Innovation Goals in Software Development for Business Applications
Abstract
Having been in touch with technical side of many companies in various sectors, we know industry is facing a period of unprecedented change. We have compiled a list of common technological challenges in the sector that companies are facing in adapting to the change. The purpose of this contribution is to discuss and communicate areas where technological challenges in the Software Development Sector lie. We see this kind of inventory beneficial to the academic community as it provides an account of industry challenges. The analysis would be necessary to really assist players in the sector in being better prepared for formalizing and documenting their learning and know-how development. Beside knowledge management benefits, the analysis also would help in taking advantage of research and development funding and attracting investors; both academic and industrial organizations can take advantage of this aspect. We are calling this type of analysis “capabilities analysis”. A single company might not solve the world’s technical problems, but just being aware of them and measuring steps taken to advance, even slightly, in the direction of solving the problems presented in this analysis would make the company stand out. When data is formulated this way, strong evidence is created that the project goes beyond standard engineering by distinguishing risk that can be eliminated through experiment from standard engineering risk.References
Huhns, M. N. & Singh, M.P. (2005). Research Directions for Service-Oriented Multiagent Systems, IEEE Internet Computing. 9, 65-70.
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S. (1998). A Security Architecture for Computational Grids, 5th ACM Conference on Computer and Communication Security, pp 83- 92.
Kearney, P. (2005). Message Level Security for Web Services, Information Security Technical Report. 10, 41-50.
Mabuchi, M., Shinjo, Y., Sato, A. & Kato, K. (2008). An Access Control Model for Web-Services That Supports Delegation and Creation of Authority, Proceedings of the Seventh International Conference on Networking, 213-222.
Gilbert, S. & Lynch, N. (2002). Brewer’s Conjecture and the Feasibility of Consistent Available Partition-Tolerant Web Services, ACM SIGACT News, 33.
Zeldovich, N. (2007). Securing Untrustworthy Software using Information Flow Control, Thesis submitted to the Department of Computing Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy.
Tkachuk, O. & Rajan, S. P. (2006). Application of Automated Environment Generation to Commercial Software, Proceedings of the 2006 international Symposium on Software Testing and Analysis (ISSTA ’06), 203-214.
http://en.wikipedia.org/wiki/GUI software testing accessed at July 22, 2010.
Kasik, D.J. & George, H.G. (1996). Toward Automatic Generation of Novice User Test Scripts, Proceedings of the Conference on Human Factors in Computing Systems : Common Ground, 244-251.
Maurer,C. (2007).DataWarehousing:EnsuringDataIntegritywithEnd-to-EndandStatistical Process Controls, Information Management, 7.
Golfarelli, M., Rizzi, S. & Cella, I. (2004). Beyond data warehousing: what’s next in business intelligence? Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, 1-6.
Istante Software. Istante: Product Overview., http://www.istantesoftware.com
Sonnen, D., and Morris, H. (2004), BusinessFactor: Event-Driven Business Performance Manager. TIBCO White Paper
Dresner, H. (2003) Business Activity Monitoring: BAM Architecture. Gartner Symposium ITXPO (Cannes, France).
Beneventano, D., et al. (2000) Information Integration: The MOMIS Project Demonstration.
In Proceedings VLDB Conference, Cairo, Egypt.
Singh, T. et al. (2012), Service Oriented Architecture Based Electric Power Real-time Data Ware House, International Journal of Engineering and Management Research, Vol.-2, Issue-6, December 2012, Pages: 48-56.
http://www.ijemr.net/December2012Issue/ServiceOrientedArchitectureBasedElectricPowerRealTimeDataWareHouse(48-56).pdf
Maurer, C. (2007) Data Warehousing: Ensuring Data Integrity with End-to-End and Statistical Process Controls
Schroder, G., Thiele, M., Lehner, W. (2010) Setting Goals and Choosing Metrics for Recommender System Evaluations, European Social Fund and Free State of Saxony under grant agreement 080954843, http://ucersti.ieis.tue.nl/files/papers/4.pdf
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).