas tecnologías como las computadoras para controlar y manipular la sociedad de manera predecible y mantener el poder en manos de unos pocos. El documento introduce las armas silenciosas como una nueva forma de control social a través de la manipulación de datos e información en lugar de armas convenc
Este documento describe el Lenguaje Unificado de Modelado (UML) y sus diagramas. UML es un lenguaje gráfico para modelar sistemas de software desarrollado inicialmente por Grady Booch, Ivar Jacobson y James Rumbaugh. El documento explica los diagramas de clases, casos de uso, estados, secuencias, actividades y la historia del desarrollo de UML. También incluye ejemplos de cómo generar código Java a partir de diagramas UML usando NetBeans.
Formato de presentación de Proyecto UNMSM FISIJulio Pari
El documento presenta un proyecto realizado por 5 estudiantes de la Facultad de Ingeniería de Sistemas e Informática de la Universidad Nacional Mayor de San Marcos en Lima, Perú, e incluye los nombres, códigos y correos electrónicos de los integrantes, así como el nombre del curso, profesor y fecha.
Este cuento habla sobre una familia que vive en una casa en el bosque. La familia está formada por los padres y sus dos hijos, un niño y una niña. Los niños disfrutan jugando en el bosque mientras sus padres los cuidan desde la casa.
Este documento describe los pasos para crear y consultar una base de datos MySQL. Inicialmente se crea la base de datos y las tablas ejecutando un script SQL. Luego se muestran diferentes consultas como listar las bases de datos existentes, listar las tablas de una base y consultar el contenido de una tabla. Finalmente se explica el uso de archivos comunes como una hoja de estilos y una librería para realizar las conexiones a la base de datos.
El documento describe los pasos para instalar MySQL, phpMyAdmin y configurar la conexión entre PHP y MySQL. Explica cómo instalar MySQL, crear bases de datos y tablas, y ejecutar consultas SQL. Luego, detalla la instalación de phpMyAdmin y su configuración. Finalmente, muestra cómo conectar PHP a MySQL mediante funciones como mysql_connect() y mysql_query(), y cómo manejar los resultados de las consultas.
Este documento describe las funciones de usuario en PHP. Explica la sintaxis básica para definir funciones, cómo pasar parámetros a funciones, devolver valores de funciones e incluir archivos. Las funciones se definen usando la palabra clave function, pueden aceptar parámetros y devolver valores. Los archivos pueden incluirse usando las instrucciones require e include.
8. Movements in civil architecture
Bronze age/Egyptian (Imhotep)
Grecian/Roman (Vitruvius) Progress
- Imitation of previous efforts
Byzantine/Romanesque - Learning from failure
- Integration of other forces
- Experimentation
Gothic
Mannerism (Michelangelo, Palladio)
Baroque
Engineering/Rational/National/Romantic
Art noveau
Modern movement (Wright, LeCorbusier)
9. Neufert Architect’s Data
The Handbook of Building Types
Kinds of civil architecture
Community
houses, flats and apartments, gardens,
education, hospitals, religion
Commerce
shops and stores, restaurants, hotels, office
buildings, banks, airports
Industry
industrial buildings, laboratories, farm buildings
Leisure
sport, theaters and cinemas, museums
10. Forces in civil architecture
Load
Kinds of loads
- Dead loads
- Live loads
- Dynamic loads
Compression Tension Avoiding failure
- Safety factors
- Redundancy
- Equilibrium
Load
Any time you depart from established practice, make ten times the
effort, ten times the investigation. Especially on a very large project.
