1 A Systems Engineer’s Perspective on Developing NCO Systems William W. Schoening 314-234-9651 Copyright © 2005 Boeing All.

Slides:



Advertisements
Similar presentations
Complex Adaptive Systems
Advertisements

Basics of Conflict Management CRETE Day 2 Training Tricia S. Jones, Ph
© 2007 Open Grid Forum Data/Compute Affinity Focus on Data Caching.
Chapter 13 Review Questions
Sharif University of Technology Session # 2.  Contents  Structured analysis and design  Information system development  Systems Analysis and Design.
The System and Software Development Process Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Chapter 2 Modeling the Process and Life Cycle Shari L. Pfleeger
Alternative Software Life Cycle Models By Edward R. Corner vol. 2, chapter 8, pp Presented by: Gleyner Garden EEL6883 Software Engineering II.
Basics of Conflict Management CRETE Day 2 Training Tricia S. Jones, Ph
Competing For Advantage
Developing the Service Communication Strategy
Media Planning and Strategy 10 McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 2 Introduction to Database Development.
Introduction to Database Development. 2-2 Outline  Context for database development  Goals of database development  Phases of database development.
Xtreme Programming. Software Life Cycle The activities that take place between the time software program is first conceived and the time it is finally.
Business Intelligence Focus Groups June, Agenda Welcome Introductions Presentation on Business Intelligence Discussion Groups – Identifying Issues.
Introduction to Software Testing
Chapter 1: The Database Environment
What is Software Architecture?
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Principles of Object Technology Module 1: Principles of Modeling.
QUALITY ASSURANCE PROJECT Conflict Management The purpose of this module is to develop participants’ facilitation and training skills to enable them to.
Thinking Actively in a Social Context T A S C.
Object Oriented Analysis and Design Introduction.
System DevelopmentInformation Systems for Management1 Chapter 9 System Development.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Systems Development Life Cycle Phases and Activities in the SDLC Variations of the SDLC models.
Writing Quality Requirements Karl E. Wiegers Presented by: Ricardo Carlos.
Chapter 16 Global Logistics and Materials Management.
[ §3 : 1 ] 2. Life-Cycle Perspective Overview 2.1 Motivation 2.2 Waterfall Model 2.3 Requirements in Context.
Lecture 9: Chapter 9 Architectural Design
Chapter 3 Social Work and Social Systems
Introduction To System Analysis and Design
© 2007 by Prentice Hall 1 Introduction to databases.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
1 Introduction to Software Engineering Lecture 1.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
Software Engineering Saeed Akhtar The University of Lahore Lecture 6 Originally shared for: mashhoood.webs.com.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
The System and Software Development Process Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
IS Analysis and Design. SDLC Systems Development Life Cycle Break problems into management review stages Control cost and time Works best with well understood.
 You will need to be able to Discuss the use of networks both in the workplace and at home.  Because of this, you will need to: › identify different.
Copyright ©2004 Virtusa Corporation | CONFIDENTIAL Requirement Engineering Virtusa Training Group 2004 Trainer: Ojitha Kumanayaka Duration : 1 hour.
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
The System and Software Development Process Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
 Many models have been proposed to deal with the problems of defining activities and associating them with each other  The first model proposed was the.
Managing Classrooms for Constructive Conflict Presentation to the Family and Consumer Sciences Academy, Temple University August 3, 2005 Tricia S. Jones,
Modelling the Process and Life Cycle. The Meaning of Process A process: a series of steps involving activities, constrains, and resources that produce.
1 Software Engineering: A Practitioner’s Approach, 6/e Chapter 9: Design Engineering Software Engineering: A Practitioner’s Approach, 6/e Chapter.
Putting Energy In Context William Cox Cox Software Architects LLC
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
Speech Processing 1 Introduction Waldemar Skoberla phone: fax: WWW:
Lectures 2 & 3: Software Process Models Neelam Gupta.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
EN Spring 2016 Lecture Notes FUNDAMENTALS OF SECURE DESIGN (NETWORK TOPOLOGY)
Network Security Laboratory Graduate School of Soongsil University Graduate School of Soongsil University Jeon Youngho
An Iterative Method For System Integration
Fundamentals of Information Systems, Sixth Edition
CompSci 280 S Introduction to Software Development
Data and database administration
Chapter ? Quality Assessment
Chapter 3 Social Work and Social Systems
Textbook Engineering Web Applications by Sven Casteleyn et. al. Springer Note: (Electronic version is available online) These slides are designed.
Introduction to Software Testing
Introduction To System Analysis and Design PART 2
Software life cycle models
Informatics 121 Software Design I
Network Architecture By Dr. Shadi Masadeh 1.
Applying Use Cases (Chapters 25,26)
Presentation transcript:

1 A Systems Engineer’s Perspective on Developing NCO Systems William W. Schoening Copyright © 2005 Boeing All Rights Reserved

2 Collaborative Systems* Definition –Individual systems can operate on their own –Collaborative systems are not owned and controlled as a whole by single entity Examples –Internet –Auto and truck transportation –Air Defense System – maybe –A group of people working on a project *Mark Maier, “Architecting Principles for Systems-of-Systems”, Journal of the International Council on Systems Engineering, Vol. I, 1998

3 Business System Transformation Eastman Kodak Consumer Segment Use with the permission of and thanks to James C. Stoffel, Sr. VP Eastman Kodak Picture Life Cycle for Traditional Technologies Picture Life Cycle for Digital/Hybrid Complex collaborative systems are the way of life in the commercial world

4 NCO and Systems Simple systems (even with NCO) are not very interesting from a systems thinking perspective Hallmark of collaborative and competitive systems is independence of individual systems Change is usually unpredictable and chaotic Collaborative systems must be highly adaptable to change if they are to survive

5 Some Risks for Collaborative NCO Systems

6 IF an individual system-of-interest unilaterally defers some of its capabilities and other individual systems require those capabilities for successful collaboration, THEN the collaborative system will not perform as expected. Multiple individual systems updating on their own schedules –Inconsistent interfaces –Inconsistent behavior Multiple individual systems making unilateral decisions –Surprises -- good and bad –Disruptive technologies Critical features must be understood by all

7 IF a system’s architecture and design are not adaptable to unknown requirements, THEN the system will lose out to those that are more adaptable leaving the developer with less than expected long-term revenue and profit. Parts of a solution Excess design margins Open architecture Architectures that accommodate other kinds of changes easily Alternative futures required to evaluate approaches

8 Some choices –Compromise to reduce proliferation –Accept the consequence IF implementation of requirements for supportability is repeatedly deferred in the interest of quick time to market or prototyping, THEN there will be many copies of the product that are not very supportable leaving a perception of poor supportability engineering by the developer.

9 NCO is more than just hooking a bunch of nodes together More data does not me it is useful We must also help users understand the content IF developers focus on data transfer (because is it easier to study) rather than interpretation by users, THEN users will begin to ignore the NCO system.

10 Where might they attack? –Systems are most vulnerable at interfaces –Internet is vulnerable to spam with viruses –NCO may be vulnerable to overload of meaningless inputs –Threats may be able to actively initiate otherwise- unintended NCO activities What can we do to alleviate this threat? What other threats are there? IF threats can successfully attack an NCO network, THEN its value will be lost (and we might even be worse off than before NCO.)

11 Operations with significant terrain masking –Potential for unusually high rate of drop and rejoin –True content messages delayed or –Grunts toss their NCO devices because they don’t work when needed (and rate of rejoins drops.) Logically correct architecture and design with great “style points” may not be the best choice IF the architecture and design do not adequately consider potential operating contexts, THEN the NCO system will not perform adequately in some highly stressful situations.

12 Concluding Remarks What users want to do determines the nature of NCO –Form must follow function –Technology is only an enabler Function includes being able to deal with the realities of collaborative systems The most successful NCO installations are likely to be those that are the most robust rather than those that have the best performance NCO is an enabler for a system, and seldom the most important part of the system from a user perspective