Rick Collins presented on the importance of software size in cost estimating for defense programs. Recent studies by the GAO and others found that many defense programs experienced significant software size growth compared to initial estimates, with actual sizes being 20-60% larger than estimated. This consistent size growth across programs emphasizes the need for cost estimates to be based on actual size data from completed projects in order to establish credible and defensible estimates. Failing to account for likely size growth can lead to unrealistic budgets and schedules for new programs.
The Basis of Estimate is the starting point for Closed Loop Control project management.
How much will it cost? When will we be done? What is going to be delivered for that cost and time?
These are random numbers "estimated" by a variety of means.
But the BOEs are the "steering targets" for the closed loop ocntrol system
Forecasting cost and schedule performanceGlen Alleman
For credible decisions to be made, we need confidence intervals on all the numbers we use to make decisions.
These confidence intervals come from the underlying statistics and the related probabilities.
Statistical forecasting, using time series analysis of past performance, is mandatory for any credible discussion of project performance in the future.
Probabilistic Schedule and Cost AnalysisGlen Alleman
An overview of the probabilistic risk analysis processes that can be applied to a program. Although it may not appear to be a “simple” overview, this material is the tip of the iceberg of this complex topic.
Just schedule analysis has been addressed in detail here. The cost aspects of forecasting and simulation must be addressed as well to complete the connections between schedule and cost.
Probabilistic cost will be surveyed here, but an in depth review is for a later time.
Building credible cost and schedule estimates requires discipline, skill, and experience. All 3 can be acquired over time. The starting point is understanding what processes make up the discipline of estimating
Establishing a Project Controls Function at the UK Defence Equipment & Suppor...Project Controls Expo
Establishing a Project Controls Function at the UK Defence Equipment & Support Organisation by Dr. Tim Sheldon - Head of Project Controls (DE&S) for Ministry of Defence, UK at at Project Controls Expo 2016, Arsenal Stadium, London.
The Basis of Estimate is the starting point for Closed Loop Control project management.
How much will it cost? When will we be done? What is going to be delivered for that cost and time?
These are random numbers "estimated" by a variety of means.
But the BOEs are the "steering targets" for the closed loop ocntrol system
Forecasting cost and schedule performanceGlen Alleman
For credible decisions to be made, we need confidence intervals on all the numbers we use to make decisions.
These confidence intervals come from the underlying statistics and the related probabilities.
Statistical forecasting, using time series analysis of past performance, is mandatory for any credible discussion of project performance in the future.
Probabilistic Schedule and Cost AnalysisGlen Alleman
An overview of the probabilistic risk analysis processes that can be applied to a program. Although it may not appear to be a “simple” overview, this material is the tip of the iceberg of this complex topic.
Just schedule analysis has been addressed in detail here. The cost aspects of forecasting and simulation must be addressed as well to complete the connections between schedule and cost.
Probabilistic cost will be surveyed here, but an in depth review is for a later time.
Building credible cost and schedule estimates requires discipline, skill, and experience. All 3 can be acquired over time. The starting point is understanding what processes make up the discipline of estimating
Establishing a Project Controls Function at the UK Defence Equipment & Suppor...Project Controls Expo
Establishing a Project Controls Function at the UK Defence Equipment & Support Organisation by Dr. Tim Sheldon - Head of Project Controls (DE&S) for Ministry of Defence, UK at at Project Controls Expo 2016, Arsenal Stadium, London.
How Should We Estimate Agile Software Development Projects and What Data Do W...Glen Alleman
Estimating techniques for an acquisition program progresses from analogies to actual cost method as the program matures and more information is known. The analogy method is most appropriate early in the program life cycle when the system is not yet fully defined.
See how IT Risks Impacts your Business. CAST help you to check on software performance, stability, maintainability, and security vulnerabilities in which CAST excels and successfully differentiates from code analyzers.CAST’s Application Intelligence Platform and Rapid Portfolio Analysis solutions can help you avoid these types of “software glitches” or "software risks" by allowing you to gain greater visibility through automated code review that identifies the root causes of risks before they become production problems, while expediting time-to-market with shorter release time lines and improved business agility.
