SlideShare a Scribd company logo
1 of 25
Rethinking Software Engineering Ian Sommerville
The Flash Crash
Large-scale complex IT systems
Complex software systems Multi-purpose. Organisational systems that support different functions within an organisation System of systems. Usually distributed and normally constructed by integrating existing systems/components/services Unlimited. Not subject to limitations derived from the laws of physics (so, no natural constraints on their size) Data intensive. System data orders of magnitude larger than code; long-lifetime data Dynamic. Changing quickly in response to changes in the business environment
Coalitions of systems Operational independence   Managerial independence   Multiple stakeholder viewpoints Evolutionary development Emergent behaviour Geographic distribution
Enterprise information systems Multi-purpose.  Designed to cross-cut the organisation System of systems.  Integrate several systems, including legacy systems Unlimited.Organisational code bases increasing in size Data intensive.  Database centric systems Dynamic. Rapid business change
Complex system realities There is no definitive specification of what the system should ‘do’ and it is practically impossible to create such a specification The complexity of the system is such that it is not ‘understandable’ as a whole It is likely that, at all times, some parts of the system will not be fully operational Actors responsible for different parts of the system are likely to have conflicting goals
There are fundamental reasons why current approaches to software engineering cannot scale to LSCITS engineering
Reductionism and software engineering
Reductionism Reductionism  “an approach to understanding the nature of complex things by reducing them to the interactions of their parts, or to simpler or more fundamental things”. Its focus is on the parts of a system, not the relationships between those parts ,[object Object],[object Object]
Complex and complicated systems Reductionist approaches are intended to help deal with complicated systems. We are now building complex systems where is is impossible to acquire and maintain a complete understanding of the system. Elements are independently controlled and often have undocumented side-effects.
Reductionist assumptions Control Reductionist approaches assume that we have control over the organisation of the system. It is then possible to decompose the system into parts that can themselves be engineered using reductionist approaches A rational world Reductionist approaches assume that rationality will be the principal influence in decision making Definable problems Reductionist approaches assume that the problem can be defined and the system boundaries established
LSCITS reality Reductionist assumptions Owners of a system control its development Decisions made rationally, driven by technical criteria Definable problem and clear system boundaries Rationality Problemdefinition Control Wicked problem and constantly renegotiated system boundaries Decisions driven by political motives No single owner or controller LSCITS reality
Reductionism and LSCITS Reductionism works (to some extent) for systems that we can control – such as software products But, for LSCITS, reductionist assumptions are no longer true Incremental improvements in software engineering are not enough to help us build complex systems of systems
Research challenges Reductionism is essentially based around the notion of a closed system The focus in software engineering has been on ‘the software’ Models and representations Verification and validation Methods and techniques But LSCITS engineering is an open system problem – not just the software but the environments that affect that software’s acceptability and operation
Short and long-term research Long-term research We need new inter-disciplinary approaches to LSCITS engineering which will involve developing completely new engineering paradigms that are not based on reductionism But – how do we test and validate these approaches? Enlightened 20+ year funding is needed to develop these approaches Shorter-term research We have to address some key problems and issues that limit the development of LSCITS as, for sure, these LSCITS are being and will be constructed
Broadening the perspective SOCIO-POLITICAL ENVIRONMENT LSCITS ENGINEERING SOFTWARE SYSTEMS OPERATIONAL ENVIRONMENT
Systems in operation ,[object Object]
How can we monitor coalitions of systems and what are the warning signs of problems?
How can systems be designed to recover from failure?
To what extent can coalitions of systems be self-managing?
How should shared knowledge in a coalition of systems be represented?,[object Object]
LSCITS EngD Students have to work on an industrial problem and spend a significant period of time working in industry on that problem.  Students take a range of courses that focus on complexity and systems engineering such as systems engineering for LSCITS, socio-technical systems, high-integrity systems engineering, empirical methods and technology innovation.  Students don’t have to produce a conventional ‘thesis’ – a book on a single topic but can produce a portfolio of work around their selected area.
LSCITS Masters course?

More Related Content

What's hot

Optimize Systems Management to Improve IT Resilience and Proactivity
Optimize Systems Management to Improve IT Resilience and ProactivityOptimize Systems Management to Improve IT Resilience and Proactivity
Optimize Systems Management to Improve IT Resilience and ProactivityInfo-Tech Research Group
 
Systems Perspective
Systems PerspectiveSystems Perspective
Systems Perspectivetaralane77
 
Transparency for-results
Transparency for-resultsTransparency for-results
Transparency for-resultsAchim Balasch
 
Extreme Problems Challenge
Extreme Problems ChallengeExtreme Problems Challenge
Extreme Problems ChallengeDatonix.it
 
Challenges of remote working in P3M – identifying, understanding and options ...
Challenges of remote working in P3M – identifying, understanding and options ...Challenges of remote working in P3M – identifying, understanding and options ...
Challenges of remote working in P3M – identifying, understanding and options ...Association for Project Management
 
Requirements Engineering for Sustainability - Open Lecture at LUT 2016
Requirements Engineering for Sustainability - Open Lecture at LUT 2016Requirements Engineering for Sustainability - Open Lecture at LUT 2016
Requirements Engineering for Sustainability - Open Lecture at LUT 2016Birgit Penzenstadler
 
Intelligent Decision Support Systems
Intelligent Decision Support SystemsIntelligent Decision Support Systems
Intelligent Decision Support SystemsGildardo Sanchez-Ante
 
Lecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A DssLecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A DssKodok Ngorex
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Luis Felipe Tabares Pérez
 
Process Intelligence and Predictive Analytics
Process Intelligence and Predictive AnalyticsProcess Intelligence and Predictive Analytics
Process Intelligence and Predictive AnalyticsSandy Kemsley
 

What's hot (14)

Optimize Systems Management to Improve IT Resilience and Proactivity
Optimize Systems Management to Improve IT Resilience and ProactivityOptimize Systems Management to Improve IT Resilience and Proactivity
Optimize Systems Management to Improve IT Resilience and Proactivity
 
Systems Perspective
Systems PerspectiveSystems Perspective
Systems Perspective
 
Transparency for-results
Transparency for-resultsTransparency for-results
Transparency for-results
 
Extreme Problems Challenge
Extreme Problems ChallengeExtreme Problems Challenge
Extreme Problems Challenge
 
Challenges of remote working in P3M – identifying, understanding and options ...
Challenges of remote working in P3M – identifying, understanding and options ...Challenges of remote working in P3M – identifying, understanding and options ...
Challenges of remote working in P3M – identifying, understanding and options ...
 
Creativity And Inovation
Creativity And InovationCreativity And Inovation
Creativity And Inovation
 
System analysis 1
System analysis 1System analysis 1
System analysis 1
 
L7 Design For Recovery
L7 Design For RecoveryL7 Design For Recovery
L7 Design For Recovery
 
idss
idssidss
idss
 
Requirements Engineering for Sustainability - Open Lecture at LUT 2016
Requirements Engineering for Sustainability - Open Lecture at LUT 2016Requirements Engineering for Sustainability - Open Lecture at LUT 2016
Requirements Engineering for Sustainability - Open Lecture at LUT 2016
 
Intelligent Decision Support Systems
Intelligent Decision Support SystemsIntelligent Decision Support Systems
Intelligent Decision Support Systems
 
Lecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A DssLecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A Dss
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
 
Process Intelligence and Predictive Analytics
Process Intelligence and Predictive AnalyticsProcess Intelligence and Predictive Analytics
Process Intelligence and Predictive Analytics
 

Similar to Rethinking Software Engineering

Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineeringIan Sommerville
 
software engineering
software engineeringsoftware engineering
software engineeringparamalways
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptMarissaPedragosa
 
An Introduction to Systems Engineering | Dorleco
An Introduction to Systems Engineering | DorlecoAn Introduction to Systems Engineering | Dorleco
An Introduction to Systems Engineering | DorlecoDorleControls
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArmen Arzumanyan
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9Ian Sommerville
 
