SlideShare a Scribd company logo
1 of 17
Download to read offline
The challenges of
emerging software
eco-systems
19 May 2013
Neil Siegel, Ph.D.
Sector Vice-President & Chief Engineer,
Northrop Grumman
Bottom-line up front
• New opportunities for software-intensive
configurations are arriving on the market
• Likely will be adopted quickly, and at
large scale
• There remains, however, a significant
potential for unintended problems
• Case studies
• Let’s talk about our role in creating the
fixes
2
Emerging software eco-systems
• Cloud, cyber-physical, and so forth
• These constructs, together with the necessary tools,
processes, training, reference design / design patterns,
and so forth, can be considered new software “eco-
systems”
• By extending the range of societal problems that
can be solved by software, these new eco-
systems provide the opportunity to increase our
value to society
• Such complex structures exhibit emergent
behavior
• Obtaining this “1+1=3” is often the reason for
interconnecting formerly-separate elements
• There is, however, often unintended emergent
behavior, some of which has adverse effects.
• We need to take the lead in addressing these problems
– only we have the expertise
3
Case-studies (1 of 5)
1. Clients #1 & #2 – private cloud
• 2 million to 20 million users per client, most of
them public-facing
• A smaller set of users (10%) do mission-critical
functions
• Customer believes that there is significant
synergy by co-hosting public-facing and
mission-critical capabilities
• Observed result: the process to manage fine-
grained access control is labor-intensive, and
hence, too expensive and considered error-
prone
4
2.Client #3 -- Transitioning an enterprise to a
private cloud
• > 100 separate mission applications, connected
into complicated and time-critical mission
threads. Each formerly on their own stand-
alone computer.
• Very large ingest rate
• Transitioned to a private cloud. >80% decrease
in hardware foot-print. Significant decrease in
software SLOC count (every application
formerly had its own infrastructure, etc.).
Case-studies (2 of 5)
5
6
2.Client #3 -- Transitioning an enterprise to a
private cloud
• But . . . (a) could not re-code to a modern computer
target some of the applications (re-certification
considered too expensive, source code not
available (!), etc.) (b) mission threading made the
use of middleware appropriate; selected and ported
most of the applications to a single middleware
structure (c) most needed cyber-protection retrofits,
and other modifications
• The new system is realizing the desired benefits,
preserved the mission timelines etc., but the
transition process was material, and this was not
well-understood by the client at the beginning of the
process. Since the process was competitive, that
was a real obstacle.
Case-studies (2 of 5 – continued)
3.Client #4 -- Forensics
• Capability hosted in a public cloud
• Serious hacking attack
• The client wants us to do analysis / forensics.
There may be a need for law-enforcement
participation.
• We don’t have access to all of the same sort
of information that we would if this were
hosted on a dedicated mission computer in
the client’s (or our own) facilities
• It is not clear to what and how law
enforcement can gain access . . . There is a
complicated “stack” of participants, yet our
client’s contract is only with the “top” of that
stack
Case-studies (3 of 5)
7
4.Client #5 – big-data
• Customer “fell in love” with a commercial product
that a vendor offered, and required us to
implement the system using that product
• It appears that at the high-end of the performance
spectrum, there is an extreme performance
sensitivity to specifics of the mission (often 10x or
more).
• Vendors either don’t understand this, or don’t
like to acknowledge it . . . and work very hard
to convince customers to choose their stuff.
Case-studies (4 of 5)
8
9
4.Client #5 – big-data
• In the end:
• COTS product hit less than 10% of the
promised performance
• Customer brought in lots of other vendors to
perform triage. Nothing worked.
• Had eventually to throw it all away, and allow
us to start all over, based on detailed
mission engineering (which worked).
• Not good for either the customer or the
vendor! (nor us – a “Cassandra” effect)
Case-studies (4 of 5 – continued)
5.Clients #6 & #7 – cyber-physical systems
• Significant functional and convenience benefits
of using digital systems to interconnect formerly-
stand-alone capabilities
• Significant (apparent) cost savings using internet
to replace dedicated / bespoke control systems
• But . . .
a) reliability / available too low
