This document provides an overview of various software development life cycle (SDLC) models and methodologies. It begins by describing the Capability Maturity Model (CMM) which defines five levels of process maturity. It then discusses traditional models like waterfall and V-shaped, as well as agile approaches like rapid application development, evolutionary prototyping, incremental development, spiral model, and extreme programming. For each model, it summarizes the key steps, strengths, and weaknesses.
How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be released?
Traditional application security tools which require lengthy periods of configuration, tuning and
application learning have become irrelevant in these fast-pace environments. Yet, falling back only on
the secure coding practices of the developer cannot be tolerated.
Secure coding requires a new approach where security tools become part of the development environment – and eliminate any unnecessary overhead. By collaborating with development teams, understanding their needs and requirements, you can pave the way to a secure deployment in minutes.
How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be released?
Traditional application security tools which require lengthy periods of configuration, tuning and
application learning have become irrelevant in these fast-pace environments. Yet, falling back only on
the secure coding practices of the developer cannot be tolerated.
Secure coding requires a new approach where security tools become part of the development environment – and eliminate any unnecessary overhead. By collaborating with development teams, understanding their needs and requirements, you can pave the way to a secure deployment in minutes.
Project Evaluation and Estimation in Software DevelopmentProf Ansari
Cost-benefit analysis
It mainly comprise two steps
Identify and estimating all of the costs and benefits of carrying out the project and operating the delivered application.
Expressing these costs and benefits in common units
We need to evaluate the net benefit, that is, the difference between the total benefit and the total benefit and the total cost of creating and operating the system.
We can categorize cost according to where they originate in the life of the project.
Stepwise Project planning in software developmentProf Ansari
The following activities are:
Identify objectives and practical measures of the effectiveness in meeting those objectives.
Establish a project authority
Stakeholder analysis – identify all stakeholders in the project and their interests
Modify objectives in the light of stakeholder’s analysis
Establish methods of communication with all parties
2.4
Software Project Management | An Overview of the Software Project ManagementAhsan Rahim
Management is the process of getting things done through others, it is the process of coordinating people & other resources to achieve the goals of the organization. A project is a set of related tasks that are coordinated to achieve a specific objective in a given time limit. A project is well-defined task, which is a collection of several operations done in order to achieve a goal. Software is the program & all associated documentation & configuration data which is needed to make these programs operate correctly.
A Software Project is the complete procedure of software development from requirement gathering to testing & maintenance, carried out according to the execution methodologies, in a specified period of time to achieve intended software product.
MonkeyTalk Automation Testing For Android ApplicationContusQA
This presentation shows how to perform automation testing for mobile application using Eclipse and MonkeyTalk.
By using MonkeyTalk functional testing of both iOS and Android applications can be automated.
We can use either real device or emulator to automate functional testing.
The basic functions of "MobEcommerce" application is automated here.
Webvirtue is a leading offshore software development company based in India specialized in ecommerce software development, custom software development, web software development and more. For more details visit here http://www.webvirtue.com/software-development.php
Project Evaluation and Estimation in Software DevelopmentProf Ansari
Cost-benefit analysis
It mainly comprise two steps
Identify and estimating all of the costs and benefits of carrying out the project and operating the delivered application.
Expressing these costs and benefits in common units
We need to evaluate the net benefit, that is, the difference between the total benefit and the total benefit and the total cost of creating and operating the system.
We can categorize cost according to where they originate in the life of the project.
Stepwise Project planning in software developmentProf Ansari
The following activities are:
Identify objectives and practical measures of the effectiveness in meeting those objectives.
Establish a project authority
Stakeholder analysis – identify all stakeholders in the project and their interests
Modify objectives in the light of stakeholder’s analysis
Establish methods of communication with all parties
2.4
Software Project Management | An Overview of the Software Project ManagementAhsan Rahim
Management is the process of getting things done through others, it is the process of coordinating people & other resources to achieve the goals of the organization. A project is a set of related tasks that are coordinated to achieve a specific objective in a given time limit. A project is well-defined task, which is a collection of several operations done in order to achieve a goal. Software is the program & all associated documentation & configuration data which is needed to make these programs operate correctly.
A Software Project is the complete procedure of software development from requirement gathering to testing & maintenance, carried out according to the execution methodologies, in a specified period of time to achieve intended software product.
MonkeyTalk Automation Testing For Android ApplicationContusQA
This presentation shows how to perform automation testing for mobile application using Eclipse and MonkeyTalk.
By using MonkeyTalk functional testing of both iOS and Android applications can be automated.
We can use either real device or emulator to automate functional testing.
The basic functions of "MobEcommerce" application is automated here.
Webvirtue is a leading offshore software development company based in India specialized in ecommerce software development, custom software development, web software development and more. For more details visit here http://www.webvirtue.com/software-development.php
Iscope Digital Media Offshore Software Development CompanyIscope Digital
Iscope Digital Media is a professional offshore software development company in USA. We provide quality software development services with lowest prices.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Why React Native as a Strategic Advantage for Startup Innovation.pdfayushiqss
Do you know that React Native is being increasingly adopted by startups as well as big companies in the mobile app development industry? Big names like Facebook, Instagram, and Pinterest have already integrated this robust open-source framework.
In fact, according to a report by Statista, the number of React Native developers has been steadily increasing over the years, reaching an estimated 1.9 million by the end of 2024. This means that the demand for this framework in the job market has been growing making it a valuable skill.
But what makes React Native so popular for mobile application development? It offers excellent cross-platform capabilities among other benefits. This way, with React Native, developers can write code once and run it on both iOS and Android devices thus saving time and resources leading to shorter development cycles hence faster time-to-market for your app.
Let’s take the example of a startup, which wanted to release their app on both iOS and Android at once. Through the use of React Native they managed to create an app and bring it into the market within a very short period. This helped them gain an advantage over their competitors because they had access to a large user base who were able to generate revenue quickly for them.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Your Digital Assistant.
Making complex approach simple. Straightforward process saves time. No more waiting to connect with people that matter to you. Safety first is not a cliché - Securely protect information in cloud storage to prevent any third party from accessing data.
Would you rather make your visitors feel burdened by making them wait? Or choose VizMan for a stress-free experience? VizMan is an automated visitor management system that works for any industries not limited to factories, societies, government institutes, and warehouses. A new age contactless way of logging information of visitors, employees, packages, and vehicles. VizMan is a digital logbook so it deters unnecessary use of paper or space since there is no requirement of bundles of registers that is left to collect dust in a corner of a room. Visitor’s essential details, helps in scheduling meetings for visitors and employees, and assists in supervising the attendance of the employees. With VizMan, visitors don’t need to wait for hours in long queues. VizMan handles visitors with the value they deserve because we know time is important to you.
Feasible Features
One Subscription, Four Modules – Admin, Employee, Receptionist, and Gatekeeper ensures confidentiality and prevents data from being manipulated
User Friendly – can be easily used on Android, iOS, and Web Interface
Multiple Accessibility – Log in through any device from any place at any time
One app for all industries – a Visitor Management System that works for any organisation.
Stress-free Sign-up
Visitor is registered and checked-in by the Receptionist
Host gets a notification, where they opt to Approve the meeting
Host notifies the Receptionist of the end of the meeting
Visitor is checked-out by the Receptionist
Host enters notes and remarks of the meeting
Customizable Components
Scheduling Meetings – Host can invite visitors for meetings and also approve, reject and reschedule meetings
Single/Bulk invites – Invitations can be sent individually to a visitor or collectively to many visitors
VIP Visitors – Additional security of data for VIP visitors to avoid misuse of information
Courier Management – Keeps a check on deliveries like commodities being delivered in and out of establishments
Alerts & Notifications – Get notified on SMS, email, and application
Parking Management – Manage availability of parking space
Individual log-in – Every user has their own log-in id
Visitor/Meeting Analytics – Evaluate notes and remarks of the meeting stored in the system
Visitor Management System is a secure and user friendly database manager that records, filters, tracks the visitors to your organization.
"Secure Your Premises with VizMan (VMS) – Get It Now"
2. Capability MMaattuurriittyy MMooddeell ((CCMMMM))
• A bench-mark for measuring the maturity
of an organization’s software process
• CMM defines 5 levels of process maturity
based on certain Key Process Areas
(KPA)
6. WWaatteerrffaallll SSttrreennggtthhss
• Easy to understand, easy to use
• Provides structure to inexperienced staff
• Milestones are well understood
• Sets requirements stability
• Good for management control (plan, staff, track)
• Works well when quality is more important than
cost or schedule
7. WWaatteerrffaallll DDeeffiicciieenncciieess
• All requirements must be known upfront
• Deliverables created for each phase are
considered frozen – inhibits flexibility
• Can give a false impression of progress
• Does not reflect problem-solving nature of
software development – iterations of phases
• Integration is one big bang at the end
• Little opportunity for customer to preview the
system (until it may be too late)
8. When ttoo uussee tthhee WWaatteerrffaallll MMooddeell
• Requirements are very well known
• Product definition is stable
• Technology is understood
• New version of an existing product
• Porting an existing product to a new platform.
9. VV--SShhaappeedd SSDDLLCC MMooddeell
• A variant of the Waterfall
that emphasizes the
verification and validation
of the product.
• Testing of the product is
planned in parallel with a
corresponding phase of
development
10. VV--SShhaappeedd SStteeppss
• Project and Requirements
Planning – allocate resources
• Product Requirements and
Specification Analysis – complete
specification of the software
system
• Architecture or High-Level Design
– defines how software functions
fulfill the design
• Detailed Design – develop
algorithms for each architectural
component
• Production, operation and
maintenance – provide for
enhancement and corrections
• System and acceptance testing –
check the entire software system
in its environment
• Integration and Testing – check
that modules interconnect
correctly
• Unit testing – check that each
module acts as expected
• Coding – transform algorithms
into software
11. VV--SShhaappeedd SSttrreennggtthhss
• Emphasize planning for verification and
validation of the product in early stages of
product development
• Each deliverable must be testable
• Project management can track progress
by milestones
• Easy to use
12. VV--SShhaappeedd WWeeaakknneesssseess
• Does not easily handle concurrent events
• Does not handle iterations or phases
• Does not easily handle dynamic changes
in requirements
• Does not contain risk analysis activities
13. When to use tthhee VV--SShhaappeedd MMooddeell
• Excellent choice for systems requiring
high reliability – hospital patient control
applications
• All requirements are known up-front
• When it can be modified to handle
changing requirements beyond analysis
phase
• Solution and technology are known
14. Structured Evolutionary PPrroottoottyyppiinngg
MMooddeell
• Developers build a prototype during the
requirements phase
• Prototype is evaluated by end users
• Users give corrective feedback
• Developers further refine the prototype
• When the user is satisfied, the prototype
code is brought up to the standards
needed for a final product.
15. Structured Evolutionary PPrroottoottyyppiinngg
SStteeppss
• A preliminary project plan is developed
• An partial high-level paper model is created
• The model is source for a partial requirements
specification
• A prototype is built with basic and critical attributes
• The designer builds
– the database
– user interface
– algorithmic functions
• The designer demonstrates the prototype, the user
evaluates for problems and suggests improvements.
• This loop continues until the user is satisfied
16. Structured Evolutionary PPrroottoottyyppiinngg
SSttrreennggtthhss
• Customers can “see” the system requirements
as they are being gathered
• Developers learn from customers
• A more accurate end product
• Unexpected requirements accommodated
• Allows for flexible design and development
• Steady, visible signs of progress produced
• Interaction with the prototype stimulates
awareness of additional needed functionality
17. Structured Evolutionary PPrroottoottyyppiinngg
WWeeaakknneesssseess
• Tendency to abandon structured program
development for “code-and-fix” development
• Bad reputation for “quick-and-dirty” methods
• Overall maintainability may be overlooked
• The customer may want the prototype delivered.
