SlideShare a Scribd company logo
1 of 66
Download to read offline
Quality Attributes in Software
Architecture
QualityAttributes in SoftwareArchitecture
Nov 2011
Gang Tao
Confidential
Levels of RequirementBusiness
Requirements
Vision and Scope
Documents
User
Requirements
Quality
Attributes
Other
Nonfunctional
Requirements
Use Cases
Functional
Requirements
Software Requirements
Specification
Confidential
Quality Attributes
Responsiveness
Confidential
Responsiveness
• Responsiveness is defined as how quickly a system
responds to user input.
• Long delays can be a major cause of user frustration, or let the user
believe the system is broken or that a command or input has been
ignored.
• Responsiveness is not same as performance.
Confidential
Responsive Matters
Confidential
Responsiveness
• All Operations Must Be Responsive
Click Me
Under normal IO load, any operation must
return to the user within 3 seconds.
Confidential
A Case Study
• getVersion() methods cause serious performance
downgrade.
Confidential
What causes the performance issue?
• Complexity
• Indirection
• Repetitions
• Bad Design
• I/O
• … …
Confidential
Price of Optimization
• Loss Readability
• Increase Complexity
• Hard to maintain and extend
• Introduce conflict
• … …
Confidential
SAP Standard Reference
Scalability
Confidential
Scalability
• Scalability refers to a systems ability to handle increased
adversity in its environment in a manner that is graceful and
predictable.
• Adversity comes in two dimensions:
• Increased managed content
• Decreased system resources
Confidential
Scale Up VS Scale Out
Confidential
Scalability Considerations
• Increased Managed Content Must Scale Appropriately
• Maintain Viability as System Resources Decrease
• UI Data Presentation Scaling
• Load Sharing Considerations
Usability
Confidential
Usability
Confidential
Usability
• Usability is the customer’s ability to get work done with the
system in an efficient and pleasing manner.
• A usable system should build on skills a user already has
and not require new or unique knowledge to use the system.
• Each new function the user encounters should follow a
similar pattern so that once a user has learned one function
others are intuitive to learn.
Confidential
Usability Notions
• More efficient to use—takes less time to accomplish a
particular task
• Easier to learn—operation can be learned by observing the
object
• More satisfying to use
Confidential
Usability Composition
• Learnability
• How easy is it for users to accomplish basic tasks the first time they
encounter the design?
• Efficiency
• Once users have learned the design, how quickly can they perform tasks?
• Memorability
• When users return to the design after a period of not using it, how easily
can they re establish proficiency?
• Errors
• How many errors do users make, how severe are these errors, and how
easily can they recover from the errors?
• Satisfaction
• How pleasant is it to use the design?
Confidential
Rule One – Don’t Make Me Think
Confidential
Rule Two - Know Your Users
Confidential
Rule Three – Be Consistent
• Be Consistent
• Things that look the same should act the same.
• Things that look different should act different.
Confidential
Usability VS. User Experiences
• Free Discussion
Confidential
Case Study & Samples
Confidential
Some References of Usability
• [1]《Designing Interfaces》,中文版名为《Designing Interfaces中文版》
• [2]《Usability Engineering》,中文版名为《可用性工程》
• [3]《The Design of Everyday Things》,中文版名为《设计心理学》
• [4]《About Face 3》,中文版名为《交互设计精髓》
• [5]《Designing Web Interfaces》,中文版名为《Web界面设计》
• [6]《Designing the Obvious》,中文版名为《一目了然——Web软件显性设计之路》
• [7]《Communicating Design》,中文版名为《设计沟通十器》
• [8]《Don’t Make Me Think》,中文版名为《点石成金:访客至上的网页设计秘笈》
• [9]《Designing From Both Sides of the Screen》,内外兼修的设计,尚未出版文版
• [10]《UI Design for Programmers》,程序员之用户界面设计,尚未出版中文版
• [11]《The Inmates are Running the Asylum》,中文版名为《交互设计之路——让高科
技产品回归人性》
Security
Confidential
Security
• Security is defined as being protected against danger or loss
Confidential
Security Model
Authentication Authorization
Audit Encryption
Confidential
Refereneces
• OWASP Top Ten
• Seven Pernicious Kingdoms
• Sans Top 25
• Common Weakness Enumerations
Accessibility
Confidential
Accessibility
• “accessibility“ refers to the possibility for everyone, including
and especially people with disabilities, to access and use
technology and information products.
Confidential
Case Study : Choose the right color
Serviceability
Confidential
Serviceability
• Serviceability refers to the ability to monitor systems, identify
issues, perform root cause analysis, and provide
maintenance in order to solve a problem and restore the
system to a functioning state.
Confidential
Serviceability
• Diagnostic Infrastructure Should Not Be Intrusive
• Issues that arise on a customer site that require engineering
involvement should be able to be diagnosed without requiring that the
affected system gets taken off line, new binaries get installed, or a
debugger gets installed.
Confidential
Serviceability
• Solutions Must Support a Customer-Centric Service
Model
• Common issues are able to be root-caused and addressed by
customers or entry level technical service representatives over the
phone.
• Meaningful log messages, alerts, and trouble-shooting trees all must
be considered to be mandatory and complementary components for
servicing a system.
Confidential
Cost of Service
Customer Self Service
Web Remote Support,
BBS/MSN
Phone/Email Support
On Site Support
Extensibility
Confidential
Extensibility
• With extensibility, the design and implementation takes into
consideration future growth.
Confidential
Extensibility Considerations
• Design and Implement With Scale in Mind
• Producers of Interfaces Must Support the Ability to
Minimize the Amount of Data Returned to a Client
• Clients Should Minimize Data Traffic and Network
Requests
• Business Logic Must Be Centralized
• Revision Compatibility Focus
Distributability
Confidential
Distributability
• Distributability is defined as the ability to manage a group of
systems as one unit and to perform management from any
location in the network.
• Decide whether a component will run in process, in a
separate process on the same machine, or on a remote
machine.
Confidential
Layers and Tiers
• Layers are a means of logical separation, and are an
architectural pattern to separate concerns
• Tiers are the physical separation of an application.
Confidential
Distributed Architecture
• Web Service
• CORBA
Maintainability
Confidential
Maintainability
• Maintainability means the ease with which a system can be
modified in order to correct defects, meet new functionality,
make maintenance easier, or cope with a changing
environment.
Confidential
Maintainability Tips
• Adhere to Coding Standards
• Avoid duplication
• Story Telling with your code
• Keep your code simple
Portability
Confidential
Portability
• Portability is defined as the ability to reuse features and
utility source code, across multiple Operating systems.
• By having an OS abstraction layer that implements platform specific
utilities, such as locks and shared memory.
• Can also be achieved by compiling different segments of code,
depending on the platform the software is to be run on.
Reliability
Confidential
Reliability (Availability)
• Reliability is defined as the ability of a system, to function
correctly, under any reasonable circumstance.
• Reasonable can include adverse situations, in which unexpected (but
supported) usage occurs.
• For Storage systems, this includes putting extreme I/O load on the
system, but expecting the system to be manageable.
Confidential
Availability
MTBF – Mean Time Between Failure
MTTR – Mean Time to Recovery
Availability= MTBF/(MTBF+MTTR)
Confidential
Reliability Consideration
• All errors must be handled in a graceful manner
• The Storage System must be manageable, without external
dependencies.
• There should be NO single point of failure
Testability
Confidential
Testability
• Software testability is the degree to which a software
artifact (i.e. a software system, software module,
requirements- or design document) supports testing in a
given test context.
Confidential
Testability of Software Components
• Controllability: The degree to which it is possible to control the state of
the component under test (CUT) as required for testing.
• Observability: The degree to which it is possible to observe
(intermediate and final) test results.
• Isolateability: The degree to which the component under test (CUT) can
be tested in isolation.
• Separation of concerns: The degree to which the component under test
has a single, well defined responsibility.
• Understandability: The degree to which the component under test is
documented or self-explaining.
• Automatability: The degree to which it is possible to automate testing of
the component under test.
• Heterogeneity: The degree to which the use of diverse technologies
requires to use diverse test methods and tools in paralle
Confidential
Testability of Requirements
• consistent
• complete
• unambiguous
• quantitative
• verifiable in practice
Compatibility
Confidential
Compatibility
• Backward
• Forward
Summary
Confidential
Quality Attributes Relationship Matrix
Responsive
ness
ReliabilitySecurityUsability Extensibility
Reliability
Security
Extensibility
Usability
Responsive
ness
Negative Impact
No Impact
Positive Impact
Confidential
Quality Model
• McCall/GE Quality Model
• ISO 9126
Confidential
Business Qualities
• Time to Market
• Cost and Benefit
• Project Lifetime
• Target Market
• Rollout schedule
• Integration with Legacy System
Confidential
Symptoms of Bad Architecture
• Rigidity
• the system is hard to change because every change forces many
other changes.
• Fragility
• changes cause the system to break in conceptually unrelated places.
• Immobility
• it’s hard to disentangle the system into reusable components.
• Viscosity
• doing things correctly is harder than doing things incorrectly.
• Opacity
• the code is hard to read and understand. It does not express its intent
well.

