Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A systems analysis of systems integration

Published: 01 January 2008 Publication History

Abstract

Most if not all complex issues stated as problems intended to result in new systems may be analyzed using systems decomposition and then constructed by synthesis. Systems decomposition starts with a complex problem that may or may not be obviously solvable and deconstructs that problem into smaller more tractable problems that can be solved. Construction by synthesis treats the smaller solutions as building blocks. The key practical advantage to synthesis is that it permits concurrency of construction. The subsystems may be developed and tested independently in isolation. Not until integration will subsystems need to be brought together. Decomposition and synthesis are the ideal in theory. In practice there can be any number of problems. Potentially the most fatal of flaws can occur during decomposition where errors in abstraction lead to over-idealization of subsystem independence. Over-idealization leads to under-specification, that what is presumed to be independent is not. Once errors in subsystem specification are made, independent development ensures that undetected dependencies will remain undetected. Subsystem dependencies are hidden time bombs, dormant until the subsystems are brought together for systems integration. In systems integration the latent dependencies interact and explode in a manner most combinatorial. The term often used to describe the excitation of dormant dependencies is "emergent behavior". Emergent behavior is but one factor that plagues the integration of large software intensive systems. There have been few published analyses or case studies dedicated to systems integration, in particular analyses deemed useful as "lessons learned" for others to follow. This paper takes a hesitant first step, not towards a "lessons learned" but towards the meta, an estimation of the boundaries of what it might take before one can provide a useful "lessons learned".