- LeMessuier
11. Brand, How Buildings Learn
Shearing layers of change
Space plan
Services
Stuff
Structure
Skin
Site
12. Walker Royce
Dimensions of software complexity
Higher technical complexity
- Embedded, real-time, distributed, fault-tolerant
- Custom, unprecedented, architecture reengineering
- High performance
An average software project:
- 5-10 people Defense
- 10-15 month duration Telecom Weapon System
- 3-5 external interfaces Switch
- Some unknowns & risks National Air Traffic
Commercial Control System
Embedded Compiler
Automotive
Software Large-Scale
Lower CASE Tool Organization/Entity
Simulation
Higher
management management
complexity Small Scientific complexity
- Small scale Simulation - Large scale
- Informal IS Application
Defense - Contractual
Distributed Objects Enterprise IS
- Single stakeholder (Family of IS MIS System - Many stake holders
(Order Entry)
- “Products” Applications) - “Projects”
IS Application
GUI/RDB
(Order Entry)
Business
Spreadsheet
Lower technical complexity
- Mostly 4GL, or component-based
- Application reengineering
- Interactive performance
13. Forces in Software
Functionality
Cost Compatibility
Capacity Fail safe
Availability Fault tolerance
Performance Throughput
Technology churn Resilience
The challenge over the next 20 years will not be speed or cost or performance;
it will be a question of complexity.
Bill Raduchel, Chief Strategy Officer, Sun Microsystems
Our enemy is complexity, and it’s our goal to kill it.
Jan Baan
14. Wojtek Kozaczynski
The domain of architecting
The “what” The “why”
Architecture System
Satisfies Features
Qualities
S/W
Architecture
Constrain Requirements
Architecture
Representation System
Quality Attributes
Produces Technology Defines
The “who” The “how”
Follows
Architect Process
Skills
Defines role
Organization
Stakeholders
15. Philippe Kruchten
We all know that ...
Architecture and design are the same thing
Architecture and infrastructure are the same thing
<my favorite technology> is the architecture
A good architecture is the work of a single architect
Architecture is flat, one blueprint is enough
Architecture is just structure
System architecture precedes software architecture
Architecture cannot be measured and validated
Architecture is a Science
Architecture is an Art
16. Merriam Webster’s Collegiate Dictionary
10th edition
Architecture defined (again)
Architecture n (1555) 1: the art of science of
building, specifically, the art or practice of
designing and building structures and esp.
habitable ones 2 a: formation or
construction as or as if as the result of
conscious act <the ~ of the garden> b: a
unifying or coherent form or structure <the
novel lacks ~>
17. Mary Shaw, CMU
Grady Booch,
Architecture defined (yet again) Philippe Kruchten,
Rich Reitman
Kurt Bittner, Rational
Software architecture encompasses the set
of significant decisions about the
organization of a software system
selection of the structural elements and their
interfaces by which a system is composed
behavior as specified in collaborations among
those elements
composition of these structural and behavioral
elements into larger subsystem
architectural style that guides this organization
18. Mary Shaw, CMU
Grady Booch,
Architecture defined (continued) Philippe Kruchten,
Rich Reitman
Kurt Bittner, Rational
Software architecture also involves
usage
functionality
performance
resilience
reuse
comprehensibility
economic and technology constraints and
tradeoffs
aesthetic concerns
19. Mary Shaw, CMU
Architectural style
An architecture style defines a family of
systems in terms of a pattern of structural
organization.