Download Risk Scorecard PowerPoint Presentation Slides to showcase planned methods of risk mitigation. This risk assessment process PowerPoint complete deck includes content ready slides such as risk management lifecycle, types of risks, risk categories, stakeholder’s management and engagement, risk appetite and tolerance, procedure, risk management plan, risk identification, risk register, risk assessment, risk analysis, risk response plan, risk response matrix, risk control matrix, risk items tracking, tools and practices and more. Get your audience focus on risk impact & profitability analysis, risk mitigations strategies, qualitative and quantitative risk analysis, etc. All slides are easy to customize. Users can edit these templates as per their requirements. Furthermore, the scorecard for risk management PPT slides can also be used for related topics such as enterprise risk management, threat management process, project risk management plan and many more. Demonstrate risk evaluation methods using corporate risk scorecard Presentation layout. Avoid inordinate delays with our Risk Scorecard PowerPoint Presentation Slides. Get it done in the allotted duration.
Risk Management Tools And Techniques PowerPoint Presentation SlidesSlideTeam
Presenting this set of slides with name - Risk Management Tools And Techniques Powerpoint Presentation Slides. Enhance your audiences knowledge with this well researched complete deck. Showcase all the important features of the deck with perfect visuals. This deck comprises of total of thirty slides with each slide explained in detail. Each template comprises of professional diagrams and layouts. Our professional PowerPoint experts have also included icons, graphs and charts for your convenience. All you have to do is DOWNLOAD the deck. Make changes as per the requirement. Yes, these PPT slides are completely customizable. Edit the colour, text and font size. Add or delete the content from the slide. And leave your audience awestruck with the professionally designed Risk Management Tools And Techniques Powerpoint Presentation Slides complete deck.
Four things that are almost guaranteed to reduce the reliability of a softwa...Ann Marie Neufelder
Distressed software projects typically have at least one of the 4 risks shown in the presentation. Avoiding these 4 things is the first step in ensuring software reliability.
Four things that are almost guaranteed to reduce the reliability of a softwa...Ann Marie Neufelder
This presentation shows the four things that have been quantitatively associated with distressed software intensive systems. Identifying these 4 things early in the system life cycle is essential for avoiding or mitigating a failed software project.
Software testing defect prediction model a practical approacheSAT Journals
Abstract Software defects prediction aims to reduce software testing efforts by guiding the testers through the defect classification of software systems. Defect predictors are widely used in many organizations to predict software defects in order to save time, improve quality, testing and for better planning of the resources to meet the timelines. The application of statistical software testing defect prediction model in a real life setting is extremely difficult because it requires more number of data variables and metrics and also historical defect data to predict the next releases or new similar type of projects. This paper explains our statistical model, how it will accurately predict the defects for upcoming software releases or projects. We have used 20 past release data points of software project, 5 parameters and build a model by applying descriptive statistics, correlation and multiple linear regression models with 95% confidence intervals (CI). In this appropriate multiple linear regression model the R-square value was 0.91 and its Standard Error is 5.90%. The Software testing defect prediction model is now being used to predict defects at various testing projects and operational releases. We have found 90.76% precision between actual and predicted defects.
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonJohn Billings CISSP
An overview of how a Risk Based Approach (RBA) can be adopted using Splunk Enterprise Security (ES) frameworks. The discussion will include an explanation of how RBA works, what outcomes have been seen by ES customers, and a live demo of a RBA modified ES environment with a BOTS data-set. The talk will also touch upon how Splunk Phantom can be used with RBA.
How to boost your ASO with data analytics?GameCamp
Presenation of Marek Pasieczny from Gamesture at ASO GameCamp webinar.
No matter if you optimize your paid or organic traffic, even simple data analysis is a must in today's world of App Store Optimization. The best conclusions come from the most creative approaches, i.e. those that allows you to save some time and make the right decisions. I'll give you 3 examples of ASO data analytics in practice.
Metrics serve as important indicator of the efficiency and effectiveness of software process. Analysis of defined metrics helps identify area of improvement and devise subsequent actions.......Read more
Agile Project Management Meets Earned Value ManagementGlen Alleman
Earned Value Management (EV) provides information for planning and controlling complex projects including software development. However, EV’s emphasis on retrospective data and the concept of driving in the rearview mirror is its primary shortcoming. Agile software development systems provide mechanisms to adapt to changing requirements in low ceremony environments. The primary shortcoming of Agile development is its inability to participate in government and commercial development environments where requirements, staffing, and funding are managed informal ways. Instead of requiring the high ceremony environment to abandon its methods, combining Agile development activities with earned value management is the approach used in this experience report. The principle management concern in every environment, high or low ceremony, is how much value is being delivered for the invested funds? The answer to this question is the domain of the metrics of EV. Merging EV with Agile development processes creates new synergies by leveraging the best of both processes in a variety of domains.
54 C o m m u n i C at i o n s o F t h e a C m | j u Ly 2 0 1 2 | v o L . 5 5 | n o . 7
practice
i
l
l
u
s
t
r
a
t
i
o
n
b
y
g
a
r
y
n
e
i
l
l
A r e s o f T wA r e M e T r i C s helpful tools or a waste of time?
