The Philosophy of Software Architecture

Author(s):  
Amit Goel

Computer Software Intensive systems have become ingrained in our daily life. Apart from obvious scientific and business applications, various embedded devices are empowered with computer software. Such a diverse application of Computer Software has led to inherent complexity in building such systems. As civilizations moved forward, the concept of architectural thinking and practice was introduced to grapple with the complexity and other challenges of creating buildings, skyscrapers, townships, and cities. The Practice of Software Architecture is an attempt to understand and handle similar challenges in Software Intensive Systems. This paper introduces software architecture and the underlying philosophy thereof. This paper provokes a discussion around the present and future of Software Architecture. The authors discuss skills and roles of Software Architect.

2010 ◽  
Vol 2 (4) ◽  
pp. 28-39
Author(s):  
Amit Goel

Computer Software Intensive systems have become ingrained in our daily life. Apart from obvious scientific and business applications, various embedded devices are empowered with computer software. Such a diverse application of Computer Software has led to inherent complexity in building such systems. As civilizations moved forward, the concept of architectural thinking and practice was introduced to grapple with the complexity and other challenges of creating buildings, skyscrapers, townships, and cities. The Practice of Software Architecture is an attempt to understand and handle similar challenges in Software Intensive Systems. This paper introduces software architecture and the underlying philosophy thereof. This paper provokes a discussion around the present and future of Software Architecture. The authors discuss skills and roles of Software Architect.


Author(s):  
Anjani Tiwari ◽  
Prof. Jatin Patel ◽  
Dr. Priyanka Sharma

Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.


Author(s):  
Xuguo Wang ◽  
Shengzhe Kan ◽  
Yeli Xu

Abstract At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accidents that may cause casualties. In the field of embedded device security, there are many studies, for instance, OPENTEE for ARM handheld devices, providing a secure execution environment for payment devices, and SGX for Intel desk top devices, for security-critical applications, such as bank teller systems, build a safe operating environment. But it is a lack of correlation between these new and existing technologies. In our opinion, through the combination of mature technology accumulation and embedded devices, the antivirus industry can create a more secure user environment. In this paper, we propose a source isolation method to make the resources used by key processes exclusive. This method uses antivirus software and builds a more comprehensive embedded security system in critical security applications. The experimental results show that the proposed method is effective and safe.


Author(s):  
Rafael Capilla ◽  
Margarita Martínez ◽  
Francisco Nava ◽  
Cristina Muñoz

Virtual reality systems are a kind of complex software systems that need a lot of effort and resources during its development phase. Because rigid and monolithic approaches for these systems have been used in the past, maintenance and evolution activities become difficult tasks to carry out. Today, software architectures are used for designing more maintainable and modular systems, but previous experiences in the virtual reality field didn’t pay much attention to the usage of appropriate architecture descriptions. In this chapter we describe how the design of virtual reality systems can be improved with software architectures. Our main goal is to provide guidance in the design of virtual reality systems that can be reused for similar applications. A software architecture-centric approach is proposed and used to tackle certain problems that affect the construction of this kind of software intensive systems.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
JeongGil Ko ◽  
Byung-Bog Lee ◽  
Kyesun Lee ◽  
Sang Gi Hong ◽  
Naesoo Kim ◽  
...  

The vision of theInternet of Things (IoT)is coming closer to reality as a large number of embedded devices are introduced to our everyday environments. For many commercial IoT devices, ubiquitously connected mobile platforms can provide global connectivity and enable various applications. Nevertheless, the types of IoT resource-utilizing applications are still limited due to the traditional stovepipe software architecture, where the vendors provide supporting software on an end-to-end basis. This paper tries to address this issue by introducing theSensor Virtualization Module (SVM), which provides a software abstraction for external IoT objects and allows applications to easily utilize various IoT resources through open APIs. We implement the SVM on both Android and iOS and show that the SVM architecture can lead to easy development of applications. We envision that this simplification in application development will catalyze the development of various IoT services.


Author(s):  
In Lee

This chapter reviews some of the major business applications of social media and discusses how social media applications are used to support business model improvement. Social media offers business organizations an array of innovative ways to interact with their employees, customers, partners, and other stakeholders. Consumers have easy ways of interacting with companies and their employees in real time with various social media embedded devices. Managers are realizing that social media affects a wide spectrum of business activities from building product or brand awareness to after-sales services. Therefore, it is crucial for companies to analyze their social media applications, develop a plan to continually monitor their advancements, and quickly respond to the social media needs of customers. For practitioners, this chapter provides managerial guidelines for social media applications for business model improvement.


2019 ◽  
pp. 1354-1368
Author(s):  
In Lee

This chapter reviews some of the major business applications of social media and discusses how social media applications are used to support business model improvement. Social media offers business organizations an array of innovative ways to interact with their employees, customers, partners, and other stakeholders. Consumers have easy ways of interacting with companies and their employees in real time with various social media embedded devices. Managers are realizing that social media affects a wide spectrum of business activities from building product or brand awareness to after-sales services. Therefore, it is crucial for companies to analyze their social media applications, develop a plan to continually monitor their advancements, and quickly respond to the social media needs of customers. For practitioners, this chapter provides managerial guidelines for social media applications for business model improvement.


Sign in / Sign up

Export Citation Format

Share Document