4) Reengineering rather than replacing
Restructuring or rewriting part or all of a
legacy system without changing its
functionality.
Applicable where some but not all sub-systems
of a larger system require frequent
maintenance.
Reengineering involves adding effort to make
them easier to maintain. The system may be re-structured and redocumented.
Advantages of reengineering
Reduced risk
There is a high risk in new software development. There may be
development problems, staffing problems and specification problems.
Reduced cost
The cost of re-engineering is often significantly less than the costs of
developing new software.
Reengineering process
Reengineering process activities
Source code translation
Convert code to a new language.
Reverse engineering
Analyse the program to understand it;
Program structure improvement
Restructure automatically for understandability;
Program modularisation
Reorganise the program structure;
Data reengineering
Clean-up and restructure system data
5) 5 principles of dependency properties from nonfunctional properties
6) Security 6 definition (system security purpose)
7) Defense in depth (concretic circle)
Defense in depth is the coordinated use of multiple security countermeasures to
protect the integrity of the information assets in an enterprise. The strategy is
based on the military principle that it is more difficult for an enemy to defeat a
complex and multi-layered defense system than to penetrate a single barrier.
Defense in depth minimizes the probability that the efforts of malicious hackers will
succeed. A well-designed strategy of this kind can also help system administrators
and security personnel identify people who attempt to compromise a computer,
server, proprietary network or ISP (Internet service provider). If a hacker gains
access to a system, defense in depth minimizes the adverse impact and gives
administrators and engineers time to deploy new or updated countermeasures to
prevent recurrence.
Components of defense in depth include antivirus software, firewalls, anti-spyware
programs, hierarchical passwords, intrusion detection and biometric verification. In
addition to electronic countermeasures, physical protection of business sites along
with comprehensive and ongoing personnel training enhances the security of vital
data against compromise, theft or destruction
9) Process improvement.
Understanding existing processes
Introducing process changes to achieve organisational objectives which are usually
focused on quality improvement, cost reduction and schedule acceleration
Most process improvement work so far has
focused on defect reduction. This reflects the increasing attention paid by industry
to quality
However, other process attributes can be the focus of improvement
Process analysis
Model and analyse (quantitatively if possible) existing processes
Improvement identification
Identify quality, cost or schedule bottlenecks
Process change introduction
Modify the process to remove identified bottlenecks
Process change training
Train staff involved in new process proposals
Change tuning
Evolve and improve process improvements