SlideShare una empresa de Scribd logo
1 de 5
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY
MALAYSIA UNIVERSITY OF SCIENCE AND TECHNOLOGY
SESSION 2012/2013
COURSE : SOFTWARE ARCHITECTURE
COURSE CODE : MIT520
STUDENT NAME : YUDEP APOI
LECTURE NAME : DR. SELLAPPAN PALLANIAPAN
ASSIGNMENT 1 (20%) DUE DATE: 30 NOV. 2012
Retrieve one article (paper) on software design/architecture from any journal, conference
proceedings or Website. Critique the article, highlighting how the design/architecture has
addressed the non-functional requirements of the system such as performance, scalability,
security, availability and maintainability.
MALAYSIA UNIVERSITY of
SCIENCE and TECHNOLOGY
CONFIDENTIAL
Critique on Risks and Challenges of Component-Based Software Development
Introduction:
Title: Risks and Challenges of Component Based Software Development
Author: Yudep Apoi
Journal info: Communications of the ACM, August 2003/vol.46,No.8
Summary:
In this article, author explain that the risks and challenges of the Component-Based Software
Development (CBSD) process. Overall, component developers, application assemblers, and
customers must know all CBSD advantages and disadvantages before developing
components and component-based applications to get maximum benefits from it.
The author mention that, practitioners identify the following key CBSD advantages in future
software development efforts:
 Reduced Lead Time: Complete applications can be built from existing pool of
components. So that one need not fear of developing incomplete applications due to
lack of a specific component.
 Leveraged Cost: As the components developed can be reused in various applications
the cost of developing various individual components can be minimized.
 Enhanced quality: The strengths and faults of the components are pre known as they
are used in many different applications. So quality of the developing applications can
be enhanced.
 Easy Maintenance: Old components can be replaced with new components for
increased performance.
CBSD encompasses three primary types of stakeholders, which are component developers,
application assemblers, and customers.
Developers
A developer encounters certain risks and challenges in developing components, managing
component-development projects, and subsequently marketing the components. Developers
must identify business areas or domains that would generate enough yields to justify
component development. Developers must adapt to changes in the domain once the
components are fabricated. Developers must also determine the optimal way to fragment the
domain into a cohesive set of component. In managing component-development projects, a
developer must monitor each component from inception to delivery. Developers must also
assess how often to release components and how to inform clients, or assemblers, of new
versions. Before embarking on component-development projects, a developer must conduct
cost-benefit analyses to determine whether to accept a client, or assembler, and contract or
construct components for the mass market. Developers must address security issues to
alleviate client concerns about possible hacker-prone, corrupt, or virus-infected components
as well.
Assembler
Assembler risks and challenges primarily concern the assembly of components in
applications, the management of component-based application assembly projects, and the
uncertainties of the component market. Some crucial challenges in assembling component-
based applications that match user requirements include matching system requirement
specifications, demarcating the requirements document into smaller subsets, and confirming
the overall selected component set. Assemblers must deal with the lack of visibility into the
component-development process.
Customers
Customers face both risks and challenges in using component-based applications to meet
their enterprise requirements, as well as in managing their component-based and legacy
application systems and in achieving and sustaining strategic competitive advantage over
their rivals. One key risk involves whether a system is capable of satisfying customer
requirements. Customers face additional risks, as application quality (or lack of quality)
based on component quality hinders their ability to carry out key business activities. Each
customer faces risks in managing its repertoire of component-based applications. Customer
must assess which projects are more suitable for CBSD. As assemblers increasingly depend
on components developed by developers and customers depend on applications assembled by
assemblers, these risks and challenges propagate from one stakeholder to another. Risks faced
by one stakeholder are transferred to the next, ultimately constraining each customer’s ability
to leverage component technology in developing its application systems. While CBSD helps
overcome inadequacies in traditional development, it also poses risks to the profitability and
even long-term survival of each of its stakeholders. Before embarking on component-based
development projects, each stakeholder must assess its risks and devise sound strategies to
address them.
Strength:
The explanations by author clearly stated and its help the software manger to make a better
decision based on the explanations. It is also can be a guide for the three stakeholders’ with
risks and challenges, and what they should do.
This paper explains well about three stakeholders with risks and challenges, and what they
should do. Cost analysis can be made before hand which avoids running in troubles later.
Customers will be able to judge and take right decisions.
Weakness:
Component developers seem to make some useless components as seen in Figure 1, and
assemblers seem to gather some components they need. Developers develop components,
which are the first step of project process by CBSD. Of course, component repositories can
become obsolete because of poor planning or unfavorable industry trends. However,
developers try to reduce that kind of problems with better planning and modeling. Security
and privacy issues should be clearly addressed. Responsibility should also be taken in case of
failure of the component. Assemblers need to search for different repositories for a specific
component. Search cost should also be considered. Trust of the source from where the
component selected is also an important issue.
Critical Comments & Questions:
1. During the estimation cost of the development, are the obsolete component supposed to
be added?
2. Should developers and assemblers working together to reduce the obsolete component
and developer’s efforts?
3. To identify the project that suitable for CBSD do all customers need to know about
CBSD? If yes, what if they don’t know about CBSD?
4. How will the developer know which metric is to be selected in the contract before
marketing as it cannot be judged beforehand?
Interesting Points:
I am still developing the project using traditional methodology such as Software
Development Life-Cycle (SDLC) and Spiral Model. I would like to follow this method
another day in the future if I have a chance.
Suggestion:
To get the overview of the risks involved I suggest strongly that one should read this paper
before investing on development of any critical component or CBSD projects.