References

[1]
Edrice Addleman, "Programming is a Part Time Job", Proceedings of the 3rd annual ACM SIGUCCS conference on User services, ACM Press, November 1975 URL: http://portal.acm.org/citation.cfm?id=803713
[2]
William Ross Ashby, An Introduction to Cybernetics, Chapman & Hall, 1957 URL: http://pcp.vub.ac.be/books/IntroCyb.pdf
[3]
James Bach, "Exploratory Testing Explained", v.1.3 April 16, 2003 URL: http://www.satisfice.com/articles/et-article.pdf
[4]
Isaiah Berlin, "The Question of Machiavelli", The New York Review of Books, Vol. 17, No. 7, November 9, 1971 URL: http://www.nybooks.com/articles/10391 (A worthy mental exercise for the interested reader.)
[5]
Graham Button, Paul Dourish, "Technomethodology: Paradoxes and Possibilities", Conference on Human Factors in Computing Systems, CHI 96, 1996 URL: http://acm.org/sigchi/chi96/proceedings/papers/Button/jpd_txt.htm
[6]
P.G. Carlock, Fenton, R.E., "System of Systems (SOS) Enterprise Systems Engineering for Information Intensive Organizations", Systems Engineering, Vol.4, No. 4, 2001, Wiley (Rube Goldberg lives!)
[7]
J. M. Coetze, "Diary of a Bad Year", The New York Review of Books, Vol. 54, No. 12, July 19, 2007 URL: http://www.nybooks.com/articles/20390
[8]
Robert Coram, Boyd: The Fighter Pilot Who Changed The Art of War, Back Bay Books, 2002 URL: http://www.belisarius.com/modern_business_strategy/boyd/destruction/destruction_and_creation.htm
[9]
Bill Curtis, Krasner, Herb, Iscoe, Neil, "A Field Study of the Software Design Process for Large Systems", CACM, Vol. 31, No. 11., pp. 1268 -- 1287, November 1988 URL: http://portal.acm.org/citation.cfm?id=50089
[10]
Robert L. Glass, "A Deja-Vu Look at Software Engineering Researchers Who Care About Practice", CACM, Vol. 50, No. 8, August 2007, pp. 21--23 URL: http://delivery.acm.org/10.1145/1280000/1278226/p21-glass.pdf?key1 =1278226&key2=7029080911&coll=GUIDE&dl=&CFID=15151515&CFTOKEN=6184618
[11]
Harry Goldstein, "Who Killed the Virtual Case File", IEEE Spectrum, Vol. 42, No 8, September 2005 URL: http://www.spectrum.ieee.org/sep05/1455
[12]
Heylighen, F., C. Joslyn, "The Law of Requisite Variety", F. Heylighen, C. Joslyn and V. Turchin (editors): Principia Cybernetica, Brussels, August 31, 2001 URL: http://pespmc1.vub.ac.be/REQVAR.html
[13]
Rudy Hirschheim, Heinz K. Klein, "Four Paradigms of Information Systems Development", CACM, Vol. 32, No. 10, pp. 1199 -- 1216, October 1989 URL: http://portal.acm.org/citation.cfm?id=67933.67937
[14]
Spencer Johnson, Blanchard, Kenneth, Who Moved My Cheese, Putnam Adult, 1998 (As iconic as Gordon Gecko in Wall Street)
[15]
J.M. Juran, Managerial Breakthrough, McGraw-Hill, 1995
[16]
Peter G. W. Keen, "Information Systems and Organizational Change", CACM Vol. 24, No. 1, pp. 24 -- 33, 1981 URL: http://portal.acm.org/citation.cfm?id=358543&coll=portal&dl=ACM
[17]
Rob Kling, "Computers and Social Power", ACM SIGCAS Computers and Society, ACM Press, Vol. 5, No. 3, Fall 1974, pp. 6 -- 11,
[18]
Harold Hongju Koh, "Why the President (Almost) Always Wins in Foreign Affairs: Lessons of the Iran-Contra Affair", The Yale Law Journal, Vol. 97, No. 7, June 1988, pp. 1255--1342 (Worth asking a librarian for.)
[19]
A. J. Krygiel, "Behind the Wizard's Curtain: An Integration Environment for a System of Systems", Natl. Defense Univ. Pr, 1999 URL: http:// www.dodccrp.org (Downloadable e-print)
[20]
Tariq Malik, "Conflicting Reports Raise New Questions About Openness within NASA", Space News International, Vol. 10, Issue 35, Sept. 10, 2007, pp 6. (What? You expect me to do your homework for you?)
[21]
John W. Meyer, Rowan, Brian, "Institutionalized Organizations: Formal Structure as Myth and Ceremony", The American Journal of Sociology, Vol. 83, No. 2 (Sep., 1977), pp. 340--363 URL:http://links.jstor.org/sici?sici=0002-9602(197709)83%3A2%3C340%3AIOFSAM%3E2.0.CO%3B2-3 (Worth asking a librarian for.)
[22]
Christopher W. Moore, "NEGOTIATION", undated URL: http://www.au.af.mil/au/awc/awcgate/army/usace/negotiation.htm
[23]
Abbe Mowshowitz, "On Approaches to the Study of Social Issues in Computing", CACM, Vol. 24, No. 3, pp. 146 -- 155, March 1981 URL: http://portal.acm.org/citation.cfm?id=358592&dl=ACM&coll=GUIDE
[24]
Charles Perrow, The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters, Princeton University Press, 2007
[25]
Ken Richardson, The Making of Intelligence, Columbia University Press, 2000
[26]
Linda Rising, "Conversations on the Net: The Professionalism Issue", SIGCSE Bulletin, Vol. 18 No. 2, 1986
[27]
Scott Thorpe, How to Think Like Einstein, Barnes and Noble, 2000
[28]
Barbara W. Tuchman, The March of Folly: From Troy to Vietnam, Ballantine Books, 1985
[29]
Vaughan, Diane "NASA Revisited: Theory, Analogy, and Public Sociology", American Journal of Sociology, Vol. 112, 2006, pp 353--393 URL: http://www.journals.uchicago.edu/cgi-bin/resolve?id=
[30]
Roger von Oech, A Whack on the Side of the Head, Warner Books, 1983
[31]
Tim Weiner, Legacy of Ashes: The History of the CIA, Doubleday, 2007 (Many systems lessons not learned.)
[32]
Edward Yourdon, Death March, Prentice Hall, 1999

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 33, Issue 1
January 2008
54 pages
ISSN:0163-5948
DOI:10.1145/1344452
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2008
Published in SIGSOFT Volume 33, Issue 1

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Oct 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media