b) variance in port-to-port timing too high
c) result is far too fragile, and too susceptible
to a wide range of attacks – hooking things
up to the internet creates new attack
channels.
Case-studies (5 of 5)
10
Some of the lessons-learned from the case studies
Cloud
• Co-location of data
increases the
down-side of a
potential spill
• Fine-grained
access control is
labor-intensive
• True enterprise
transition can be
quite labor-
intensive
• How to do forensics
Big-data
• Extreme
performance
sensitivity to
mission specifics
• How to test, when
increasingly we
cannot control the
data we process
Cyber-physical
• Authentication
• Built-in protection
against
unreasonable use
• Socially-induced
complexities
• Too much variance
• Reliability /
availability far too
low
Reliability
• In general, the MTBF for software stinks
• People have pointed the way for a long time, but time-to-market and
the quest for more functionality still drives design decisions
11
Special discussion:
Reliability / availability / capacity / port-to-port timing
• I spent many years of my career as the designated “fix-it”
person for problem programs
• My findings: weak designs allowed too much unplanned
dynamic behavior
• Good at implementing the dynamic behavior they wanted . . .
• . . . but weak at preventing other the dynamic behavior
• Usually pretty good at implementing the functional and
presentation requirements
• But unplanned dynamic behavior resulted in low reliability /
availability, poor MTBF, low capacity, high variance in port-to-port
timing (including human response times)
• I extended this to a more systematic study in (Siegel 2011)
• Including a technique for designs that are effective at preventing
unplanned dynamic behavior
12
We now live in the middle of critical missions
• Capers Jones’ data shows a huge range of software quality
outcomes: 20x latent defects, and so forth
• Consistent with other’s data, and confirmed by my own benchmarks
(100x to 1,000x MTBF)
• Yet it seems like time-to-market and the quest for functionality
dominates decision-making
• For example, typical software desktop / application MTBF: 10 hours
• Modern commercial jetliner MTBF: >> 1,000,000 hours
• Techniques to be better exist / have been proposed:
• Model-driven design / development
• Formal validation methodologies
• Domain-specific languages (to reduce SLOC count)
• And yet . . . they remain at the margins of most practice
If we are going to be implementing critical missions – the
next-generation power grid, advanced health care
prognostics, self-driving cars, etc. – this is probably not
good enough
13
Cyber-physical
• In my view, this is the high-leverage area in the
near future
• It is also the area of highest risk
• Why:
• Cyber vulnerabilities (my view: we must learn to build secure
systems from insecure components)
• Privacy breaches
• Direct and obvious safety impacts
• We have often focused on mean & peak performance /
capacity / port-to-port timing, rather than on reducing
variance
• Failure to include built-in blocks against unreasonable
use
• The new environment limits our ability to control, or
even understand, all of the data we will be asked to
process
14
As we get into more consumer-facing / safety-critical
missions, expectations will rise
15
An on-off
switch
Is expected to
work 100% of
the time
A baseball
player
Is a huge
success if he
get a hit 30%
of the time
Expectations of our field
• Achieve the benefits, but minimize the
unintended adverse consequences
• Our track-record is pretty good, but expectations
are very high . . . and will get higher
Summary
• New software eco-systems offer us an enormous
opportunity . . .
• . . . that comes with increased exposure and
public expectations
• Significant down-side risks, and insufficient
attention to mitigating them
• Significant variation in the quality of outcomes;
which indicates that we are not yet a mature field-
of-practice
• Some solutions exist, both old and new
• But the variation cited above indicates that these are
not always adopted
• If we wait for laws and regulations, we won’t like
the outcome
• Cyber-physical is the domain upon which to focus
16
17
About the presenter: Neil Siegel, Ph.D., sector
vice-president & chief engineer at Northrop
Grumman, has been responsible for several of the
Nation’s most successful military systems, including
the Blue-Force Tracker, the Army’s first unmanned
air vehicle, and many others. He is a member of the
National Academy of Engineering, a Fellow of the
IEEE, the recipient of the prestigious Simon Ramo
Medal for systems engineering, the Army’s Order of
Saint Barbara, and other awards and honors.

