Another View: Did we lose our religion?

 

Connecting state and local government leaders

Back in 1990 I declared that the 1980s was a lost decade from the perspective of software development progress. The question I posed was: 'Will there be a breakthrough in the 1990's?' I went on to say, 'It won't happen automatically; people are too satisfied with unsatisfactory ways. We dare not make the mistake of complacency a la the automobile industry; we must push awareness and resource commitment to get ahead of the power curve of demand.'

Back in 1990 I declared that the 1980s was a lost decade from the perspective of software development progress. The question I posed was: 'Will there be a breakthrough in the 1990's?' I went on to say, 'It won't happen automatically; people are too satisfied with unsatisfactory ways. We dare not make the mistake of complacency a la the automobile industry; we must push awareness and resource commitment to get ahead of the power curve of demand.'In 1994, I closed the annual Software Technology Conference with the observation that the underlying need within the defense community is for predictability."From a Pentagon perspective, it is not the fact that software costs are growing annually and consuming more and more of our defense dollars that worries us. Nor is it the fact that our weapon systems and commanders are becoming more and more reliant on software to perform their mission. Our inability to predict how much a software system will cost, when it will be operational, and whether or not it will satisfy user requirements'those are the major concerns. What our senior managers and Department of Defense leaders want most from us is for us to deliver on our promises. They want systems that are on-time, within budget, that satisfy user requirements, and are reliable.'The question I should like to briefly explore in this article is, where are we today, and where will we be tomorrow?Why do I use the metaphor of religion? Primarily because religion is the traditional example of faith-based behavior; that is, behavior that is based on a belief-system rather than on externally imposed rules such as the law of gravity or she that has the gold, rules. Remember: The emotional discussions regarding whether Ada or C++ should be preferred were frequently described as religious arguments, based on beliefs rather than facts.Sadly, I still see the world of software being governed by religious-like belief systems rather than objective appraisal. When I left the Pentagon six years ago I described some of what was happening as bumper-sticker management, and the situation has not changed for the better. For example, how often do we hear, "Use best commercial practice," or "Buy product, not process"?What's wrong with best commercial practice? Fact is, it just doesn't exist among DOD contractors. It's a fantasy created by those who want to streamline acquisition, making it possible to cut the number of oversight personnel by reducing the opportunity for oversight. The best way to justify a hands-off attitude is to assert that contractors always do everything right!There are more-mature software organizations today. Virtually every large DOD contractor can boast at least one organization at Software Engineering Institute's Capability Maturity Model Level 4 or above, and several organizations at CMM Level 3. On the other hand, most DOD software is still being developed in less mature organizations, mainly because the program executive office or program manager doesn't demand that the part of the company that will actually build the software be Level 3!Back in 1991 Paul Strassmann, then Director of Defense Information, said, 'The #1 priority of DOD, as I see it, is to convert its software technology capability from a cottage industry into a modern industrial method of production.'Guess what? That has not happened. Why not? Because this requires software engineering. Software engineering encompasses a set of three key elements'methods, tools, and procedures'that enable the manager to control the process of software development and provide the practitioner with a foundation for building high quality software in a productive manner. The fundamental ingredient in a software engineering approach is the design of a robust software architecture. By architecture, I don't refer to the grouping and linkage of servers and routers and PCs. I mean the inherent design of the software itself'the identity of modules and their relationships, including in particular the infrastructure, control and data interfaces that permit software components to operate as a system.I was told by one attendee at a DOD systems design review several months ago that the contractor described his proposed system as "modular". That's a good architectural term, and it was accepted at face value.In fact, the system, when looked at by this independent attendee, was found to have only two modules. When he brought this to the program manager's attention, he said, "The contractor says it is modular. He's smarter than we are."This little incident underscores two facts: architecture was understood by neither the contractor nor the government program manager, and the probability of a successful software delivery is low. All too often the DOD excuse for not requiring an architectural evaluation is, 'Requirements change rapidly. We can't afford to be locked into a specific architecture." Wrong. That is the very reason that attention should be given to architecture, so that changes to requirements can be accommodated easily.I am told that SEI is still being asked to do independent technical assessments to answer the question, "Why has this software acquisition has not produced the desired working software system?"Why wait to ask SEI to come in to do a post mortem