SlideShare a Scribd company logo
Estimating the Principal
of Technical Debt
Bill Curtis, Jay Sappidi, & Alexandra Szynkarski       WTD’12
CAST Research Labs                                 June 5, 2012
The Technical Debt Metaphor
  Technical Debt                   the future cost of defects remaining in code at
                                    release, a component of the cost of ownership

             Business Risk                  Opportunity cost—benefits that could have
                                            been achieved had resources been put on new
               Opportunity cost             capability rather than retiring technical debt

              Liability from debt           Liability—business costs related to outages,
                                            breaches, corrupted data, etc.



           Technical Debt                   Interest—continuing IT costs attributable to the
                                              violations causing technical debt, i.e, higher
             Interest on the debt             maintenance costs, greater resource usage, etc.


             Principal borrowed             Principalcost of fixing problems remaining in
                                              the code after release that must be remediated



     Structural quality problems               Today’s talk focuses on the principal
         in production code
CAST Confidential      1
Inputs for Estimating the Principal of Technical Debt

                     Data source            Inputs

                                           Structural
                    Static analysis         quality
                    of applications        problems


                                           Hours to     Technical
                     Historical data        correct       Debt
                    on maintenance         problems     Principal


                                       Developer’s
                    IT or contractor    burdened
                    finance records    hourly rate


CAST Confidential                      2
Analyzing and Measuring Structural Quality
                      CAST Application Intelligence Platform
  ANALYZERS                APP KNOWLEDGE BASE                 DASHBOARDS & PORTALS
 Oracle PL/SQL
                             APPLICATION HEALTH               Governance Dashboard
 Sybase T-SQL
 SQL Server T-SQL
 IBM SQL/PSM              Risk Factors      Cost factors
 C, C++, C#
                           Robustness       Transferability
 Pro C
 Cobol                     Performance      Changeability
 CICS
                             Security
 Visual Basic
 VB.Net
 ASP.Net                       APPLICATION SIZE                   Project Trends
 Java, J2EE
                             LOC         Function Points
 JSP
 XML, HTML
 Javascript
 VBScript
 PHP                       Application Metadata
 PowerBuilder                                                    Drill Down Portal
 Oracle Forms
 PeopleSoft                                     Analysis
 SAP ABAP,                                        of all
 Netweaver                                      system
 Tibco                                          artifacts
 Business Objects
 Universal Analyzer

CAST Confidential
Appmarq  CAST’s Structural Quality Repository

     Industry-leading repository on structural quality
                – 745 Applications
                – 160 Companies, 14 Countries
                – 321,259,160 Lines of Code; 59,511,706 Violations

                                                             Telecom
                                                   Retail                      Financial
                                                Government
                                                Other
                                                                                Insurance

                                                               IT Consulting




CAST Confidential
Formulas for Estimating Technical Debt Principal

                               % Violations        Hours to
                                to be fixed          Fix              Cost /Hour
                                Old    New        Old      New        Old      New
     High Severity             50%    100%         1         3        $75       $75
     Medium Severity           25%      50%        1         1        $75       $75
     Low Severity              10%       0%        1        NA        $75        NA


Estimated Technical Debt Principal =
( high severity violations) X (% to be fixed) X (average hours to fix) X ($s per hour) +
( medium severity violations) X (% to be fixed) X (average hours to fix) X ($s per hour) +
( low severity violations) X (% to be fixed) X (average hours to fix) X ($s per hour)


                 This is an estimate of Technical Debt Principal
                 Customers can get more accurate estimates by
                    adjusting the parameters in the equation

CAST Confidential
Technical Debt Principal Estimates for Both Formulas

                      Mean          Median           Minimum        Maximum        Std. Deviation
                    Old    New     Old    New        Old    New    Old     New      Old    New
    Sample
                    3.61   10.26   2.79    7.94 0.02        0.01   49.72 253.03     3.34   10.57
     (n=744)
      .NET
                    3.09   12.29   2.37   10.20      0.96   0.49   16.52   73.00    2.70   11.47
     (n=63)
     ABAP
                    0.43   1.90    0.41    1.73      0.05   2.00   1.42     6.89    0.23    1.08
     (n=72)
         C
                    2.62   7.65    2.18   6.46       0.02   0.01   12.82   31.89    2.58   6.92
     (n=44)
       C++
                    4.33   12.95   2.41   7.83       0.02   0.01   38.08 132.91     7.02   24.42
     (n=30)
    JavaEE
                    5.42   14.68   5.13   13.66      0.07   0.23   49.72 253.03     3.91   12.76
     (n=474)
  Or-Forms
                    4.57   21.16   1.12   3.87       0.49   1.13   30.23 151.93     6.60   33.92
     (n=45)
   V. Basic
                    2.93   9.83    2.58   8.37       0.68   2.77   12.14   45.01    2.80   10.24
     (n=16)



CAST Confidential                                6
Estimates of Technical Debt Principal by Health Factor

                                             70% of Technical Debt is in IT Cost
                                              (Transferability, Changeability)
         Robustness
                                             30% of Technical Debt is in Business
                18%                           Risk (Robustness, Performance, Security)
                          Transferability
                               40%           Health Factor proportions are mostly
 Security 7%                                  consistent across technologies

            Changeability
                    30%




CAST Confidential
Relating Technical Debt to Business Value

                      Health              Operational          Output
                      Factor               problems           Measure
                                           Outages, slow
                     Robustness                                Availability
                                             recovery


                                             Degraded
                    Performance                              Work efficiency
                                             response


  Technical
                       Security           Breaches, Theft    Data protection
    debt


                                             Lengthy
                    Transferability                          IT productivity
                                          comprehension


                    Changeability         Excessive effort   Delivery speed



CAST Confidential                     8
Technical Debt Management Cycle

                           Application                                      Build/Release/
    IT Executives           Managers                     Developers         QA/AI Center

            Step 1            Step 2                                            Step 3
       Set policy and       Set reduction                                       Measure
      quality priorities   targets & plans                                   Technical Debt



                                                Step 4
                                       Plan actions for
                                         remediation



            Step 7            Step 6                            Step 5
        Report to the                                          Remediate
                            Track results
         business                                              violations




CAST Confidential                           9

More Related Content

What's hot

Strategic governance performance_management_systems
Strategic governance performance_management_systemsStrategic governance performance_management_systems
Strategic governance performance_management_systems
Ramsés Gallego
 
Culture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_programCulture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_program
Ramsés Gallego
 
Pm Intro (Blk)
Pm Intro (Blk)Pm Intro (Blk)
Pm Intro (Blk)
cramini
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...
InSync Conference
 
Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...
Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...
Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...
Schneider Electric
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
Ramsés Gallego
 
In house penetration testing pci dss
In house penetration testing pci dssIn house penetration testing pci dss
In house penetration testing pci dss
Richard Thompson
 
Three Confluence Deployments That Will Blow You Away
Three Confluence Deployments That Will Blow You AwayThree Confluence Deployments That Will Blow You Away
Three Confluence Deployments That Will Blow You Away
Atlassian
 
Overcoming Cost Intransparency of Cloud Computing
Overcoming Cost Intransparency of Cloud ComputingOvercoming Cost Intransparency of Cloud Computing
Overcoming Cost Intransparency of Cloud Computing
Nane Kratzke
 
Predicting product life using reliability analysis methods
Predicting product life using reliability analysis methodsPredicting product life using reliability analysis methods
Predicting product life using reliability analysis methods
ASQ Reliability Division
 
Delivering Benefits With A Smarter Grid September 2011
Delivering Benefits With A Smarter Grid   September 2011Delivering Benefits With A Smarter Grid   September 2011
Delivering Benefits With A Smarter Grid September 2011
forrestsmall
 
Conversations oneffectiveit management
Conversations oneffectiveit managementConversations oneffectiveit management
Conversations oneffectiveit managementComputer Aid, Inc
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
Ramsés Gallego
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
jamiesim
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochurecwoodson
 
Slow Cool 20081009 Final
Slow Cool 20081009 FinalSlow Cool 20081009 Final
Slow Cool 20081009 Finalrajivmordani
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACARamsés Gallego
 

What's hot (20)

Strategic governance performance_management_systems
Strategic governance performance_management_systemsStrategic governance performance_management_systems
Strategic governance performance_management_systems
 
Culture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_programCulture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_program
 
Pm Intro (Blk)
Pm Intro (Blk)Pm Intro (Blk)
Pm Intro (Blk)
 
Risk management
Risk managementRisk management
Risk management
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...
 
Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...
Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...
Trends in Control and Power Technologies and Its Impact for Mineral Recovery ...
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
In house penetration testing pci dss
In house penetration testing pci dssIn house penetration testing pci dss
In house penetration testing pci dss
 
Three Confluence Deployments That Will Blow You Away
Three Confluence Deployments That Will Blow You AwayThree Confluence Deployments That Will Blow You Away
Three Confluence Deployments That Will Blow You Away
 
Overcoming Cost Intransparency of Cloud Computing
Overcoming Cost Intransparency of Cloud ComputingOvercoming Cost Intransparency of Cloud Computing
Overcoming Cost Intransparency of Cloud Computing
 
Predicting product life using reliability analysis methods
Predicting product life using reliability analysis methodsPredicting product life using reliability analysis methods
Predicting product life using reliability analysis methods
 
Delivering Benefits With A Smarter Grid September 2011
Delivering Benefits With A Smarter Grid   September 2011Delivering Benefits With A Smarter Grid   September 2011
Delivering Benefits With A Smarter Grid September 2011
 
Conversations oneffectiveit management
Conversations oneffectiveit managementConversations oneffectiveit management
Conversations oneffectiveit management
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Risk eng
Risk engRisk eng
Risk eng
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
 
Slow Cool 20081009 Final
Slow Cool 20081009 FinalSlow Cool 20081009 Final
Slow Cool 20081009 Final
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACA
 

Viewers also liked

Class in Bollywood
Class in BollywoodClass in Bollywood
Class in BollywoodSashank Kini
 
Presentation new8
Presentation new8Presentation new8
Presentation new8shannonalli
 
LGBTQ Place in the Indian Space (1)
LGBTQ Place in the Indian Space (1)LGBTQ Place in the Indian Space (1)
LGBTQ Place in the Indian Space (1)Sashank Kini
 
Media evalation.pptx question4
Media evalation.pptx question4Media evalation.pptx question4
Media evalation.pptx question4shannonalli
 
Assignment - Comm Theory - Sashank Kini
Assignment - Comm Theory - Sashank KiniAssignment - Comm Theory - Sashank Kini
Assignment - Comm Theory - Sashank KiniSashank Kini
 

Viewers also liked (6)

Class in Bollywood
Class in BollywoodClass in Bollywood
Class in Bollywood
 
Anamatic
AnamaticAnamatic
Anamatic
 
Presentation new8
Presentation new8Presentation new8
Presentation new8
 
LGBTQ Place in the Indian Space (1)
LGBTQ Place in the Indian Space (1)LGBTQ Place in the Indian Space (1)
LGBTQ Place in the Indian Space (1)
 
Media evalation.pptx question4
Media evalation.pptx question4Media evalation.pptx question4
Media evalation.pptx question4
 
Assignment - Comm Theory - Sashank Kini
Assignment - Comm Theory - Sashank KiniAssignment - Comm Theory - Sashank Kini
Assignment - Comm Theory - Sashank Kini
 

Similar to Estimating the principal of Technical Debt - Dr. Bill Curtis - WTD '12

CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
Principled Technologies
 
The Technical Debt Management Cycle
The Technical Debt Management CycleThe Technical Debt Management Cycle
The Technical Debt Management Cycle
CISQ - Consortium for IT Software Quality
 
Cloud computing standards
Cloud computing standardsCloud computing standards
Cloud computing standards
Seungyun Lee
 
Software Measurement for Lean Application Management
Software Measurement for Lean Application ManagementSoftware Measurement for Lean Application Management
Software Measurement for Lean Application Management
CAST
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ - Consortium for IT Software Quality
 
Standardized Risk Measurement for IT Executives 101
Standardized Risk Measurement for IT Executives 101Standardized Risk Measurement for IT Executives 101
Standardized Risk Measurement for IT Executives 101
Konstantin Berger
 
Managing Software Risk with CAST
Managing Software Risk with CASTManaging Software Risk with CAST
Managing Software Risk with CAST
CAST
 
Getting Over 'the Hump': How to Expand Your Stalled Virtualization Deployment
Getting Over 'the Hump': How to Expand Your Stalled Virtualization DeploymentGetting Over 'the Hump': How to Expand Your Stalled Virtualization Deployment
Getting Over 'the Hump': How to Expand Your Stalled Virtualization Deployment
David Resnic
 
Huawei Symantec Oceanspace S2600 Overview
Huawei Symantec Oceanspace S2600 OverviewHuawei Symantec Oceanspace S2600 Overview
Huawei Symantec Oceanspace S2600 Overview
Utopia Media
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08
gueste9924aa
 
Rapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST HighlightRapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST Highlight
CAST
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence PlatformJohn Fotiadis ✔️
 
Agile Management of Tech Debt and Architecture with CAST
Agile Management of Tech Debt and Architecture with CASTAgile Management of Tech Debt and Architecture with CAST
Agile Management of Tech Debt and Architecture with CAST
CAST
 
7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt
CAST
 
Cost Analysis In IT - HES08
Cost Analysis In IT - HES08Cost Analysis In IT - HES08
Cost Analysis In IT - HES08Thomas Danford
 
Cloud Computing for Developers and Architects - QCon 2008 Tutorial
Cloud Computing for Developers and Architects - QCon 2008 TutorialCloud Computing for Developers and Architects - QCon 2008 Tutorial
Cloud Computing for Developers and Architects - QCon 2008 Tutorial
Stuart Charlton
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
Compuware APM
 
HPC Impact: EDA Telemetry Neural Networks
HPC Impact: EDA Telemetry Neural NetworksHPC Impact: EDA Telemetry Neural Networks
HPC Impact: EDA Telemetry Neural Networks
inside-BigData.com
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
Mark Underwood
 
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...HKISPA
 

Similar to Estimating the principal of Technical Debt - Dr. Bill Curtis - WTD '12 (20)

CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
 
The Technical Debt Management Cycle
The Technical Debt Management CycleThe Technical Debt Management Cycle
The Technical Debt Management Cycle
 
Cloud computing standards
Cloud computing standardsCloud computing standards
Cloud computing standards
 
Software Measurement for Lean Application Management
Software Measurement for Lean Application ManagementSoftware Measurement for Lean Application Management
Software Measurement for Lean Application Management
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
 
Standardized Risk Measurement for IT Executives 101
Standardized Risk Measurement for IT Executives 101Standardized Risk Measurement for IT Executives 101
Standardized Risk Measurement for IT Executives 101
 
Managing Software Risk with CAST
Managing Software Risk with CASTManaging Software Risk with CAST
Managing Software Risk with CAST
 
Getting Over 'the Hump': How to Expand Your Stalled Virtualization Deployment
Getting Over 'the Hump': How to Expand Your Stalled Virtualization DeploymentGetting Over 'the Hump': How to Expand Your Stalled Virtualization Deployment
Getting Over 'the Hump': How to Expand Your Stalled Virtualization Deployment
 
Huawei Symantec Oceanspace S2600 Overview
Huawei Symantec Oceanspace S2600 OverviewHuawei Symantec Oceanspace S2600 Overview
Huawei Symantec Oceanspace S2600 Overview
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08
 
Rapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST HighlightRapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST Highlight
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence Platform
 
Agile Management of Tech Debt and Architecture with CAST
Agile Management of Tech Debt and Architecture with CASTAgile Management of Tech Debt and Architecture with CAST
Agile Management of Tech Debt and Architecture with CAST
 
7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt
 
Cost Analysis In IT - HES08
Cost Analysis In IT - HES08Cost Analysis In IT - HES08
Cost Analysis In IT - HES08
 
Cloud Computing for Developers and Architects - QCon 2008 Tutorial
Cloud Computing for Developers and Architects - QCon 2008 TutorialCloud Computing for Developers and Architects - QCon 2008 Tutorial
Cloud Computing for Developers and Architects - QCon 2008 Tutorial
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
 
HPC Impact: EDA Telemetry Neural Networks
HPC Impact: EDA Telemetry Neural NetworksHPC Impact: EDA Telemetry Neural Networks
HPC Impact: EDA Telemetry Neural Networks
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Estimating the principal of Technical Debt - Dr. Bill Curtis - WTD '12

  • 1. Estimating the Principal of Technical Debt Bill Curtis, Jay Sappidi, & Alexandra Szynkarski WTD’12 CAST Research Labs June 5, 2012
  • 2. The Technical Debt Metaphor Technical Debt  the future cost of defects remaining in code at release, a component of the cost of ownership Business Risk Opportunity cost—benefits that could have been achieved had resources been put on new Opportunity cost capability rather than retiring technical debt Liability from debt Liability—business costs related to outages, breaches, corrupted data, etc. Technical Debt Interest—continuing IT costs attributable to the violations causing technical debt, i.e, higher Interest on the debt maintenance costs, greater resource usage, etc. Principal borrowed Principalcost of fixing problems remaining in the code after release that must be remediated Structural quality problems Today’s talk focuses on the principal in production code CAST Confidential 1
  • 3. Inputs for Estimating the Principal of Technical Debt Data source Inputs Structural Static analysis quality of applications problems Hours to Technical Historical data correct Debt on maintenance problems Principal Developer’s IT or contractor burdened finance records hourly rate CAST Confidential 2
  • 4. Analyzing and Measuring Structural Quality CAST Application Intelligence Platform ANALYZERS APP KNOWLEDGE BASE DASHBOARDS & PORTALS Oracle PL/SQL APPLICATION HEALTH Governance Dashboard Sybase T-SQL SQL Server T-SQL IBM SQL/PSM Risk Factors Cost factors C, C++, C# Robustness Transferability Pro C Cobol Performance Changeability CICS Security Visual Basic VB.Net ASP.Net APPLICATION SIZE Project Trends Java, J2EE LOC Function Points JSP XML, HTML Javascript VBScript PHP Application Metadata PowerBuilder Drill Down Portal Oracle Forms PeopleSoft Analysis SAP ABAP, of all Netweaver system Tibco artifacts Business Objects Universal Analyzer CAST Confidential
  • 5. Appmarq  CAST’s Structural Quality Repository  Industry-leading repository on structural quality – 745 Applications – 160 Companies, 14 Countries – 321,259,160 Lines of Code; 59,511,706 Violations Telecom Retail Financial Government Other Insurance IT Consulting CAST Confidential
  • 6. Formulas for Estimating Technical Debt Principal % Violations Hours to to be fixed Fix Cost /Hour Old New Old New Old New High Severity 50% 100% 1 3 $75 $75 Medium Severity 25% 50% 1 1 $75 $75 Low Severity 10% 0% 1 NA $75 NA Estimated Technical Debt Principal = ( high severity violations) X (% to be fixed) X (average hours to fix) X ($s per hour) + ( medium severity violations) X (% to be fixed) X (average hours to fix) X ($s per hour) + ( low severity violations) X (% to be fixed) X (average hours to fix) X ($s per hour)  This is an estimate of Technical Debt Principal  Customers can get more accurate estimates by adjusting the parameters in the equation CAST Confidential
  • 7. Technical Debt Principal Estimates for Both Formulas Mean Median Minimum Maximum Std. Deviation Old New Old New Old New Old New Old New Sample 3.61 10.26 2.79 7.94 0.02 0.01 49.72 253.03 3.34 10.57 (n=744) .NET 3.09 12.29 2.37 10.20 0.96 0.49 16.52 73.00 2.70 11.47 (n=63) ABAP 0.43 1.90 0.41 1.73 0.05 2.00 1.42 6.89 0.23 1.08 (n=72) C 2.62 7.65 2.18 6.46 0.02 0.01 12.82 31.89 2.58 6.92 (n=44) C++ 4.33 12.95 2.41 7.83 0.02 0.01 38.08 132.91 7.02 24.42 (n=30) JavaEE 5.42 14.68 5.13 13.66 0.07 0.23 49.72 253.03 3.91 12.76 (n=474) Or-Forms 4.57 21.16 1.12 3.87 0.49 1.13 30.23 151.93 6.60 33.92 (n=45) V. Basic 2.93 9.83 2.58 8.37 0.68 2.77 12.14 45.01 2.80 10.24 (n=16) CAST Confidential 6
  • 8. Estimates of Technical Debt Principal by Health Factor  70% of Technical Debt is in IT Cost (Transferability, Changeability) Robustness  30% of Technical Debt is in Business 18% Risk (Robustness, Performance, Security) Transferability 40%  Health Factor proportions are mostly Security 7% consistent across technologies Changeability 30% CAST Confidential
  • 9. Relating Technical Debt to Business Value Health Operational Output Factor problems Measure Outages, slow Robustness Availability recovery Degraded Performance Work efficiency response Technical Security Breaches, Theft Data protection debt Lengthy Transferability IT productivity comprehension Changeability Excessive effort Delivery speed CAST Confidential 8
  • 10. Technical Debt Management Cycle Application Build/Release/ IT Executives Managers Developers QA/AI Center Step 1 Step 2 Step 3 Set policy and Set reduction Measure quality priorities targets & plans Technical Debt Step 4 Plan actions for remediation Step 7 Step 6 Step 5 Report to the Remediate Track results business violations CAST Confidential 9