HW13: Chapter 17

17.10 Your company wishes to move from using desktop applications to accessing the same functionality remotely as services. Identify three risks that might arise and suggest how these risks may be reduced.

The first and most important risk I would consider if my company moved from using desktop applications to accessing the same functionality remotely as services is security. Transitioning to a software as a service (SaaS) model introduces a host of new security vulnerabilities. By using the cloud, the company transfers control of who has access to what data and at what level, which can result in data theft and loss. They also run the risk of encountering phishing or malware through the use of the internet. To combat the myriad of security risks associate with SaaS, the company should diligently research the service provider and, if possible, implement mechanisms on their side to add extra security layers. For example, they could choose an SaaS provider that can integrate with their enterprise and position behind their firewall of networks (2). Additional mechanisms could include security patches to the system or narrowed accessibility to certain features.

During the use of the software, the company would also risk extra costs both directly and associated with the time needed to transfer a large amount of data, such as video or high-quality images over the remote service. This is mentioned in Chapter 17 of the textbook on page 499. With the use of SaaS Data transfer takes place at network speeds, which may take extra time which in turn tries the company financially (time=money in any world, especially the software world!). Not only would this prove inconvenient, but the service provider could even charge directly by the amount of data transferred. To reduce these risks, the company should estimate how much money and time they will save by switching to using the software as a service. They should then compare this to the approximate time and money they would save by switching to a particular SaaS model. Money is saved, for example, by transferring the cost of software management to the provider. By weighing financial benefits against the aforementioned costs of SaaS, the company could make an informed decision about going with SaaS that would reduce the risk of a sticky situation.

The final risk associated with using software applications as services relates to the ramifications of terminating the contract if unsatisfied. The company will have little control of UI, feature, and even security measure changes made to the software by the service provider. All of these could be deal-breakers. Many times, the service needs to be paid upfront for a long period of time (1), meaning that the company would either lose money or need to stick with an unsatisfactory product for that time. Further, once the company does terminate its contract, it may prove difficult to obtain the data the service was storing and even more difficult to obtain it in a useful format, risking data loss. It seems this risk is best mitigated by reading the contract in full and contesting any issues to the service provider. Perhaps, it’s best to consider a company that has a short initial trial-period. The company should consider the scenario of needing to cancel the software and whether it could sustain its financial and structural impacts.

Sources: 1 - https://financesonline.com/10-saas-security-risks-concerns-every-user/ 2 - https://www.testcraft.io/saas-ultimately-safe/

2021

Meeting Charleston

2 minute read

Today, I attended the Alumni Symposium. During freshman year, one of my classes had encouraged attendance to the (then in-person) symposium, but I was unable...

Chapter 9

2 minute read

The journey does not end after a software project has gone live. This week’s reading was “Continuing the Journey” - Chapter 9 of Client-Centered Software Dev...

Chapter 6

3 minute read

“Databases reside at the heart of most software applications” (SD Chapter 6, pg 168). This week’s readings cover Chapter 6 of our textbook, Client-Centered S...

Chapter 5

2 minute read

This week’s reading (Chapter 5 of Client-Centered Software Development) covers domain classes and unit/system testing. According to the text, “domain classes...

Release early and often

2 minute read

Proper documentation for both internal and external users of a software application is crucial to its sustained success after deployment. This week, we read ...

Stupid or Solid?

2 minute read

This week, we read “From STUPID to Solid Code!” by William Durand. This article is packed with high-level do’s and dont’s of programming. The “dont’s” are co...

What’s Happening?

2 minute read

This week, our class chose and reflected on articles from Software, Computer, or CoACM magazines. While perusing software magazines (finding good ones was an...

This bugs me

4 minute read

6.4. Exercise - Find the Oldest Bug Find the oldest bug that’s still open in your chosen project. Write a blog entry describing the problem, with a theory ab...

