About Us | Contact Us
View Cart

Increasing Complexity Threatens Software Stability

By Vigilize | Friday, November 17, 2017 - Leave a Comment

As lines of code continue to replace humans and physical devices, quality control is essential…and often overlooked.


An article review.


ServIcons_ITAudit_01

Looking back over the last decade or two it is easy to see how computers have changed physically as they shrank in size, spreading to our pockets and beyond, but another change was going on beneath the surface. As computers grew in processing power the software that ran on them has increased in complexity to take advantage of that power, and a recent article submitted to us by our friend Wes Pollard of Home Bank describes some of the problems that additional complexity may cause.

One of the biggest problems lies in testing: unlike physical objects which can be tested in practically all the conditions it which it will be used, it is extremely difficult if not impossible to foresee all the different ways a piece of software will be interacted with. From the hardware it will be running on, the other applications running on that system and even how the end user behaves there can be a potentially infinite combination of elements at work…and when a failure does occur, it can be very difficult to track down.

There may also be more code out there than you realize, as many of the things you use daily have been enhanced while you weren’t paying attention. The accelerator in your car behaves the same as it always has, but if it’s a recent model it likely has no physical connection to the engine, instead sending a signal to the car’s engine management computer to be interpreted by software. Changing a battery used to be a job one could do in a few minutes in their driveway, now it can require a trip to the dealership to reset the car’s battery management system. And unlike with many computers, the software running in your car can go without seeing updates for the entire life of the vehicle, though automotive recalls involving a reflash of the computer are becoming a common experience.

Going forward it is hard to see society deciding that they’re comfortable enough, so it’s reasonable to believe that software will continue to be involved in our day to day life. Without a focus on quality, though, that involvement might become increasingly negative.


Original article by James Somers writing for The Atlantic.


same_strip_012513


 

Latest News
    Thanks for being interested in our Technology Planning Webinars! This year‘s annual update to our annual Technology Planning webinar will include a panel discussion, a review of the previous years’ movies that are already available, and a discussion about alternative tactics that have arisen from recent conferences as well as the impact of the AIO […]
    Welcome Cybersecurity Conference Attendees! Thanks for joining us for the Cybersecurity Conference today! We have created this page for you to have access to the deliverables from Dan’s talk.  
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Why It Rhymes With SEEM (And its Not the I Before E Rule) Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s the Gestalt. The idea that the whole is greater than the sum of it’s parts. That’s not something that is often brought […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]
    Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger organizations these days that are NOT community based banks.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories regarding a powerful piece of spyware called Pegasus sold […]