Software intelligence

Software Intelligence is insight into the structural condition of software assets produced by software designed to analyze database structure, software framework and source code to better understand and control complex software systems in Information Technology environments.[1] Similarly to Business Intelligence (BI), Software Intelligence is produced by a set of software tools and techniques for the mining of data and software inner-structure. End results are information used by business and software stakeholders to make informed decisions, communicate about software health, measure the efficiency of software development organizations, and prevent software catastrophes.[2]

Capabilities

Because of the complexity and wide range of components and subjects implied in software, Software intelligence is derived from different aspects of software:

  • Software composition is the construction of software application components.[3] Components result from software coding, as well as the integration of the source code from external components: Open source, 3rd party components, or frameworks. Other components can be integrated using application programming interface call to libraries or services.
  • Software architecture refers to the structure and organization of elements of a system, relations, and properties among them.
  • Software flaws designate problems that can cause security, stability, resiliency, and unexpected results. There is no standard definition of software flaws but the most accepted is from The MITRE Corporation where common flaws are cataloged as Common Weakness Enumeration.[4]
  • Software grades assess attributes of the software. Historically, the classification and terminology of attributes have been derived from the ISO 9126-3 and the subsequent ISO 25000:2005[5] quality model.
  • Software economics refers to the resource evaluation of software in past, present, or future to make decisions and to govern.[6]

Components

The capabilities of Software intelligence generate an increasing number of components including:

  • Code analyzer to serve as an information basis for other Software Intelligence components identifying objects created by the programming language, external objects from Open source, third parties objects, frameworks, API, or services
  • Graphical visualization and blueprinting of the inner structure of the software product or application considered[7] including dependencies, from data acquisition (automated and real-time data capture, end-user entries) up to data storage, the different layers[8] within the software, and the coupling between all elements.
  • Navigation capabilities within components and impact analysis features
  • List of flaws, architectural and coding violations, against standardized best practices,[9] cloud blocker preventing migration to a Cloud environment,[10] and rogue data-call entailing the security and integrity of software [11]
  • Grades or scores of the structural and software quality aligned with industry-standard like OMG, CISQ or SEI assessing the reliability, security, efficiency, maintainability, and scalability to cloud or other systems.
  • Metrics quantifying and estimating software economics including work effort, sizing, and technical debt[12]
  • Industry references and benchmarking allowing comparisons between outputs of analysis and industry standards

User Aspect

Some considerations must be made in order to successfully integrate the usage of Software Intelligence systems in a company. Ultimately the Software Intelligence system must be accepted and utilized by the users in order for it to add value to the organization. If the system does not add value to the users' mission, they simply don't use it as stated by M. Storey in 2003.[13]

At the code level and system representation, Software Intelligence systems must provide a different level of abstractions: an abstract view for designing, explaining and documenting and a detailed view for understanding and analyzing the software system.[14]

At the governance level, the user acceptance for Software Intelligence covers different areas related to the inner functioning of the system as well as the output of the system. It encompasses these requirements:

  • Comprehensive: missing information may lead to a wrong or inappropriate decision, as well as it is a factor influencing the user acceptance of a system.[15]
  • Accurate: accuracy depends on how the data is collected to ensure fair and indisputable opinion and judgment.[16]
  • Precise: precision is usually judged by comparing several measurements from the same or different sources.[17]
  • Scalable: lack of scalability in the software industry is a critical factor leading to failure.[18]
  • Credible: outputs must be trusted and believed.
  • Deploy-able and usable.

Applications

Software intelligence has many applications in all businesses relating to the software environment, whether it is software for professionals, individuals, or embedded software. Depending on the association and the usage of the components, applications will relate to:

  • Change and modernization: uniform documentation and blueprinting on all inner components, external code integrated, or call to internal or external components of the software[19]
  • Resiliency and security: measuring against industry standards to diagnose structural flaws in an IT environment.[20] Compliance validation regarding security, specific regulations or technical matters.
  • decisions making and governance: Providing analytics about the software itself or stakeholders involved in the development of the software, e.g. productivity measurement to inform business and IT leaders about progress towards business goals.[21] Assessment and Benchmarking to help business and IT leaders to make informed, fact-based decision about software.[22]

Marketplace

The Software Intelligence is a high-level discipline and has been gradually growing covering applications listed above. There are several markets driving the need for it:

  • Application Portfolio Analysis (APA) aiming at improving the enterprise performance[23][24]
  • Software Assessment for producing software KPI[25] and improve quality and productivity
  • Software security and resiliency measures and validation
  • Software evolution or legacy modernization, for which blueprinting the software systems are needed nor tools improving and facilitating modifications

References

  1. Dąbrowski R. (2012) On Architecture Warehouses and Software Intelligence. In: Kim T., Lee Y., Fang W. (eds) Future Generation Information Technology. FGIT 2012. Lecture Notes in Computer Science, vol 7709. Springer, Berlin, Heidelberg
  2. Ahmed E. Hassan and Tao Xie. 2010. Software intelligence: the future of mining software engineering data. In Proceedings of the FSE/SDP workshop on Future of software engineering research (FoSER '10). ACM, New York, NY, USA, 161–166
  3. Nierstrasz, Oscar, and Theo Dirk Meijler. "Research directions in software composition." ACM Computing Surveys 27.2 (1995): 262-264 doi:10.1145/210376.210389
  4. Kanashiro, L., et al. "Predicting software flaws with low complexity models based on static analysis data." Journal of Information Systems Engineering & Management 3.2 (2018): 17 doi:10.20897/jisem.201817
  5. "ISO 25000:2005" (PDF). Archived (PDF) from the original on 2013-04-14. Retrieved 2013-10-18.
  6. Boehm, Barry W., and Kevin J. Sullivan. "Software economics: a roadmap." Proceedings of the conference on The future of Software engineering. 2000. doi:10.1145/336512.336584
  7. Renato Novais, José Amancio Santos, Manoel Mendonça, Experimentally assessing the combination of multiple visualization strategies for software evolution analysis, Journal of Systems and Software, Volume 128, 2017, pp. 56–71, ISSN 0164-1212, doi:10.1016/j.jss.2017.03.006.
  8. Rolia, Jerome A., and Kenneth C. Sevcik. "The method of layers." IEEE transactions on software engineering 21.8,1995, 689-700,doi:10.1109/32.403785
  9. Software Engineering Rules on code quality. http://it-cisq.org/standards/code-quality-standards/
  10. Balalaie, Armin, , Abbas Heydarnoori, and Pooyan Jamshidi. "Microservices architecture enables devops: Migration to a cloud-native architecture." Ieee Software 33.3 ,May–June 2016, 42-52,doi:10.1109/MS.2016.64
  11. Q. Feng, R. Kazman, Y. Cai, R. Mo and L. Xiao, "Towards an Architecture-Centric Approach to Security Analysis," 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, 2016, pp. 221-230, doi:10.1109/WICSA.2016.41.
  12. R. Haas, R. Niedermayr and E. Juergens, "Teamscale: Tackle Technical Debt and Control the Quality of Your Software," 2019 IEEE/ACM International Conference on Technical Debt (TechDebt), Montreal, QC, Canada, 2019, pp. 55-56, doi:10.1109/TechDebt.2019.00016.
  13. Storey MA. (2003) Designing a Software Exploration Tool Using a Cognitive Framework. In: Zhang K. (eds) Software Visualization. The Springer International Series in Engineering and Computer Science, vol 734. Springer, Boston, MA.
  14. Seonah Lee, Sungwon Kang, What situational information would help developers when using a graphical code recommender?, Journal of Systems and Software, Volume 117, 2016, pp. 199–217, ISSN 0164-1212, doi:10.1016/j.jss.2016.02.050.
  15. Linda G. Wallace, Steven D. Sheetz, The adoption of software measures: A technology acceptance model (TAM) perspective, Information & Management, Volume 51, Issue 2, 2014, pp. 249–259, ISSN 0378-7206, doi:10.1016/j.im.2013.12.003
  16. Lippert, S.K., & Forman, H. (2005). Utilization of information technology: examining cognitive and experiential factors of post-adoption behavior. IEEE Transactions on Engineering Management, 52, 363–381.
  17. Rajiv D. Banker and Chris F. Kemerer (1992). Performance Evaluation Metrics for Information Systems Development: A Principal-Agent Model. Information Systems Research, volume 3, number 4, 379–400.
  18. M. Crowne, "Why software product startups fail and what to do about it. Evolution of software product development in startup companies," IEEE International Engineering Management Conference, 2002, pp. 338–343 vol.1. doi:10.1109/IEMC.2002.1038454
  19. Parnas, David Lorge, Precise Documentation: The Key to Better Software, The Future of Software Engineering, 2011, 125–148, doi:10.1007/978-3-642-15187-3_8
  20. https://www.bcg.com/capabilities/technology-digital/software-intelligence.aspx
  21. LaValle S, Lesser E, Shockley R, Hopkins MS and Kruschwitz N (2011) Big data, analytics and the path from insights to value. MIT Sloan Management Review 52 (2), 21–32.
  22. Janez Prašnikar, Žiga Debeljak,Aleš Ahčan (2005) Benchmarking as a tool of strategic management, Total Quality Management & Business Excellence, volume 16, number 2, 257–275, doi:10.1080/14783360500054400
  23. https://www.gartner.com/it-glossary/application-portfolio-analysis
  24. https://www.gartner.com/doc/3812067/effective-strategies-deliver-sustainable-cost
  25. https://www.omg.org/spec/AFP
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.