More Related Content

What's hot

Supporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspectiveSupporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspectiveLen Bass
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - EngineeringRonald Bartels
 
Rework: Anticipating What May Go Wrong
Rework: Anticipating What May Go WrongRework: Anticipating What May Go Wrong
Rework: Anticipating What May Go Wrongpedlove
 
Critical Chain Basics
Critical Chain BasicsCritical Chain Basics
Critical Chain BasicsJakub Linhart
 
Continuous Engineering with IBM Rational RELM
Continuous Engineering with IBM Rational RELMContinuous Engineering with IBM Rational RELM
Continuous Engineering with IBM Rational RELMgjuljo
 
Network analysis-design-and-implementation-part-a2252
Network analysis-design-and-implementation-part-a2252Network analysis-design-and-implementation-part-a2252
Network analysis-design-and-implementation-part-a2252Michelle Quizon
 
Agile in an ANSI-748-C environment
Agile in an ANSI-748-C environmentAgile in an ANSI-748-C environment
Agile in an ANSI-748-C environmentGlen Alleman
 
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDevops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDrew Malone
 
Building Software In-House: Too Much Control and Flexibility
Building Software In-House: Too Much Control and FlexibilityBuilding Software In-House: Too Much Control and Flexibility
Building Software In-House: Too Much Control and FlexibilityIvan Ruchkin
 
Pc Order To Installation Cycle Time Reduction Display
Pc Order To Installation Cycle Time Reduction DisplayPc Order To Installation Cycle Time Reduction Display
Pc Order To Installation Cycle Time Reduction Displaywhayes2000
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperLori Witzel
 
Major Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperMajor Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperIan Heptinstall
 
Deliver Reliable Power Projects - Webinar June 16 2015
Deliver Reliable Power Projects - Webinar June 16 2015Deliver Reliable Power Projects - Webinar June 16 2015
Deliver Reliable Power Projects - Webinar June 16 2015Aconex
 
Effektives Consulting - Performance Engineering
Effektives Consulting - Performance EngineeringEffektives Consulting - Performance Engineering
Effektives Consulting - Performance Engineeringhitdhits
 

What's hot (20)

Supporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspectiveSupporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspective
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - Engineering
 
C24 Sandbox Insert
C24 Sandbox InsertC24 Sandbox Insert
C24 Sandbox Insert
 
Rework: Anticipating What May Go Wrong
Rework: Anticipating What May Go WrongRework: Anticipating What May Go Wrong
Rework: Anticipating What May Go Wrong
 
Technical Debt
Technical DebtTechnical Debt
Technical Debt
 
Critical Chain Basics
Critical Chain BasicsCritical Chain Basics
Critical Chain Basics
 
Continuous Engineering with IBM Rational RELM
Continuous Engineering with IBM Rational RELMContinuous Engineering with IBM Rational RELM
Continuous Engineering with IBM Rational RELM
 
Network analysis-design-and-implementation-part-a2252
Network analysis-design-and-implementation-part-a2252Network analysis-design-and-implementation-part-a2252
Network analysis-design-and-implementation-part-a2252
 
Agile in an ANSI-748-C environment
Agile in an ANSI-748-C environmentAgile in an ANSI-748-C environment
Agile in an ANSI-748-C environment
 
SECh123
SECh123SECh123
SECh123
 
An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)
 
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDevops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
 
Building Software In-House: Too Much Control and Flexibility
Building Software In-House: Too Much Control and FlexibilityBuilding Software In-House: Too Much Control and Flexibility
Building Software In-House: Too Much Control and Flexibility
 
