cpsc 875 cpsc 875
play

CPSC 875 CPSC 875 John D McGregor John D. McGregor Risk, - PowerPoint PPT Presentation

CPSC 875 CPSC 875 John D McGregor John D. McGregor Risk, Uncertainty, and Options Dynamic environment Dynamic environment http://www.ignify.com/Ignify-eCommerce- Technical-Architecture.asp Risk 1 Risk 1 An event that could happen and if


  1. CPSC 875 CPSC 875 John D McGregor John D. McGregor Risk, Uncertainty, and Options

  2. Dynamic environment Dynamic environment http://www.ignify.com/Ignify-eCommerce- Technical-Architecture.asp

  3. Risk ‐ 1 Risk 1 • An event that could happen and if it did happen would cause pp pp a loss of value is a risk. • There are two major lines of mitigation: – Reduce the probability of occurrence – Reduce the cost if it does occur • There is a risk that the packet processing software will miss its • There is a risk that the packet processing software will miss its performance target resulting in loss of packets, unclear speech, and misunderstandings. Mitigation: simulate the architecture, measure actions required to process packets, propose alternative design, simulate and see if fewer actions are needed. are needed.

  4. Risk ‐ 2 Risk 2 • One mitigation tactic is to design experiments One mitigation tactic is to design experiments. • More viable for software than hardware • To avoid impacting the project schedule the id i i h j h d l h entire region that might be affected by a d design decision can be factored into a module i d i i b f d i d l that can be replaced. • Then different designs can be created, measured, and the winner inserted without the rest of the design being impacted.

  5. Risk 3 Risk ‐ 3 • Every experiment is the basis for an option Every experiment is the basis for an option • We can afford to run several experiments • But we need a notion of value d i f l • There is no point in spending more than the design is worth • Also there is the cost of a production quality p q y implementation once the choice is made

  6. Acknowledgement Acknowledgement http://www.sei.cmu.edu/reports/07tr003.pdf

  7. Definitions Definitions

  8. Patterns Patterns

  9. Questions addressed Questions addressed

  10. Components of real options Components of real options

  11. Approaches to real options Approaches to real options

  12. Challenges ‐ 1 Challenges 1

  13. Challenges ‐ 2 Challenges 2

  14. Challenges ‐ 3 Challenges 3

  15. Architecture for example Architecture for example

  16. CIS as a real options problem CIS as a real options problem

  17. Elicited values Elicited values

  18. formula formula

  19. So here is what you are going to do So here is what you are going to do • Examine your architecture for points of Examine your architecture for points of uncertainty • Develop an operational profile • Develop an operational profile • Return to a previous decision about a pattern to use • Consider the alternative patterns • Describe the considerations about each pattern as they relate to operational profile p y p p and uncertainty

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend