SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. VI (Mar – Apr. 2015), PP 41-43
www.iosrjournals.org
DOI: 10.9790/0661-17264143 www.iosrjournals.org 41 | Page
Restoration and Degeneration of the Applications
Rajesh Venkatesan, Ankit Jain and Prateek Arora
Abstract: This study is to analyze and identify solutions for software degeneration lifecycle.
A software runs on multiple platforms (Operating Systems) these days and makes use of their resources which
communicate directly with the hardware. It is, at the time of installation, in its most critical and vulnerable
state because at that moment, it is dealing the system files which were created or configured with latter. Hence,
a software is likely and most probable to degenerate at this stage.
So, in a mechanism where the application state can be saved during its update and installation would act as a
rescue measure if the software degeneration happens during the same.
One crossroad we may come across in the discussion is that the framework that deals with saving the
application state shall be embedded along with the application or can it be made a cross platform extension or
shall it be a facility in the operating system.
Also, from a user point of view, Application Installation, an Upgrade or a Critical Software Patch are always
vulnerable. This not only involves unexpected functioning of the software but also affects the utilization of
resources in the operating system.
This seeks for a restoration framework at the application level. Yes, the operating system for its own self does it
today using checkpoints however it is not for the softwares running over it. Restoring applications specifically
across platforms is required today for clear software installations and upgrades.
I. Experiments and Data analysis:
Observation of the software failures leads to discovery of an important fact that the softwares are
generally in the high risk of failure during their update/upgrade cycle. For a software, when it is in its useful life
as described in the graph below, it undergoes its upgradation many a times and for each single time, there is
dramatic increase in its failure rate.
Fig 1.0
These failure rates makes the software less immune to unstability and thus risk of degeneration in each
upgrade rises as a spike. This graph can help us determine the checkpoints of the restoration that we need to
create in a software’s lifecycle and dispose off when not required.
Now, lets have a look at what the idealized software failure rate curve should look like :-
Restoration and Degeneration of the Applications
DOI: 10.9790/0661-17264143 www.iosrjournals.org 42 | Page
Fig 2.0
If we compare the idealized curve to the actual curve, we can easily figure out the drastic increase in
failure rates of the software. The software becomes more and more unstable with each upgrade/change instead
of becoming more stable. Idealized curve shows a consistent drop in slope of the failure rate, but in reality, on
the contrary, upgrades tend to come in each software’s lifetime which leads to the creation of spikes depicting
unstability in the softwares configuration and lifecycle. Each of these spikes calls for the creation of checkpoint
in the underlying system’s permanent memory. As a result, we can come closer to the idealized curve, which is
beneficial for the software as well as the operating system it is running upon.
II. Discussions & Results:
The restoration of the application state can take place by the following three methods:
1) OS to handle application restoration.
2) Standalone Cross Platform Agent.
3) Application level restoration.
OS:-
For the current research and discussion let us take ".dat" files for consideration as they can
appropriately help to understand the whole motive of this research in a nutshell.
The ".dat" files are the ones which provide the information to OS to protect against the pre-existing
virus (if any) in it. A minor change in the configuration data in these files can make them act as their
counterparts i.e. Virus. This has happened in the past in many of the similar software updates. However, if a
healthy state for the application exists, we can make it roll back to that state. For the determination of creation of
checkpoint following procedure can be followed:
An application when installs maintains its entries in the file system and registry. If the file system
changes go smooth during update, then the registry entries are made. So prior to the file system changes, the
current configuration for the application can be saved in the already created file system in some other location in
permanent memory. As a result of this, a disturbed update for the application, as soon as it suspected, can be
rolled back using the data which was stored prior to the update.
There is a drawback in the inbuilt-OS level restoration framework. It will cyreate restoration
framework for all the applications making use of OS resources and user will have no choice to select only a few
particular application which he wants to stored. Also, storing status of every application will use a lot of
memory in the system. For this purpose, we can have an idea of a standalone restoration agent which overcomes
the mentioned drawbacks.
Application Level restoration:
Application level restoration deals with the restoration of the application data using the framework
associated with the application itself. The application level framework will keep check on the upgradation
Restoration and Degeneration of the Applications
DOI: 10.9790/0661-17264143 www.iosrjournals.org 43 | Page
cycles and maintain the record of the application data by itself. In working, the application level restoration
framework will work in similar fashion as OS one.
Standalone Cross Platform Agent:
Working of the standalone agent will be similar to the the one as mentioned above in the OS part but
this agent will have the provision of selecting the applications to create the restoration files for. This may be a
standalone application having a UI for selecting the application to create restoration check points.
The agent shall be a cross platform application like as that of JVM which can be made available to all
the OS currently in existence.
III. Conclusion
With all the options considered, it appears that the efficiency of these three restoration methods is still
an open ended question but one thing for sure is that, the applications if restored at certain milestones can help
improve the lifetime of a software. The methods which are mentioned above can precisely help in determining
the checkpoints/milestones for the restoration. In the plot against time and efficiency, it is quite possible to
move the curve more to the ideal line as we restrain the application from withering away its life span everytime
it receives an update.
References:
[1]. https://www.tele-task.de/archive/podcast/9186/
[2]. Operating System Concepts: by Avi Silberschatz, Peter Galvin, Greg Gagne
[3]. Guide to Software Development: Designing and Managing the Life Cycle by Arthur M. Langer
[4]. Operating System: A Design-oriented Approach by Charles Crowley
[5]. A Brief Introduction to Software Development and Quality Assurance Management
[6]. by Steven C. Shaffer