Pc Order To Installation Cycle Time Reduction Display
Pc Order To Installation Cycle Time Reduction DisplayPc Order To Installation Cycle Time Reduction Display
Pc Order To Installation Cycle Time Reduction Display
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration Whitepaper
 
Distributed Development
Distributed DevelopmentDistributed Development
Distributed Development
 
SAD15 - Maintenance
SAD15 - MaintenanceSAD15 - Maintenance
SAD15 - Maintenance
 
Major Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperMajor Projects - Faster Better Cheaper
Major Projects - Faster Better Cheaper
 
Deliver Reliable Power Projects - Webinar June 16 2015
Deliver Reliable Power Projects - Webinar June 16 2015Deliver Reliable Power Projects - Webinar June 16 2015
Deliver Reliable Power Projects - Webinar June 16 2015
 
Effektives Consulting - Performance Engineering
Effektives Consulting - Performance EngineeringEffektives Consulting - Performance Engineering
Effektives Consulting - Performance Engineering
 

Viewers also liked

Getting to Know the Newly Mobile Senior Set
Getting to Know the Newly Mobile Senior SetGetting to Know the Newly Mobile Senior Set
Getting to Know the Newly Mobile Senior Setsachsinsights
 
Above the line below the line
Above the line below the lineAbove the line below the line
Above the line below the lineeduardoamezcua9
 
Linux Variability Anomalies: What Causes Them and How do They get Fixed?
Linux Variability Anomalies: What Causes Them and How do They get Fixed?Linux Variability Anomalies: What Causes Them and How do They get Fixed?
Linux Variability Anomalies: What Causes Them and How do They get Fixed?sarah_nadi
 
Olgc 3rd grade state fair
Olgc 3rd grade state fairOlgc 3rd grade state fair
Olgc 3rd grade state fairMotoko Lavallee
 
New Product Research: Uncommon Cancers
New Product Research: Uncommon CancersNew Product Research: Uncommon Cancers
New Product Research: Uncommon Cancerssachsinsights
 
Using Google Glass for Market Research
Using Google Glass for Market ResearchUsing Google Glass for Market Research
Using Google Glass for Market Researchsachsinsights
 
Tics en power
Tics en powerTics en power
Tics en powerjespu
 
Why Java Developers Struggle With Cryptography APIs?
Why Java Developers Struggle With Cryptography APIs?Why Java Developers Struggle With Cryptography APIs?
Why Java Developers Struggle With Cryptography APIs?sarah_nadi
 
A Study of Variability Spaces in Open Source Software
A Study of Variability Spaces in Open Source SoftwareA Study of Variability Spaces in Open Source Software
A Study of Variability Spaces in Open Source Softwaresarah_nadi
 
ζω γραφή μονο Photo
ζω γραφή μονο Photoζω γραφή μονο Photo
ζω γραφή μονο PhotoIoulia Kontopoulou
 
俳句コンテスト結果 (1)
俳句コンテスト結果 (1)俳句コンテスト結果 (1)
俳句コンテスト結果 (1)Motoko Lavallee
 
俳句コンテスト結果2
俳句コンテスト結果2俳句コンテスト結果2
俳句コンテスト結果2Motoko Lavallee
 

Viewers also liked (17)

On the road survey
On the road surveyOn the road survey
On the road survey
 
Getting to Know the Newly Mobile Senior Set
Getting to Know the Newly Mobile Senior SetGetting to Know the Newly Mobile Senior Set
Getting to Know the Newly Mobile Senior Set
 
Above the line below the line
Above the line below the lineAbove the line below the line
Above the line below the line
 
Linux Variability Anomalies: What Causes Them and How do They get Fixed?
Linux Variability Anomalies: What Causes Them and How do They get Fixed?Linux Variability Anomalies: What Causes Them and How do They get Fixed?
Linux Variability Anomalies: What Causes Them and How do They get Fixed?
 