For every developer who treasures these
mathematical abstractions of software systems
there is a developer who thinks software metrics are
invented just to keep project managers busy. Software
metrics can be very powerful tools that help achieve
your goals but it is important to use them correctly, as
they also have the power to demotivate project teams
and steer development in the wrong direction.
For the past 11 years, the Software Improvement
Group has advised hundreds of organizations
concerning software development and risk
management on the basis of software metrics.
We have used software metrics in more than 200
investigations in which we examined a single snapshot
of a system. Additionally, we use software metrics to
track the ongoing development effort of more than
400 systems. While executing these projects, we have
learned some pitfalls to avoid when using software
metrics in a project management setting. This
article addresses the four most important of these:
˲ Metric in a bubble;
˲ Treating the metric;
˲ One-track metric; and
˲ Metrics galore.
Knowing about these pitfalls will
help you recognize them and, hopeful-
ly, avoid them, which ultimately leads
to making your project successful. As
a software engineer, your knowledge
of these pitfalls helps you understand
why project managers want to use soft-
ware metrics and helps you assist the
managers when they are applying met-
rics in an inefficient manner. As an
outside consultant, you need to take
the pitfalls into account when pre-
senting advice and proposing actions.
Finally, if you are doing research in
the area of software metrics, knowing
these pitfalls will help place your new
metric in the right context when pre-
senting it to practitioners. Before div-
ing into the pitfalls, let’s look at why
software metrics can be considered a
useful tool.
software metrics steer People
“You get what you measure.” This
phrase definitely applies to software
project teams. No matter what you de-
fine as a metric, as soon as it is used to
evaluate a team, the value of the metric
moves toward the desired value. Thus,
to reach a particular goal, you can con-
tinuously measure properties of the
desired goal and plot these measure-
ments in a place visible to the team.
Ideally, the desired goal is plotted
alongside the current measurement to
indicate the distance to the goal.
Imagine a project in which the run-
time performance of a particular use
case is of critical importance. In this
case it helps to create a test in which
the execution time of the use case is
measured daily. By plotting this daily
data point against the desired value,
and making sure the team sees this
mea.
Project Evaluation and Estimation in Software DevelopmentProf Ansari
Cost-benefit analysis
It mainly comprise two steps
Identify and estimating all of the costs and benefits of carrying out the project and operating the delivered application.
Expressing these costs and benefits in common units
We need to evaluate the net benefit, that is, the difference between the total benefit and the total benefit and the total cost of creating and operating the system.
We can categorize cost according to where they originate in the life of the project.
Similar to Size matters a lot rick collins - technomics (20)
The Use of Functional Size in the Industry.pdfNesma
In this webinar, the emphasis is on the use of Functional Size in the Industry, and we focus on several use cases where functional size helps organizations to make impactful decisions based on objective metrics and data.
While traditional performance metrics often measure individual output or adherence to pre-defined plans, measuring performance in agile teams requires a different approach. Agile teams operate in iterative cycles, prioritizing adaptability and learning over rigid goals. So, why do organizations still measure their performance?
By using the right metrics in the right way, organizations can empower their agile teams to thrive and deliver exceptional results.
Software Cost Estimation webinar January 2024.pdfNesma
In this webinar you will learn why Software Cost Estimation is important, what is the Software Cost Estimation Body of Knowledge for Software and the ways you can become a professional certified software cost estimator SCEC!
The journey of UNISON Cost Engineering in the field of automotive software cost estimation started in 2018. The expectation is that in 2030 the cost of software will be 50% of the total production cost of a car. To help the OEM get a proper understanding of the software development cost they need to use some form of size measurement to compare, challenge and control the cost of software development by the software vendors.
The COSMIC battle between David and Goliath - Paul HusseinNesma
No more exhaustive and emotional discussions on price and deliverables. Predictable prices for projects and changes. No escalating maintenance costs. This can only be done by specifying exactly what you want and outsource it to the right service providers that have the required platform already in place.
Succesful Estimating - It's how you tell the story - Amritpal Singh AgarNesma
Estimating the Cost of something is a profession. But then you have to tell the story about the estimate to whoever needs to hear that story. The success of how you tell the story is determining the success of the cost estimate.
CEBoK for Software Past Present Future - Megan JonesNesma
The Cost Estimation Body of Knowledge for Software is in development for a number of years within ICEAA. First as a section of the general CEBoK, but it will be established as a separate CEBoK-S for Software, since software is becoming very prominent within the cost estimation community.
