Innovation Goals in Software Development for Business Applications

Robert Arnold, Reza Shadnam

Abstract


Having been in touch with technical side of many companies in various sectors, we know industry is facing a period of unprecedented change. We have compiled a list of common technological challenges in the sector that companies are facing in adapting to the change. The purpose of this contribution is to discuss and communicate areas where technological challenges in the Software Development Sector lie. We see this kind of inventory beneficial to the academic community as it provides an account of industry challenges. The analysis would be necessary to really assist players in the sector in being better prepared for formalizing and documenting their learning and know-how development. Beside knowledge management benefits, the analysis also would help in taking advantage of research and development funding and attracting investors; both academic and industrial organizations can take advantage of this aspect. We are calling this type of analysis “capabilities analysis”. A single company might not solve the world’s technical problems, but just being aware of them and measuring steps taken to advance, even slightly, in the direction of solving the problems presented in this analysis would make the company stand out. When data is formulated this way, strong evidence is created that the project goes beyond standard engineering by distinguishing risk that can be eliminated through experiment from standard engineering risk.


References


Huhns, M. N. & Singh, M.P. (2005). Research Directions for Service-Oriented Multiagent Systems, IEEE Internet Computing. 9, 65-70.

Foster, I., Kesselman, C., Tsudik, G., Tuecke, S. (1998). A Security Architecture for Computational Grids, 5th ACM Conference on Computer and Communication Security, pp 83- 92.

Kearney, P. (2005). Message Level Security for Web Services, Information Security Technical Report. 10, 41-50.

Mabuchi, M., Shinjo, Y., Sato, A. & Kato, K. (2008). An Access Control Model for Web-Services That Supports Delegation and Creation of Authority, Proceedings of the Seventh International Conference on Networking, 213-222.

Gilbert, S. & Lynch, N. (2002). Brewer’s Conjecture and the Feasibility of Consistent Available Partition-Tolerant Web Services, ACM SIGACT News, 33.

Zeldovich, N. (2007). Securing Untrustworthy Software using Information Flow Control, Thesis submitted to the Department of Computing Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy.

Tkachuk, O. & Rajan, S. P. (2006). Application of Automated Environment Generation to Commercial Software, Proceedings of the 2006 international Symposium on Software Testing and Analysis (ISSTA ’06), 203-214.

http://en.wikipedia.org/wiki/GUI software testing accessed at July 22, 2010.

Kasik, D.J. & George, H.G. (1996). Toward Automatic Generation of Novice User Test Scripts, Proceedings of the Conference on Human Factors in Computing Systems : Common Ground, 244-251.

Maurer,C. (2007).DataWarehousing:EnsuringDataIntegritywithEnd-to-EndandStatistical Process Controls, Information Management, 7.

Golfarelli, M., Rizzi, S. & Cella, I. (2004). Beyond data warehousing: what’s next in business intelligence? Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, 1-6.

Istante Software. Istante: Product Overview., http://www.istantesoftware.com

Sonnen, D., and Morris, H. (2004), BusinessFactor: Event-Driven Business Performance Manager. TIBCO White Paper

Dresner, H. (2003) Business Activity Monitoring: BAM Architecture. Gartner Symposium ITXPO (Cannes, France).

Beneventano, D., et al. (2000) Information Integration: The MOMIS Project Demonstration.

In Proceedings VLDB Conference, Cairo, Egypt.

Singh, T. et al. (2012), Service Oriented Architecture Based Electric Power Real-time Data Ware House, International Journal of Engineering and Management Research, Vol.-2, Issue-6, December 2012, Pages: 48-56.

http://www.ijemr.net/December2012Issue/ServiceOrientedArchitectureBasedElectricPowerRealTimeDataWareHouse(48-56).pdf

Maurer, C. (2007) Data Warehousing: Ensuring Data Integrity with End-to-End and Statistical Process Controls

Schroder, G., Thiele, M., Lehner, W. (2010) Setting Goals and Choosing Metrics for Recommender System Evaluations, European Social Fund and Free State of Saxony under grant agreement 080954843, http://ucersti.ieis.tue.nl/files/papers/4.pdf


Full Text: PDF

DOI: 10.19139/soic-2310-5070-53

Refbacks

  • There are currently no refbacks.