• Process may continue forever (scope creep)
18. WWhheenn ttoo uussee
SSttrruuccttuurreedd EEvvoolluuttiioonnaarryy PPrroottoottyyppiinngg
• Requirements are unstable or have to be
clarified
• As the requirements clarification stage of a
waterfall model
• Develop user interfaces
• Short-lived demonstrations
• New, original development
• With the analysis and design portions of object-oriented
development.
19. RRaappiidd AApppplliiccaattiioonn MMooddeell ((RRAADD))
• Requirements planning phase (a workshop
utilizing structured discussion of business
problems)
• User description phase – automated tools
capture information from users
• Construction phase – productivity tools, such as
code generators, screen generators, etc. inside
a time-box. (“Do until done”)
• Cutover phase -- installation of the system, user
acceptance testing and user training
20. RRAADD SSttrreennggtthhss
• Reduced cycle time and improved productivity
with fewer people means lower costs
• Time-box approach mitigates cost and schedule
risk
• Customer involved throughout the complete
cycle minimizes risk of not achieving customer
satisfaction and business needs
• Focus moves from documentation to code
(WYSIWYG).
• Uses modeling concepts to capture information
about business, data, and processes.
21. RRAADD WWeeaakknneesssseess
• Accelerated development process must give
quick responses to the user
• Risk of never achieving closure
• Hard to use with legacy systems
• Requires a system that can be modularized
• Developers and customers must be committed
to rapid-fire activities in an abbreviated time
frame.
22. WWhheenn ttoo uussee RRAADD
• Reasonably well-known requirements
• User involved throughout the life cycle
• Project can be time-boxed
• Functionality delivered in increments
• High performance not required
• Low technical risks
• System can be modularized
23. IInnccrreemmeennttaall SSDDLLCC MMooddeell
• Construct a partial
implementation of a total
system
• Then slowly add increased
functionality
• The incremental model
prioritizes requirements of the
system and then implements
them in groups.
• Each subsequent release of
the system adds function to
the previous release, until all
designed functionality has
been implemented.
24. IInnccrreemmeennttaall MMooddeell SSttrreennggtthhss
• Develop high-risk or major functions first
• Each release delivers an operational product
• Customer can respond to each build
• Uses “divide and conquer” breakdown of tasks
• Lowers initial delivery cost
• Initial product delivery is faster
• Customers get important functionality early
• Risk of changing requirements is reduced
25. IInnccrreemmeennttaall MMooddeell WWeeaakknneesssseess
• Requires good planning and design
• Requires early definition of a complete
and fully functional system to allow for the
definition of increments
• Well-defined module interfaces are
required (some will be developed long
before others)
• Total cost of the complete system is not
lower
26. When to uussee tthhee IInnccrreemmeennttaall MMooddeell
• Risk, funding, schedule, program complexity, or
need for early realization of benefits.
• Most of the requirements are known up-front but
are expected to evolve over time
• A need to get basic functionality to the market
early
• On projects which have lengthy development
schedules
• On a project with new technology
27. SSppiirraall SSDDLLCC MMooddeell
• Adds risk analysis,
and 4gl RAD
prototyping to the
waterfall model
• Each cycle involves
the same sequence of
steps as the waterfall
process model
29. SSppiirraall QQuuaaddrraanntt
EEvvaalluuaattee aalltteerrnnaattiivveess,, iiddeennttiiffyy aanndd rreessoollvvee rriisskkss
• Study alternatives relative to objectives and constraints
• Identify risks (lack of experience, new technology, tight
schedules, poor process, etc.