Agile Development and Agile Cost Estimation - A return to basic principles - ...Nesma
Is there a natural tension between agile development and traditional cost management or do we need to return to basic principles? Even when you are flexible, you still need to make a plan, build an estimate and measure what you have achieved.
Resolving Cost Management and Key Pitfalls of Agile Software Development - Da...Nesma
Agile software development does not always live up to the promises. Especially in the field of IT Cost Management. Without proper estimation and tracking the value cannot be made clear.
Project Succes is a Choice - Joop SchefferlieNesma
Project success is a choice. Don't stop thinking about the best way to do a project, agile or not. Select the best competencies to ensure that the project will be successful.
Deze presentatie beschrijft een praktische implementatie van het gebruik van Nesma functiepunten in Agile deliveries. Deze presentatie is gepresenteerd door Richard Sweer van Infinity tijdens de webinar Afrekenen met functiepunten. Voor meer info: www.nesma.org; conference@nesma.org.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Setting the stage
Recent GAO findings regarding U.S. defense programs
U.S. defense program software size growth analysis
Closing Remarks
Agenda
2
3. Credible, Defensible Cost Estimates
Realistic Budgets
Executable Contracts/Projects
Successful Acquisition & Sustainment
Outcomes
3
The Big Picture
Avoid
approving
projects that
can’t be
afforded
Avoid
awarding
contracts that
can’t be
executed
The ‘right’ cost analysis capability facilitates authoritative decision-maker
knowledge that enables informed decision making
4. 4
As analysts, we are asking decision-makers to place their trust/confidence in our analysis
and resulting estimates
Thus, the first requirement of an estimate is that it be credible/defensible
The principal means to establish credibility/defensibility (and corresponding trust) is to
explain in very specific terms the path from data/facts to methods/models to estimates (i.e.,
the evidentiary chain)
Clarity of this evidentiary chain is paramount
Clarity enables persuasion leading to trust
Our work as analysts must be persuasive and even compelling
Many of the consumers of our estimates are exposed to an endless stream of advocates with
agendas
So, when we tell these consumers “no, project x is going to cost 50% more than you expected”,
we had better be prepared to sell/defend our position
Decision-makers Must Trust Our Work
Credibility --> Confidence --> Trust
5. 5
Data is the foundation for estimate credibility and defensibility
An estimate not grounded in data can be viewed a guess or, at best,
analyst opinion/judgement
An estimate is only as good as it’s underlying data
Data collection and normalization must be a top priority of cost
analysts
The equivalent of doing the all important prep work (scraping, sanding,
priming) prior to painting the exterior of a house
Data Engenders Trust
Data is the lifeblood of cost analysts
6. Cost estimating is not about being right!
Rather, it is about minimizing how wrong we are!
The most credible, defensible cost estimates
reflect data-driven evaluation of uncertainty & risk
Use Monte Carlo simulation to generate an “S-
Curve depicting the potential range of cost
outcomes for a project
But Always Bear in Mind
6
Program X S-Curve
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
0 25 50 75 100 125 150 175 200
Cost(FY00 $M)
CumProbability
CV=.35
CurrentBudget:
35% - $83M
Mean Estimate:
57% - $100M
7. Can You Relate to This?
7
An estimate not based on the size of a completed (or nearly completed) project
is at best an educated guess
SIZE
8. Cost estimators cannot create estimates for a project that lacks definition
No definition = no estimate
Ideally, project managers, engineers, etc. have enough understanding of the
project to define it in terms that are useful to cost estimators
Professional cost estimators, particularly those with parametric estimating
expertise, don’t require much definition
Size is not the only way to characterize the scope & complexity of a software
development project, but it is arguably the key consideration for cost
estimators
Cold Hard Facts
8
9. Recent “Real World” Findings re. U.S. Defense Programs
9
The U.S. Government Accountability Office (GAO)
produces a Congressionally-mandated annual
assessment of the Defense Department’s largest
acquisition programs
The most recent report (June 2020) addresses 121
defense programs
106 weapons programs ($1,853B)
15 IT programs ($15B)
The report highlights software development
risk/challenges/growth for 42 of the 121 programs
12. U.S. Defense Program Software Development Characteristics
12
Includes new,
modified,
reused & auto-
generated
Unique nature of weapon systems
necessitates custom-created software
Custom created code is relatively expensive
If custom code grows, then growth is by
definition more expensive
Strong evidence that estimated new code
count will grow
Strong evidence that estimated reused code
count will be unrealistically/optimistically
high & be replaced with more costly new
code
Strong evidence that estimated COTS &
modified COTS count will be unrealistically
high & be replaced with more costly new
code
13. Actual
SLOC
Initial
New
SLOC
Estimate
Initial
Existing
SLOC
Estimate
New SLOC
Growth
More
New SLOC
Required
New SLOC
Efficiency*
Estimating
Optimism
-
Development
Realism
Cannot
Use
Existing
SLOC
Undefined
Requirements
New SLOC
Must be
Developed
Re-Usable
Existing
SLOC
+
+
+
+
++
+
- +
+
+
+
+
13
U.S. Defense Program Software Size Growth (2007 Study*)
* “Software Code Growth: A New Approach Based on Historical Analysis of Actuals,” Technomics, Inc.
