Case Study #2

  • Uncategorized

CaseStudy #2

InstitutionAffiliation

CaseStudy #2

Technologyand Product Review for Application Lifecycle Management Tools

Thereare multiple businesses across the world. Each particular businessgets to carry out its operations in different preferred ways.However, when a company generates an idea, it is necessary that itprotects it from being corrupted. During the changing phase of anapplication, the organization should ensure that all the features andcomponents get protection against corruption and confidentiality.This can be done using software referred to as the ApplicationLifecycle Management (Rossberg,2014).This is a regulation form of software application with the ability totrack each phase of the progress of the idea until it evolves into anapplication and eventually retires. ALM gives a company the capacityto manage all the features of the software from the early stagesuntil the software retires (Rossberg,2014).A business can also determine the retirement of a good after multiplefruitful years of use or if its maintenance cost is too high throughthe ALM application software. The application software comprises ofseveral components that are designed to meet the needs of thecustomers in a systematic step. When the application is inproduction, the constituents including the version control,performance monitoring, and event management, are used in the controlof the on-going support. ALM is quite useful in providing support toorganizations from their initiation all the way to retiring.

Forcompanies involved in the generation of software for informationtechnology security, a properly-installed ALM will guarantee thedevelopment of effective and high-value produce. Besides, it’sessential to note the five pillars of information security, whichcomprise of protection, reaction, recognition, documentation, andinhibition. Through the use of the ALM software, the developers candetect the errors and troubles that might render a specific softwareproduct susceptible to security risks (Barkanaet al., 2014).ALM also provides a platform for trial-and-error to enhance theproduct’s integrity much further. Furthermore, documentation isessential in the ALM since it facilitates the organization andrecording of other processes in relation to software development.

Features

Allcompanies require protection of their assets through the cybersecurity applications. The organizations, therefore, need theInternational Business Machines (IBM) Corporation to protect theirapplications throughout their life. IBM is a technological firmlocated in the United States that offers several options insupporting the various features of the application’s lifespan(Vernaillen,2016).These features include the lifetime traceability, which enables theCLM to achieve insights and influence the decision making. Thereal-time planning is deliberated to connect the plans to the actualjobs thus enhancing the delivery time. Additionally, in-contextcollaboration deals with the requirements, codes, designs, plans andtasks which influence better decision making. Developmentintelligence is also one of the characteristics used in settingmeasurable objectives for ease in tracking. Moreover, constantimprovement is necessary for providing enhancement in both theincremental as well as a breakthrough of various projects through therecycle of the proper practices.

Thecompany refers to these features of the software as the RationalCollaborative Lifecycle Management (CLM), an ALM solution, whichcomprises of the IBM Rational DOORS Next Generation, IBM RationalTeam Concert and the IBM Rational Quality Manager products (Barkanaet al., 2014).The CLM is a firmly integrated suite of apparatuses that offersautomation for each part of the software development lifecycle fromthe requirements all the way to the testing. The CLM applicationcomprises of the Rational Requirements Composers (RRC), which are therequirements for gathering and management. Moreover, the RationalDOORS Next Generation holds the requirements administrationfunctionality of RRC together with the user interface of DOORS. TheRational Team Concert (RTC) breaks down the requirements intobusiness needs or active stories (Kranz,2017).The RTC is also in charge of the Project management, source codeadministration as well as the building of automation. The RationalQuality Manager (RQM) maps the test cases to the requirements andalso develops and controls the test cases. The CLM facilitates a fastand more cost effective delivery of the IT project. The collaborativeteams work together to effectively produce the software.

Capabilities

TheIBM Collaborative Lifecycle Management supports and powers thegeneration process for the software. The CLM facilitates the creationof the requirements of the software. Once the requirements have beencreated, the CLM facilitates the project management and coding of thesoftware, to its testing. The requirements could spontaneously beapplied as the foundation for the agile stories. The code is,thereafter, developed to implement each story and placed in the CLM’ssource code repository, where it is stored (Johnson,2015).The version history of the software is traced together with itsconnection to the story. The CLM is one of the most effectivelifecycle automation products that are available in the world today.It ensures the coordination of the building of the source code togenerate executable software. Besides, the requirements and storiesproduced can be used in writing tests that are stored in the testadministration component of the CLM. The performance of the tests isalso monitored with the raising and tracking of the flaws in thesystem. Through the effectiveness of CLM, the testers are able totrace the extent of the tests ensuring that every functional pieceacquires a test. Moreover, every individual test runs and is passed.Therefore, the IBM Collaborative Lifecycle Management is necessaryfor supporting and executing the software projects from the start tothe final point.