• Resolve risks (evaluate if money could be lost by
continuing system development
31. SSppiirraall QQuuaaddrraanntt
PPllaann nneexxtt pphhaassee
• Typical activities
– Develop project plan
– Develop configuration management plan
– Develop a test plan
– Develop an installation plan
32. SSppiirraall MMooddeell SSttrreennggtthhss
• Provides early indication of insurmountable
risks, without much cost
• Users see the system early because of rapid
prototyping tools
• Critical high-risk functions are developed first
• The design does not have to be perfect
• Users can be closely tied to all lifecycle steps
• Early and frequent feedback from users
• Cumulative costs assessed frequently
33. SSppiirraall MMooddeell WWeeaakknneesssseess
• Time spent for evaluating risks too large for small or low-risk
projects
• Time spent planning, resetting objectives, doing risk
analysis and prototyping may be excessive
• The model is complex
• Risk assessment expertise is required
• Spiral may continue indefinitely
• Developers must be reassigned during non-development
phase activities
• May be hard to define objective, verifiable milestones
that indicate readiness to proceed through the next
iteration
34. WWhheenn ttoo uussee SSppiirraall MMooddeell
• When creation of a prototype is appropriate
• When costs and risk evaluation is important
• For medium to high-risk projects
• Long-term project commitment unwise because
of potential changes to economic priorities
• Users are unsure of their needs
• Requirements are complex
• New product line
• Significant changes are expected (research and
exploration)
35. AAggiillee SSDDLLCC’’ss
• Speed up or bypass one or more life cycle
phases
• Usually less formal and reduced scope
• Used for time-critical applications
• Used in organizations that employ
disciplined methods
36. SSoommee AAggiillee MMeetthhooddss
• Adaptive Software Development (ASD)
• Feature Driven Development (FDD)
• Crystal Clear
• Dynamic Software Development Method
(DSDM)
• Rapid Application Development (RAD)
• Scrum
• Extreme Programming (XP)
• Rational Unify Process (RUP)
37. EExxttrreemmee PPrrooggrraammmmiinngg -- XXPP
For small-to-medium-sized teams
developing software with vague or rapidly
changing requirements
Coding is the key activity throughout a
software project
• Communication among teammates is
done with code
• Life cycle and behavior of complex objects
defined in test cases – again in code
38. XXPP PPrraaccttiicceess ((11--66))
1. Planning game – determine scope of the next release
by combining business priorities and technical
estimates
2. Small releases – put a simple system into production,
then release new versions in very short cycle
3. Metaphor – all development is guided by a simple
shared story of how the whole system works
4. Simple design – system is designed as simply as
possible (extra complexity removed as soon as found)
5. Testing – programmers continuously write unit tests;
customers write tests for features
6. Refactoring – programmers continuously restructure
the system without changing its behavior to remove
duplication and simplify
39. XXPP PPrraaccttiicceess ((77 –– 1122))
7. Pair-programming -- all production code is written with
two programmers at one machine
8. Collective ownership – anyone can change any code
anywhere in the system at any time.
9. Continuous integration – integrate and build the
system many times a day – every time a task is
completed.
10. 40-hour week – work no more than 40 hours a week
as a rule
11. On-site customer – a user is on the team and available
full-time to answer questions
12. Coding standards – programmers write all code in
accordance with rules emphasizing communication
through the code
40. XXPP iiss ““eexxttrreemmee”” bbeeccaauussee
Commonsense practices taken to extreme levels
• If code reviews are good, review code all the time (pair
programming)
• If testing is good, everybody will test all the time
• If simplicity is good, keep the system in the simplest design that
supports its current functionality. (simplest thing that works)
• If design is good, everybody will design daily (refactoring)
• If architecture is important, everybody will work at defining and
refining the architecture (metaphor)
• If integration testing is important, build and integrate test several
times a day (continuous integration)
• If short iterations are good, make iterations really, really short (hours
rather than weeks)
41. XXPP RReeffeerreenncceess
Online references to XP at
• http://www.extremeprogramming.org/
• http://c2.com/cgi/wiki?ExtremeProgrammingRoadmap
• http://www.xprogramming.com/
42. FFeeaattuurree DDrriivveenn DDeessiiggnn ((FFDDDD))
Five FDD process activities
1. Develop an overall model – Produce class and sequence diagrams from
chief architect meeting with domain experts and developers.
