This is the foundation page for the topic of Development Practices
The CI Development Cycle is a set of processes at the foundation layer of verification (what I call the “point of implementation“). They’re discussed “in the abstract” here, but when reviewed as concrete instances (e.g., during design peer review), they form a basis for mitigating the cognitive biases that might otherwise remain unaddressed during the development process1.
All are adapted from industry-standard practices (see ASME Y 14.24) , so are specific to no particular company and to no particular product domain. System Engineers who are conversant with these processes will have an easier cognitive transition from the abstract framework of functionally decomposed requirements into the physically decomposed product structure. Each of them will influence how the corresponding data will be found to support formal verification.
It is also useful to note that the Design community is one of the two most important users of our products2. We rely on the designers to understand the requirements we write, to design in response to them, and to ensure that verification data can be collected from these designs with respect to the parameterization of our requirements. In my experience, that happens most reliably (and least confrontationally) when we System Engineers are at least conversant in our user’s language, with a basic awareness of their basic tools and circumstances.
The reader with some software background will notice similarities between the presentation of this material and recursive programming practices. This is by intent: much of what follows essentially describes the various ways that recursive design decomposition processes can terminate3. I won’t claim to have identified all such terminal logic; just the ones I have encountered or can readily envision based on my own background in design and verification.
Finally, the title addresses Configuration Items (CI)…but then rarely makes mention of them. This may seem odd, until it is recalled that any item (hardware or software) can be designated as a CI at any point in the life cycle (see Identifying the Configuration). If late-designated (e.g., a re-development item to be upgraded), it will be necessary to recover whatever information can be gleaned about the original intentions and capabilities in order accomplish the new objective. The patterns discussed here will make that process much easier.
On to Part I: Introductory Discussion→
Footnotes