­

Architecting for Cyber Security Analytics

Context: Cyber space is vulnerable to a number of attacks and these vulnerabilities are often exploited by hacker groups that result in huge loss for individuals, organizations, and national economies. The estimated annual cost of […]

July 2nd, 2017|

How much Open Source Communities concern about deployability and other DevOps-related quality attributes?

There are two papers that investigated deployability as an emerging quality attribute in DevOps context. In , authors examined design decisions made to satisfy deployability from three projects and then designed deployability tactics tree. In […]

June 5th, 2016|

A tool to leveraging, customizing and visualizing data generated in continuous deployment pipeline for different stakeholders (e.g., architect)

A continuous deployment (CD) pipeline is composed of a number of open sources and/or commercial tools. During each steps (e.g., build, package, test etc.) of CD pipeline, a lot of information is produced. Although […]

June 5th, 2016|

Migrating monolithic applications to microservices architecture style

One of biggest challenges for organizations is how to reduce intra-component/service coupling in order to support Continuous Delivery/Deployment practices. At the best state, the goal is to break down (monolithic) applications into independently deployable and […]

June 5th, 2016|

Designing and Implementing a (Secure) Continuous Deployment Pipeline

Since there is no a standard continuous delivery and deployment pipeline in the industry, the organizations always have challenges to design and implement their continuous deployment pipeline. Therefore, a large number of continuous deployment pipeline […]

June 5th, 2016|

Requirement Engineering for Security

Security is one of the biggest challenges facing organisations in the modern hyper-connected world. A number of theoretical security models are available that provide best practice security guidelines and are widely utilised as a basis […]

May 29th, 2016|