SlideShare una empresa de Scribd logo
1 de 5
Software
architecture
Foyzul Karim
Overview
Project
scope
Production
scope
Next : Design a ride sharing system

Más contenido relacionado

La actualidad más candente

Presentasi Informatika BAB 5 Jaringan Komputer dan Internet
Presentasi Informatika BAB 5 Jaringan Komputer dan InternetPresentasi Informatika BAB 5 Jaringan Komputer dan Internet
Presentasi Informatika BAB 5 Jaringan Komputer dan InternetMemesByMasAgus
 
Maksud komputer dan jenis komputer
Maksud komputer dan jenis komputerMaksud komputer dan jenis komputer
Maksud komputer dan jenis komputerismailbadri4
 
Bab 3 Informatika - Teknologi, Informasi, dan Komunikasi
Bab 3 Informatika - Teknologi, Informasi, dan KomunikasiBab 3 Informatika - Teknologi, Informasi, dan Komunikasi
Bab 3 Informatika - Teknologi, Informasi, dan Komunikasi7g syifa apic
 
Microsoft Word
Microsoft WordMicrosoft Word
Microsoft WordAngelLika4
 
Rangkuman informatika bab 3
Rangkuman informatika bab 3Rangkuman informatika bab 3
Rangkuman informatika bab 3SenseiDogge
 
presentasi Perkembangan IT Komputer
presentasi Perkembangan IT Komputerpresentasi Perkembangan IT Komputer
presentasi Perkembangan IT KomputerAhmad Saiful Islam
 
Soal uas x simdig smt genap 14 15
Soal uas x simdig smt genap 14 15Soal uas x simdig smt genap 14 15
Soal uas x simdig smt genap 14 15Den Ronggo
 
evaluasi pembelajaran
evaluasi pembelajaran evaluasi pembelajaran
evaluasi pembelajaran Niakhairani
 
Makalah peran komputer bagi masyarakat
Makalah peran komputer bagi masyarakatMakalah peran komputer bagi masyarakat
Makalah peran komputer bagi masyarakatSeptian Muna Barakati
 
latihan dasar pemula ms word 2007.pdf
latihan dasar pemula ms word 2007.pdflatihan dasar pemula ms word 2007.pdf
latihan dasar pemula ms word 2007.pdfAndraBasupati
 
Pengenalan dan perakitan hardware komputer
Pengenalan dan perakitan hardware komputerPengenalan dan perakitan hardware komputer
Pengenalan dan perakitan hardware komputerAhmad Pratama Ramadhan
 
Kidung pujian keluarga......
Kidung pujian keluarga......Kidung pujian keluarga......
Kidung pujian keluarga......Yohanis Weni
 
Materi 2 : Perangkat lunak (software)
Materi 2 : Perangkat lunak (software)Materi 2 : Perangkat lunak (software)
Materi 2 : Perangkat lunak (software)Nanang Kurniawan
 
Rangkuman buku informatika bab 3 kelompok 7 kelas 7 g
Rangkuman buku informatika bab 3 kelompok 7 kelas 7 gRangkuman buku informatika bab 3 kelompok 7 kelas 7 g
Rangkuman buku informatika bab 3 kelompok 7 kelas 7 gSyafiq Kamil Aryawiguna
 
Ppt mengakses informasi melalui homepage
Ppt mengakses informasi melalui homepagePpt mengakses informasi melalui homepage
Ppt mengakses informasi melalui homepageAisyah Safitri Hayati
 
power point internet dan sistem jaringan
power point internet dan sistem jaringanpower point internet dan sistem jaringan
power point internet dan sistem jaringannandaputri
 
BAB 8 - Dampak Sosial Informatika
BAB 8 - Dampak Sosial InformatikaBAB 8 - Dampak Sosial Informatika
BAB 8 - Dampak Sosial InformatikaKeishaValiqaPasha1
 
JANJI PELAJAR MUHAMMADIYAH
JANJI PELAJAR MUHAMMADIYAHJANJI PELAJAR MUHAMMADIYAH
JANJI PELAJAR MUHAMMADIYAHIPM SULSEL
 
Pembukaan dan penutup do'a PEmbawa Doa Acara
Pembukaan dan penutup do'a PEmbawa Doa AcaraPembukaan dan penutup do'a PEmbawa Doa Acara
Pembukaan dan penutup do'a PEmbawa Doa AcaraMuhammad Tohir
 
PRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASI
PRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASIPRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASI
PRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASIYoga Romdoni
 

La actualidad más candente (20)

Presentasi Informatika BAB 5 Jaringan Komputer dan Internet
Presentasi Informatika BAB 5 Jaringan Komputer dan InternetPresentasi Informatika BAB 5 Jaringan Komputer dan Internet
Presentasi Informatika BAB 5 Jaringan Komputer dan Internet
 
Maksud komputer dan jenis komputer
Maksud komputer dan jenis komputerMaksud komputer dan jenis komputer
Maksud komputer dan jenis komputer
 
Bab 3 Informatika - Teknologi, Informasi, dan Komunikasi
Bab 3 Informatika - Teknologi, Informasi, dan KomunikasiBab 3 Informatika - Teknologi, Informasi, dan Komunikasi
Bab 3 Informatika - Teknologi, Informasi, dan Komunikasi
 
Microsoft Word
Microsoft WordMicrosoft Word
Microsoft Word
 
Rangkuman informatika bab 3
Rangkuman informatika bab 3Rangkuman informatika bab 3
Rangkuman informatika bab 3
 
presentasi Perkembangan IT Komputer
presentasi Perkembangan IT Komputerpresentasi Perkembangan IT Komputer
presentasi Perkembangan IT Komputer
 
Soal uas x simdig smt genap 14 15
Soal uas x simdig smt genap 14 15Soal uas x simdig smt genap 14 15
Soal uas x simdig smt genap 14 15
 
evaluasi pembelajaran
evaluasi pembelajaran evaluasi pembelajaran
evaluasi pembelajaran
 
Makalah peran komputer bagi masyarakat
Makalah peran komputer bagi masyarakatMakalah peran komputer bagi masyarakat
Makalah peran komputer bagi masyarakat
 
latihan dasar pemula ms word 2007.pdf
latihan dasar pemula ms word 2007.pdflatihan dasar pemula ms word 2007.pdf
latihan dasar pemula ms word 2007.pdf
 
Pengenalan dan perakitan hardware komputer
Pengenalan dan perakitan hardware komputerPengenalan dan perakitan hardware komputer
Pengenalan dan perakitan hardware komputer
 
Kidung pujian keluarga......
Kidung pujian keluarga......Kidung pujian keluarga......
Kidung pujian keluarga......
 
Materi 2 : Perangkat lunak (software)
Materi 2 : Perangkat lunak (software)Materi 2 : Perangkat lunak (software)
Materi 2 : Perangkat lunak (software)
 
Rangkuman buku informatika bab 3 kelompok 7 kelas 7 g
Rangkuman buku informatika bab 3 kelompok 7 kelas 7 gRangkuman buku informatika bab 3 kelompok 7 kelas 7 g
Rangkuman buku informatika bab 3 kelompok 7 kelas 7 g
 
Ppt mengakses informasi melalui homepage
Ppt mengakses informasi melalui homepagePpt mengakses informasi melalui homepage
Ppt mengakses informasi melalui homepage
 
power point internet dan sistem jaringan
power point internet dan sistem jaringanpower point internet dan sistem jaringan
power point internet dan sistem jaringan
 
BAB 8 - Dampak Sosial Informatika
BAB 8 - Dampak Sosial InformatikaBAB 8 - Dampak Sosial Informatika
BAB 8 - Dampak Sosial Informatika
 
JANJI PELAJAR MUHAMMADIYAH
JANJI PELAJAR MUHAMMADIYAHJANJI PELAJAR MUHAMMADIYAH
JANJI PELAJAR MUHAMMADIYAH
 
Pembukaan dan penutup do'a PEmbawa Doa Acara
Pembukaan dan penutup do'a PEmbawa Doa AcaraPembukaan dan penutup do'a PEmbawa Doa Acara
Pembukaan dan penutup do'a PEmbawa Doa Acara
 
PRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASI
PRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASIPRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASI
PRESENTASI TEKNOLOGI INFORMASI DAN KOMUNIKASI
 

Más de Foyzul Karim

Software architecture : From project management to deployment
Software architecture : From project management to deploymentSoftware architecture : From project management to deployment
Software architecture : From project management to deploymentFoyzul Karim
 
SDLC, Agile methodologies and Career in Product management
SDLC, Agile methodologies and Career in Product managementSDLC, Agile methodologies and Career in Product management
SDLC, Agile methodologies and Career in Product managementFoyzul Karim
 
A practical approach on - How to design offline-online synchronization system
A practical approach on - How to design offline-online synchronization systemA practical approach on - How to design offline-online synchronization system
A practical approach on - How to design offline-online synchronization systemFoyzul Karim
 
BizBook365 : A microservice approach
BizBook365 : A microservice approachBizBook365 : A microservice approach
BizBook365 : A microservice approachFoyzul Karim
 
Microservices: A developer's approach
Microservices: A developer's approachMicroservices: A developer's approach
Microservices: A developer's approachFoyzul Karim
 
Software design principles SOLID
Software design principles SOLIDSoftware design principles SOLID
Software design principles SOLIDFoyzul Karim
 
BizBook365.com 16Feb2018 Demo
BizBook365.com 16Feb2018 DemoBizBook365.com 16Feb2018 Demo
BizBook365.com 16Feb2018 DemoFoyzul Karim
 
Angular4 kickstart
Angular4 kickstartAngular4 kickstart
Angular4 kickstartFoyzul Karim
 
BizBook365 - Modern Inventory System for Shops
BizBook365 - Modern Inventory System for ShopsBizBook365 - Modern Inventory System for Shops
BizBook365 - Modern Inventory System for ShopsFoyzul Karim
 
Kickstart android development with xamarin
Kickstart android development with xamarinKickstart android development with xamarin
Kickstart android development with xamarinFoyzul Karim
 
Windows store app development using javascript
Windows store app development using javascriptWindows store app development using javascript
Windows store app development using javascriptFoyzul Karim
 
Unit testing (workshop)
Unit testing (workshop)Unit testing (workshop)
Unit testing (workshop)Foyzul Karim
 
Windows store app development V1
Windows store app development V1Windows store app development V1
Windows store app development V1Foyzul Karim
 

Más de Foyzul Karim (15)

Software architecture : From project management to deployment
Software architecture : From project management to deploymentSoftware architecture : From project management to deployment
Software architecture : From project management to deployment
 
SDLC, Agile methodologies and Career in Product management
SDLC, Agile methodologies and Career in Product managementSDLC, Agile methodologies and Career in Product management
SDLC, Agile methodologies and Career in Product management
 
A practical approach on - How to design offline-online synchronization system
A practical approach on - How to design offline-online synchronization systemA practical approach on - How to design offline-online synchronization system
A practical approach on - How to design offline-online synchronization system
 
BizBook365 : A microservice approach
BizBook365 : A microservice approachBizBook365 : A microservice approach
BizBook365 : A microservice approach
 
Microservices: A developer's approach
Microservices: A developer's approachMicroservices: A developer's approach
Microservices: A developer's approach
 
Software design principles SOLID
Software design principles SOLIDSoftware design principles SOLID
Software design principles SOLID
 
BizBook365.com 16Feb2018 Demo
BizBook365.com 16Feb2018 DemoBizBook365.com 16Feb2018 Demo
BizBook365.com 16Feb2018 Demo
 
Angular4 kickstart
Angular4 kickstartAngular4 kickstart
Angular4 kickstart
 
BizBook365 - Modern Inventory System for Shops
BizBook365 - Modern Inventory System for ShopsBizBook365 - Modern Inventory System for Shops
BizBook365 - Modern Inventory System for Shops
 
Kickstart android development with xamarin
Kickstart android development with xamarinKickstart android development with xamarin
Kickstart android development with xamarin
 
Windows store app development using javascript
Windows store app development using javascriptWindows store app development using javascript
Windows store app development using javascript
 
Unit testing (workshop)
Unit testing (workshop)Unit testing (workshop)
Unit testing (workshop)
 
Windows store app development V1
Windows store app development V1Windows store app development V1
Windows store app development V1
 
Data types
Data typesData types
Data types
 
Linq
LinqLinq
Linq
 

Último

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Último (20)

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf