SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
The Devastating Impact of Architecturally Complex Defects
KILLER APPS
TO APP
KILLERS
FROM
Art inspired by original artwork “Anatomy of a Murder” by Saul Bass
2
Architecturally
Complex
Violations
constitute 8% of
violations, but
they are:
52%of the repair
effort
8Xmore likely to
escape into
testing
6Xmore likely
to escape
operations
caution caution
Year after year, killer apps developed by organizations that rely upon technology to service
their clients, face app killers like major outages, malfunctions, and security breaches
that disrupt business and damage reputations. Sadly, nearly all of these failures had an
architectural flaw that had gone undetected.
The technical diversity that gives modern business applications their unique power and
flexibility comes at a cost of staggering complexity. Quite simply, the complexity of modern
business applications exceeds the capability of any single individual or team to understand all
of the potential interactions among the component languages and technologies. Organizations
are now faced with the devastating impact of Architecturally Complex Violations.
3
Architecturally
Complex Violation
A structural flaw involving
interactions among multiple
components that may reside in
different application layers
User Interface
Logic
Data
TERMINOLOGYArchitecture of Decay
A map of the defect fix relationships
among Architectural Hotspots
Architectural Hotspot
A component that contributes
to many Architecturally
Complex Violations
4
EFFORT DRIVERS
Why do Architecturally Complex Violations take more effort to fix?
They are multi-component and therefore require a lot more files to fix than a Code-Level
Violation.  Reported data indicates that frequently as many as 20 different modifications to files
are required to remediate a single architecturally complex defect.
LinkedIn
experienced
a security
breach
exposing
6.4M
passwords
92%
8%
Architecturally
Complex
Violations
Component-Level
Violations
% of Total Violations
% of Effort to Correct
48%52%
Architecturally
Complex
Violations
Component-Level
Violations
5
COST DRIVERS
Sony suffered a
dozen attacks
at the hands
of the LulzSec
Group, which
exposed
customer
accounts
resulting in
55class action
lawsuits and
cost
$178M
Most Component-
Level Violations
are fixed with a
single change
Why are Architecturally Complex Violations more costly to fix?
These defects are more expensive to fix because they involve interactions between multiple
tiers of the application often written in different languages and hosted on different platforms.
These violations require much more involvement and coordination across teams to ensure that
the fix is resolved system-wide.
Relative number of changes
to correct an Architecturally
Complex Violation
6
PROBLEM DRIVERS
% of violations crossing a phase boundary
Why are Architecturally Complex Violations worse as they cross phases?
Since Complex Violations are more likely to persist into operations, they are more likely to
cause operational problems than the single component violations that tend to get caught
earlier.
Knight
Capital trading
system had
an algorithmic
error which
caused erratic
trading activity
and left the firm
with billions
of dollars in
unwanted
securities and
$400M
loss.
Architecturally
Complex Violations
8X worse
6X worse
Architecturally
Complex Violations
Test Operations
2%13%
83%
10%
7
DECAY DRIVERS
80%
of
Architecturally
Complex
Violations
involve an
Architectural
Hotspot.
Architectural
Hotspots reveal
concentrations
of architectural
decay
Architecture of Decay
A map of the most frequent fix relationships among Architectural Hotspots reveals the
Architecture of Decay but it also presents a roadmap to guide high-value remediation and the
greatest opportunities to restore the structural health of an application.
Big problems are often the result of several interacting weaknesses in the code, none of which
caused the problem by itself. Preventing application-level defects requires analysis of all the
interactions between components of heterogeneous technologies. Reliably detecting software
quality problems requires an analysis of each application component in the context of the
entire application as a whole – an evaluation of application quality rather than code quality.
8
BUSINESS DRIVERS
You will rarely detect Architecturally Complex Violations with unit tests or code analyzers. To
detect these App Killers you need…
CAST Application Intelligence Platform. A dynamic business environment, new technology,
and multiple sourcing options amplify the complexity of business application software. Since
even the most talented developers can no longer know all of the nuances of the different
languages, technologies, and tiers in an application, their capability needs to be augmented
by automated tools to evaluate the entire application. Without such assistance, defects
hidden in the interactions between application tiers will place the business at risk for outages,
degraded service, security breaches, and corrupted data.
CAST AIP is unique in its ability to find structural defects early at build time when the code can
first be analyzed at the level of the entire application. Detection and repair at this point can be
an order of magnitude cheaper than if these structural flaws slip into the final stages of testing
where they are deeply embedded in the application and a larger portion of the code will have
to be torn down and rebuilt.
To find out more about CAST AIP visit www.castsoftware.com/AIP
Application
Quality
analyzes
the software
across all of the
application’s
languages, tiers,
and technologies
to measure how
well all of the
application’s
components
come together to
create operational
performance
and overall
maintainability.
9
SUMMARY
CAST Application Intelligence Platform
CAST Application Intelligence Platform (AIP) is the only enterprise-grade software quality assessment and performance
measurement solution available. CAST AIP inspects source code, identifies and tracks quality issues, and provides
the data to monitor development performance. CAST can read, analyze, and semantically understand most kinds of
source code, including scripting and interface languages, 3GLs, 4GLs, and web and mainframe technologies, across all
layers of an application (UI, logic, and data). By analyzing all tiers of a complex application, CAST measures quality and
adherence to architectural and coding standards, while providing visual specification models.
Sources:
Z. Li, et al. (2011). Characteristics of multiple component defects and architectural hotspots: A large system case study. Empirical Software Engineering, 16 (5), 667-702.
M. Leszak, et al. (2000). A case study of root cause defect analysis. Proceedings of the 22nd
International Conference on Software Engineering. Los Alamitos, CA: IEEE Computer Society, 428-437.
A. Von Mayerhauser, et al. (2000). Deriving fault architectures from defect history. Journal of Software Maintenance: Research and Practice, 12 (5), 287-304.
Enterprise-grade analysis
requires a 3-tiered approach
10
ABOUT CAST
CAST is a pioneer and world leader in Software Analysis and Measurement, with unique technology resulting from
more than $100 million in R&D investment. CAST introduces fact-based transparency into application development
and sourcing to transform it into a management discipline. More than 250 companies across all industry sectors and
geographies rely on CAST to prevent business disruption while reducing hard IT costs. CAST is an integral part of
software delivery and maintenance at the world’s leading IT service providers such as IBM and Capgemini.
Founded in 1990, CAST is listed on NYSE-Euronext (Euronext: CAS) and serves IT intensive enterprises worldwide with a
network of offices in North America, Europe and India. For more information, visit www.castsoftware.com
Call: 877-852-2278
Email: info@castsoftware.com
Visit our Web site: www.castsoftware.com
Follow Us