More Related Content

What's hot

Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
Dr. Loganathan R
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineeringMark Turner CRP
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance SystemEhsan Ilahi
 
Ch15 software reuse
Ch15 software reuseCh15 software reuse
Ch15 software reuse
software-engineering-book
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
software-engineering-book
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9Ian Sommerville
 
Atifalhas
AtifalhasAtifalhas
Atifalhas
Evandro Madeira
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
software-engineering-book
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
software-engineering-book
 
Auto products flyer_v2
Auto products flyer_v2Auto products flyer_v2
Auto products flyer_v2
Khushwant Peswani
 
What features should your Automation Change Management software have?
What features should your Automation Change Management software have?What features should your Automation Change Management software have?
What features should your Automation Change Management software have?
MDT Software
 
Manageral aspects of software maintance
Manageral aspects of software maintanceManageral aspects of software maintance
Manageral aspects of software maintance
SanSan149
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safety
dalesanders
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
Cse 101(update)
Cse 101(update)Cse 101(update)
Cse 101(update)
Taufiq Anik
 

What's hot (18)

Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineering
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
Ch15 software reuse
Ch15 software reuseCh15 software reuse
Ch15 software reuse
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Atifalhas
AtifalhasAtifalhas
Atifalhas
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
 
Auto products flyer_v2
Auto products flyer_v2Auto products flyer_v2
Auto products flyer_v2
 
What features should your Automation Change Management software have?
What features should your Automation Change Management software have?What features should your Automation Change Management software have?
What features should your Automation Change Management software have?
 
Manageral aspects of software maintance
Manageral aspects of software maintanceManageral aspects of software maintance
Manageral aspects of software maintance
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safety
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Windows installerbasics
Windows installerbasicsWindows installerbasics
Windows installerbasics
 
Cse 101(update)
Cse 101(update)Cse 101(update)
Cse 101(update)
 

Viewers also liked

A012620107
A012620107A012620107
A012620107
IOSR Journals
 
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
IOSR Journals
 
B012310410
B012310410B012310410
B012310410
IOSR Journals
 
A1102020113
A1102020113A1102020113
A1102020113
IOSR Journals
 
E010312832
E010312832E010312832
E010312832
IOSR Journals
 
S110304122142
S110304122142S110304122142
S110304122142
IOSR Journals
 
C010411722
C010411722C010411722
C010411722
IOSR Journals
 
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure  CommunicationVehicle Obstacles Avoidance Using Vehicle- To Infrastructure  Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
IOSR Journals
 
I1303015159
I1303015159I1303015159
I1303015159
IOSR Journals
 
D010323137
D010323137D010323137
D010323137
IOSR Journals
 
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
IOSR Journals
 
P1303019093
P1303019093P1303019093
P1303019093
IOSR Journals
 
C011121114
C011121114C011121114
C011121114
IOSR Journals
 
K013139190
K013139190K013139190
K013139190
IOSR Journals
 
K1302025559
K1302025559K1302025559
K1302025559
IOSR Journals
 
G013124354
G013124354G013124354
G013124354
IOSR Journals
 
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
IOSR Journals
 
O130307101110
O130307101110O130307101110
O130307101110
IOSR Journals
 
Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)
Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)
Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)
IOSR Journals
 
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...
IOSR Journals
 

Viewers also liked (20)

A012620107
A012620107A012620107
A012620107
 
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
 
B012310410
B012310410B012310410
B012310410
 
A1102020113
A1102020113A1102020113
A1102020113
 
E010312832
E010312832E010312832
E010312832
 
S110304122142
S110304122142S110304122142
S110304122142
 
C010411722
C010411722C010411722
C010411722
 
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure  CommunicationVehicle Obstacles Avoidance Using Vehicle- To Infrastructure  Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
 
I1303015159
I1303015159I1303015159
I1303015159
 
D010323137
D010323137D010323137
D010323137
 
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
 
P1303019093
P1303019093P1303019093
P1303019093
 
C011121114
C011121114C011121114
C011121114
 
K013139190
K013139190K013139190
K013139190
 
K1302025559
K1302025559K1302025559
K1302025559
 
G013124354
G013124354G013124354
G013124354
 
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
 
O130307101110
O130307101110O130307101110
O130307101110
 
Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)
Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)
Analysis Of NACA 6412 Airfoil (Purpose: Propeller For Flying Bike)
 
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...
 

