IT Abstract 5-10 Key
IT Abstract 5-10 Key
(1)Modern software systems employ large IT infrastructures hosted in on-premise clouds or using “rented”
cloud resources from specific vendors. (2) The unifying force across any cloud strategy is incremental product
and application improvement against conservation of those resources. (3) This is where monitoring of cloud
applications becomes a key asset. (4) To shed light over the status of monitoring practices in industry, we
study: (a) monitoring practices and tools adoption in industry; (b) size and complexity of industrial monitoring
problems; (c) the role of software architecture and software process with respect to monitoring strategies. (5)
We conduct mixed-methods empirical research featuring interviews and a web survey featuring 140+
practitioners from over 70 different organizations. (6) Even if the market makes available a significant set of
monitoring tools, our results show a rather unappealing picture of industrial monitoring: (a) industrial decision-
makers do not perceive monitoring as a key asset even though the downtime of their applications correlates
heavily with the level of automation and responsiveness enabled by monitoring; (b) monitoring is done with
crude technology, mostly MySQL querying or similar (e.g., Nagios); finally, (c) incidents are discovered by
clients rather than application owners. (7) We conclude that the road toward the industrial adoption of cutting-
edge monitoring technology is still one of the less travelled, presumably in connection to the considerable
investment required. (8) Furthermore, the lack of industrial cloud monitoring standards does not help in
addressing the proliferation of multiple tool combinations, with varying effectiveness. (9) Further research
should be invested in looking into and addressing these major concerns.
Abstract 8: What skills do IT companies look for in new developers? A study with Stack Overflow jobs
(1) There is a growing demand for information on how IT companies look for candidates to their open
positions. (2) This paper investigates which hard and soft skills are more required in IT companies by analyzing
the description of 20,000 job opportunities. (3) We applied open card sorting to perform a high-level analysis
on which types of hard skills are more requested. (4) Further, we manually analyzed the most mentioned soft
skills. (5) Programming languages are the most demanded hard skills. (6) Communication, collaboration, and
problem-solving are the most demanded soft skills. (7) We recommend developers to organize their resum´e
according to the positions they are applying. (8) We also highlight the importance of soft skills, as they appear
in many job opportunities.
(1) Exploiting software development related data from software-development intensive organizations to
support tactical and strategic decision making is a challenge. (2) Combining data-driven approaches with
expert knowledge has been highlighted as a sensible approach for leading software-development intensive
organizations to rightful decision-making improvements. (3) However, most of the existing proposals lack of
important aspects that hinders their industrial uptake such as: customization guidelines to fit the proposals to
other contexts and/or automatic or semi-automatic data collection support for putting them forward in a real
organization. (4) As a result, existing proposals are rarely used in the industrial context. (5) Support software-
development intensive organizations with guidance and tools for exploiting software development related data
and expert knowledge to improve their decision making. (6) We have developed a novel method called SESSI
(Specification and Estimation of Software Strategic Indicators) that was articulated from industrial experiences
with Nokia, Bittium, Softeam and iTTi in the context of Q-Rapids European project following a design science
approach. (7) As part of the industrial summative evaluation, we performed the first case study focused on the
application of the method. (8) We detail the phases and steps of the SESSI method and illustrate its application
in the development of ModelioNG, a software product of Modeliosoft development firm. (9) The application
of the SESSI method in the context of ModelioNG case study has provided us with useful feedback to improve
the method and has evidenced that applying the method was feasible in this context.
Abstract 10: Case Study Research in Software Engineering—It is a Case, and it is a Study, but is it a
Case Study?
(1) Case studies are regularly published in the software engineering literature, and guidelines for conducting
case studies are available. (2) Based on a perception that the label ‘‘case study’’ is assigned to studies that are
not case studies, an investigation has been conducted. (3) The aim was to investigate whether or not the label
‘‘case study’’ is correctly used in software engineering research. (4) To address the objective, 100 recent articles
found through Scopus when searching for case studies in software engineering have been investigated and
classified. (5) Unfortunately, the perception of misuse of the label ‘‘case study’’ is correct. (6) Close to 50% of
the articles investigated were judged as not being case studies according to the definition of a case study. (7)
We either need to ensure correct use of the label ‘‘case study’’, or we need another label for its definition. (8)
Given that ‘‘case study’’ is a well-established label, it is probably impossible to change the label. (9) Thus, we
introduce an alternative definition of case study emphasising its real-life context, and urge researchers to
carefully follow the definition of different research methods when presenting their research.