Más contenido relacionado

La actualidad más candente

Defect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect OriginDefect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect Origin
ijseajournal
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
Ammar Shafiq
 
Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4
Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4
Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4
Kedar Sapre
 

La actualidad más candente (20)

Embedded Design
Embedded Design Embedded Design
Embedded Design
 
Defect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect OriginDefect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect Origin
 
Planning the development process
Planning the development processPlanning the development process
Planning the development process
 
An outline of my c
An outline of my cAn outline of my c
An outline of my c
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
 
Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4
Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4
Prakat_Whitepaper_Accessibility_Unit_FrameworkV1.4
 
Software quality
Software qualitySoftware quality
Software quality
 
final (2)
final (2)final (2)
final (2)
 
Software Engineering Past Papers Notes
Software Engineering Past Papers Notes Software Engineering Past Papers Notes
Software Engineering Past Papers Notes
 
Vivek_MK
Vivek_MKVivek_MK
Vivek_MK
 
SE2_Lec 18_ Coding
SE2_Lec 18_ CodingSE2_Lec 18_ Coding
SE2_Lec 18_ Coding
 
Hci In The Software Process
Hci In The Software ProcessHci In The Software Process
Hci In The Software Process
 
Hci in software process
Hci in software processHci in software process
Hci in software process
 
Lesson 8...Question Part 2
Lesson 8...Question Part 2Lesson 8...Question Part 2
Lesson 8...Question Part 2
 
Resume
ResumeResume
Resume
 
Software developer
Software developerSoftware developer
Software developer
 
Process Improvement for better Software Technical Quality under Global Crisis...
Process Improvement for better Software Technical Quality under Global Crisis...Process Improvement for better Software Technical Quality under Global Crisis...
Process Improvement for better Software Technical Quality under Global Crisis...
 
Slides chapter 1
Slides chapter 1Slides chapter 1
Slides chapter 1
 
Software Engineering Diversity
Software Engineering DiversitySoftware Engineering Diversity
Software Engineering Diversity
 
job job
job jobjob job
job job
 

Destacado

Sample Call Center Hierarchy 8.13.07
Sample Call Center Hierarchy 8.13.07Sample Call Center Hierarchy 8.13.07
Sample Call Center Hierarchy 8.13.07
thecallcenterpro
 

Destacado (9)

Intranet (leave management module) admin
Intranet (leave management module) adminIntranet (leave management module) admin
Intranet (leave management module) admin
 
Intranet (callback module)
Intranet (callback module)Intranet (callback module)
Intranet (callback module)
 
Metrics for Call Center
Metrics for Call CenterMetrics for Call Center
Metrics for Call Center
 
Sample Call Center Hierarchy 8.13.07
Sample Call Center Hierarchy 8.13.07Sample Call Center Hierarchy 8.13.07
Sample Call Center Hierarchy 8.13.07
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
 
Workplace etiquette & manners
Workplace etiquette & mannersWorkplace etiquette & manners
Workplace etiquette & manners
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
 
Example Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow DiagramExample Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow Diagram
 
Office Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationOffice Etiquette PowerPoint Presentation
Office Etiquette PowerPoint Presentation
 

Similar a MIT520 software architecture assignments (2012) - 1

Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
iaemedu
 
A New Model for Study of Quality Attributes to Components Based Development A...
A New Model for Study of Quality Attributes to Components Based Development A...A New Model for Study of Quality Attributes to Components Based Development A...
A New Model for Study of Quality Attributes to Components Based Development A...
Kiogyf
 