Requirements Engineering Process Improvement
Requirements Engineering Process ImprovementRequirements Engineering Process Improvement
Requirements Engineering Process ImprovementIan Sommerville
 
a-beginners-guide-to-systems-engineering.pdf
a-beginners-guide-to-systems-engineering.pdfa-beginners-guide-to-systems-engineering.pdf
a-beginners-guide-to-systems-engineering.pdfssuser1f55c6
 
System Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU EthiopiaSystem Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU EthiopiaDebre Tabor University
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design IntroductionUsman Khan
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng OverviewIan Sommerville
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaDebre Tabor University
 
sadfinal2007-121022230733-phpapp01.pdf
sadfinal2007-121022230733-phpapp01.pdfsadfinal2007-121022230733-phpapp01.pdf
sadfinal2007-121022230733-phpapp01.pdfshoukatali154717
 

Similar to Rethinking Software Engineering (20)

L2 Socio Tech Systems
L2 Socio Tech SystemsL2 Socio Tech Systems
L2 Socio Tech Systems
 
L6 LSCITS Engineering
L6 LSCITS EngineeringL6 LSCITS Engineering
L6 LSCITS Engineering
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineering
 
software engineering
software engineeringsoftware engineering
software engineering
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
Chapter01 1
Chapter01 1Chapter01 1
Chapter01 1
 
Ch10
Ch10Ch10
Ch10
 
An Introduction to Systems Engineering | Dorleco
An Introduction to Systems Engineering | DorlecoAn Introduction to Systems Engineering | Dorleco
An Introduction to Systems Engineering | Dorleco
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems Design
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9
 
Requirements Engineering Process Improvement
Requirements Engineering Process ImprovementRequirements Engineering Process Improvement
Requirements Engineering Process Improvement
 
a-beginners-guide-to-systems-engineering.pdf
a-beginners-guide-to-systems-engineering.pdfa-beginners-guide-to-systems-engineering.pdf
a-beginners-guide-to-systems-engineering.pdf
 
L1 Intro To Lscits
L1 Intro To LscitsL1 Intro To Lscits
L1 Intro To Lscits
 
System Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU EthiopiaSystem Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU Ethiopia
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design Introduction
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng Overview
 
Bsa 411 preview full class
Bsa 411 preview full classBsa 411 preview full class
Bsa 411 preview full class
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU Ethiopia
 
sadfinal2007-121022230733-phpapp01.pdf
sadfinal2007-121022230733-phpapp01.pdfsadfinal2007-121022230733-phpapp01.pdf
sadfinal2007-121022230733-phpapp01.pdf
 

More from Ian Sommerville

Ultra Large Scale Systems
Ultra Large Scale SystemsUltra Large Scale Systems
Ultra Large Scale SystemsIan Sommerville
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
Conceptual systems design
Conceptual systems designConceptual systems design
Conceptual systems designIan Sommerville
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITSIan Sommerville
 
An introduction to LSCITS
An introduction to LSCITSAn introduction to LSCITS
An introduction to LSCITSIan Sommerville
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-studyIan Sommerville
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million usersIan Sommerville
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflowIan Sommerville
 
CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureIan Sommerville
 
CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterIan Sommerville
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1Ian Sommerville
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2Ian Sommerville
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureIan Sommerville
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachIan Sommerville
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsIan Sommerville
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013Ian Sommerville
 

More from Ian Sommerville (20)

Ultra Large Scale Systems
Ultra Large Scale SystemsUltra Large Scale Systems
Ultra Large Scale Systems
 
Resp modellingintro
Resp modellingintroResp modellingintro
Resp modellingintro
 
Resilience and recovery
Resilience and recoveryResilience and recovery
Resilience and recovery
 
LSCITS-engineering
LSCITS-engineeringLSCITS-engineering
LSCITS-engineering
 
Requirements reality
Requirements realityRequirements reality
Requirements reality
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Conceptual systems design
Conceptual systems designConceptual systems design
Conceptual systems design
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITS
 
An introduction to LSCITS
An introduction to LSCITSAn introduction to LSCITS
An introduction to LSCITS
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million users
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
 
CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failure
 
CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disaster
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructure
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systems
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 

Recently uploaded

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Recently uploaded (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

