11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

444 s<strong>of</strong>tware piracy <strong>and</strong> counterfeiting• Detailed specification <strong>of</strong> what the program will berequired to do. This can include developing a prototype<strong>and</strong> getting user’s reaction to it.• Creation <strong>of</strong> a suitable program architecture—algorithm(s) <strong>and</strong> the data types, objects, or other structuresneeded to implement them (see algorithm).• Coding—writing the program language statementsthat implement the structure.• Verification <strong>and</strong> testing <strong>of</strong> the program using realisticdata <strong>and</strong> field testing (see quality assurance,s<strong>of</strong>tware).• Maintenance, or the correction <strong>of</strong> errors <strong>and</strong> adding<strong>of</strong> requested minor features (short <strong>of</strong> creating a newversion <strong>of</strong> the program).There are a number <strong>of</strong> competing ways in which to viewthis s<strong>of</strong>tware development cycle. The “iterative” or “evolutionary”approach sees s<strong>of</strong>tware development as a linearprocess <strong>of</strong> progress through the above steps.The “spiral” approach, on the other h<strong>and</strong>, sees the steps<strong>of</strong> planning, risk analysis, development, <strong>and</strong> evaluationbeing applied repeatedly, until the risk analysis <strong>and</strong> evaluationphases result in a go/no go to finish the project.The most commonly used approach is called waterfall.In it the results (output) <strong>of</strong> each stage become the input<strong>of</strong> the next stage. This approach is easiest for scheduling(see project management s<strong>of</strong>tware), since each stage isstrictly dependent on its predecessor. However, some advocates<strong>of</strong> this approach have included the ability for a givenstage to feed back to the preceding stage if necessary. Forexample, a problem found in implementation (coding) mayrequire revisiting the preceding design phase.Developing S<strong>of</strong>tware Engineering St<strong>and</strong>ardsTwo organizations have become prominent in the effort topromote s<strong>of</strong>tware engineering. The federally funded S<strong>of</strong>twareEngineering Institute (SEI) at Carnegie Mellon Universitywas established in 1984. Its mission statement is to:1. Accelerate the introduction <strong>and</strong> widespread use<strong>of</strong> high-pay<strong>of</strong>f s<strong>of</strong>tware engineering practices <strong>and</strong>technology by identifying, evaluating, <strong>and</strong> maturingpromising or underused technology <strong>and</strong> practices.2. maintain a long-term competency in s<strong>of</strong>tware engineering<strong>and</strong> technology transition.3. Enable industry <strong>and</strong> government organizations tomake measured improvements in their s<strong>of</strong>tware engineeringpractices by working with them directly.4. Foster the adoption <strong>and</strong> sustained use <strong>of</strong> st<strong>and</strong>ards<strong>of</strong> excellence for s<strong>of</strong>tware engineering practice.Since 1993, the IEEE <strong>Computer</strong> Society <strong>and</strong> ACM SteeringCommittee for the Establishment <strong>of</strong> S<strong>of</strong>tware Engineeringas a Pr<strong>of</strong>ession has been pursuing a set <strong>of</strong> goals that arelargely complementary to those <strong>of</strong> the SEI:1. Adopt St<strong>and</strong>ard Definitions2. Define Required Body <strong>of</strong> Knowledge <strong>and</strong> RecommendedPractices (In electrical engineering, forThe Spiral Model visualizes s<strong>of</strong>tware development as a process <strong>of</strong>planning, risk analysis, development, <strong>and</strong> evaluation. The cyclerepeats until the project is developed to its full scope.example, electromagnetic theory is part <strong>of</strong> the body<strong>of</strong> knowledge while the National Electrical SafetyCode is a recommended practice.)3. Define Ethical St<strong>and</strong>ards4. Define Educational Curricula for (a) undergraduate,(b) graduate (MS), <strong>and</strong> (c) continuing education(for retraining <strong>and</strong> migration).Further ReadingBooch, Grady. “The Promise, the Limits, the Beauty <strong>of</strong> S<strong>of</strong>tware.”March 8, 2007. Lecture before the British <strong>Computer</strong> Society.Available online. URL: http://www.bcs.org/server.php?show=ConWebDoc.10367. Accessed August 21, 2007.Brooks, Frederick. The Mythical Man-Month: Essays on S<strong>of</strong>twareEngineering. 20th anniversary ed. Reading, Mass.: Addison-Wesley, 1995.Christensen, Mark J., <strong>and</strong> Richard H. Thayer. The Project Manager’sGuide to S<strong>of</strong>tware Engineering’s Best Practices. Los Alamitos,Calif.: IEEE <strong>Computer</strong> Society Press, 2001.McConnell, Steve. After the Gold Rush: Creating a True Pr<strong>of</strong>ession<strong>of</strong> S<strong>of</strong>tware Engineering. Redmond, Wash.: Micros<strong>of</strong>t Press,1999.S<strong>of</strong>tware Engineering Coordinating Committee (IEEE <strong>Computer</strong>Society <strong>and</strong> Association for Computing Machinery.) Availableonline. URL: http://www.acm.org/serving/se/homepage.html.Accessed August 21, 2007.Sommerville, Ian. S<strong>of</strong>tware Engineering. 8th ed. Boston: Addison-Wesley, 2006.s<strong>of</strong>tware piracy <strong>and</strong> counterfeitingAccording to surveys by analysis firm IDC, s<strong>of</strong>tware piracyaccounted for $7.3 billion in losses to the U.S. s<strong>of</strong>twareindustry in 2006, while reducing its expansion <strong>and</strong> thus jobcreation. (This is part <strong>of</strong> a larger picture in which, accordingto a Gallup study, 22 percent <strong>of</strong> adults in the United Statesreported having bought some sort <strong>of</strong> counterfeit product.) Abit <strong>of</strong> Web searching (or even reading spam in one’s in-box)suggests that thous<strong>and</strong>s <strong>of</strong> sites <strong>of</strong>fer “cracked” s<strong>of</strong>tware

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!