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdfSystems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
aniyathikitchen
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
CruzIbarra161
 

Similar a MIT520 software architecture assignments (2012) - 1 (20)

Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
Mi0033 software engineering
Mi0033   software engineeringMi0033   software engineering
Mi0033 software engineering
 
Software Engineering (Short & Long Questions)
Software Engineering (Short & Long Questions)Software Engineering (Short & Long Questions)
Software Engineering (Short & Long Questions)
 
A New Model for Study of Quality Attributes to Components Based Development A...
A New Model for Study of Quality Attributes to Components Based Development A...A New Model for Study of Quality Attributes to Components Based Development A...
A New Model for Study of Quality Attributes to Components Based Development A...
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdfSystems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Lect3 conventional vs modern spm
Lect3 conventional vs modern spmLect3 conventional vs modern spm
Lect3 conventional vs modern spm
 
Software Development Today Everything You Need To Know.pdf
Software Development Today Everything You Need To Know.pdfSoftware Development Today Everything You Need To Know.pdf
Software Development Today Everything You Need To Know.pdf
 
SE-Lecture-4.pptx
SE-Lecture-4.pptxSE-Lecture-4.pptx
SE-Lecture-4.pptx
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
DELIVER QUALITY SOFTWARE PRODUCTS BY FOLLOWING SIMPLE STEPS
DELIVER QUALITY SOFTWARE PRODUCTS BY FOLLOWING SIMPLE STEPSDELIVER QUALITY SOFTWARE PRODUCTS BY FOLLOWING SIMPLE STEPS
DELIVER QUALITY SOFTWARE PRODUCTS BY FOLLOWING SIMPLE STEPS
 
Ijetcas14 545
Ijetcas14 545Ijetcas14 545
Ijetcas14 545
 
lecture 1-5.pdf
lecture 1-5.pdflecture 1-5.pdf
lecture 1-5.pdf
 
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptxSOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
 
IRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLCIRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLC
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
SE-Lecture-2.pptx
SE-Lecture-2.pptxSE-Lecture-2.pptx
SE-Lecture-2.pptx
 
1.Basic Introduction (1).ppt
1.Basic Introduction (1).ppt1.Basic Introduction (1).ppt
1.Basic Introduction (1).ppt
 

Más de Yudep Apoi (7)

Amalan Pertanian Yang Baik Untuk Penanaman Lada
Amalan Pertanian Yang Baik Untuk Penanaman LadaAmalan Pertanian Yang Baik Untuk Penanaman Lada
Amalan Pertanian Yang Baik Untuk Penanaman Lada
 
RHB SE User Manual Draft
RHB SE User Manual DraftRHB SE User Manual Draft
RHB SE User Manual Draft
 
Steps how to create active x using visual studio 2008
Steps how to create active x using visual studio 2008Steps how to create active x using visual studio 2008
Steps how to create active x using visual studio 2008
 
Web aggregation and mashup with kapow mashup server
Web aggregation and mashup with kapow mashup serverWeb aggregation and mashup with kapow mashup server
Web aggregation and mashup with kapow mashup server
 
MIT521 software testing (2012) v2
MIT521   software testing  (2012) v2MIT521   software testing  (2012) v2
MIT521 software testing (2012) v2
 
Intranet (hiring module)
Intranet (hiring module)Intranet (hiring module)
Intranet (hiring module)
 
Intranet (attendance module)
Intranet (attendance module)Intranet (attendance module)
Intranet (attendance module)
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

MIT520 software architecture assignments (2012) - 1

  • 1. MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MALAYSIA UNIVERSITY OF SCIENCE AND TECHNOLOGY SESSION 2012/2013 COURSE : SOFTWARE ARCHITECTURE COURSE CODE : MIT520 STUDENT NAME : YUDEP APOI LECTURE NAME : DR. SELLAPPAN PALLANIAPAN ASSIGNMENT 1 (20%) DUE DATE: 30 NOV. 2012 Retrieve one article (paper) on software design/architecture from any journal, conference proceedings or Website. Critique the article, highlighting how the design/architecture has addressed the non-functional requirements of the system such as performance, scalability, security, availability and maintainability. MALAYSIA UNIVERSITY of SCIENCE and TECHNOLOGY CONFIDENTIAL
  • 2. Critique on Risks and Challenges of Component-Based Software Development Introduction: Title: Risks and Challenges of Component Based Software Development Author: Yudep Apoi Journal info: Communications of the ACM, August 2003/vol.46,No.8 Summary: In this article, author explain that the risks and challenges of the Component-Based Software Development (CBSD) process. Overall, component developers, application assemblers, and customers must know all CBSD advantages and disadvantages before developing components and component-based applications to get maximum benefits from it. The author mention that, practitioners identify the following key CBSD advantages in future software development efforts:  Reduced Lead Time: Complete applications can be built from existing pool of components. So that one need not fear of developing incomplete applications due to lack of a specific component.  Leveraged Cost: As the components developed can be reused in various applications the cost of developing various individual components can be minimized.  Enhanced quality: The strengths and faults of the components are pre known as they are used in many different applications. So quality of the developing applications can be enhanced.  Easy Maintenance: Old components can be replaced with new components for increased performance. CBSD encompasses three primary types of stakeholders, which are component developers, application assemblers, and customers.
  • 3. Developers A developer encounters certain risks and challenges in developing components, managing component-development projects, and subsequently marketing the components. Developers must identify business areas or domains that would generate enough yields to justify component development. Developers must adapt to changes in the domain once the components are fabricated. Developers must also determine the optimal way to fragment the domain into a cohesive set of component. In managing component-development projects, a developer must monitor each component from inception to delivery. Developers must also assess how often to release components and how to inform clients, or assemblers, of new versions. Before embarking on component-development projects, a developer must conduct cost-benefit analyses to determine whether to accept a client, or assembler, and contract or construct components for the mass market. Developers must address security issues to alleviate client concerns about possible hacker-prone, corrupt, or virus-infected components as well. Assembler Assembler risks and challenges primarily concern the assembly of components in applications, the management of component-based application assembly projects, and the uncertainties of the component market. Some crucial challenges in assembling component- based applications that match user requirements include matching system requirement specifications, demarcating the requirements document into smaller subsets, and confirming the overall selected component set. Assemblers must deal with the lack of visibility into the component-development process. Customers Customers face both risks and challenges in using component-based applications to meet their enterprise requirements, as well as in managing their component-based and legacy application systems and in achieving and sustaining strategic competitive advantage over their rivals. One key risk involves whether a system is capable of satisfying customer requirements. Customers face additional risks, as application quality (or lack of quality) based on component quality hinders their ability to carry out key business activities. Each customer faces risks in managing its repertoire of component-based applications. Customer must assess which projects are more suitable for CBSD. As assemblers increasingly depend on components developed by developers and customers depend on applications assembled by
  • 4. assemblers, these risks and challenges propagate from one stakeholder to another. Risks faced by one stakeholder are transferred to the next, ultimately constraining each customer’s ability to leverage component technology in developing its application systems. While CBSD helps overcome inadequacies in traditional development, it also poses risks to the profitability and even long-term survival of each of its stakeholders. Before embarking on component-based development projects, each stakeholder must assess its risks and devise sound strategies to address them. Strength: The explanations by author clearly stated and its help the software manger to make a better decision based on the explanations. It is also can be a guide for the three stakeholders’ with risks and challenges, and what they should do. This paper explains well about three stakeholders with risks and challenges, and what they should do. Cost analysis can be made before hand which avoids running in troubles later. Customers will be able to judge and take right decisions. Weakness: Component developers seem to make some useless components as seen in Figure 1, and assemblers seem to gather some components they need. Developers develop components, which are the first step of project process by CBSD. Of course, component repositories can become obsolete because of poor planning or unfavorable industry trends. However, developers try to reduce that kind of problems with better planning and modeling. Security and privacy issues should be clearly addressed. Responsibility should also be taken in case of failure of the component. Assemblers need to search for different repositories for a specific component. Search cost should also be considered. Trust of the source from where the component selected is also an important issue. Critical Comments & Questions: 1. During the estimation cost of the development, are the obsolete component supposed to be added? 2. Should developers and assemblers working together to reduce the obsolete component and developer’s efforts?
  • 5. 3. To identify the project that suitable for CBSD do all customers need to know about CBSD? If yes, what if they don’t know about CBSD? 4. How will the developer know which metric is to be selected in the contract before marketing as it cannot be judged beforehand? Interesting Points: I am still developing the project using traditional methodology such as Software Development Life-Cycle (SDLC) and Spiral Model. I would like to follow this method another day in the future if I have a chance. Suggestion: To get the overview of the risks involved I suggest strongly that one should read this paper before investing on development of any critical component or CBSD projects.