SlideShare una empresa de Scribd logo
1 de 31
CBAM (Cost Benefit Analysis Method)
Presented By
Asim Shahzad
MCS02121005
Agenda
CBAM, Cost Benefit Analysis Method.
Decision Making Context.
The Basics of CBAM.
CBAM Steps.
CBAM Outcomes and Strengths
Cost-Benefit Analysis Method (CBAM)
CBAM an architecture for analyzing the costs,

benefits and schedule implications of architectural
decisions.
ATAM (Architecture Trade-off Analysis Method)
considered the design decisions with respect to
architectural quality attributes like modifiability,
performance, availability, usability, and so on.
CBAM is different from the former method, it add the
costs (and implicit budgets or money) as quality
attributes.
Cont..
The biggest tradeoffs in large, complex systems

usually have to do with finance.
How should an organization invest its resources in a
manner that will maximize its gains and minimize its
risk?
“…perhaps more important than costs, are the
benefits than an architecture decision may bring to an
organization.”
CBAM provides an assessment of the technical and
economic issues and architectural decisions
Decision-Making Context
The CBAM does not make decisions for the stakeholders. It

simply aids in the documentation of the costs and benefits
analysis.
The

CBAM can aid the stakeholders in choosing
architectural strategies based on their return on investment
(ROI) – the ratio of benefit to cost.
Calculating ROI
R (ROI) = (B (Benefit) / C (Cost))*100
This can be used to determine the optimal order for

implementation the various strategies.

Investment= $2000
Benefit = $500
R (ROI)=(B(benefit)/C(cost))*100
R(ROI)=($500/$2000)*100= 25%
Context of CBAM
The Basis for the CBAM
Variations of Scenarios
 a way to strongly express and represent specific quality attributes

(performance, cost, trademark etc. )

Utility-Response
 Every incentive in a scenario provides some utility to the

stakeholders.

Priorities of Scenarios
 Different scenarios within a given system have different levels of

importance to the stakeholders and hence different utilities.
 To characterize the relative importance of each scenario, a weigh is
assigned through a two-step voting exercise.
The Basis for the CBAM {2}
Architectural Strategies
In order to move from the current

utility attribute response level to the
desired or even best-case level.
Side

Effects
Impact of the changes
The importance of Cost Modeling
“How do I convince my boss to investing in

availability ?”
Maintain high availability requires a high level of
redundancy(duplication) with a rollover capability
This takes time an personnel
Personnel cost money as do purchasing highly available