Reflections on Open Source in Today’s World

2 minute read

This week, our assignment was to explore http://opensource.com/, reading at least two medium-length articles from the site and blogging about what we learned...

Reflections on FOSS

3 minute read

This class, CSCI 462, is centered around contributing to an open-source software project through bug fixes, documentation fixes, and other improvements. Befo...

Introduction

1 minute read

Hi everyone! My name is Janneke (pronounced ‘Yah-Nuh-Kuh’) Morin.

Back to top ↑

2020

HW21: Chapter 24

1 minute read

24.6 Explain why program inspections are an effective technique for discovering errors in a program. What types of error are unlikely to be discovered throug...

HW20: Team Progress II

1 minute read

I feel like our team made great progress on the most recent deliverable (deliverable 4)! We met via Zoom more often than we did between any other two variabl...

HW19: Chapter 23

less than 1 minute read

23.6 Figure 23.14 shows the task durations for software project activities. Assume that a serious, unanticipated setback occurs, and instead of taking 10 day...

HW18: Chapter 21 and Chapter 22

2 minute read

21.4 Explain why an object-oriented approach to software development may not be suitable for real-time systems.

HW17: Team Progress I

2 minute read

This is my first reflection on our team’s testing project. I think this will be a helpful exercise as we move into the final stages of building our testing f...

HW16: Chapter 20

2 minute read

20.10 You work for a software company that has developed a system that provides information about consumers and that is used within a SoS by a number of othe...

HW15: Chapter 19

1 minute read

19.3 Why is it impossible to infer the emergent properties of a complex system from the properties of the system components? In the words of Ian Sommerville,...

HW14: Chapter 18

less than 1 minute read

18.4 Define an interface specification for the Currency Converter and Check Credit Ratings services shown in Figure 18.7.

HW13: Chapter 17

2 minute read

17.10 Your company wishes to move from using desktop applications to accessing the same functionality remotely as services. Identify three risks that might a...

HW12: Chapter 16

less than 1 minute read

16.9 Design the interfaces of components that might be used in a system for an emergency control room. You should design interfaces for a call-logging compon...

HW11: Chapter 9

2 minute read

9.8 Briefly describe the three main types of software maintenance. Why is it sometimes difficult to distinguish between them? Fault repairs to fix bugs and v...

HW10: Chapter 15

2 minute read

15.10 The reuse of software raises a number of copyright and intellectual property issues. If a customer pays the software contractor to develop a system, wh...

HW9: Chapter 8 and reflections on testing

5 minute read

8.7: Write a scenario that could be used to help design tests for the wilderness weather station system. Context: According to Chapter 7, Design and Implemen...

HW8: Mythical Man Month

3 minute read

Mythical Man-Month - Does adding more labor to a project linearly reduce the time to completion? Or does it do the opposite, particularly to an already late ...

HW7: Chapter 5 and 6

1 minute read

5.3: You have been asked to develop a system that will help with planning large-scale events and parties such as weddings, graduation celebrations, and birth...

HW6: Chapter 2

1 minute read

2.1 Suggest the most appropriate generic software process model that might be used as a basis for managing the development of the following systems. Explain ...

HW5: Chapter 4 and reflections

6 minute read

4.5: Using the technique suggested here, where natural language descriptions are presented in a standard format, write plausible user requirements for the fo...

HW4: Reflections on software failures

3 minute read

Our readings this week began with a focus on several software engineering failures which resulted in devastating incidents such as plane crashes (Space Craft...

HW3: Chapters 11 & 12

3 minute read

11.4: What is the common characteristic of all architectural styles that are geared to supporting software fault tolerance? Architectural styles geared to su...

HW1: Chapter 1

3 minute read

1.3: What are the four important attributes that all professional software should possess? Suggest four other attributes that may sometimes be significant.

HW0: Introduction

less than 1 minute read

Hi everyone! My name is Janneke (pronounced ‘Yah-Nuh-Kuh’) Morin.

Back to top ↑