Olgc 3rd grade state fair
Olgc 3rd grade state fairOlgc 3rd grade state fair
Olgc 3rd grade state fair
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
New Product Research: Uncommon Cancers
New Product Research: Uncommon CancersNew Product Research: Uncommon Cancers
New Product Research: Uncommon Cancers
 
Using Google Glass for Market Research
Using Google Glass for Market ResearchUsing Google Glass for Market Research
Using Google Glass for Market Research
 
Tics en power
Tics en powerTics en power
Tics en power
 
Why Java Developers Struggle With Cryptography APIs?
Why Java Developers Struggle With Cryptography APIs?Why Java Developers Struggle With Cryptography APIs?
Why Java Developers Struggle With Cryptography APIs?
 
A Study of Variability Spaces in Open Source Software
A Study of Variability Spaces in Open Source SoftwareA Study of Variability Spaces in Open Source Software
A Study of Variability Spaces in Open Source Software
 
Onward15
Onward15Onward15
Onward15
 
ζωγραφή Houlia 2
 ζωγραφή Houlia 2 ζωγραφή Houlia 2
ζωγραφή Houlia 2
 
ζω γραφή μονο Photo
ζω γραφή μονο Photoζω γραφή μονο Photo
ζω γραφή μονο Photo
 
Listening Skills
Listening SkillsListening Skills
Listening Skills
 
俳句コンテスト結果 (1)
俳句コンテスト結果 (1)俳句コンテスト結果 (1)
俳句コンテスト結果 (1)
 
俳句コンテスト結果2
俳句コンテスト結果2俳句コンテスト結果2
俳句コンテスト結果2
 

Similar to Siegel - keynote presentation, 18 may 2013

How to test a Mainframe Application
How to test a Mainframe ApplicationHow to test a Mainframe Application
How to test a Mainframe ApplicationMichael Erichsen
 
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016CGI
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional RequirementsYuriy Guts
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering MethodologiesNesrine Shokry
 
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsPerformance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsTechWell
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017Andrew Miller
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudSkytap Cloud
 
Adapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesAdapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesPrabhat Sinha
 
Embracing Failure - AzureDay Rome
Embracing Failure - AzureDay RomeEmbracing Failure - AzureDay Rome
Embracing Failure - AzureDay RomeAlberto Acerbis
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018Christophe Rochefolle
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science PlatformDecision Science Community
 
Site-Reliability-Engineering-v2[6241].pdf
Site-Reliability-Engineering-v2[6241].pdfSite-Reliability-Engineering-v2[6241].pdf
Site-Reliability-Engineering-v2[6241].pdfDeepakGupta747774
 
Successful_BC_Strategy.pdf
Successful_BC_Strategy.pdfSuccessful_BC_Strategy.pdf
Successful_BC_Strategy.pdfmykovalenko1
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidSteve Branam
 
Impact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top PracticesImpact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top PracticesBrian Petrini
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUniversity of the District of Columbia
 
How to Build a Platform Team
How to Build a Platform TeamHow to Build a Platform Team
How to Build a Platform TeamVMware Tanzu
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 

Similar to Siegel - keynote presentation, 18 may 2013 (20)

How to test a Mainframe Application
How to test a Mainframe ApplicationHow to test a Mainframe Application
How to test a Mainframe Application
 
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional Requirements
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering Methodologies
 
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsPerformance Testing Cloud-Based Systems
Performance Testing Cloud-Based Systems
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Adapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesAdapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored Processes
 
Embracing Failure - AzureDay Rome
Embracing Failure - AzureDay RomeEmbracing Failure - AzureDay Rome
Embracing Failure - AzureDay Rome
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science Platform
 
Site-Reliability-Engineering-v2[6241].pdf
Site-Reliability-Engineering-v2[6241].pdfSite-Reliability-Engineering-v2[6241].pdf
Site-Reliability-Engineering-v2[6241].pdf
 
Successful_BC_Strategy.pdf
Successful_BC_Strategy.pdfSuccessful_BC_Strategy.pdf
Successful_BC_Strategy.pdf
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
Impact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top PracticesImpact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top Practices
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
 
