“If You Don’t Actively Attack the Risks,

Slides:



Advertisements
Similar presentations
MBASE Integration Framework
Advertisements

1 Lecture #8 Purpose of SSRD Describe Capability Requirements: system subject matter measured by concrete means Describe Project, Level of Service, and.
Recall The Team Skills 1. Analyzing the Problem (with 5 steps) 2. Understanding User and Stakeholder Needs 3. Defining the System 4. Managing Scope 1.
1 Analysis of MBASE Model-Clashes Mohammed Al-Said USC-CSE.
Copyright 2000 by USC and the Center for Software Engineering, all rights reserved. “No scene from prehistory is quite so vivid as that of the mortal struggles.
Information Resources Management January 23, 2001.
Software Process Models
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Paper Prototyping.
University of Southern California Center for Systems and Software Engineering Risk Calculation Case Studies CS 510 Software Engineering Supannika Koolmanojwong.
University of Southern California Center for Systems and Software Engineering A Look at Software Engineering Risks in a Team Project Course Sue Koolmanojwong.
Using UML, Patterns, and Java Object-Oriented Software Engineering Royce’s Methodology Chapter 16, Royce’ Methodology.
University of Southern California Center for Software Engineering CSE USC MBASE Essentials Planning and control Milestone content Process models Life cycle.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 8 Slide 1 Software Prototyping l Rapid software development.
University of Southern California Center for Software Engineering C S E USC Software Model Clashes Identification USC-CSE Annual Research Review Mohammed.
2/13/07(c) USC-CSSE1 An Empirical Study on MBASE and LeanMBASE Supannika Koolmanojwong Center for Systems and Software Engineering CSSE- Annual Research.
Administrivia Lifecycle Architecture (LCA) group assignment will go out later today. Informal feedback meetings with LCO groups EasyShare: Mon, 2:45pm-3:15pm,
CS350/550 Software Engineering Lecture 1. Class Work The main part of the class is a practical software engineering project, in teams of 3-5 people There.
University of Southern California Center for Software Engineering C S E USC Barry Boehm, USC CS 510, CS 577a Fall,2005 (
USC CSSE Top 10 Risk Items: People’s Choice Awards Barry Boehm, Jesal Bhuta USC Center for Systems & Software Engineering
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 8 Slide 1 Software Prototyping l Rapid software development to validate requirements l.
Four P’s People – software engineers People – software engineers Product – software to be produced Product – software to be produced Process – framework.
Ch 1: The Scope of Software Engineering
Why is software engineering worth studying?  Demand for software is growing dramatically  Software costs are growing per system  Many projects have.
Web Project Management Nazia Hameed COMSATS University of Science and Technology Islamabad.
University of Southern California Center for Systems and Software Engineering Incremental Commitment Spiral Model (ICSM) for CS 577 Barry Boehm, Supannika.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 8 Slide 1 Software Prototyping l Rapid software development to validate requirements.
 CS 5380 Software Engineering Chapter 2 – Software Processes Chapter 2 Software Processes1.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
1 Project Risk Management Project Risk Management Dr. Said Abu Jalala.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by.
Chapter 3 Project Management Details Tracking Project Progress Project Estimation Project Risk Analysis Project Organization RUP Project Management Workflow.
Note Excerpts from Object-Oriented Software Engineering WCB/McGraw-Hill, 2008 Stephen R. Schach
1 Requirements Management - General concepts - Noureddine Abbadeni King Saud University College of Computer and Information Sciences Based on “Software.
13-January-2003cse LifeCycle © 2003 University of Washington1 Lifecycle CSE 403, Winter 2003 Software Engineering
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
University of Southern California Center for Systems and Software Engineering 09/02/09©USC-CSSE1 OCD Risk Management & DART CS 577a, Fall 2009 September.
CS 577b Software Engineering II -- Introduction
Lecture 2 –Approaches to Systems Development Method 10/9/15 1.
Software Prototyping Rapid software development to validate requirements.
Risk Management ©USC-CSSE.
Project & Risk Management
Software Project Management Lecture 5 Software Project Risk Management.
Overview of SAIP and LSSA. Software Architecture in Practice Provides a set of techniques, not a prescriptive method for architectural design. Based on.
Recall The Team Skills 1. Analyzing the Problem (with 5 steps) 2. Understanding User and Stakeholder Needs 3. Defining the System A Use Case Primer Organizing.
Software Engineering (CSI 321) Project Planning & Estimation 1.
University of Southern California Center for Systems and Software Engineering Risk Management CS 577a, Fall 2010 November 24, /24/2010©USC-CSSE1.
IS444: Modern tools for applications development Dr. Azeddine Chikh.
Risk Analysis 19 th September, Risk vs. Problem Risk  An “uncertain event that “may” happen with some probability Problem  The above event.
1 Software Risk Management : Overview and Recent Developments LiGuo Huang Computer Science and Engineering Southern Methodist University.
University of Southern California Center for Software Engineering C S E USC Barry Boehm, USC CS 510, CS 577a Fall 2015 Software Risk Management : Overview.
©Ian Sommerville 2000, Tom Dietterich 2001 Slide 1 System prototyping l Prototyping is the rapid development of a system l In the past, the developed system.
University of Southern California Center for Systems and Software Engineering Aug. 26, 2010 © USC-CSE Page 1 A Winsor Brown CS 577a Lecture Fall.
Welcome to Software Project Management. CONVENTIONAL SOFTWARE MANAGEMENT The BEST and WORST thing about software is its flexibility. 1.Software development.
R i s k If you don’t attack risks, they will attack you.
Why is Design so Difficult? Analysis: Focuses on the application domain Design: Focuses on the solution domain –The solution domain is changing very rapidly.
Software Development Process includes: all major process activities all major process activities resources used, subject to set of constraints (such as.
CS 577b: Software Engineering II
Software Risk Management : Overview and Recent Developments
Software Engineering (CSI 321)
Recognization and management of RISK in educational projects
Software Risk Management : Overview and Recent Developments
ICM-Sw Essentials for 577 Process models Success models Product models
Software Risk Management : Overview and Recent Developments
Distributed Assessment of Risk Tool DART
Risk Management ©USC-CSSE.
Software Risk Management : Overview and Recent Developments
Presentation transcript:

“If You Don’t Actively Attack the Risks, Copyright 2000 by USC and the Center for Software Engineering, all rights reserved. “If You Don’t Actively Attack the Risks,

The Risks Will Actively Attack You.” -Tom Gilb

Importance of Risk Management Addresses Complex Software Systems Focuses Projects on Critical Risk Items Provides Techniques for Handling Risk Items Reduces Software Costs by Reducing Rework Usually 40-50% of software costs

Rework Costs Concentrated in a Few High-Risk Items

If Risk Management is so important, why don’t people do it? Unwillingness to admit risks exist Leaves impression that you don’t know exactly what you’re doing Leaves impression that your bosses, customers don’t know exactly what they’re doing “Success-orientation” Tendency to postpone the hard parts Maybe they’ll go away Maybe they’ll get easier, once we do the easy parts Costs money and time up front

When do people do Risk Management? After they’ve been burned in similar situation Pain-avoidance Convincing evidence of consequences When everybody involved is convinced that risks exist, but that it’s still worth going forward Everyone is a winner  Realistic expectations When they’ve learned how to do it well Techniques not well-known, but can be learned

Defining Risk “Risk”: Possibility of loss or injury -Webster Risk Exposure = (Probability of unsatisfactory outcome) X (Loss if unsatisfactory outcome)

Components of “Satisfactory Outcome:” Stakeholder Win Condition Satisfaction Customer, Developer: Budget, Schedule User: Functionality, Performance, Reliability, Usability Maintainer: Modifiability, Portability Product Line Manager: Reusability Many Counterexamples: Lee, “The Day the Phones Stopped,” 1991 Gibbs, “Software’s Chronic Crisis,” 1994 Neumann, “Computer Related Risks,” 1995

A Typical Software Risk Situation Software Controls Spaceborne Experiment PROB (Software has critical error) = 0.4 Loss from Critical Error Occurring = $20M If Do Independent V&V: PROB (Critical Error Remains) = 0.05 Added Cost to Software Project = $1M If No Independent V&V: PROB (Critical Error Remains) = 0.2 Added Cost to Software Project = $0

Prioritizing Risks: Risk Exposure Risk Exposure - (Probability) (Loss of Utility) High Check Utility - Loss Estimate Major Risk Risk Probability Check Probability Estimate Little Risk Low Low High Loss of Utility

Risk Exposure Factors (Satellite Experiment Software) Unsatisfactory Outcome (UO) Prob (UO) Loss (UO) 10 8 7 9 3 4 1 5 2 Risk Exposure 3 - 5 4 - 8 5 6 8 1 2 30 - 50 24 - 40 28 - 56 45 15 24 8 30 7 4 A. S/ W error kills experiment B. S/ W error loses key data C. Fault tolerance features cause unacceptable performance D. Monitoring software reports unsafe condition as safe E. Monitoring software reports safe condition as unsafe F. Hardware delay causes schedule overrun G. Data reduction software errors cause extra work H. Poor user interface causes inefficient operation I. Processor memory insufficient J. DBMS software loses derived data

Risk Exposure Factors and Contours: Satellite Experiment Software

Top 10 Risk Items: 1989 and 1995 1989 1995 1. Personnel shortfalls 2. Schedules and budgets 3. Wrong software functions 4. Wrong user interface 5. Gold plating 6. Requirements changes 7. Externally-furnished components 8. Externally-performed tasks 9. Real-time performance 10. Straining computer science 1995 1. Personnel shortfalls 2. Schedules, budgets, process 3. COTS, external components 4. Requirements mismatch 5. User interface mismatch 6. Architecture, performance, quality 7. Requirements changes 8. Legacy software 9. Externally-performed tasks 10. Straining computer science

Candidate 3156/4156 Risk Items Personnel: commitment; compatibility; ease of communication; skills (management, Web/Java, Perl, CGI, data compression, …) Schedule: project scope; IOC content; critical-path items (COTS, platforms, reviews, …) COTS: to be discussed further in recitation Rqts, UI: mismatch to Library user needs Performance: #bits; #bits/sec; overhead sources

General Cause of Risk “Model Clashes” Goal: Underlying assumptions made by stakeholders models may conflict Often “unconscious” Examples? We’ll see how to use MBASE to address this pervasive problem Goal: Know risks “no risks” - impossible risks are a natural part of a project, just know how to approach balance tradeoff’s - greater risk = higher reward = greater pot. loss Mitigation and risk reduction reduces total risk exposure, planned mitigation allows for risk taking

Model Clashes and MBASE

Where Are We Now? Overview of MBASE Operation Concept Description (OCD) System and Software Requirements Definition (SSRD) System and Software Architecture Description (SSAD) Life Cycle Plan (LCP) Feasibility Rationale Description (FRD)

“No scene from prehistory is quite so vivid as that of the mortal struggles of great beasts in the tar pits. Large system programming has over the past decade been such a tar pit, and many great and powerful beasts have thrashed violently in it.” Fred Brooks, 1975

“Everyone seems to have been surprised by the stickiness of the problem, and it is hard to discern the nature of it. But we must try to understand it if we are to solve it.” Fred Brooks, 1975

Understanding the Tar Pit: Model Clashes Model (Webster): A description or analogy used to help visualize or analyze something; a pattern of something to be made Includes product models, process models, property models, success models Model Clash: An incompatibility among the underlying assumptions of a set of models Produces conflicts, confusion, mistrust, frustration, rework, throwaway systems Model Integration: Choosing and/or reengineering models to reconcile their underlying assumptions.

Examples of Model Clashes Product Model Clashes: structure clashes, traceability clashes, architectural style clashes COTS-driven product and Waterfall process Risk-based process and spec-based progress payments Design-to-cost process and tightly-coupled architecture Incremental process and Rayleigh-curve staffing model Evolutionary development without life-cycle architecture Golden Rule and stakeholder win-win Spec-based process and IKIWISI success model I’ll know it when I see it

Classic Model Clashes In Practice Model Clashes and Tar Pits: Bank of America Master Net Example Master Net Stakeholders Master Net Contract Initial Progress The Tar Pit The Bottom Line Contributing Model Clashes R.Glass, Software Runaways, Prentice Hall, 1998, PP. 152-182

Reconciling Model Clashes Use stakeholders’ success models, domain models to drive choices of other models MBASE conceptual framework Example: Process model decision table Reconcile underlying assumptions Example model clash patterns Pre-package domain-integrated models Successful examples

Where’s It All Going? Win-Win • Business Case Analysis Software Warranties • QFD 10X • Six Sigma Award Fees JAD • RAD UML CORBA • COM Architectures Product Lines OO Analysis & Design Domain Ontologies COTS • GOTS Spiral Waterfall Risk Management Business Process Reengineering CMM’s • Peopleware IPT’s • Objectory Groupware COCOMO COCOTS • Checkpoint System Dynamics Metrics • - ilities Simulation and Modeling

One View: Models Needing Integration Win-Win • Business Case Analysis Software Warranties • QFD 10X • Six Sigma Award Fees JAD • RAD Success Models Product Models Spiral Waterfall Risk Management Business Process Reengineering CMM’s • Peopleware IPT’s • Objectory Groupware UML CORBA • COM Architectures Product Lines OO Analysis & Design Domain Ontologies COTS • GOTS MBASE COCOMO COCOTS • Checkpoint System Dynamics Metrics • - ilities Simulation and Modeling Process Models Property Models