An architectural style defines
a vocabulary of components and connector
types
a set of constraints on how they can be
combined
one or more semantic models that specify how
a system’s overall properties can be
determined from the properties of its parts
20. Architecture metamodel
Software Software
Archite cture Architects
is part
of are actors in
System
is represe nte d by
architecture
Architecture
D esign Process
Softwa re produces
Architecture Logical view
has D escription
P rocess
is ma de of
view
relates to
Architecture is a Imple men-
S tyle guide tation view
Architectural D eployment
view view
has
U se case
Architectural style is made of view
ha s
constrains
is a Form Connection
depicts
Architectural
P attern
Compone nt Constraints
satisfies
Archite ctura l
constrains Blue print
R equire me nts
21. Models
Models are the language of designer, in
many disciplines
Models are representations of the system
tobebuilt or asbuilt
Models are vehicle for communications
with various stakeholders
Visual models, blueprints
Scale
Models allow reasoning about some
characteristic of the real system
22. Many stakeholders, many views
Architecture is many things to many different
interested parties
enduser
customer
project manager
system engineer
developer
architect
maintainer
other developers
Multidimensional reality
Multiple stakeholders
multiple views, multiple blueprints
23. Architectural view
An architectural view is a simplified
description (an abstraction) of a system
from a particular perspective or vantage
point, covering particular concerns, and
omitting entities that are not relevant to this
perspective
24. Architecturally significant elements
Not all design is architecture
Main “business” classes
Important mechanisms
Processors and processes
Layers and subsystems
Architectural views = slices through
models
25. Characteristics of a Good Architecture
Resilient
Simple
Approachable
Clear separation of concerns
Balanced distribution of responsibilities
Balances economic and technology
constraints
26. Representing System Architecture
Logical View Implementation View
End-user Programmers
Functionality Software management
Use Case View
Process View Deployment View
System integrators System engineering
Performance System topology
Scalability Delivery, installation
Throughput Communication
Conceptual Physical
28. How many views?
Simplified models to fit the context
Not all systems require all views:
Single processor: drop deployment view
Single process: drop process view
Very Small program: drop implementation view
Adding views:
Data view, security view
29. The Value of the UML
Is an open standard
Supports the entire software development
lifecycle
Supports diverse applications areas
Is based on experience and needs of the
user community
Supported by many tools
30. Creating the UML
UML 1.3
OMG Acceptance, Nov 1997
Final submission to OMG, Sep ‘97 UML 1.1
public First submission to OMG, Jan ´97
feedback
UML partners UML 1.0
Web - June ´96 UML 0.9
OOPSLA ´95 Unified Method 0.8
Other methods Booch method OMT OOSE
32. Contributions to the UML
Harel
Meyer Gamma, et al
Statecharts
Before and after Frameworks and patterns,
conditions
HP Fusion
Booch
Operation descriptions and
Booch method message numbering
Embley
Rumbaugh
Singleton classes and
OMT
high-level view
Jacobson Wirfs-Brock
OOSE
Responsibilities
Shlaer - Mellor Odell
Object lifecycles Classification
33. Overview of the UML
The UML is a language for
visualizing
specifying
constructing
documenting
the artifacts of a softwareintensive system
34. Overview of the UML
Modeling elements
Relationships
Extensibility Mechanisms
Diagrams
35. Modeling Elements
Structural elements
class, interface, collaboration, use case,
active class, component, node
Behavioral elements
interaction, state machine
Grouping elements
package, subsystem
Other elements
note
38. Models, Views, and Diagrams
A model is a complete
description of a system
from a particular
State
perspective State
Diagrams
Class
Diagrams
Use Case Diagrams
Use Case
Diagrams State
Use Case Use Case
Diagrams State
Diagrams
Use Case Diagrams Object
Diagrams
Diagrams
Sequence Diagrams
Diagrams
Diagrams
Scenario State
Scenario
Diagrams State
Diagrams
Collaboration
Diagrams Models Component
Diagrams
Diagrams Diagrams
Scenario Component
Scenario
Diagrams
Component
Diagrams
Deployment
Statechart
Diagrams Diagrams
Diagrams Diagrams
Activity
Diagrams
39. Diagrams
A diagram is a view into a model
Presented from the aspect of a particular
stakeholder
Provides a partial representation of the system
Is semantically consistent with other views
In the UML, there are nine standard
diagrams
Static views: use case, class, object,
component, deployment
Dynamic views: sequence, collaboration,
statechart, activity
41. Use Case Diagram
Captures system functionality as seen by
users
Built in early stages of development
Purpose
Specify the context of a system
Capture the requirements of a system
Validate a system’s architecture
Drive implementation and generate test cases
Developed by analysts and domain experts
43. Class Diagram
Captures the vocabulary of a system
Built and refined throughout development
Purpose
Name and model concepts in the system
Specify collaborations
Specify logical database schemas
Developed by analysts, designers, and
implementers
45. Object Diagram
Shows instances and links
Built during analysis and design
Purpose
Illustrate data/object structures
Specify snapshots
Developed by analysts, designers, and
implementers
47. Component Diagram
Captures the physical structure of the
implementation
Built as part of architectural specification
Purpose
Organize source code
Construct an executable release
Specify a physical database
Developed by architects and programmers
49. Deployment Diagram
Captures the topology of a system’s
hardware
Built as part of architectural specification
Purpose
Specify the distribution of components
Identify performance bottlenecks
Developed by architects, networking
engineers, and system engineers
53. Collaboration Diagram
Captures dynamic behavior (message
oriented)
Purpose
Model flow of control
Illustrate coordination of object structure and
control
57. Activity Diagram
Captures dynamic behavior (activityoriented)
Purpose
Model business workflows
Model operations
58. Architecture and the UML
Design View Implementation View
Classes, interfaces,
collaborations Components
Use cases
Use Case View
Process View Deployment View
Active classes Nodes
Organization Dynamics
Package, subsystem Interaction
State machine
59. Software engineering process
A set of partially ordered steps intended to
reach a goal. In software engineering the
goal is to build a software product or to
enhance an existing one.