Deficiencies

TheIBM CLM has limited warranty since it only warrants that a programwill conform to its specifications if it is used in the specifiedoperating environment. This warranty is only applicable to theoriginal section of the program. The Rational Team Concert alsolimits operations due to the long period of time it takes to searchor return a result when a new character is used as a query. Multiplesubmissions of queries may also lead to blocking of the whole systemexposing it to cyber criminals.

HowIBM CLM Promotes Cyber Security

TheIBM CLM is applied in the end on scaled agile frameworks or SAFesupport for the active teams and corporations. With CLM, theorganization will be able to operate effectively using the alreadyinstalled infrastructure and adopt the SAFe and start operating withthe newly developed product. CLM also provides quick and easy accessto the SAFe guidance. The product hence reduces the risks as well asenhancing the system’s resistance to attacks leading to a decreasein its vulnerabilities. The DOORS Next Generation improves thestructure management through merging the automated units thusreducing the conflicts that occur in the requirements section due tothe parallel changes (Kranz,2017).Therefore, this ensures that the organization guarantees the 5Pillars IA are upheld thus promoting development.

Furthermore,the Rational Quality Manager (RQM) supplements the abilities of theconfiguration administration of the test artifacts through thesupporting reconciliation process between various requirements(Zaphirisand Ioannou, 2016).The suspect links are stretched to link validity enabling them tounderstand the changes in the related dependencies. The link providesthree states including valid, suspect, or invalid, which is recalledthroughout the configurations. The RQM provides protection for allthe data by reviewing the changes and updating the test case henceenhancing the 5 Pillar Information Security for Aberdeen SoftwareCompany.

Inaddition, the IBM Rational Team Concert Quick Planner are used in thedeveloper speed and enhanced applications. This team stimulates theactive developer adoptions between the active teams in order to makequick deliveries of data. This facilitates more production in themultiple projects developers. With the user interface styling, thereis close integration between the Track and Plan modules easing thenavigations between the components. The links are also easilytraceable thus improving cyber security as all the data can be easilytraced without any hardships. The reports are then made available foruse thus ensuring the 5 Pillar IA are upheld (Johnson,2015).These features enable the promotion of effective operations in thebusiness and hence growth.

Finally,it is necessary that all organizations integrate system applicationsthat protect their data from being corrupted. Using the ALM, theorganizations can employ the IBM Rational Collaborative LifecycleManagement in order to ensure the protection of all programs. The IBMCLM is capable of ensuring that all the programs are prevented fromthe cyber-crimes through upholding the 5 Pillar Information Securityand Assurance. With the installation of this project, AberdeenSoftware Company will have smooth operations due to the proper cybersecurity in all its systems and hence promote growth and developmentin the business.

References

Barkana,E., Bertoletti, A., Bussaglia, S., Calalang, E., Kapciak, S.,Olivera, L., Polastri, S. and Silva, F. (2014). Creatingintegrated IBM WebSphere solutions using Application LifecycleManagement.1st ed. New York: IBM Redbooks

Johnson,R. (2015). Securitypolicies and implementation issues, second edition.1st ed. Burlington, MA: Jones &amp Bartlett Learning.

Kranz,M. (2017). Buildingthe internet of things.1st ed. New York, NY: John Wiley et Sons.

Rossberg,J. (2014). Beginningapplication lifecycle management(1st ed.). Berkeley, CA: Apress.

Vernaillen,R. (2016). IBMi 7.2 technical overview with technology refresh updates(1st ed.). [S.l.]: IBM Redbooks.

Zaphiris,P. and Ioannou, A. (2016). Learningand collaboration technologies.1st ed. Berlin: Springer.