Rethinking Software Engineering

  • 3.
  • 5. Complex software systems Multi-purpose. Organisational systems that support different functions within an organisation System of systems. Usually distributed and normally constructed by integrating existing systems/components/services Unlimited. Not subject to limitations derived from the laws of physics (so, no natural constraints on their size) Data intensive. System data orders of magnitude larger than code; long-lifetime data Dynamic. Changing quickly in response to changes in the business environment
  • 6. Coalitions of systems Operational independence Managerial independence Multiple stakeholder viewpoints Evolutionary development Emergent behaviour Geographic distribution
  • 7. Enterprise information systems Multi-purpose. Designed to cross-cut the organisation System of systems. Integrate several systems, including legacy systems Unlimited.Organisational code bases increasing in size Data intensive. Database centric systems Dynamic. Rapid business change
  • 8. Complex system realities There is no definitive specification of what the system should ‘do’ and it is practically impossible to create such a specification The complexity of the system is such that it is not ‘understandable’ as a whole It is likely that, at all times, some parts of the system will not be fully operational Actors responsible for different parts of the system are likely to have conflicting goals
  • 9. There are fundamental reasons why current approaches to software engineering cannot scale to LSCITS engineering
  • 11.
  • 12. Complex and complicated systems Reductionist approaches are intended to help deal with complicated systems. We are now building complex systems where is is impossible to acquire and maintain a complete understanding of the system. Elements are independently controlled and often have undocumented side-effects.
  • 13. Reductionist assumptions Control Reductionist approaches assume that we have control over the organisation of the system. It is then possible to decompose the system into parts that can themselves be engineered using reductionist approaches A rational world Reductionist approaches assume that rationality will be the principal influence in decision making Definable problems Reductionist approaches assume that the problem can be defined and the system boundaries established
  • 14. LSCITS reality Reductionist assumptions Owners of a system control its development Decisions made rationally, driven by technical criteria Definable problem and clear system boundaries Rationality Problemdefinition Control Wicked problem and constantly renegotiated system boundaries Decisions driven by political motives No single owner or controller LSCITS reality
  • 15. Reductionism and LSCITS Reductionism works (to some extent) for systems that we can control – such as software products But, for LSCITS, reductionist assumptions are no longer true Incremental improvements in software engineering are not enough to help us build complex systems of systems
  • 16. Research challenges Reductionism is essentially based around the notion of a closed system The focus in software engineering has been on ‘the software’ Models and representations Verification and validation Methods and techniques But LSCITS engineering is an open system problem – not just the software but the environments that affect that software’s acceptability and operation
  • 17. Short and long-term research Long-term research We need new inter-disciplinary approaches to LSCITS engineering which will involve developing completely new engineering paradigms that are not based on reductionism But – how do we test and validate these approaches? Enlightened 20+ year funding is needed to develop these approaches Shorter-term research We have to address some key problems and issues that limit the development of LSCITS as, for sure, these LSCITS are being and will be constructed
  • 18. Broadening the perspective SOCIO-POLITICAL ENVIRONMENT LSCITS ENGINEERING SOFTWARE SYSTEMS OPERATIONAL ENVIRONMENT
  • 19.
  • 20. How can we monitor coalitions of systems and what are the warning signs of problems?
  • 21. How can systems be designed to recover from failure?
  • 22. To what extent can coalitions of systems be self-managing?
  • 23.
  • 24. LSCITS EngD Students have to work on an industrial problem and spend a significant period of time working in industry on that problem. Students take a range of courses that focus on complexity and systems engineering such as systems engineering for LSCITS, socio-technical systems, high-integrity systems engineering, empirical methods and technology innovation. Students don’t have to produce a conventional ‘thesis’ – a book on a single topic but can produce a portfolio of work around their selected area.
  • 26. Conclusion Current software engineering methods and techniques are effective in building closed systems (such as software products) But they cannot cope with LSCITS – where we need to consider not just the software but its development and operational environment Software engineering has to change to embrace the wider reality of LSCITS engineering Failure to do so will put our society at risk as complex software becomes embedded in all aspects of our lives
  • 27. Finding out more http://arxiv.org/abs/1109.3444