and tell you how you screwed up? Why not ask them to come in, first, to review the request for proposals and statement of work? And then to assist in evaluation of the software engineering practices, software development environment, and proposed architecture proposed in response to the RFP. And then again, after award, to assess the quality of the software engineering and development process.SEI isn't cheap, but terminating a $100 millions project for lack of satisfactory performance isn't cheap either.Interestingly, when one thinks about best commercial practice, there are two very different worlds out there. There is the government contractor world, and there is the real commercial world'banks, insurance companies, United Parcel Service and FedEx, Eckerd Drug, Disney World. These companies develop their own software using the best available software tools such as Rational Corp.'s software development environment. They don't pick the cheapest tools. They don't rely on COTS or outside software developers - their software is their business, and they consider that it provides them a competitive advantage, and they want to control it, and they use the best tools available regardless of cost.Product line developments are also becoming increasingly commonplace in the true commercial world. In addition to the original example'CelsiusTech, the Swedish firm that was the first to exploit the benefits of a product line architecture approach to software application development back in the late 1980s'you'll find now a number of companies using an architecture-centered approach. For example, Nokia, Motorola, Hewlett-Packard, Philips, Cummins Corp. and, believe it or not, one government application at the National Reconnaissance Office.NRO is enjoying 50 percent reductions in overall cost and schedule, and nearly tenfold reductions in defects and development personnel.Let me list for you the most common and relevant-to-DOD reasons that these companies give for adopting the architecture-centered product line approach to software development:These companies and NRO do have best practices, but their practices are not yet widely recognized as such. Frankly, it will take DOD PEOs, not program managers, and their overseers, the service acquisition executives, and especially the DOD Comptroller and financial folks to recognize and direct the product line approach to software development and acquisition. Unfortunately, this group is not known for its software acumen.The major impediment to the product line development approach, aside from ignorance of its benefits, are cultural, organizational and, especially, the DOD's stovepipe approach to budgeting and funding. DOD has many potential software product lines. None of them have been built, largely for political and stovepipe budgeting reasons. As a result, development and fielding of defense systems continues to take longer, cost more, and lack predictable quality. Product lines require strategic investment, which appears to be outside the DOD Comptroller and acquisition communities' frames of reference. Yet, it is the Department of Defense that most often uses the term "strategic".Cummins' Corp. used to take a year or more to bring software for a new engine to the test lab, now they can do it in less than a week! I strongly recommend that you obtain a copy of a new book, Software Product Lines, just published in 2002 by Addison-Wesley. The authors are from SEI. Sadly, with the exception of the NRO, it appears that the readers are mainly from commercial organizations. There was a previous version of the book, Software Architecture in Practice, that sold more than 14,000 copies, but I doubt that more than a few, if any, DOD folks have read it.I work for one, but let me tell you that, although government contractors are commercial organizations, they do not have an identifiable best commercial practice. They basically will provide what the government asks for. The only reason many of them can now boast of having at least a few SEI maturity level organizations is because, starting 10 years ago, many government RFPs required a software capability evaluation as a condition of bidding. In fact, sad to say, many contractors today put into their proposals satisfactory CMM credentials, but then actually perform the work with an organization that couldn't spell CMM.Why does the government let this happen? Why aren't there software capability evaluations anymore? The word is, they take too long and cost too much. Better to make a quick award, and then, down the line, accept an inferior product or terminate for convenience. Too often what the government has been asking for is commercial off the shelf. How many failures of COTS-based acquisitions have there been over the past decade? Too many!Best commercial practice is not eliminating all software smarts in government and relying 100 percent on contractors to deliver good software. Best commercial practice is what real commercial companies are doing. They have in-house software expertise, they use a robust software development environment and they base their software development on a sound software architecture. It is no secret or surprise that Rational Corp. and its competitors have a growing market in the commercial world and a shrinking market in the government world.I'm not suggesting that the government can or should develop software in-house. I am strongly suggesting that the government needs enough in-house software expertise to know what it is buying. It is still true that you get what you pay for, and that apples and oranges are not the same thing.Watts Humphrey recently published a new book entitled Winning with Software - An Executive Strategy. Not surprisingly, the book is directed primarily at executives of commercial companies. But every DOD acquisition executive, PEO and program manager needs to real and understand it message. Frankly, its message is pretty simple: Software projects rarely fail for technical reasons; invariably, the problem is poor management.He poses two interesting questions and buttresses them with numerous examples: Why do competent software professionals agree to dates when they have no idea how to meet them? Why do executives accept schedule commitments when the engineers offer no evidence that they can meet these commitments? He asserts that management's undisciplined approach to commitments contributes to every one of the five most common causes of project failure:What is formal methods programming? Basically, it is all of the above rolled together: sound management, established engineering processes, robust software development environment, model based architecture and a reliable programming language. I was thrilled to see, in the March edition of CROSSTALK, an article by Peter Amey of Praxis Critical Systems, in which he stated, 'There is now compelling evidence that development methods that focus on bug prevention rather than bug detection can both raise quality and save time and money.'He adds that a key ingredient is the use of unambiguous programming languages that allow rigorous analysis very early in the development process. I was an early and vocal advocate of Ada primarily because, unlike other languages, it enforces basic software engineering practice. In that article Peter describes the use of a subset of Ada known as SPARK. He says, 'The exact semantics of SPARK require software writers to think carefully and express themselves clearly; any lack of precision is ruthlessly exposed by its support tool, the SPARK Examiner.' There were significant savings from using SPARK in a critical avionics program, including most notably the fact that formal FAA test costs were reduced by 80 percent. Unfortunately, this is an isolated DOD example. The same rigor and discipline of formal methods programming should apply for all major software intensive system developments.Finally, let me say a word about predictability. Predictability is the only metric that the warfighters care about. Question is, how can we make the warfighters'including the PEOs and program managers who are charged with delivering the capabilities needed by the warfighters' smart enough to know that you can't just buy software as a product off the showroom floor?They must have understanding of the software engineering paradigm that produces software. In fact, more than this, to be assured of getting software that works on a predictable schedule and at predictable cost requires that someone in government be smart enough to enunciate the basic processes that will be employed by the contractor to produce. This is important because, otherwise, competitors will bid an unrealistically low price and unrealistically fast schedule, and be awarded the contract. To perform at the low cost means no robust software development environment, no time and effort devoted to creating a valid software architecture, and probably cheap people.If the government wants to get software right, it must give sufficient process to assure that the contractors all bid essentially the same level of capability. I believe that government should be explicit about the need for architecture, a robust software development environment, perhaps even the requirement for a language like SPARK. But as a minimum, it needs to specify that the performing organization must be at least CMM Level 3. Why? Because at Level 1 virtually all projects have cost and schedule overruns, whereas at Level 3 virtually all projects are on target.As regards defect rates and dollars per source line of code, you'll get improvement on the order of 20 percent to 50 percent. You get what you pay for. If you want it cheap, you'll get it cheap, but it may not work in the manner envisioned, if it will work at all.Where have we been? The government, I fear, has been wallowing in a slue of self-deceit, thinking it need not have software expertise, but can simply rely on the so-called best commercial practices of contractors. The problem is that, left to their own devices, the defense contractors' best practices are not very good. Are there best commercial practices? You bet! The banks, insurance companies and other truly commercial enterprises have them. But they have them, not because of some automatic external happenstance, but because their senior managers have had the moxie to realize that it takes money to make money, and that it takes software expertise to develop or acquire software. The government needs to go and do likewise. Otherwise, the decade of 2000 will likely not show any lessening of the software crisis that has carried over from the 1990s.

Lloyd K. Mosemann II

Mosemann is senior vice president for corporate development at Science Applications International Corporation. He retired from the Air Force in 1996 deputy assistant secretary for Communications, Computers and Support Systems. The following is the text of the keynote speech he gave in April at the Air Force-sponsored Software Technology Conference in Salt Lake City.










Did we lose our religion?




































  • Large-scale productivity gains
  • Improved time-to-market, equates to fielding weapons faster
  • Improved product quality
  • Increased customer satisfaction, equates to warfighter satisfaction
  • Enables mass customization
  • Compensates for the inability to hire software engineers.




















  • Unrealistic schedules
  • Inappropriate staffing
  • Changing requirements
  • Poor quality work
  • Believing in magic.

















NEXT STORY: Rare chance

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.