27 September 1999 Crisis Management William L. Scherlis Carnegie Mellon University School of Computer Science.

Slides:



Advertisements
Similar presentations
1 Use Cases Application provisioning (version control) Workload management/load-balancing (server consolidation) Data Federation/sharing E-utilities (provisioning.
Advertisements

The e-Framework Bill Olivier Director Development, Systems and Technology JISC.
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Kellan Hilscher. Definition Different perspectives on the components, behavioral specifications, and interactions that make up a software system Importance.
CS3773 Software Engineering Lecture 01 Introduction.
Alternative Approach to Systems Analysis Structured analysis
ARCH-01: Introduction to the OpenEdge™ Reference Architecture Don Sorcinelli Applied Technology Group.
Data Model driven applications using CASE Data Models as the nucleus of software development in a Computer Aided Software Engineering environment.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
 The Rise of Computer Science ◦ Machine Language (1 st Gen) ◦ Assembly Language (2 nd Gen) ◦ Third Generation Languages (FORTRAN, BASIC, Java, C++, etc.)
Rational Unified Process
L4-1-S1 UML Overview © M.E. Fayad SJSU -- CmpE Software Architectures Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
On-Demand Creation/Evolution of Organizations (Weaving a Spandex Society) Leon Osterweil University of Massachusetts.
Research Perspectives Bill Scherlis CMU SCS DoD Software Summit 9 Aug 01.
1 Chapter 7 IT Infrastructures Business-Driven Technology
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 1: Introduction to Decision Support Systems Decision Support.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Problems with reuse – Increased maintenance costs; lack of tool support; not-invented- here syndrome; creating, maintaining, and using a component library.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
1 IBM Software Group ® Mastering Object-Oriented Analysis and Design with UML 2.0 Module 1: Best Practices of Software Engineering.
Chapter 2 The process Process, Methods, and Tools
Rational Unified Process Fundamentals Module 4: Disciplines II.
Week 1 Reference (chapter 1 in text book (1)) Dr. Fadi Fayez Jaber Updated By: Ola A.Younis Decision Support System.
Software Models (Cont.) 9/22/2015ICS 413 – Software Engineering1 -Component-based software engineering -Formal Development Model.
. Traffic Flow Management System Benefits Flexibility for Future Growth: TFMS provides a modern software architecture to meet future growth and support.
Chapter 6 : Software Metrics
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
Software engineering. What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects of software.
Assessing the Suitability of UML for Modeling Software Architectures Nenad Medvidovic Computer Science Department University of Southern California Los.
Odyssey A Reuse Environment based on Domain Models Prepared By: Mahmud Gabareen Eliad Cohen.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Basic Concepts Software Architecture. What is Software Architecture? Definition: – A software architecture is the set of principal design decisions about.
Radar Open Systems Architectures
Chapter 3 DECISION SUPPORT SYSTEMS CONCEPTS, METHODOLOGIES, AND TECHNOLOGIES: AN OVERVIEW Study sub-sections: , 3.12(p )
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
1 Introduction to Software Engineering Lecture 1.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
Object Oriented Analysis and Design using the UML CIS 520 Advanced Object-Oriented Design.
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
Current and Potential Uses for GIS in Academic Arctic Research Michael F. Goodchild University of California Santa Barbara.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
ANKITHA CHOWDARY GARAPATI
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Software Engineering Jon Walker. What is Software Engineering? Why do we call it Software Engineering? Why not just call it programming or software development?
SOFTWARE ENGINEERING. Objectives Have a basic understanding of the origins of Software development, in particular the problems faced in the Software Crisis.
System/SDWG Update Management Council Face-to-Face Flagstaff, AZ August 22-23, 2011 Sean Hardman.
Software Requirements Specification Document (SRS)
Software Engineering (CSI 321) Software Process: A Generic View 1.
Sponsored by the National Science Foundation GENI Cloud Security GENI Engineering Conference 12 Kansas City, MO Stephen Schwab University of Southern California.
1 BTEP Working Group Work Plan and Service Vision Report to Joint Council PSSDC/PSCIOC February 15, 2005 Debbie Farr, Government of Ontario and Elise Boisjoly,
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
IT323 - Software Engineering 2 1 Tutorial 4.  List the main benefits of software reuse 2.
1 IBM Software Group ® Mastering Object-Oriented Analysis and Design with UML 2.0 Module 4: Analysis and Design Overview.
Week 1 Reference (chapter 1 in text book (1)) Dr. Fadi Fayez Jaber Updated By: Ola A.Younis Decision Support System.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Federal Land Manager Environmental Database (FED) Overview and Update June 6, 2011 Shawn McClure.
Dr. Ir. Yeffry Handoko Putra
GCTC Transportation Super Cluster Smart City SDK
EOSC MODEL Pasquale Pagano CNR - ISTI
Federal Land Manager Environmental Database (FED)
The Extensible Tool-chain for Evaluation of Architectural Models
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
System Modeling Assessment & Roadmap Joint OMG/INCOSE Working Group
Presentation transcript:

27 September 1999 Crisis Management William L. Scherlis Carnegie Mellon University School of Computer Science

27 September 1999 NSF Software Workshop2 Crisis Management An Application Case Study –What is Crisis Management –Crisis Management technologies –Crisis Management challenges for software technology research 1. “Software Swat” 2. Composition on demand 3. Managing rapid change 4. Code-ification 5. Quality: analysis, assurance, validation 6. Human interface

27 September 1999 NSF Software Workshop3 Dimensions of Crisis Management (CM) Context Dimensions Distinct phases of activity –Planning –Preparedness/Mitigation –Response –Recovery Broad spectrum of players –FEMA –State, Local –NGOs –Business –Citizens Diversity of artifacts –Data inputs –Databases –Reports and documents –Applications –Communications channels Dimensions of Challenge Interdependent organizations –Federal/state/local, NGOs, utilities, private sector supplies, etc. –Thousands of organizations potentially involved –Wide variation in access to IT resources Organizational structure varies by phase –C 2 during response Situation awareness Decision support –Federation during planning Interoperation and metadata –Transactional during recovery People under stress –Human-systems interaction

27 September 1999 NSF Software Workshop4 CM Technologies Examples Reliable communications Information integration –Multi-source data analysis –Variable quality –Geographical info Modeling and simulation “Instant bureaucracy” Situation awareness Collaboration E-Commerce Supply chain creation –Inventory management “Forward deployment” –Business transactions Pre-certification Citizen single point-of-access –Information –Transactions Authentication and trust –Citizens, responders, suppliers, organizations –Reconfigurable authorization Information escrow

27 September 1999 NSF Software Workshop5 1. Software Swat Teams Key Software Research Issues Elements of a “Software Swat” capability –Rapid assembly of reliable teams, components, and tools The aggressive iterative process: –Requirements elicitation and analysis –Baseline technologies modeling –Contextual system design –Patterns of integration –Adaptation and assembly –Analysis, testing, and assurance Early deployment Continuous improvement and re-release –No new bugs –Rapid response to unanticipated needs –Rest on principles of predictability of evolvable processes Predictable outcomes Adjustment of features, quality, performance

27 September 1999 NSF Software Workshop6 2. Composition on demand Key Software Research Issues Composition: rapid system assembly and adaptation –Rapid integration of subsystems/components Overcome diverse kinds of incompatibilities with Software Architecture Use component attributes to enable predictable integration Seek compositionality: Predict properties of systems from properties of components. –Without compositionality, the entire system must be retested –Analyze/assure component properties just once. –Rapid information integration Reconcile/adapt similar data models Program understanding to capture/express data design –Provide information assurance despite rapid assembly Emply diverse techniques to adapt components for “safe” use –Sandbox, wrap, transform, etc.

27 September 1999 NSF Software Workshop7 3. Managing Rapid Change Key Software Research Issues Composition: rapid system assembly and adaptation –Enable geographically dispersed teams to collaborate Example: Oklahoma City rapid software integration Information sharing (and access control) Information awareness Coordination of effort (i.e., concurrency control) –Rapid adaptation of components and assemblies With predictable results: –Use analyses to predict the effects of change –Use specifications to avoid full re-analysis and testing –Use manipulations to facilitate functional change –Continuous improvement Rapid early deployment Iterate and update while in use (Also important for operational e-commerce sites) Improvements in components, integration, user interface, etc. –Assimilate new releases from component suppliers

27 September 1999 NSF Software Workshop8 4. Quality: Analysis, Assurance, Validation Key Software Research Issues Quality: Getting the important things right –Managing security-vs-responsiveness Now: High security usually means highly constrained functionality –Validation of integration Metadata about quality, sourcing, etc. Trace conclusions/results to sources and retain audit trail Compositionality The “good-enough” test –Units, Order-of -magnitude, Reasonableness –Models and simulations Develop explicit domain models to frame specifications and assurance Exploit code-ified domain models –Crisis management exercises The usual mode of operation for crisis responders Include the IT dimension –Augmented reality Modeling  Reality

27 September 1999 NSF Software Workshop9 5. Creating the Discipline Key Software Research Issues Code-ification of new domains –Capture using domain-specific language and domain-specific tools –Example domains FEMA business rules Information policy: privacy, access Response processes Situation awareness –Analysis Consequences of access changes Business rule interactions

27 September 1999 NSF Software Workshop10 6. Crisis Management User Interfaces Key Software Research Issues Human interface –Rapid creation of new human interfaces Responders Citizens Business –Collaboration CM teams –Software engineering teams Communities –Citizens Under stress Diverse information and transaction needs –Responders Under stress Diverse information and transaction needs

27 September 1999 NSF Software Workshop11 Crisis Management An Application Case Study –What is Crisis Management –Crisis Management technologies –Crisis Management challenges for software technology research 1. “Software Swat” 2. Composition on demand 3. Managing rapid change 4. Code-ification 5. Quality: Analysis, assurance, validation 6. Human interface –Success in Crisis Management depends increasingly on a solid foundation of software technologies