2. Build a features list – Identify all the features that support requirements.
The features are functionally decomposed into Business Activities steps
within Subject Areas.
Features are functions that can be developed in two weeks and expressed in client terms
with the template: <action> <result> <object>
i.e. Calculate the total of a sale
3. Plan by feature -- the development staff plans the development
sequence of features
4. Design by feature -- the team produces sequence diagrams for the
selected features
5. Build by feature – the team writes and tests the code
http://www.nebulon.com/articles/index.html
43. DDyynnaammiicc SSyysstteemmss DDeevveellooppmmeenntt MMeetthhoodd
((DDSSDDMM))
Applies a framework for RAD and short time
frames
Paradigm is the 80/20 rule
– majority of the requirements can be
delivered in a relatively short amount of
time.
44. DDSSDDMM PPrriinncciipplleess
1. Active user involvement imperative (Ambassador
users)
2. DSDM teams empowered to make decisions
3. Focus on frequent product delivery
4. Product acceptance is fitness for business purpose
5. Iterative and incremental development - to converge
on a solution
6. Requirements initially agreed at a high level
7. All changes made during development are reversible
8. Testing is integrated throughout the life cycle
9. Collaborative and co-operative approach among all
stakeholders essential
45. DDSSDDMM LLiiffeeccyyccllee
• Feasibility study
• Business study – prioritized requirements
• Functional model iteration
– risk analysis
– Time-box plan
• Design and build iteration
• Implementation
46. AAddaappttiivvee SSDDLLCC
Combines RAD with software engineering
best practices
• Project initiation
• Adaptive cycle planning
• Concurrent component engineering
• Quality review
• Final QA and release
47. AAddaappttiivvee SStteeppss
1. Project initialization – determine intent of
project
2. Determine the project time-box (estimation
duration of the project)
3. Determine the optimal number of cycles and
the time-box for each
4. Write an objective statement for each cycle
5. Assign primary components to each cycle
6. Develop a project task list
7. Review the success of a cycle
8. Plan the next cycle
48. TTaaiilloorreedd SSDDLLCC MMooddeellss
• Any one model does not fit all projects
• If there is nothing that fits a particular project,
pick a model that comes close and modify it for
your needs.
• Project should consider risk but complete spiral
too much – start with spiral & pare it done
• Project delivered in increments but there are
serious reliability issues – combine incremental
model with the V-shaped model
• Each team must pick or customize a SDLC
model to fit its project
50. Quality – the ddeeggrreeee ttoo wwhhiicchh tthhee ssooffttwwaarree
ssaattiissffiieess ssttaatteedd aanndd iimmpplliieedd rreeqquuiirreemmeennttss
• Absence of system crashes
• Correspondence between the software and the users’
expectations
• Performance to specified requirements
Quality must be controlled because it lowers production
speed, increases maintenance costs and can adversely
affect business
51. QQuuaalliittyy AAssssuurraannccee PPllaann
• The plan for quality assurance activities should be in
writing
• Decide if a separate group should perform the quality
assurance activities
• Some elements that should be considered by the plan
are: defect tracking, unit testing, source-code tracking,
technical reviews, integration testing and system testing.
52. QQuuaalliittyy AAssssuurraannccee PPllaann
• Defect tracing – keeps track of each defect found, its
source, when it was detected, when it was resolved, how
it was resolved, etc
• Unit testing – each individual module is tested
• Source code tracing – step through source code line by
line
• Technical reviews – completed work is reviewed by
peers
• Integration testing -- exercise new code in combination
with code that already has been integrated
• System testing – execution of the software for the
purpose of finding defects.