Introducing DevOps Techniques in a Software Construction Class

Author(s):  
Mark Hills
1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


IEEE Software ◽  
2006 ◽  
Vol 23 (2) ◽  
pp. c3-c3
Author(s):  
S. McConnell

Author(s):  
S. Kavitha ◽  
J. V. Anchitaalagammai ◽  
S. Nirmala ◽  
S. Murali

The chapter summarizes the concepts and challenges of DevOps in IoT, DevSecOps in IoT, integrating security into IoT, machine learning and AI in IoT of software engineering practices. DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of DevOps is the automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevSecOps is a practice of integrating security into every aspect of an application lifecycle from design to development.


Author(s):  
Chafia Bouanaka ◽  
Ahmed Amar Debza ◽  
Faiza Belala ◽  
Nadia Zeghib

Constructing systems from components and building components for different systems require well-established methodologies and processes. This article proposes a formal framework for designing and specifying component-based systems (CBS). The two-dimensional evolutions of CBS are architectural reconfiguration and behavioral adaptation, when user requirements and/or runtime contexts change. This framework provides an incremental design methodology where component interfaces and their corresponding ports are the basic units of software construction, rather than components. Conceptually, interfaces serve to assemble simple components to obtain more complex ones. Behaviorally, they serve to propagate side effects of visible changes of a component on its neighbors. Interfaces also supply interactions and synchronization effects on the underlying sub-system. The calculation process is guided by changes on interfaces where the hierarchical structure of the underlying CBS is maintained. In this framework, CBS specification is supported by some execution tools based on Maude.


2014 ◽  
Vol 989-994 ◽  
pp. 3240-3243
Author(s):  
Hong Chang Sun ◽  
Li Na Li ◽  
San Peng Deng

A numerical control transformation (NCT) system for a conventional lathe machine is introduced in this paper. The NCT system is considered as the key equipment to the manufacture of the transmission shaft. According to the construction feature and technological requirements, both the hardware and software construction are analyzed, as well as the implementation method of the NCT system. By practical operation, the experiment test result is given at the end of the paper to support the usefulness and practicality of the NCT system.


Sign in / Sign up

Export Citation Format

Share Document