Skip to main content

Context for Managed Evolution

  • Chapter
  • First Online:
Future-Proof Software-Systems
  • 1165 Accesses

Abstract

In the previous chapter, architecture principles have been introduced, explained, and justified. A number of essential architecture principles are defined in part 2. Architecture principles are the treasure of modern software architecting, distilled from decades of experience and valuable work of many architects. In order to generate the impact on actual systems, they must be taught, ingrained into the development process, and finally enforced. The organization of the company must be geared toward Principle-Based Architecting. The strategy of Managed Evolution, paired with Principle-Based Architecting, forms a robust ecosystem for the creation, maintenance, and evolution of today’s complex software-systems. This chapter introduces the context for the Managed Evolution, i.e., the most important processes to successfully implement Managed Evolution and Principle-Based Architecting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abran A (2010) Software metrics and software metrology. Wiley, Piscataway. ISBN 978-0-470-59720-0

    Book  Google Scholar 

  2. Annighoefer B (2015) Model-based architecting and optimization of distributed integrated modular avionics. Shaker, Aachen. ISBN 978-3-8440-3420-2

    Google Scholar 

  3. Aroms E (2012) NIST Special Publication 800-55 Rev1: Security Metrics Guide for Information Technology Systems. CreateSpace Independent Publishing Platform, Scotts Valley. ISBN 978-1-4701-5204-8

    Google Scholar 

  4. AUTOSAR (2017) Consortium: AUTOSAR—Layered Architecture https://www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_EXP_LayeredSoftwareArchitecture.pdf. Accessed 11 Mar 2018

  5. Beijer P, de Klerk T (2010) IT architecture—essential practices for IT business solutions. www.lulu.com. ISBN 978-1-4457-0603-0

  6. Boar BH (1999) Constructing blueprints for enterprise IT architectures. Wiley, New York. ISBN 978-0-471-29620-1

    Google Scholar 

  7. Brotby WK (2008) Information security management metrics—a definitive guide to effective security monitoring and measurement. Taylor & Francis Ltd, Boca Raton. ISBN 978-1-420-05285-5

    Google Scholar 

  8. Brotby WK, Hinson G (2013) PRAGMATIC security metrics—applying metametrics to information security. Taylor & Francis Ltd., Boca Raton. ISBN 978-1-439-88152-1

    Google Scholar 

  9. Cameron KS, Quinn RE (2011) Diagnosing and changing organizational culture: based on the competing values framework, 3rd edn. Jossey-Bass Publishers, San Francisco. ISBN 978-0-4706-5026-4

    Google Scholar 

  10. Czarnecki C, Dietze C (2017) Reference architecture for the telecommunications industry: transformation of strategy, organization, processes, data, and applications. Springer, Cham. ISBN 978-3-319-46755-9

    Book  Google Scholar 

  11. Dyer C (2018) The power of company culture: how any business can build a culture that improves productivity, performance and profits. Kogan Page Publishers, London. ISBN 978-0-749-48195-7

    Google Scholar 

  12. Ejiogu LO (2005) Software metrics—the discipline of software quality. Booksurge Publishing, Charleston. ISBN 978-1-4196-0242-9

    Google Scholar 

  13. Eusgeld I (2008) Dependability metrics—advanced lecture (GI-Dagstuhl Research Seminar, 2005), Springer Lecture Notes in Computer Science. ISBN 978-3-540-68946-1

    Google Scholar 

  14. Eveleens RLC (2006) Open systems integrated modular avionics—the real thing mission systems engineering, pp. 2-1–2-22. National Aerospace Laboratory, Report RTO-EN-SCI-176. https://www.sto.nato.int/publications. Accessed 11 Apr 2018

  15. Fenton N, Bieman J (2015) Software metrics - a rigorous and practical approach. Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series, 3rd edn. ISBN 978-1-439-83822-8

    Google Scholar 

  16. Francis R, Bekera B (2014) A metric and frameworks for resilience analysis of engineered and infrastructure systems. Reliability Engineering and System Safety. 121(2014), 90–103. https://blogs.gwu.edu/seed/files/2012/07/Reliability-Engineering-and-System-Safety-2014-Francis-1y5jkh9.pdf. Accessed 3 Sep 2017]

  17. Genero M, Piattini M, Calero C (2005) (eds.) Metrics for software conceptual models. Imperial College Press, London. ISBN 978-1-8609-4497-0

    Google Scholar 

  18. Goffee R, Jones G (2003) The character of a corporation – how your company’s culture can make or break your business, 2 edn. Profile Books, Ltd., London. ISBN 978-1-86197-639-0