Similar to F017264143

Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application Testing
Trupti Jethva
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtestingAkss004
 
Software Process and Requirement
Software Process and RequirementSoftware Process and Requirement
Software Process and Requirement
cricket2ime
 
Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...
Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...
Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...
Madjid KETFI
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault Tolerance
Ankit Singh
 
Software maintaince.pptx
Software maintaince.pptxSoftware maintaince.pptx
Software maintaince.pptx
AmarYa2
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareengPINKU29
 
Software rejuvenation
Software rejuvenationSoftware rejuvenation
Software rejuvenation
RVCE
 
Software rejuvenation
Software rejuvenationSoftware rejuvenation
Software rejuvenation
RVCE
 
Software rejuvenation
Software rejuvenationSoftware rejuvenation
Software rejuvenation
RVCE2
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx
KENNEDYDONATO1
 
Performance testing wreaking balls
Performance testing wreaking ballsPerformance testing wreaking balls
Performance testing wreaking balls
Leonid Grinshpan, Ph.D.
 
Dynamic Component Deployment and (Re) Configuration Using a Unified Framework
Dynamic Component Deployment and (Re) Configuration Using a Unified FrameworkDynamic Component Deployment and (Re) Configuration Using a Unified Framework
Dynamic Component Deployment and (Re) Configuration Using a Unified Framework
Madjid KETFI
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)
IRJET Journal
 
Ch9
Ch9Ch9
An analysis of software aging in cloud environment
An analysis of software aging in cloud environment  An analysis of software aging in cloud environment
An analysis of software aging in cloud environment
IJECEIAES
 
Why software performance reduces with time?.pdf
Why software performance reduces with time?.pdfWhy software performance reduces with time?.pdf
Why software performance reduces with time?.pdf
Mike Brown
 
Ch16.pptx
Ch16.pptxCh16.pptx
Ch16.pptx
AslamHossain30
 

Similar to F017264143 (20)

Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application Testing
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtesting
 
Software Process and Requirement
Software Process and RequirementSoftware Process and Requirement
Software Process and Requirement
 
C0931115
C0931115C0931115
C0931115
 
Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...
Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...
Model-driven Framework for Dynamic Deployment and Reconfiguration of Componen...
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault Tolerance
 
Software maintaince.pptx
Software maintaince.pptxSoftware maintaince.pptx
Software maintaince.pptx
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
 
Software rejuvenation
Software rejuvenationSoftware rejuvenation
Software rejuvenation
 
Software rejuvenation
Software rejuvenationSoftware rejuvenation
Software rejuvenation
 
Software rejuvenation
Software rejuvenationSoftware rejuvenation
Software rejuvenation
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx
 
Performance testing wreaking balls
Performance testing wreaking ballsPerformance testing wreaking balls
Performance testing wreaking balls
 
Report hospital
Report hospitalReport hospital
Report hospital
 
Dynamic Component Deployment and (Re) Configuration Using a Unified Framework
Dynamic Component Deployment and (Re) Configuration Using a Unified FrameworkDynamic Component Deployment and (Re) Configuration Using a Unified Framework
Dynamic Component Deployment and (Re) Configuration Using a Unified Framework
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)
 
Ch9
Ch9Ch9
Ch9
 
An analysis of software aging in cloud environment
An analysis of software aging in cloud environment  An analysis of software aging in cloud environment
An analysis of software aging in cloud environment
 
Why software performance reduces with time?.pdf
Why software performance reduces with time?.pdfWhy software performance reduces with time?.pdf
Why software performance reduces with time?.pdf
 
Ch16.pptx
Ch16.pptxCh16.pptx
Ch16.pptx
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

F017264143

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. VI (Mar – Apr. 2015), PP 41-43 www.iosrjournals.org DOI: 10.9790/0661-17264143 www.iosrjournals.org 41 | Page Restoration and Degeneration of the Applications Rajesh Venkatesan, Ankit Jain and Prateek Arora Abstract: This study is to analyze and identify solutions for software degeneration lifecycle. A software runs on multiple platforms (Operating Systems) these days and makes use of their resources which communicate directly with the hardware. It is, at the time of installation, in its most critical and vulnerable state because at that moment, it is dealing the system files which were created or configured with latter. Hence, a software is likely and most probable to degenerate at this stage. So, in a mechanism where the application state can be saved during its update and installation would act as a rescue measure if the software degeneration happens during the same. One crossroad we may come across in the discussion is that the framework that deals with saving the application state shall be embedded along with the application or can it be made a cross platform extension or shall it be a facility in the operating system. Also, from a user point of view, Application Installation, an Upgrade or a Critical Software Patch are always vulnerable. This not only involves unexpected functioning of the software but also affects the utilization of resources in the operating system. This seeks for a restoration framework at the application level. Yes, the operating system for its own self does it today using checkpoints however it is not for the softwares running over it. Restoring applications specifically across platforms is required today for clear software installations and upgrades. I. Experiments and Data analysis: Observation of the software failures leads to discovery of an important fact that the softwares are generally in the high risk of failure during their update/upgrade cycle. For a software, when it is in its useful life as described in the graph below, it undergoes its upgradation many a times and for each single time, there is dramatic increase in its failure rate. Fig 1.0 These failure rates makes the software less immune to unstability and thus risk of degeneration in each upgrade rises as a spike. This graph can help us determine the checkpoints of the restoration that we need to create in a software’s lifecycle and dispose off when not required. Now, lets have a look at what the idealized software failure rate curve should look like :-
  • 2. Restoration and Degeneration of the Applications DOI: 10.9790/0661-17264143 www.iosrjournals.org 42 | Page Fig 2.0 If we compare the idealized curve to the actual curve, we can easily figure out the drastic increase in failure rates of the software. The software becomes more and more unstable with each upgrade/change instead of becoming more stable. Idealized curve shows a consistent drop in slope of the failure rate, but in reality, on the contrary, upgrades tend to come in each software’s lifetime which leads to the creation of spikes depicting unstability in the softwares configuration and lifecycle. Each of these spikes calls for the creation of checkpoint in the underlying system’s permanent memory. As a result, we can come closer to the idealized curve, which is beneficial for the software as well as the operating system it is running upon. II. Discussions & Results: The restoration of the application state can take place by the following three methods: 1) OS to handle application restoration. 2) Standalone Cross Platform Agent. 3) Application level restoration. OS:- For the current research and discussion let us take ".dat" files for consideration as they can appropriately help to understand the whole motive of this research in a nutshell. The ".dat" files are the ones which provide the information to OS to protect against the pre-existing virus (if any) in it. A minor change in the configuration data in these files can make them act as their counterparts i.e. Virus. This has happened in the past in many of the similar software updates. However, if a healthy state for the application exists, we can make it roll back to that state. For the determination of creation of checkpoint following procedure can be followed: An application when installs maintains its entries in the file system and registry. If the file system changes go smooth during update, then the registry entries are made. So prior to the file system changes, the current configuration for the application can be saved in the already created file system in some other location in permanent memory. As a result of this, a disturbed update for the application, as soon as it suspected, can be rolled back using the data which was stored prior to the update. There is a drawback in the inbuilt-OS level restoration framework. It will cyreate restoration framework for all the applications making use of OS resources and user will have no choice to select only a few particular application which he wants to stored. Also, storing status of every application will use a lot of memory in the system. For this purpose, we can have an idea of a standalone restoration agent which overcomes the mentioned drawbacks. Application Level restoration: Application level restoration deals with the restoration of the application data using the framework associated with the application itself. The application level framework will keep check on the upgradation
  • 3. Restoration and Degeneration of the Applications DOI: 10.9790/0661-17264143 www.iosrjournals.org 43 | Page cycles and maintain the record of the application data by itself. In working, the application level restoration framework will work in similar fashion as OS one. Standalone Cross Platform Agent: Working of the standalone agent will be similar to the the one as mentioned above in the OS part but this agent will have the provision of selecting the applications to create the restoration files for. This may be a standalone application having a UI for selecting the application to create restoration check points. The agent shall be a cross platform application like as that of JVM which can be made available to all the OS currently in existence. III. Conclusion With all the options considered, it appears that the efficiency of these three restoration methods is still an open ended question but one thing for sure is that, the applications if restored at certain milestones can help improve the lifetime of a software. The methods which are mentioned above can precisely help in determining the checkpoints/milestones for the restoration. In the plot against time and efficiency, it is quite possible to move the curve more to the ideal line as we restrain the application from withering away its life span everytime it receives an update. References: [1]. https://www.tele-task.de/archive/podcast/9186/ [2]. Operating System Concepts: by Avi Silberschatz, Peter Galvin, Greg Gagne [3]. Guide to Software Development: Designing and Managing the Life Cycle by Arthur M. Langer [4]. Operating System: A Design-oriented Approach by Charles Crowley [5]. A Brief Introduction to Software Development and Quality Assurance Management [6]. by Steven C. Shaffer