The following is the domain checklist:
- Has use been made of applied national or international standards, for instance to exchange of data via networks (OSI, TCP/IP, XML), of applications in the IBM-environment (SAA), or of a standard programming language that can be compiled on a wide variety of hardware?
- Is a specific application present and in use for security?
- Are input, output, and processing implemented separately?
- Has data consistency been taken care of by use of checkpoint/restart utilities?
- Will the data processing be done dually?
- Has the data processing been split up into sub-transactions?
- Is the operator able to supply status information?
- Have check processes (watchdogs) been applied?
- Are the subsystems distributed?
- Are the program modules being reused?
- Is use made of technical actions in interfaces?
- Are the algorithms optimized, that is, for performance reasons?
- Will user input be completed automatically?
- Have you planned how your software architecture will be validated throughout its development?
- Have you identified suitable validation techniques for use at each stage of the life cycle? Do you know when you will use each?