Contenu connexe

Plus de CAST

Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...CAST
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeCAST
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM BudgetsCAST
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsCAST
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitCAST
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesCAST
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityCAST
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurementCAST
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCAST
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysisCAST
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtCAST
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platformsCAST
 
CRASH Report 2014
CRASH Report 2014CRASH Report 2014
CRASH Report 2014CAST
 
Code quality infographic
Code quality infographicCode quality infographic
Code quality infographicCAST
 
Unsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsUnsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsCAST
 
CAST Architecture Checker
CAST Architecture CheckerCAST Architecture Checker
CAST Architecture CheckerCAST
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...CAST
 
Cast Consulting
Cast ConsultingCast Consulting
Cast ConsultingCAST
 

Plus de CAST (20)

Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in code
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based Contracts
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurement
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance Infographic
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysis
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platforms
 
CRASH Report 2014
CRASH Report 2014CRASH Report 2014
CRASH Report 2014
 
Code quality infographic
Code quality infographicCode quality infographic
Code quality infographic
 
Unsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsUnsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable Apps
 
CAST Architecture Checker
CAST Architecture CheckerCAST Architecture Checker
CAST Architecture Checker
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
 
Cast Consulting
Cast ConsultingCast Consulting
Cast Consulting
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

From Killer Apps to App Killers CAST

  • 1. The Devastating Impact of Architecturally Complex Defects KILLER APPS TO APP KILLERS FROM Art inspired by original artwork “Anatomy of a Murder” by Saul Bass
  • 2. 2 Architecturally Complex Violations constitute 8% of violations, but they are: 52%of the repair effort 8Xmore likely to escape into testing 6Xmore likely to escape operations caution caution Year after year, killer apps developed by organizations that rely upon technology to service their clients, face app killers like major outages, malfunctions, and security breaches that disrupt business and damage reputations. Sadly, nearly all of these failures had an architectural flaw that had gone undetected. The technical diversity that gives modern business applications their unique power and flexibility comes at a cost of staggering complexity. Quite simply, the complexity of modern business applications exceeds the capability of any single individual or team to understand all of the potential interactions among the component languages and technologies. Organizations are now faced with the devastating impact of Architecturally Complex Violations.
  • 3. 3 Architecturally Complex Violation A structural flaw involving interactions among multiple components that may reside in different application layers User Interface Logic Data TERMINOLOGYArchitecture of Decay A map of the defect fix relationships among Architectural Hotspots Architectural Hotspot A component that contributes to many Architecturally Complex Violations
  • 4. 4 EFFORT DRIVERS Why do Architecturally Complex Violations take more effort to fix? They are multi-component and therefore require a lot more files to fix than a Code-Level Violation.  Reported data indicates that frequently as many as 20 different modifications to files are required to remediate a single architecturally complex defect. LinkedIn experienced a security breach exposing 6.4M passwords 92% 8% Architecturally Complex Violations Component-Level Violations % of Total Violations % of Effort to Correct 48%52% Architecturally Complex Violations Component-Level Violations
  • 5. 5 COST DRIVERS Sony suffered a dozen attacks at the hands of the LulzSec Group, which exposed customer accounts resulting in 55class action lawsuits and cost $178M Most Component- Level Violations are fixed with a single change Why are Architecturally Complex Violations more costly to fix? These defects are more expensive to fix because they involve interactions between multiple tiers of the application often written in different languages and hosted on different platforms. These violations require much more involvement and coordination across teams to ensure that the fix is resolved system-wide. Relative number of changes to correct an Architecturally Complex Violation