Architectural process
Sequence of activities that lead to the
production of architectural artifacts:
A software architecture description
An architectural prototype
62. Key concepts
When does
Phase, Iterations architecture happen?
Process Workflows What does
Activity, steps happen?
Artifacts What is
produced?
models
reports, documents
Who does
Worker: Architect it?
63. Lifecycle Phases
Inception Elaboration Construction Transition
time
Inception Define the scope of the project and
develop business case
Elaboration Plan project, specify features, and
baseline the architecture
Construction Build the product
Transition Transition the product to its users
64. Major Milestones
Inception Elaboration Construction Transition
time
Vision Baseline Initial Product
Architecture Capability Release
65. Phases and Iterations
Inception Elaboration Construction Transition
Prelim ... Arch ... Dev Dev ... Trans ...
Iteration Iteration Iteration Iteration Iteration
Release Release Release Release Release Release Release Release
An iteration is a sequence of activities with an established plan and
evaluation criteria, resulting in an executable release
66. Architecture-Centric
Models are vehicles for visualizing, specifying,
constructing, and documenting architecture
The Unified Process prescribes the
successive refinement of an executable
architecture
Inception Elaboration Construction Transition
time
Architecture
67. Unified Process structure
Phases
Process Workflows Inception Elaboration Construction Transition
Business Modeling
Requirements
Analysis & Design
Implementation
Test
Deployment
Supporting Workflows
Configuration Mgmt
Management
Environment
Preliminary Iter. Iter. Iter. Iter. Iter. Iter. Iter.
Iteration(s) #1 #2 #n #n+1 #n+2 #m #m+1
Iterations
68. Architecture and Iterations
Use case Design Implementation Deployment Test
Model Model Model Model Model
Content
69. Architectural design
Identify, select, and validate
“architecturally significant” elements
Not everything is architecture
Main “business” classes
Important mechanisms
Processors and processes
Layers and subsystems
Interfaces
Produce a Software Architecture Documen
70. Architectural design workflow
Select scenarios: criticality and risk Use case view
Identify main classes and their
responsibility Logical view
Distribute behavior on classes
Structure in subsystems, layers, Implementation view
define interfaces Deployment view
Define distribution and concurrency Process view
Implement architectural prototype
Derive tests from use cases
Evaluate architecture
Iterate
71. Sources of architecture
Method Method
Theft Intuition Theft Intuition
Classical system Unprecedented system
72. Patterns
A pattern is a solution to a problem in a
context
A pattern codifies specific knowledge
collected from experience in a domain
All wellstructured systems are full of
patterns
Idioms
Design patterns
Architectural patterns
78. Software Architecture
Shaw and Garlan
Architectural patterns Buschmann et al
A System of Patterns
Buschman et al
Booch
Distributed • Layered
Eventdriven • MVC
Framebased • IRcentric
Batch • Subsumption
Pipes and filters • Disposable
Repositorycentric
Blackboard
Interpreter
Rulebased
79. Real-Life Object-oriented Systems
Soren Lauesen
Complex business system
Customer
name : String Sales
Order GUI layer
Address : String product : Product
date : Date
save()
ServiceAgent Observer
purchase(customer, product, items) update()
Middle layer
Customer Order Line Product
name : String items : Product name : String
Address : String price : Currency
getName()
save() updateName() getName()
getName() updateName()
updateName()
Customer Order Line Product SQL Database
* *
80. Logical application architecture
Graphical Graphical Graphical
User User User
Interface Interface Interface
Relational Business Business
Database Object Object
Model Model
Relational
Database
Relational
Database
81. Physical application architecture
Thinner client, thicker server
Client A Client B Client C
Application Application WWW Browser
Business Object DCOM
CORBA Beans
Services ADO/R
Business Object
Engine Web
HTML
Business COM Beans Server CGI ASP Java
Object Server MTS ETS
Business Object Business Object
Services Services
Business Object Business Object
Engine Engine
Relational Database Server(s)
