Feeds

Of Autodesk and the Freedom Tower

Lessons for software developers?

3 Big data security analytics techniques

Sefetsky emphasises that SOM didn't just jump into this; it did a proper evaluation of Revit first, although perhaps the real test is the pleasures people apparently take in using Revit. But the new process does deliver, it gives SOM rapid design realisation and confidence both in the final delivery and in its ability to make radical changes in a controlled and cost-effective way. The design of the Freedom Tower above ground has already changed significantly, for instance, to accommodate the need of the NY police department for more space around the tower).

According to Sefetsky the collaboration with Autodesk Consulting has delivered “competitive advantage without being at the bleeding edge”.

So far so good, then, but so not particularly IT. However, we could have taken these presentations, changed the names of the technology vendors and replaced “building” with “computer application” – and we might have been listening to a presentation on the benefits of the OMG's Model Driven Architecture!

Of course, this isn't so surprising when you remember that the “patterns movement” behind much modern software development was based on an architectural movement - check out this interview with Erich Gamma. Gamma's seminal book Design Patterns (Gamma, E. R. Helm, R. Johnson and J. Vlissides. Addison-Wesley, 1995) was based on Christopher Alexander's work on what he sometimes called "a timeless way of building".

However, it gives one pause for thought when you hear Autodesk's Bernstein talking about his architecture students and their reaction to this new way of working and realise that they are raising issues awfully like those raised by hands-on programmers when they meet automated systems development. People don't like change and automation brings change. Nevertheless, it seems highly unlikely that our systems development process should be immune from automation, considering that we can automate business process successfully - admittedly with all the disruption that entails for business workers.

Perhaps we need to examine the automation process and its consequences dispassionately, before we decide that Model Driven Architecture (for example) can't work for us. And perhaps considering the automation of building design processes is a good way to isolate ourselves from the personal impact of automation, so we can make a neutral assessment.

Of course, a formal model-driven architectural approach isn't the only way forward. Kent Beck's eXtreme Programming (XP) approach, for example, achieves similar ends to those achieved by SOM's simulation of the Freedom Tower design, by actually building pieces of business function and constantly testing them against prebuilt test cases.

An XP approach probably isn't appropriate to building the Freedom Tower, but XP does respect architecture and can deliver notable successes. Something similar was probably used, more or less, to build a lot of wonderful European cathedrals, although looking at the noble edifices we see today, shouldn't blind us to the fact that quite a lot of cathedrals fell down early on – perhaps some builders skimped the test cases.

But, XP is appropriate to programming, and we should consider using it – just as we should also consider using the more formal modelling approaches represented by MDA, say, which correspond to the modelling/simulation processes used by SOM. There may be several paths to a goal and sometimes looking at another discipline (such as buildings architecture) can help us appreciate some of these alternatives. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.