1 The “Ride The Mainstream!” project for the IDESG, in 5 15 minutes.

Slides:



Advertisements
Similar presentations
1 OpenFlow + : Extension for OpenFlow and its Implementation Hongyu Hu, Jun Bi, Tao Feng, You Wang, Pingping Lin Tsinghua University
Advertisements

Integrating the NASP Practice Model Into Presentations: Resource Slides Referencing the NASP Practice Model in professional development presentations helps.
3 Copyright © 2005, Oracle. All rights reserved. Designing J2EE Applications.
Some ideas …. Task XBRL as a business performance and financial reporting standard (with its various taxonomies). 2.
Digital inclusion – a CS perspective Alex Poulovassilis ESRC TLRP-TEL Inclusion and Impact conference, June 2010.
ATMAN HB summary seminar # Challenges 2 ATMAN project 9/17/2010.
Software Testing Technique. Introduction Software Testing is the process of executing a program or system with the intent of finding errors. It involves.
Why Do We Need a (Plan) Portability API? Gerd Breiter Frank Leymann Thomas Spatzier.
Multi-Application in Smart Card-based Devices Christophe Colas, Chief Software Architect August 2002.
1 NEST New and emerging science and technology EUROPEAN COMMISSION - 6th Framework programme : Anticipating Scientific and Technological Needs.
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
From Model-based to Model-driven Design of User Interfaces.
SOFTWARE TESTING. INTRODUCTION  Software Testing is the process of executing a program or system with the intent of finding errors.  It involves any.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Visibility Information Exchange Web System. Source Data Import Source Data Validation Database Rules Program Logic Storage RetrievalPresentation AnalysisInterpretation.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Software Testing and Quality Assurance
Usability Inspection n Usability inspection is a generic name for a set of methods based on having evaluators inspect or examine usability-related issues.
Writing Good Software Engineering Research Papers A Paper by Mary Shaw In Proceedings of the 25th International Conference on Software Engineering (ICSE),
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
1 Computer Systems & Architecture Lesson 1 1. The Architecture Business Cycle.
Lecture Nine Database Planning, Design, and Administration
CHAPTER 19 Building Software.
BIS310: Week 7 BIS310: Structured Analysis and Design Data Modeling and Database Design.
Automating your Business Processes Using Oracle Workflow Therron Hofsetz Logical Apps, Inc.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 17 Slide 1 Extreme Programming.
Problems with reuse – Increased maintenance costs; lack of tool support; not-invented- here syndrome; creating, maintaining, and using a component library.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
On Roles of Models in Information Systems (Arne Sølvberg) Gustavo Carvalho 26 de Agosto de 2010.
Abstraction IS 101Y/CMSC 101 Computational Thinking and Design Tuesday, September 17, 2013 Carolyn Seaman University of Maryland, Baltimore County.
Managing Software Quality
1 IBM Software Group ® Mastering Object-Oriented Analysis and Design with UML 2.0 Module 1: Best Practices of Software Engineering.
Chapter 2 The process Process, Methods, and Tools
Institut Experimentelles Software Engineering Fraunhofer IESE Klaus Schmid Relating Product Line Adoption Mode and Transition Process.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
University of Utah SoCCS Lecture 61 Architecture – An Introduction CS Lecture 6 Nathan Dykman.
Software Models (Cont.) 9/22/2015ICS 413 – Software Engineering1 -Component-based software engineering -Formal Development Model.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Extreme/Agile Programming Prabhaker Mateti. ACK These slides are collected from many authors along with a few of mine. Many thanks to all these authors.
SOFTWARE DESIGN.
Abstraction IS 101Y/CMSC 101 Computational Thinking and Design Tuesday, September 17, 2013 Marie desJardins University of Maryland, Baltimore County.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Chapter 10 Analysis and Design Discipline. 2 Purpose The purpose is to translate the requirements into a specification that describes how to implement.
GRASP: Designing Objects with Responsibilities
Chapter 3 Object Oriented Systems and Open GIS. Objectives of the Chapter Establish place of O-O in OpenGIS cover basics of O-O emphasise design issues.
Software Engineering Principles. SE Principles Principles are statements describing desirable properties of the product and process.
Distributed Information Systems. Motivation ● To understand the problems that Web services try to solve it is helpful to understand how distributed information.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Information Technology Division Executive Office for Administration and Finance Service Oriented Architecture An Enterprise Approach to Enabling the Business.
Copyright ©2004 Virtusa Corporation | CONFIDENTIAL Requirement Engineering Virtusa Training Group 2004 Trainer: Ojitha Kumanayaka Duration : 1 hour.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
Review of Parnas’ Criteria for Decomposing Systems into Modules Zheng Wang, Yuan Zhang Michigan State University 04/19/2002.
Science and Technology Norwegian University of NTNU Rolv Bræk, January Introduction to Systems Engineering by Rolv Bræk NTNU.
IQ Server Product Overview June The problem we solve in a customer’s words… “We have almost 400 applications and they are all intertwined and very.
Introduction to Software Engineering 1. Software Engineering Failures – Complexity – Change 2. What is Software Engineering? – Using engineering approaches.
Design Evaluation Overview Introduction Model for Interface Design Evaluation Types of Evaluation –Conceptual Design –Usability –Learning Outcome.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
The Software Lifecycle Stuart Faulk. Definition Software Life Cycle: evolution of a software development effort from concept to retirement Life Cycle.
Process 4 Hours.
Software Testing.
The Development Process of Web Applications
Presented by Munezero Immaculee Joselyne PhD in Software Engineering
Distribution and components
Software Quality Engineering
Applying Use Cases (Chapters 25,26)
Applying Use Cases (Chapters 25,26)
SOA Strategies for Enterprise X
Presentation transcript:

1 The “Ride The Mainstream!” project for the IDESG, in 5 15 minutes

Some immediate NSTIC and IDESG Standards Coordination implications Provision for Anonymity/Pseudonymity by limiting processing to specified context, implicitly implementing the principle of least privilege. Criterion for success of proposed mini-project would be the desk-demonstrable ability to act as middleware between any combination of interoperating applications using n APIs, protocols or standards, with programming effort of the order of n, not n 2 or higher. Instructive impacts on Taxonomy, Attributes, Use Cases, Functional Model, and Privacy Activities. 2

Reminder: The RTM project’s 2 main deliverables 1.TMA – The Mainstream Architecture for Common Knowledge, a new software engineering component architecture. It is surprisingly novel, and not only because it stands on a very wide and firm ontological and epistemological basis. (Don’t worry: that foundation is just a plain science of “the phenomenon of knowledge”!) 2.the AOS – Application Operating System, the program product and new universal front-end for all applications (though still a work-in-progress) 3

Some of the broader benefits of TMA-organized app development 1.Really RAD, with mostly market-prompted snap-in application composition, with quality 2.Access Control a natural part of app design 3.Transparent database and transaction design and management 4.Secure execution under the control of the AOS 5.Ontological basis enabling quantum leap in application evolvability in a market context 4

The first step proposed for the IDESG (at the end of the 5 min presentation) SCC immediately involves existing Providers in the TMA-organized specification (that is, using ontologies in a TMA way) of current public interfaces and the modeling of Use Cases. Deliverables would enable initial AOS to rapidly verify old and help suggest new functionality. Some big questions were posed, for example: 1. How does that offer anonymity? 2. Coding before design?! 3. How does this relate to Standards Coordination? 4. What would be the criteria for success? 5

TMA and the AOS helping people simplify complexity together 1.Patterns for success in conceptualization, and anti-patterns for failure (That’s the wisdom of “The Homeric Mainstream”! Of the Logos too.) 2.Homer in The Odyssey: the cardinal sin is what I here call the “Fixed Ontology Fallacy” 3.Ontologies give us Being and Becoming, that is, constancy and change. Here’s how: 4.In a TMA-organized world, every processing step or transaction is a transformation of current data from being seen as instances of one ontology to being seen as instances of another.

On conceptual transformations (as mediated by TMA-organized ontologies) Extremely variable granularity, usually nested. But the AOS will always ensure correctness of processing following from the coherence and consistency of the respective ontologies, and the latter is (comparatively) easy to establish. As a rule, efficiency of processing follows from the “bounded rationality” that usually pertains in the real human world (despite the n th order logic) Orthogonal dimensions always help ensure that much-sought “separation of concerns”. Context-switching as general form of creativity 7

1. How does TMA offer anonymity? Anonymity (and pseudonymity) are merely one of the many possible consequences of Bounded Rationality Wikipedia: “ Bounded rationality is the idea that in decision-making, rationality of individuals is limited by the information they have, the cognitive limitations of their minds, and the finite amount of time they have to make a decision. It was proposed by Herbert A. Simon as an alternative basis for the mathematical modeling of decision making, as used in economics and related disciplines; it complements rationality as optimization, which views decision-making as a fully rational process of finding an optimal choice given the information available.Herbert A. Simoneconomics 8

Bounded Rationality Is merely one of the phenomena of the natural Simplification of Complexity But whereas in microeconomics it is regarded as a human shortcoming and modeling problem, in TMA it is a feature we can leverage: if we can limit processing to specified context (and the AOS does so) we can offer anonymity and, more generally, actually effect the realization of the Principle of Least Privilege. 9

The Principle of Least Privilege From Wikipedia: In practice, true least privilege is neither definable nor possible to enforce. Currently, there is no method that allows evaluation of a process to define the least amount of privileges it will need to perform its function. This is because it is not possible to know all the values of variables it may process, addresses it will need, or the precise time such things will be required. Currently, the closest practical approach is to eliminate privileges that can be manually evaluated as unnecessary. The resulting set of privileges still exceeds the true minimum required privileges for the process. Another limitation is the granularity of control that the operating environment has over privileges for an individual process. [5] In practice, it is rarely possible to control a process's access to memory, processing time, I/O device addresses or modes with the precision needed to facilitate only the precise set of privileges a process will require. [5] TMA enables an almost complete transcending of those limitations. 10

More on the first step proposed for the IDESG (The first task of an “Ontology AHG”?) 1.TMA & AOS workshop to know the TMA kind of ontology 2.Obtain several Providers’ interface specs, if possible for interoperation or federation. Dig for “full” semantics. 3.In the TMA way, model their data requirements, with present taxonomies, with appropriate levels of abstraction in the terms, determining commonalities and differences. Relevant ontologies will emerge. Improved Taxonomy too! 4.Check consistency between the assumed standards 5.Relate to use cases, determining functional model, down to a detail level, with state transitions. (Some blurring of important distinctions there!) 6.Address gaps with questions and suggestions (2 weeks’ full-time work for a small team?) 11

2. Coding before design?! The weak answer: Remember that 2 steps were proposed: “SCC immediately involves existing Providers in the TMA-organized specification of current public interfaces and the modeling of Use Cases. Deliverables would enable initial AOS to rapidly verify old and help build new functionality.” Only the “help build” (or “suggest”) part would be new coding. 12

Yes, coding can often precede design That is a consequence of numerous major aspects or considerations. Here’s a mere sample: Ontologies as components with highly orthogonal dimensions so more easily composed together. High reuse of generic and even quite specific functionality, often automatically prompted by the AOS-driven component market. The way cross-cutting concerns are provided for, in contrast with conventional API calls or OO methods. So we get high agility and thence evolvability, implying more effective discovery of needs. 13

3. How does this relate to Standards Coordination? The immediate project proposed would be a demonstration of several important issues: The AOS as a generic event-driven agent The AOS as middleware, mediating interoperation The tuning of interoperation using levels of abstraction, the ubiquitous but key feature. In general it’s all about interface standards, including the support of multiple legacy kinds Ability to support protocols as well as formats 14

4. What would be the criteria for success? For the initial project as proposed (that is, before the first running AOS): The desk-demonstrable ability to act as middleware between any combination of interoperating applications using n interfacing standards, with programming effort of the order of n not n 2 or higher. That would be thanks to the role of Common Knowledge expressed in terms of discovered TMA-organized ontologies. The AOS itself will strongly support that discovery process. 15