The architects of today’s large and complex systems all too often struggle with the lack of a consistent set of principles and practices that adequately address the entire breadth of systems architecture. The Method Framework for Engineering System Architectures (MFESA) enables system architects and process engineers to create methods for effectively and efficiently engineering high-quality architecture for systems, subsystems, and software components. Meets the Needs of Specific Projects The book begins by documenting the common challenges that must be addressed by system architecture engineering. It explores the major principles answering these challenges and forming the basis of MFESA. Next, the authors introduce MFESA, including its primary goals, inputs, tasks, outputs, and assumptions. Then they describe the fundamental concepts and terminology on which the systems architecture engineering is founded. This is followed by a description of each of the ten system architecture engineering tasks including associated goals and objectives, preconditions, inputs, steps, postconditions, work products, guidelines, and pitfalls. Finally, the book documents the relationship between quality and architecture, explains the quality model underlying MFESA, and provides a summary of MFESA method framework, as well as a list of points to remember and future directions planned for MFESA. Explains Specific Rationales Organized as a handy desk reference, this book harnesses more than 100 years of the authors’ combined professional experience to provide extensive guidelines, best practices, and tips on avoiding possible pitfalls. It presents a direct rationale of why steps are taken, how things can go wrong, and guidance for how and when to tailor the model for a system’s specific context. CRC Press is pleased to announce that The Method Framework for Engineering System Architectures has been added to Intel Corporation’s Recommended Reading List. Intel’s Recommended Reading program provides technical professionals a simple and handy reference list of what to read to stay abreast of new technologies. Dozens of industry technologists, corporate fellows, and engineers have helped by suggesting books and reviewing the list. This is the most comprehensive reading list available for professional computer developers.
Software and system testers repeatedly fall victim to the same pitfalls. Think of them as "anti-patterns": mistakes that make testing far less effective and efficient than it ought to be. In Common System and Software Testing Pitfalls, Donald G. Firesmith catalogs 92 of these pitfalls. Drawing on his 35 years of software and system engineering experience, Firesmith shows testers and technical managers and other stakeholders how to avoid falling into these pitfalls, recognize when they have already fallen in, and escape while minimizing their negative consequences. Firesmith writes for testing professionals and other stakeholders involved in large or medium-sized projects. His anti-patterns and solutions address both "pure software" applications and "software-reliant systems," encompassing heterogeneous subsystems, hardware, software, data, facilities, material, and personnel. For each pitfall, he identifies its applicability, characteristic symptoms, potential negative consequences and causes, and offers specific actionable recommendations for avoiding it or limiting its consequences. This guide will help you, Pinpoint testing processes that need improvement-before, during, and after the project, Improve shared understanding and collaboration among all project participants, Develop, review, and optimize future project testing programs, Make your test documentation far more useful, Identify testing risks and appropriate risk-mitigation strategies, Categorize testing problems for metrics collection, analysis, and reporting, Train new testers, QA specialists, and other project stakeholders Book jacket.
Offering a practical way to generate effective and efficient project-specific system architecture engineering methods, this volume addresses the entire range of systems architecture including hardware, software, subsystems, and systems of systems. It defines a set of architectural roles and teams and provides a repository of reusable architectural engineering process components to develop high-quality system architectures. It examines a cohesive set of tailorable tasks and components steps for producing associated architectural work products and establishes a recommended set of industry best practices for engineering the architecture of software-intensive systems.
Fifteen-year-old Matt Mitchell was having the worst summer imaginable. His misery started when his mother died in a senseless car accident. Unable to remain in the family's memory-filled seaside cottage, Matt's grieving father moved Matt and his twin sister as far as possible from the ocean they loved. But their relocation to the small town of Hawthorne, Indiana only made Matt's life more difficult. Three bullies at his new high school dedicated themselves to making him miserable. To top it off, Matt heard that the recluse living in the dilapidated Victorian mansion next door was none other than Old Lady Hawthorne, the town's infamous witch and murderer of wayward husbands. When Old Lady Hawthorne's niece and her three children moved in next door, something extraordinary happened. Matt met Gerallt, the strange boy destined to become his best friend. And when Gerallt divulged the Hawthorne's family secret, it changed Matt's life forever. The Secrets of Hawthorne House is the story of an unlikely friendship, the clash of two radically different cultures, secret magic, and a search for the lost Hawthorne treasure.
OPEN (Object-oriented Process, Environment and Notation) is an international de facto standard object-oriented development method developed and maintained by the OPEN Consortium. OPEN consists of the OPEN Modeling Language (OML) as well as process, metrics, etc. This book specifies OML, a small but vital component of the complete OPEN method. It uses diagrams, tables, Web references and text to present the syntax, semantics and rationale behind OML. It documents version 1.0 of OML so that object-oriented modelers can learn and use it, and upperCASE vendors can support it.
The beautiful young photojournalist, Aileen O’Shannon, is not who she seems. For centuries, she has been a demon hunter, a sorceress who has tracked and killed small bands of demons that occasionally crossed into our world. But that changed when she joined Dr. Jack Oswald’s expedition to study one of hundreds of huge holes that mysteriously appeared overnight in the frozen tundra north of the Arctic Circle. Instead of small sporadic incursions, hordes of demons now pour from these hell holes like water from a sieve. With bombing little more than a losing game of whack-a-mole, Earth’s armies are unable to destroy the portals. When Jack suggests a desperate plan, he is drafted to join Aileen and a team of other sorcerers and Army Rangers to travel to the demon homeworld. Once there, they will unleash a plague virus and set off a nuclear bomb to destroy the portal complex. It’s a suicide mission. But Aileen has given Jack’s wife her word to bring him back safely, and the demons have already killed three men under her protection. Just how far will Aileen go to avoid losing another?
It’s August in Alaska, and geology professor Jack Oswald prepares for the new school year. But when hundreds of huge holes mysteriously appear overnight in the frozen tundra north of the Arctic Circle, Jack receives an unexpected phone call. An oil company exec hires Jack to investigate, and he picks his climatologist wife and two of their graduate students as his team. Uncharacteristically, Jack also lets Aileen O’Shannon, a bewitchingly beautiful young photojournalist, talk him into coming along as their photographer. When they arrive in the remote oil town of Deadhorse, the exec and a biologist to protect them from wild animals join the team. Their task: to assess the risk of more holes opening under the Trans-Alaska Pipeline and the wells and pipelines that feed it. But they discover a far worse danger lurks below. When it emerges, it threatens to shatter Jack’s unshakable faith in science. And destroy us all....
An anthology of uncanny short stories to read late at night from the prize-winning author of the Hell Holes series and The Secrets of the Hawthorne House. Read stories about a very special birthday party, a memorable farmer’s daughter, a collector of unique collectables, the investigation of a Romanian strigoi, an unintended consequence of using voodoo dolls for revenge, and an arsonist considering working at a crematorium.
When hundreds of huge holes mysteriously appeared overnight in the frozen tundra north of the Arctic Circle, geologist Jack Oswald picked Angele Menendez, his climatologist wife, to determine if the record temperatures due to climate change was the cause. But the holes were not natural. They were unnatural portals for an invading army of demons. Together with Aileen O'Shannon, a 1,700-year-old sorceress demon-hunter, the three survivors of the research team sent to study the holes had only one chance: to flee down the dangerous Dalton Highway towards the relative safety of Fairbanks. However, the advancing horde of devils, imps, hellhounds, and gargoyles will stop at nothing to prevent their prey from escaping. It is a 350-mile race with simple rules. Win and live; lose and die...
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.