Software engineering - layered technology, Computer Engineering

Software Engineering - Layered Technology

Although various authors have developed personal definitions of software engineering, a definition given by Fritz Bauer at the seminal conference on the subject still provides a forum for discussion:

"Software engineering is the establishment and use of sound engineering principles so as to obtain economically software that is reliable and works efficiently on real machines. "

Every reader will be tempted to add further to this definition. It says very little about the technical aspects of software quality; it does not directly state the need for customer satisfaction or in-time product delivery; it omits mention of the significance of measurement and metrics; it does not tell the significance of a mature process. And yet, Bauer's definition gives us a baseline. What are the "sound engineering principles" that can be applied to computer software development? How do we "economically" construct software so that it is "reliable"? What is the requirement to develop computer programs that work "efficiently" on not one but various different "real machines"? These are the questions that persistently challenge software engineers.

The IEEE [IEE93] has developed a more complete definition when it states;

"Software Engineering (1)  The  application of  a  systematic, disciplined, quantifiable approach to  the operation, development, and maintenance of software that is, the application of engineering to software. (2) The study of approaches as in (1) ".

Posted Date: 10/19/2012 9:16:34 AM | Location : United States







Related Discussions:- Software engineering - layered technology, Assignment Help, Ask Question on Software engineering - layered technology, Get Answer, Expert's Help, Software engineering - layered technology Discussions

Write discussion on Software engineering - layered technology
Your posts are moderated
Related Questions
Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a

FACSIMILE : This is often known as 'fax' and it represents the interface between reprographic and computer technology. By using fax, the contents of a sheet of paper (text or illu

Write a short notes on storage classes in C. Every variable and function in C has two attributes : type and storage class. The four storage classes are automatic, external, reg

Describe the properties of Attributesand operations Attributes are named slots for data values that belong to the class. Previously we have studied in MCS-024, different o

Layout view is helpful for laying out Web pages. However you can adjust most of your design elements in Layout view, certain changes should be completed in Standard view. When you

What happens to logic after synthesis, which is driving an unconnected output port that is left open (, that is, noconnect) during its module instantiation? An unconnected out

What are advantages and disadvantages of TTL gates design with Wired-AND connection ? Ans. Advantages and disadvantages In this IC added logic is performed with

The following is a requirements specification for a simple game based on a player moving through a maze of connected rooms from an entrance door to an exit door. The required sy

Object-Oriented Control Architecture For Ams Manufacturing Introduction     In recent past, the industrial sectors have started presenting additional inclination toward

What is arithmetic pipeline?  Pipeline arithmetic units are usually found in very high speed computers. They are used to execute floating point operations, multiplication of fi