More Related Content

What's hot

Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsGatte Ravindranath
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6Alan Dix
 
Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality AttributesHayim Makabee
 
formal verification
formal verificationformal verification
formal verificationToseef Aslam
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3Alan Dix
 
Spiral Model - Software Development Life Cycle (SDLC)
Spiral Model - Software Development Life Cycle (SDLC)Spiral Model - Software Development Life Cycle (SDLC)
Spiral Model - Software Development Life Cycle (SDLC)ACM-KU
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineeringRa'Fat Al-Msie'deen
 
HCI - Chapter 4
HCI - Chapter 4HCI - Chapter 4
HCI - Chapter 4Alan Dix
 
9. Software Implementation
9. Software Implementation9. Software Implementation
9. Software Implementationghayour abbas
 
Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6Abdul Basit
 
Feature Selection in Machine Learning
Feature Selection in Machine LearningFeature Selection in Machine Learning
Feature Selection in Machine LearningUpekha Vandebona
 
Design concept -Software Engineering
Design concept -Software EngineeringDesign concept -Software Engineering
Design concept -Software EngineeringVarsha Ajith
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slidesSrinath Dhayalamoorthy
 
Introduction to Software Engineering SE1
Introduction to Software Engineering SE1Introduction to Software Engineering SE1
Introduction to Software Engineering SE1koolkampus
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementPratik Tandel
 
Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction swarna sudha
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reductionmrizwan969
 
Line of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point MatricLine of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point MatricAnkush Singh
 

What's hot (20)

Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design Patterns
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6
 
Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality Attributes
 
formal verification
formal verificationformal verification
formal verification
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3
 
Spiral Model - Software Development Life Cycle (SDLC)
Spiral Model - Software Development Life Cycle (SDLC)Spiral Model - Software Development Life Cycle (SDLC)
Spiral Model - Software Development Life Cycle (SDLC)
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineering
 
HCI - Chapter 4
HCI - Chapter 4HCI - Chapter 4
HCI - Chapter 4
 
9. Software Implementation
9. Software Implementation9. Software Implementation
9. Software Implementation
 
Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6
 
Feature Selection in Machine Learning
Feature Selection in Machine LearningFeature Selection in Machine Learning
Feature Selection in Machine Learning
 
Design concept -Software Engineering
Design concept -Software EngineeringDesign concept -Software Engineering
Design concept -Software Engineering
 
Digital image processing
Digital image processing  Digital image processing
Digital image processing
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slides
 
Introduction to Software Engineering SE1
Introduction to Software Engineering SE1Introduction to Software Engineering SE1
Introduction to Software Engineering SE1
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
 
Line of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point MatricLine of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point Matric
 

Similar to Quality attributes in software architecture

Non Functional Requirement.
Non Functional Requirement.Non Functional Requirement.
Non Functional Requirement.Khushboo Shaukat
 
Design principles & quality factors
Design principles & quality factorsDesign principles & quality factors
Design principles & quality factorsAalia Barbe
 
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Securitylawmoore
 
Software Architecture
Software ArchitectureSoftware Architecture
Software ArchitectureAhmed Misbah
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?OSSCube
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdfJayanthi Kannan MK
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering MethodologiesNesrine Shokry
 
Software Quality Factors-Non Functional Rq.pptx
Software Quality Factors-Non Functional Rq.pptxSoftware Quality Factors-Non Functional Rq.pptx
Software Quality Factors-Non Functional Rq.pptxsingbling
 
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...Microservices at Scale: How to Reduce Overhead and Increase Developer Product...
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...DevOps.com
 
Component based development | what, why and how
Component based development | what, why and howComponent based development | what, why and how
Component based development | what, why and howRakesh Kumar Jha
 
Quality Concept
Quality ConceptQuality Concept
Quality ConceptAnand Jat
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGSri Latha
 
Software Defects and SW Reliability Assessment
Software Defects and SW Reliability AssessmentSoftware Defects and SW Reliability Assessment
Software Defects and SW Reliability AssessmentKristine Hejna
 
KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...
KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...
KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...KARUNANIDHI ETHIRAJ
 
Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)Peter Tröger
 
Lecture3.se.pptx
Lecture3.se.pptxLecture3.se.pptx
Lecture3.se.pptxAmna Ch
 
Software engineering lecture 1
Software engineering  lecture 1Software engineering  lecture 1
Software engineering lecture 1JusperKato
 

Similar to Quality attributes in software architecture (20)

Non Functional Requirement.
Non Functional Requirement.Non Functional Requirement.
Non Functional Requirement.
 
Design principles & quality factors
Design principles & quality factorsDesign principles & quality factors
Design principles & quality factors
 
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Security
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering Methodologies
 
Software Quality Factors-Non Functional Rq.pptx
Software Quality Factors-Non Functional Rq.pptxSoftware Quality Factors-Non Functional Rq.pptx
Software Quality Factors-Non Functional Rq.pptx
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...Microservices at Scale: How to Reduce Overhead and Increase Developer Product...
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...
 
Component based development | what, why and how
Component based development | what, why and howComponent based development | what, why and how
Component based development | what, why and how
 
Quality Concept
Quality ConceptQuality Concept
Quality Concept
 
Journey to the center of DevOps - v6
Journey to the center of DevOps - v6Journey to the center of DevOps - v6
Journey to the center of DevOps - v6
 
CIS512_Topic1.pptx
CIS512_Topic1.pptxCIS512_Topic1.pptx
CIS512_Topic1.pptx
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
 
Software Defects and SW Reliability Assessment
Software Defects and SW Reliability AssessmentSoftware Defects and SW Reliability Assessment
Software Defects and SW Reliability Assessment
 
KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...
KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...
KARUNANIDHI E_ QA_SOFTWARE TESTING 5+ YEARS EXP IN AUTOMATION(Selenium) & MAN...
 
Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)
 
Lecture3.se.pptx
Lecture3.se.pptxLecture3.se.pptx
Lecture3.se.pptx
 
Software engineering lecture 1
Software engineering  lecture 1Software engineering  lecture 1
Software engineering lecture 1
 

More from Gang Tao

Scale machine learning deployment
Scale machine learning deploymentScale machine learning deployment
Scale machine learning deploymentGang Tao
 
Critical thinking
Critical thinkingCritical thinking
Critical thinkingGang Tao
 
Cloud monitoring
Cloud monitoringCloud monitoring
Cloud monitoringGang Tao
 
Big Data Computing Architecture
Big Data Computing ArchitectureBig Data Computing Architecture
Big Data Computing ArchitectureGang Tao
 
Splunk Spark Integration
Splunk Spark IntegrationSplunk Spark Integration
Splunk Spark IntegrationGang Tao
 
Regression
RegressionRegression
RegressionGang Tao
 
Bayesian Classification
Bayesian ClassificationBayesian Classification
Bayesian ClassificationGang Tao
 
Great bychoice
Great bychoiceGreat bychoice
Great bychoiceGang Tao
 
Data Science Introduction
Data Science IntroductionData Science Introduction
Data Science IntroductionGang Tao
 
Now you see it
Now you see itNow you see it
Now you see itGang Tao
 

More from Gang Tao (10)

Scale machine learning deployment
Scale machine learning deploymentScale machine learning deployment
Scale machine learning deployment
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
 
Cloud monitoring
Cloud monitoringCloud monitoring
Cloud monitoring
 
Big Data Computing Architecture
Big Data Computing ArchitectureBig Data Computing Architecture
Big Data Computing Architecture
 
Splunk Spark Integration
Splunk Spark IntegrationSplunk Spark Integration
Splunk Spark Integration
 
Regression
RegressionRegression
Regression
 
Bayesian Classification
Bayesian ClassificationBayesian Classification
Bayesian Classification
 
Great bychoice
Great bychoiceGreat bychoice
Great bychoice
 
Data Science Introduction
Data Science IntroductionData Science Introduction
Data Science Introduction
 
Now you see it
Now you see itNow you see it
Now you see it
 

Recently uploaded

UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 

Recently uploaded (20)

UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 

Quality attributes in software architecture