How to Build a Platform Team
How to Build a Platform TeamHow to Build a Platform Team
How to Build a Platform Team
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Siegel - keynote presentation, 18 may 2013

  • 1. The challenges of emerging software eco-systems 19 May 2013 Neil Siegel, Ph.D. Sector Vice-President & Chief Engineer, Northrop Grumman
  • 2. Bottom-line up front • New opportunities for software-intensive configurations are arriving on the market • Likely will be adopted quickly, and at large scale • There remains, however, a significant potential for unintended problems • Case studies • Let’s talk about our role in creating the fixes 2
  • 3. Emerging software eco-systems • Cloud, cyber-physical, and so forth • These constructs, together with the necessary tools, processes, training, reference design / design patterns, and so forth, can be considered new software “eco- systems” • By extending the range of societal problems that can be solved by software, these new eco- systems provide the opportunity to increase our value to society • Such complex structures exhibit emergent behavior • Obtaining this “1+1=3” is often the reason for interconnecting formerly-separate elements • There is, however, often unintended emergent behavior, some of which has adverse effects. • We need to take the lead in addressing these problems – only we have the expertise 3
  • 4. Case-studies (1 of 5) 1. Clients #1 & #2 – private cloud • 2 million to 20 million users per client, most of them public-facing • A smaller set of users (10%) do mission-critical functions • Customer believes that there is significant synergy by co-hosting public-facing and mission-critical capabilities • Observed result: the process to manage fine- grained access control is labor-intensive, and hence, too expensive and considered error- prone 4
  • 5. 2.Client #3 -- Transitioning an enterprise to a private cloud • > 100 separate mission applications, connected into complicated and time-critical mission threads. Each formerly on their own stand- alone computer. • Very large ingest rate • Transitioned to a private cloud. >80% decrease in hardware foot-print. Significant decrease in software SLOC count (every application formerly had its own infrastructure, etc.). Case-studies (2 of 5) 5
  • 6. 6 2.Client #3 -- Transitioning an enterprise to a private cloud • But . . . (a) could not re-code to a modern computer target some of the applications (re-certification considered too expensive, source code not available (!), etc.) (b) mission threading made the use of middleware appropriate; selected and ported most of the applications to a single middleware structure (c) most needed cyber-protection retrofits, and other modifications • The new system is realizing the desired benefits, preserved the mission timelines etc., but the transition process was material, and this was not well-understood by the client at the beginning of the process. Since the process was competitive, that was a real obstacle. Case-studies (2 of 5 – continued)
  • 7. 3.Client #4 -- Forensics • Capability hosted in a public cloud • Serious hacking attack • The client wants us to do analysis / forensics. There may be a need for law-enforcement participation. • We don’t have access to all of the same sort of information that we would if this were hosted on a dedicated mission computer in the client’s (or our own) facilities • It is not clear to what and how law enforcement can gain access . . . There is a complicated “stack” of participants, yet our client’s contract is only with the “top” of that stack Case-studies (3 of 5) 7
  • 8. 4.Client #5 – big-data • Customer “fell in love” with a commercial product that a vendor offered, and required us to implement the system using that product • It appears that at the high-end of the performance spectrum, there is an extreme performance sensitivity to specifics of the mission (often 10x or more). • Vendors either don’t understand this, or don’t like to acknowledge it . . . and work very hard to convince customers to choose their stuff. Case-studies (4 of 5) 8
  • 9. 9 4.Client #5 – big-data • In the end: • COTS product hit less than 10% of the promised performance • Customer brought in lots of other vendors to perform triage. Nothing worked. • Had eventually to throw it all away, and allow us to start all over, based on detailed mission engineering (which worked). • Not good for either the customer or the vendor! (nor us – a “Cassandra” effect) Case-studies (4 of 5 – continued)
  • 10. 5.Clients #6 & #7 – cyber-physical systems • Significant functional and convenience benefits of using digital systems to interconnect formerly- stand-alone capabilities • Significant (apparent) cost savings using internet to replace dedicated / bespoke control systems • But . . . a) reliability / available too low b) variance in port-to-port timing too high c) result is far too fragile, and too susceptible to a wide range of attacks – hooking things up to the internet creates new attack channels. Case-studies (5 of 5) 10
  • 11. Some of the lessons-learned from the case studies Cloud • Co-location of data increases the down-side of a potential spill • Fine-grained access control is labor-intensive • True enterprise transition can be quite labor- intensive • How to do forensics Big-data • Extreme performance sensitivity to mission specifics • How to test, when increasingly we cannot control the data we process Cyber-physical • Authentication • Built-in protection against unreasonable use • Socially-induced complexities • Too much variance • Reliability / availability far too low Reliability • In general, the MTBF for software stinks • People have pointed the way for a long time, but time-to-market and the quest for more functionality still drives design decisions 11
  • 12. Special discussion: Reliability / availability / capacity / port-to-port timing • I spent many years of my career as the designated “fix-it” person for problem programs • My findings: weak designs allowed too much unplanned dynamic behavior • Good at implementing the dynamic behavior they wanted . . . • . . . but weak at preventing other the dynamic behavior • Usually pretty good at implementing the functional and presentation requirements • But unplanned dynamic behavior resulted in low reliability / availability, poor MTBF, low capacity, high variance in port-to-port timing (including human response times) • I extended this to a more systematic study in (Siegel 2011) • Including a technique for designs that are effective at preventing unplanned dynamic behavior 12
  • 13. We now live in the middle of critical missions • Capers Jones’ data shows a huge range of software quality outcomes: 20x latent defects, and so forth • Consistent with other’s data, and confirmed by my own benchmarks (100x to 1,000x MTBF) • Yet it seems like time-to-market and the quest for functionality dominates decision-making • For example, typical software desktop / application MTBF: 10 hours • Modern commercial jetliner MTBF: >> 1,000,000 hours • Techniques to be better exist / have been proposed: • Model-driven design / development • Formal validation methodologies • Domain-specific languages (to reduce SLOC count) • And yet . . . they remain at the margins of most practice If we are going to be implementing critical missions – the next-generation power grid, advanced health care prognostics, self-driving cars, etc. – this is probably not good enough 13
  • 14. Cyber-physical • In my view, this is the high-leverage area in the near future • It is also the area of highest risk • Why: • Cyber vulnerabilities (my view: we must learn to build secure systems from insecure components) • Privacy breaches • Direct and obvious safety impacts • We have often focused on mean & peak performance / capacity / port-to-port timing, rather than on reducing variance • Failure to include built-in blocks against unreasonable use • The new environment limits our ability to control, or even understand, all of the data we will be asked to process 14 As we get into more consumer-facing / safety-critical missions, expectations will rise
  • 15. 15 An on-off switch Is expected to work 100% of the time A baseball player Is a huge success if he get a hit 30% of the time Expectations of our field • Achieve the benefits, but minimize the unintended adverse consequences • Our track-record is pretty good, but expectations are very high . . . and will get higher
  • 16. Summary • New software eco-systems offer us an enormous opportunity . . . • . . . that comes with increased exposure and public expectations • Significant down-side risks, and insufficient attention to mitigating them • Significant variation in the quality of outcomes; which indicates that we are not yet a mature field- of-practice • Some solutions exist, both old and new • But the variation cited above indicates that these are not always adopted • If we wait for laws and regulations, we won’t like the outcome • Cyber-physical is the domain upon which to focus 16
  • 17. 17 About the presenter: Neil Siegel, Ph.D., sector vice-president & chief engineer at Northrop Grumman, has been responsible for several of the Nation’s most successful military systems, including the Blue-Force Tracker, the Army’s first unmanned air vehicle, and many others. He is a member of the National Academy of Engineering, a Fellow of the IEEE, the recipient of the prestigious Simon Ramo Medal for systems engineering, the Army’s Order of Saint Barbara, and other awards and honors.