(Hardin & Jones), 2007 ISPA-SCEA Conference, June 2007
“Analytical Hypothesis, 1 of 2” (slide 5)
14. U.S. Defense Program Software Size Growth (2007 Study)
14
Results based on analysis of actual vs. estimated sizing data for 50 defense programs
~75% of the 50 represent real-time software
30% of the 50 are waterfall, 24% incremental, 16% incremental & 30% unspecified
4% of the 50 are simple efforts, 20% routine, 28% moderate & 48% difficult
Constrained optimization (i.e., residual minimization) analysis using MS Excel Solver indicates
Magnitude of growth depends on composition & complexity
New SLOC growth = growth of new SLOC + replacement of “existing” SLOC with new SLOC
Replacement because existing SLOC reusability is 20% less than expected
Non-reusable existing SLOC is replaced by new SLOC using 30% fewer lines of code
Simple Routine Moderate Difficult
1.15 1.29 1.44 1.58
1.09 1.20 1.31 1.42
1.04 1.12 1.19 1.26
Ratio of Actual Final to Estimated SLOC by Composition & Complexity
Composition
100% new
75% new/25% modified
50% new/25% modified/25% unmodified
Complexity
15. U.S. Defense Program Software Size Growth (2013 Study*)
15
Results based on analysis of actual vs.
estimated data for 17 defense programs
Software development efforts
started/completed in 2001-2009
Original data set = 127 programs; data for
110 did not meet stringent inclusion criteria
Linear, log-linear & non-linear regression
analysis using the coefficient of variation
(CV) as the principal statistical “measure
of merit”
Each dependent variable was regressed
on all possible combinations of four & five
independent variables (> 1.5 million
combinations!)
Developed seven “best” statistical
relationships
Relationship specific to size growth reflects
19-61% size growth; this is consistent with
2007 study results
* “ODASA-CE Software Growth Research,” Technomics, Inc. (Arnold, Cincotta, Lofgren & Nolte),
2013 ICEAA Workshop, June 2013
16. 16
* “Software Growth Analysis,” Naval Center for Cost Analysis (Brown, Lanham, Rosa, Staley &
Wallshein), 2015 Annual ICEAA Workshop, June 2015
U.S. Defense Program Software Size Growth (2015 Study*)
“Does software size grow or shrink?” (slide 5)
17. U.S. Defense Program Software Size Growth (2015 Study*)
17
Results based on analysis of actual vs. estimated sizing data for 200 computer software
configuration items (CSCI) for a variety of defense programs
~75% of the data points represent real-time software
Mean growth factors reflect 29-67% size growth (consistent with other study findings)
Coefficient of variation (CV) reflects significant variability
32-50% of the CSCIs did not grow, but 50-68% did
* “Software Growth Analysis,” Naval Center for Cost Analysis (Brown, Lanham, Rosa, Staley &
Wallshein), 2015 Annual ICEAA Workshop, June 2015
18. 18
In closing
Beware of hallucinated assumptions and
‘experts’ who don’t come to the table with data!
SIZE
Size is an objective measure of software development complexity that is essential to
credible, defensible cost estimates
Regardless of the sizing technique employed by those responsible for defining the project
in enough detail to facilitate cost estimation, the most credible sizing estimates are based
on actual sizing data for completed or nearly completed projects
Regardless of the sizing technique employed and best intentions of all parties responsible
for delivering a software product, size growth is an unfortunate fact of life
In case of SLOC, three studies of U.S. defense program software data indicate ~20-60% code
growth
Budgets established for future software projects should reflect historical size growth
relevant to the type/complexity of the future projects
Requires data and rigorous analysis of the type reflected in the three studies
19. Thanks for attending today!
Noted software growth presentations at https://www.iceaaonline.com/archives/
rcollins@technomics.net; 571-366-1402 (office); 571-218-0411 (mobile)
19