    Google Scholar 

  19. Gupta R (2017) Measurement of software quality factors using CK metrics. LAP LAMBERT Academic Publishing, Saarbrücken. ISBN 978-3-6598-9331-5

    Google Scholar 

  20. Halvorson C (2016) People Management: everything you need to know about managing and leading people at work. CreateSpace Independent Publishing Platform. ISBN 978-1-5229-7235-8

    Google Scholar 

  21. Hayden L (2010) IT security metrics—a practical framework for measuring security and protecting data. McGraw-Hill Education Ltd., New York. ISBN 978-0-071-71340-5

    Google Scholar 

  22. Heidel R, Hoffmeister M, Hankel M, Döbrich U (2017) Basiswissen RAMI 4.0: Referenzarchitekturmodell und Industrie 4.0-Komponente. Beuth-Verlag, Berlin. ISBN 978-3-41026-482-8

    Google Scholar 

  23. Herrmann DS (2007) Complete guide to security and privacy metrics—measuring regulatory compliance, operational resilience, and ROI. Auerbach Publishers Inc., Boca Raton. ISBN 978-0-8493-5402-1

    Book  Google Scholar 

  24. Janicak CA (2015) Safety metrics—tools and techniques for measuring safety performance. Bernan Print, Maryland. Revised edition, . ISBN 978-1-5988-8754-9

    Google Scholar 

  25. Jaquith A (2007) Security Metrics – Replacing Fear, Uncertainty, and Doubt Addison-Wesley Professional, USA, ISBN 978-0-321-34998-9

    Google Scholar 

  26. Jones G, Goffee R (2003) The character of a corporation: How your company’s culture can make or break your business. Profile Books Ltd., London. ISBN 978-1-8619-7639-0

    Google Scholar 

  27. Jones C (2017) A guide to selecting software measures and metrics. Taylor & Francis Ltd., Boca Raton. ISBN 978-1-138-03307-8

    Book  Google Scholar 

  28. Kan SH (2002) Metrics and models in software engineering, 2nd edn. Addison-Wesley Longman, Amsterdam. ISBN 978-0-201-72915-3

    Google Scholar 

  29. Mateski M, Trevino CM, Veitsch CK, Harris M, Maruoka S, Frye J (2017) Cyber threat metrics. CreateSpace Independent Publishing Platform. ISBN 978-1-5424-7775-8

    Google Scholar 

  30. Murer S, Bonati B, Furrer FJ (2011) Managed evolution—a strategy for very large information systems. Springer, Heidelberg. ISBN 978-3-642-01632-5

    Book  Google Scholar 

  31. Thida O, Aung KO (2011) Analyzing object-oriented systems with software quality metrics—an empirical study for software maintainability. LAP LAMBERT Academic Publishing, Saarbrücken. ISBN 978-3-8433-7748-5

    Google Scholar 

  32. Poulin JS (1997) Measuring software reuse – principles, practices, and economic models. Addison Wesley Longman, Reading. ISBN 0-201-63413-9

    Google Scholar 

  33. Ross JW, Weill P, Robertson DC (2006) Enterprise Architecture as Strategy—Creating a Foundation for Business Execution. Harvard Business Review Press, Boston. ISBN 978-1-5913-9839-4

    Google Scholar 

  34. Scheid O (2015) AUTOSAR compendium, Part 1: application & RTE. CreateSpace Independent Publishing Platform, Bruchsal. ISBN 978-1-5027-5152-2

    Google Scholar 

  35. The open group (2011) TOGAF® Version 9.1, 10th edn. Van Haren Publishing, Zaltbommel. ISBN 978-9-0875-3679-4

    Google Scholar 

  36. Wong C (2000) Security metrics - a beginner’s guide. Osborne Publisher, New York. ISBN 978-0-071-74400-3

    Google Scholar 

  37. van’t Wout J, Waage M, Hartman H, Stahlecker M, Hofmann A (2010) The integrated architecture framework explained: why, what, how. Springer, Berlin. ISBN 978-3-642-11517-2

    Book  Google Scholar 

  38. Young C (2010) Metrics and methods for security risk management. Syngress Publishing, Burlington. ISBN 978-1-8561-7978-2

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frank J. Furrer .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Fachmedien Wiesbaden GmbH, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Furrer, F.J. (2019). Context for Managed Evolution. In: Future-Proof Software-Systems. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-19938-8_8

Download citation

Publish with us

Policies and ethics