software and adapting it for particular needs

Cost models are imperfect for a wide variety of

reasons, but they are the only tools available to
constrain requirements.
The CBAM steps:
This section first describes the steps of the CBAM
and then explores how to quantify uncertainty
to aid in making decisions.
Iteration I: Establish an Initial
Ranking
In the first iteration of the CBAM, each step is executed
to establish an initial ranking that will then be refined
in the second iteration. These steps serve to reduce the
size of the decision space, refine the scenarios, collect
sufficient information for decision making, and
establish an initial ranking of ASs.
Step 1:
Collate scenarios
Collate the scenarios elicited during the ATAM
exercise, and allow stakeholders to contribute new
ones. Prioritize these scenarios based on satisfying the
business goals of the system and choose the top onethird for further study.
Step 2:
Refine scenarios
Refine the scenarios by focusing on their
stimulus/response measures. Elicit the worst, current,
desired, and best-case QA response level for each
scenario.
Step 3:
Prioritize scenarios
Allocate 100 votes to each stakeholder and have them
distribute the votes among the scenarios by considering
the desired response value for each scenario. Total the
votes and choose the top 50% of the scenarios for
further analysis. Assign a weight of 1.0 to the highest
rated scenario, and assign the other scenarios a weight
relative to that scenario. This becomes the scenario
weight that appears in the calculation of the overall
benefit of an AS. Make a list of the QAs that concern
the stakeholders
Step 4:
Assign utility.
Determine the utility for each QA response level
(worst-case, current, desired, or best-case) for all
scenarios. The QAs of concern are the ones in the list
generated in step
Step 5:
Develop ASs for scenarios and determine their
expected QA response levels.
Develop (or capture the already-developed) ASs that
address the top 50% of the scenarios chosen in step 3,
and determine the expected QA response levels that
will result from implementing these ASs. Given that an
AS may affect multiple scenarios, this calculation must
be performed for each affected scenario.
Step 6:
Determine the utility of the expected QA response
level by interpolation.
Using the elicited utility values (that form a utility
curve) determine the utility of the “expected” QA
response level. We perform this calculation for each
affected scenario.
Step 7:
Calculate the total benefit obtained from an AS.
Subtract the utility value of the “current” level from the
“expected” level and normalize it using the votes
elicited in step 3. Sum the benefit of a particular AS
across all scenarios and across all relevant QAs
Step 8
Choose ASs based on ROI, subject to cost and
schedule constraints.
Determine the cost and schedule implications of each
AS. Calculate the ROI value for each remaining AS as a
ratio of benefit to cost. Rank order the ASs according to
their ROI values, and choose the top ones until the
budget or schedule is exhausted.
Step 9:
Confirm the results with intuition.
Of the chosen ASs, consider whether these seem to
align with the organization’s business goals. If not,
consider issues that may have been overlooked during
the analysis. If significant issues exist, perform another
iteration of these steps.
AS (Architecture
strategies)
QA (Quality
Attribute)
Iteration II: Incorporating
Uncertainty
A more sophisticated and realistic version of the CBAM
can be created by expanding on the steps enumerated
above. Secondary information can be added about risk
estimation and uncertainty and the allocation of
development resources. Each category of secondary
information may potentially affect the investment
decisions under consideration. Therefore, the ways they
augment the steps of the method must be considered
carefully for correctness and for practicality
Iteration II: Incorporating
Uncertainty(cont.…)
Augmenting the Steps.
The CBAM relies on stakeholder judgments for its
valuations of software benefits and costs. But these
judgments will naturally be uncertain, due to
differences in beliefs and experiences. One way to think
rigorously about the uncertainty of the results collected
in Iteration I is to collect and consider the risks
inherent in the estimates that have been made. To do
this, some kind of risk assessment exercise must be
performed. The risks typically fall into these four
categories.
Cont.….
Risks that affect the cost estimate of a strategy
under consideration
2. Risks that affect a stimulus-response characteristic
or a utility estimate of a strategy in the context of a
scenario.
3. Risks that affect stimulus-response characteristics
of other scenarios or QAs not previously considered.
These risks pertain to the side effects (rather than
the intended effects) of an AS.
1.
Cont.….
4. Risks that are related to project management and

schedule
CBAM Outcomes and Strengths
solving a problem in theory is very different from
solving one in practice.
The method provides values as a basis for a rational

decision making process in applying certain
architectural strategies
The method provides a business measure that can
determine the level of return on investment of a
particular change to the system.
Cont.…
The method will help organizations in analyzing and

pre-evaluating the resource investment in different
directions by adopting those architectural strategies
that are maximizing the gains and minimize the risks.
CBAM tells us that giving people the appropriate
tools to frame and structure their decision-making
process in relation to costs and benefits and
encouraging the right kind of dialogue among the
stakeholders are beneficial to the development of the
soft-ware system.
Questions??
CBAM Cost-Benefit Analysis Method Explained

Más contenido relacionado

La actualidad más candente

Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5Sudarshan Dhondaley
 
Chapter 15 software product metrics
Chapter 15 software product metricsChapter 15 software product metrics
Chapter 15 software product metricsSHREEHARI WADAWADAGI
 
Software architecture Unit 1 notes
Software architecture Unit 1 notesSoftware architecture Unit 1 notes
Software architecture Unit 1 notesSudarshan Dhondaley
 
Analysis modeling & scenario based modeling
Analysis modeling &  scenario based modeling Analysis modeling &  scenario based modeling
Analysis modeling & scenario based modeling Benazir Fathima
 
Building systems from off the shelf components
Building systems from off the shelf componentsBuilding systems from off the shelf components
Building systems from off the shelf componentsHimanshu
 
System engineering
System engineeringSystem engineering
System engineeringLisa Elisa
 
Software Architecture: Design Decisions
Software Architecture: Design DecisionsSoftware Architecture: Design Decisions
Software Architecture: Design DecisionsHenry Muccini
 
Reconstructing Software Architecture
Reconstructing Software ArchitectureReconstructing Software Architecture
Reconstructing Software ArchitectureHimanshu
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSAshita Agrawal
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsGatte Ravindranath
 
Model Based Software Architectures
Model Based Software ArchitecturesModel Based Software Architectures
Model Based Software ArchitecturesMunazza-Mah-Jabeen
 