82. The Second Wave
Paul Dreyfus, Netscape
Complex Internet system
Dynamic HTML, JavaScript, Java
Client
plug-ins, source code enhancements
Java, C, C++, JavaScript, CGI
Server
Application Java, C, C++, JavaBeans, CORBA, DCOM
Server
Fulfillment Financial Inventory RDBMS Native languages
System System System Server
83. Who are the architects?
Experience
software development
domain
Proactive, goal oriented
Leadership, authority
Architecture team
balance
84. Architect
Not just a top level designer
Need to ensure feasibility
Not the project manager
But “joined at the hip”
Not a technology expert
Purpose of the system, “fit”,
Not a lone scientist
Communicator
85. Software architecture team charter
Defining the architecture of the software
Maintaining the architectural integrity of the
software
Assessing technical risks related to the
software design
Proposing the order and contents of the
successive iterations
Consulting services
Assisting marketing for future product
definition
Facilitating communications between
project teams
86. Architecture is making decisions
The life of a software architect is a long (and
sometimes painful) succession of suboptimal
decisions made partly in the dark.
87. Futures
ADL: Architecture Description Languages
UML, UniCon, LILEAnna, P++, LEAP, Wright,
µRapid
Standardization of concepts
IEEE Working Group on Architecture
INCOSE Working Group on System
Architecture
Systematic capture of architectural patterns
88. References (Architecture)
Len Bass, Paul Clements & Rick Kazman, Software Architecture in
Practice, Addison-Wesley, 1998.
Frank Buschmann, Régine Meunier, Hans Rohnert, Peter Sommerlad,
and Michael Stahl, Pattern-Oriented Software Architecture - A System
of Patterns, Wiley and Sons, 1996.
Christine Hofmeister, Robert Nord, Dilip Soni, Applied Software
Architecture, Addison-Wesley 1999.
Eric Gamma, John Vlissides, Richard Helm, Ralph Johnson, Design
Patterns, Addison-Wesley 1995.
Philippe Kruchten, “The 4+1 View Model of Architecture,” IEEE
Software, 12 (6), November 1995, IEEE.
http://www.rational.com/support/techpapers/ieee/
Eberhardt Rechtin, Systems Architecting: Creating and Building
Complex Systems, Englewood Cliffs NJ, Prentice-Hall, 1991.
89. References (Architecture)
Eberhardt Rechtin & Mark Maier, The Art of System
Architecting, CRC Press, 1997.
Recommended Practice for Architectural Description, Draft 2.0 of
IEEE P1471, May 1998
http://www.pithecanthropus.com/~awg/
Mary Shaw, and David Garlan, Software Architecture—
Perspectives on an Emerging Discipline, Upper Saddle River,
NJ, Prentice-Hall, 1996.
Bernard I. Witt, F. Terry Baker, and Everett W. Merritt, Software
Architecture and Design—Principles, Models, and Methods,
New York NY, Van Nostrand Reinhold, 1995.
The World-wide Institute of Software Architects
http://www.wwisa.org
90. References (UML)
Grady Booch, James Rumbaugh, Ivar Jacobson, The Unified
Modeling Language User Guide, Addison-Wesley, 1999.
91. References (Process)
Barry Boehm, “A spiral model of software development and
enhancement,” IEEE Computer, May 1998.
Barry Boehm, “Anchoring the software process,” IEEE
Software, July 1996.
Grady Booch, Object Solutions, Addison-Wesley, 1995.
Philippe Kruchten, “A Rational Development Process,”
CrossTalk, July 1996.
http://www.rational.com/support/techpapers/devprcs/
Philippe Kruchten, The Rational Unified Process - An
Introduction, Addison-Wesley, 1999.
Rational Unified Process 5.0, Rational, Cupertino, CA, 1998
Walker Royce, Software Project Management: a Unified
Framework, Addison-Wesley, 1998
The Software Program Manager’s Network
http://www.spmn.com