  • 6. 6 PROBLEM DRIVERS % of violations crossing a phase boundary Why are Architecturally Complex Violations worse as they cross phases? Since Complex Violations are more likely to persist into operations, they are more likely to cause operational problems than the single component violations that tend to get caught earlier. Knight Capital trading system had an algorithmic error which caused erratic trading activity and left the firm with billions of dollars in unwanted securities and $400M loss. Architecturally Complex Violations 8X worse 6X worse Architecturally Complex Violations Test Operations 2%13% 83% 10%
  • 7. 7 DECAY DRIVERS 80% of Architecturally Complex Violations involve an Architectural Hotspot. Architectural Hotspots reveal concentrations of architectural decay Architecture of Decay A map of the most frequent fix relationships among Architectural Hotspots reveals the Architecture of Decay but it also presents a roadmap to guide high-value remediation and the greatest opportunities to restore the structural health of an application. Big problems are often the result of several interacting weaknesses in the code, none of which caused the problem by itself. Preventing application-level defects requires analysis of all the interactions between components of heterogeneous technologies. Reliably detecting software quality problems requires an analysis of each application component in the context of the entire application as a whole – an evaluation of application quality rather than code quality.
  • 8. 8 BUSINESS DRIVERS You will rarely detect Architecturally Complex Violations with unit tests or code analyzers. To detect these App Killers you need… CAST Application Intelligence Platform. A dynamic business environment, new technology, and multiple sourcing options amplify the complexity of business application software. Since even the most talented developers can no longer know all of the nuances of the different languages, technologies, and tiers in an application, their capability needs to be augmented by automated tools to evaluate the entire application. Without such assistance, defects hidden in the interactions between application tiers will place the business at risk for outages, degraded service, security breaches, and corrupted data. CAST AIP is unique in its ability to find structural defects early at build time when the code can first be analyzed at the level of the entire application. Detection and repair at this point can be an order of magnitude cheaper than if these structural flaws slip into the final stages of testing where they are deeply embedded in the application and a larger portion of the code will have to be torn down and rebuilt. To find out more about CAST AIP visit www.castsoftware.com/AIP Application Quality analyzes the software across all of the application’s languages, tiers, and technologies to measure how well all of the application’s components come together to create operational performance and overall maintainability.
  • 9. 9 SUMMARY CAST Application Intelligence Platform CAST Application Intelligence Platform (AIP) is the only enterprise-grade software quality assessment and performance measurement solution available. CAST AIP inspects source code, identifies and tracks quality issues, and provides the data to monitor development performance. CAST can read, analyze, and semantically understand most kinds of source code, including scripting and interface languages, 3GLs, 4GLs, and web and mainframe technologies, across all layers of an application (UI, logic, and data). By analyzing all tiers of a complex application, CAST measures quality and adherence to architectural and coding standards, while providing visual specification models. Sources: Z. Li, et al. (2011). Characteristics of multiple component defects and architectural hotspots: A large system case study. Empirical Software Engineering, 16 (5), 667-702. M. Leszak, et al. (2000). A case study of root cause defect analysis. Proceedings of the 22nd International Conference on Software Engineering. Los Alamitos, CA: IEEE Computer Society, 428-437. A. Von Mayerhauser, et al. (2000). Deriving fault architectures from defect history. Journal of Software Maintenance: Research and Practice, 12 (5), 287-304. Enterprise-grade analysis requires a 3-tiered approach
  • 10. 10 ABOUT CAST CAST is a pioneer and world leader in Software Analysis and Measurement, with unique technology resulting from more than $100 million in R&D investment. CAST introduces fact-based transparency into application development and sourcing to transform it into a management discipline. More than 250 companies across all industry sectors and geographies rely on CAST to prevent business disruption while reducing hard IT costs. CAST is an integral part of software delivery and maintenance at the world’s leading IT service providers such as IBM and Capgemini. Founded in 1990, CAST is listed on NYSE-Euronext (Euronext: CAS) and serves IT intensive enterprises worldwide with a network of offices in North America, Europe and India. For more information, visit www.castsoftware.com Call: 877-852-2278 Email: info@castsoftware.com Visit our Web site: www.castsoftware.com Follow Us