Architecture business cycle ( abc )
Architecture business cycle ( abc )Architecture business cycle ( abc )
Architecture business cycle ( abc )Dr Reeja S R
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design pptfarazimlak
 
Architectural styles and patterns
Architectural styles and patternsArchitectural styles and patterns
Architectural styles and patternsHimanshu
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 

La actualidad más candente (20)

Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5
 
Chapter 15 software product metrics
Chapter 15 software product metricsChapter 15 software product metrics
Chapter 15 software product metrics
 
Software architecture Unit 1 notes
Software architecture Unit 1 notesSoftware architecture Unit 1 notes
Software architecture Unit 1 notes
 
Analysis modeling & scenario based modeling
Analysis modeling &  scenario based modeling Analysis modeling &  scenario based modeling
Analysis modeling & scenario based modeling
 
Taxonomy for bugs
Taxonomy for bugsTaxonomy for bugs
Taxonomy for bugs
 
Building systems from off the shelf components
Building systems from off the shelf componentsBuilding systems from off the shelf components
Building systems from off the shelf components
 
System engineering
System engineeringSystem engineering
System engineering
 
Software Architecture: Design Decisions
Software Architecture: Design DecisionsSoftware Architecture: Design Decisions
Software Architecture: Design Decisions
 
Reconstructing Software Architecture
Reconstructing Software ArchitectureReconstructing Software Architecture
Reconstructing Software Architecture
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
 
Uml Common Mechanism
Uml Common MechanismUml Common Mechanism
Uml Common Mechanism
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML Designing
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design Patterns
 
Model Based Software Architectures
Model Based Software ArchitecturesModel Based Software Architectures
Model Based Software Architectures
 
Checkpoints of the Process
Checkpoints of the ProcessCheckpoints of the Process
Checkpoints of the Process
 
Architecture business cycle ( abc )
Architecture business cycle ( abc )Architecture business cycle ( abc )
Architecture business cycle ( abc )
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design ppt
 
Architectural styles and patterns
Architectural styles and patternsArchitectural styles and patterns
Architectural styles and patterns
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 

Destacado

Reliability and its principals
Reliability and its principalsReliability and its principals
Reliability and its principalsHimanshu
 
Structural and functional testing
Structural and functional testingStructural and functional testing
Structural and functional testingHimanshu
 
Architecture Review
Architecture ReviewArchitecture Review
Architecture ReviewHimanshu
 
Software reliability tools and common software errors
Software reliability tools and common software errorsSoftware reliability tools and common software errors
Software reliability tools and common software errorsHimanshu
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousingHimanshu
 
Importance of software architecture
Importance of software architectureImportance of software architecture
Importance of software architectureHimanshu
 
Structural patterns
Structural patternsStructural patterns
Structural patternsHimanshu
 
Software archiecture lecture07
Software archiecture   lecture07Software archiecture   lecture07
Software archiecture lecture07Luktalja
 

Destacado (10)

Reliability and its principals
Reliability and its principalsReliability and its principals
Reliability and its principals
 
Structural and functional testing
Structural and functional testingStructural and functional testing
Structural and functional testing
 
Architecture Review
Architecture ReviewArchitecture Review
Architecture Review
 
Software reliability tools and common software errors
Software reliability tools and common software errorsSoftware reliability tools and common software errors
Software reliability tools and common software errors
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousing
 
Abc
AbcAbc
Abc
 
Saam
SaamSaam
Saam
 
Importance of software architecture
Importance of software architectureImportance of software architecture
Importance of software architecture
 
Structural patterns
Structural patternsStructural patterns
Structural patterns
 
Software archiecture lecture07
Software archiecture   lecture07Software archiecture   lecture07
Software archiecture lecture07
 

Similar a CBAM Cost-Benefit Analysis Method Explained

Cost-Benefit Analysis
Cost-Benefit AnalysisCost-Benefit Analysis
Cost-Benefit AnalysisSakshi Sharma
 
Making Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI AdoptionMaking Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI Adoptionrhefner
 
Return on-investment (roi)
Return on-investment (roi)Return on-investment (roi)
Return on-investment (roi)RSasirekha
 
Agile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value ManagementAgile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value ManagementGlen Alleman
 
Pm0016 project risk management
Pm0016  project risk managementPm0016  project risk management
Pm0016 project risk managementsmumbahelp
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentErik De Monte
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docxcherishwinsland
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost managementsmumbahelp
 
Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentMayank Johri
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.pptMaanbahadurkhadka
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfVinoth Kumar
 
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...IOSR Journals
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxchristinemaritza
 
SYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNSYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNVictorJames21
 

Similar a CBAM Cost-Benefit Analysis Method Explained (20)

IM426 3A G5.ppt
IM426 3A G5.pptIM426 3A G5.ppt
IM426 3A G5.ppt
 
Spm unit2
Spm unit2Spm unit2
Spm unit2
 
Cost-Benefit Analysis
Cost-Benefit AnalysisCost-Benefit Analysis
Cost-Benefit Analysis
 
Quality - An Introduction-170715
Quality - An Introduction-170715Quality - An Introduction-170715
Quality - An Introduction-170715
 
Making Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI AdoptionMaking Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI Adoption
 
Return on-investment (roi)
Return on-investment (roi)Return on-investment (roi)
Return on-investment (roi)
 
Agile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value ManagementAgile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value Management
 
Pm0016 project risk management
Pm0016  project risk managementPm0016  project risk management
Pm0016 project risk management
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docx
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost management
 
Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk Assessment
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
 
Feasibility_Study
Feasibility_StudyFeasibility_Study
Feasibility_Study
 
Savi chapter9
Savi chapter9Savi chapter9
Savi chapter9
 
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docx
 
Ch09
Ch09Ch09
Ch09
 
SYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNSYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGN
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

CBAM Cost-Benefit Analysis Method Explained

  • 1.
  • 2. CBAM (Cost Benefit Analysis Method) Presented By Asim Shahzad MCS02121005
  • 3. Agenda CBAM, Cost Benefit Analysis Method. Decision Making Context. The Basics of CBAM. CBAM Steps. CBAM Outcomes and Strengths
  • 4. Cost-Benefit Analysis Method (CBAM) CBAM an architecture for analyzing the costs, benefits and schedule implications of architectural decisions. ATAM (Architecture Trade-off Analysis Method) considered the design decisions with respect to architectural quality attributes like modifiability, performance, availability, usability, and so on. CBAM is different from the former method, it add the costs (and implicit budgets or money) as quality attributes.
  • 5. Cont.. The biggest tradeoffs in large, complex systems usually have to do with finance. How should an organization invest its resources in a manner that will maximize its gains and minimize its risk? “…perhaps more important than costs, are the benefits than an architecture decision may bring to an organization.” CBAM provides an assessment of the technical and economic issues and architectural decisions
  • 6. Decision-Making Context The CBAM does not make decisions for the stakeholders. It simply aids in the documentation of the costs and benefits analysis. The CBAM can aid the stakeholders in choosing architectural strategies based on their return on investment (ROI) – the ratio of benefit to cost.
  • 7. Calculating ROI R (ROI) = (B (Benefit) / C (Cost))*100 This can be used to determine the optimal order for implementation the various strategies. Investment= $2000 Benefit = $500 R (ROI)=(B(benefit)/C(cost))*100 R(ROI)=($500/$2000)*100= 25%
  • 9. The Basis for the CBAM Variations of Scenarios  a way to strongly express and represent specific quality attributes (performance, cost, trademark etc. ) Utility-Response  Every incentive in a scenario provides some utility to the stakeholders. Priorities of Scenarios  Different scenarios within a given system have different levels of importance to the stakeholders and hence different utilities.  To characterize the relative importance of each scenario, a weigh is assigned through a two-step voting exercise.
  • 10. The Basis for the CBAM {2} Architectural Strategies In order to move from the current utility attribute response level to the desired or even best-case level. Side Effects Impact of the changes
  • 11. The importance of Cost Modeling “How do I convince my boss to investing in availability ?” Maintain high availability requires a high level of redundancy(duplication) with a rollover capability This takes time an personnel Personnel cost money as do purchasing highly available software and adapting it for particular needs Cost models are imperfect for a wide variety of reasons, but they are the only tools available to constrain requirements.
  • 12. The CBAM steps: This section first describes the steps of the CBAM and then explores how to quantify uncertainty to aid in making decisions.
  • 13. Iteration I: Establish an Initial Ranking In the first iteration of the CBAM, each step is executed to establish an initial ranking that will then be refined in the second iteration. These steps serve to reduce the size of the decision space, refine the scenarios, collect sufficient information for decision making, and establish an initial ranking of ASs.
  • 14. Step 1: Collate scenarios Collate the scenarios elicited during the ATAM exercise, and allow stakeholders to contribute new ones. Prioritize these scenarios based on satisfying the business goals of the system and choose the top onethird for further study.
  • 15. Step 2: Refine scenarios Refine the scenarios by focusing on their stimulus/response measures. Elicit the worst, current, desired, and best-case QA response level for each scenario.
  • 16. Step 3: Prioritize scenarios Allocate 100 votes to each stakeholder and have them distribute the votes among the scenarios by considering the desired response value for each scenario. Total the votes and choose the top 50% of the scenarios for further analysis. Assign a weight of 1.0 to the highest rated scenario, and assign the other scenarios a weight relative to that scenario. This becomes the scenario weight that appears in the calculation of the overall benefit of an AS. Make a list of the QAs that concern the stakeholders
  • 17. Step 4: Assign utility. Determine the utility for each QA response level (worst-case, current, desired, or best-case) for all scenarios. The QAs of concern are the ones in the list generated in step
  • 18. Step 5: Develop ASs for scenarios and determine their expected QA response levels. Develop (or capture the already-developed) ASs that address the top 50% of the scenarios chosen in step 3, and determine the expected QA response levels that will result from implementing these ASs. Given that an AS may affect multiple scenarios, this calculation must be performed for each affected scenario.
  • 19. Step 6: Determine the utility of the expected QA response level by interpolation. Using the elicited utility values (that form a utility curve) determine the utility of the “expected” QA response level. We perform this calculation for each affected scenario.
  • 20. Step 7: Calculate the total benefit obtained from an AS. Subtract the utility value of the “current” level from the “expected” level and normalize it using the votes elicited in step 3. Sum the benefit of a particular AS across all scenarios and across all relevant QAs
  • 21. Step 8 Choose ASs based on ROI, subject to cost and schedule constraints. Determine the cost and schedule implications of each AS. Calculate the ROI value for each remaining AS as a ratio of benefit to cost. Rank order the ASs according to their ROI values, and choose the top ones until the budget or schedule is exhausted.
  • 22. Step 9: Confirm the results with intuition. Of the chosen ASs, consider whether these seem to align with the organization’s business goals. If not, consider issues that may have been overlooked during the analysis. If significant issues exist, perform another iteration of these steps.
  • 24. Iteration II: Incorporating Uncertainty A more sophisticated and realistic version of the CBAM can be created by expanding on the steps enumerated above. Secondary information can be added about risk estimation and uncertainty and the allocation of development resources. Each category of secondary information may potentially affect the investment decisions under consideration. Therefore, the ways they augment the steps of the method must be considered carefully for correctness and for practicality
  • 25. Iteration II: Incorporating Uncertainty(cont.…) Augmenting the Steps. The CBAM relies on stakeholder judgments for its valuations of software benefits and costs. But these judgments will naturally be uncertain, due to differences in beliefs and experiences. One way to think rigorously about the uncertainty of the results collected in Iteration I is to collect and consider the risks inherent in the estimates that have been made. To do this, some kind of risk assessment exercise must be performed. The risks typically fall into these four categories.
  • 26. Cont.…. Risks that affect the cost estimate of a strategy under consideration 2. Risks that affect a stimulus-response characteristic or a utility estimate of a strategy in the context of a scenario. 3. Risks that affect stimulus-response characteristics of other scenarios or QAs not previously considered. These risks pertain to the side effects (rather than the intended effects) of an AS. 1.
  • 27. Cont.…. 4. Risks that are related to project management and schedule
  • 28. CBAM Outcomes and Strengths solving a problem in theory is very different from solving one in practice. The method provides values as a basis for a rational decision making process in applying certain architectural strategies The method provides a business measure that can determine the level of return on investment of a particular change to the system.
  • 29. Cont.… The method will help organizations in analyzing and pre-evaluating the resource investment in different directions by adopting those architectural strategies that are maximizing the gains and minimize the risks. CBAM tells us that giving people the appropriate tools to frame and structure their decision-making process in relation to costs and benefits and encouraging the right kind of dialogue among the stakeholders are beneficial to the development of the soft-ware system.

Notas del editor

  1. To earn profit of $50000000 in the year. To open 20 branches all over the world till 2020. Predictive Analysis, Security Method