This document presents an overview of the different technological stacks that can be used to implement a client for the OpenMDM® technology. Alongside it describes some key aspects for each client stack that should be used to decide which client stack should be used for implementing OpenMDM® applications. Finally, it incorporates a summary of our findings after conducting user interviews.

1. License

Eclipse Public License - v 1.0

THE ACCOMPANYING DOCUMENT IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE PUBLIC LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES RECIPIENT’S ACCEPTANCE OF THIS AGREEMENT.

1. DEFINITIONS

"Contribution" means:

  1. in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and

  2. in the case of each subsequent Contributor:

    1. changes to the Program, and

    2. additions to the Program;

where such changes and/or additions to the Program originate from and are distributed by that particular Contributor. A Contribution 'originates' from a Contributor if it was added to the Program by such Contributor itself or anyone acting on such Contributor’s behalf. Contributions do not include additions to the Program which: (i) are separate modules of software distributed in conjunction with the Program under their own license agreement, and (ii) are not derivative works of the Program.

"Contributor" means any person or entity that distributes the Program.

"Licensed Patents" mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone or when combined with the Program.

"Program" means the Contributions distributed in accordance with this Agreement.

"Recipient" means anyone who receives the Program under this Agreement, including all Contributors.

2. GRANT OF RIGHTS

  1. Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, distribute and sublicense the Contribution of such Contributor, if any, and such derivative works, in source code and object code form. .Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free patent license under Licensed Patents to make, use, sell, offer to sell, import and otherwise transfer the Contribution of such Contributor, if any, in source code and object code form. This patent license shall apply to the combination of the Contribution and the Program if, at the time the Contribution is added by the Contributor, such addition of the Contribution causes such combination to be covered by the Licensed Patents. The patent license shall not apply to any other combinations which include the Contribution. No hardware per se is licensed hereunder.

  2. Recipient understands that although each Contributor grants the licenses to its Contributions set forth herein, no assurances are provided by any Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity. Each Contributor disclaims any liability to Recipient for claims brought by any other entity based on infringement of intellectual property rights or otherwise. As a condition to exercising the rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to distribute the Program, it is Recipient’s responsibility to acquire that license before distributing the Program.

  3. Each Contributor represents that to its knowledge it has sufficient copyright rights in its Contribution, if any, to grant the copyright license set forth in this Agreement.

3. REQUIREMENTS

A Contributor may choose to distribute the Program in object code form under its own license agreement, provided that:

  1. it complies with the terms and conditions of this Agreement; and

  2. its license agreement:

    1. effectively disclaims on behalf of all Contributors all warranties and conditions, express and implied, including warranties or conditions of title and non-infringement, and implied warranties or conditions of merchantability and fitness for a particular purpose;

    2. effectively excludes on behalf of all Contributors all liability for damages, including direct, indirect, special, incidental and consequential damages, such as lost profits;

    3. states that any provisions which differ from this Agreement are offered by that Contributor alone and not by any other party; and

    4. states that source code for the Program is available from such Contributor, and informs licensees how to obtain it in a reasonable manner on or through a medium customarily used for software exchange.

When the Program is made available in source code form:

  1. it must be made available under this Agreement; and

  2. a copy of this Agreement must be included with each copy of the Program.

Contributors may not remove or alter any copyright notices contained within the Program.

Each Contributor must identify itself as the originator of its Contribution, if any, in a manner that reasonably allows subsequent Recipients to identify the originator of the Contribution.

4. COMMERCIAL DISTRIBUTION

Commercial distributors of software may accept certain responsibilities with respect to end users, business partners and the like. While this license is intended to facilitate the commercial use of the Program, the Contributor who includes the Program in a commercial product offering should do so in a manner which does not create potential liability for other Contributors. Therefore, if a Contributor includes the Program in a commercial product offering, such Contributor ("Commercial Contributor") hereby agrees to defend and indemnify every other Contributor ("Indemnified Contributor") against any losses, damages and costs (collectively "Losses") arising from claims, lawsuits and other legal actions brought by a third party against the Indemnified Contributor to the extent caused by the acts or omissions of such Commercial Contributor in connection with its distribution of the Program in a commercial product offering. The obligations in this section do not apply to any claims or Losses relating to any actual or alleged intellectual property infringement. In order to qualify, an Indemnified Contributor must: a) promptly notify the Commercial Contributor in writing of such claim, and b) allow the Commercial Contributor to control, and cooperate with the Commercial Contributor in, the defense and any related settlement negotiations. The Indemnified Contributor may participate in any such claim at its own expense.

For example, a Contributor might include the Program in a commercial product offering, Product X. That Contributor is then a Commercial Contributor. If that Commercial Contributor then makes performance claims, or offers warranties related to Product X, those performance claims and warranties are such Commercial Contributor’s responsibility alone. Under this section, the Commercial Contributor would have to defend claims against the other Contributors related to those performance claims and warranties, and if a court requires any other Contributor to pay any damages as a result, the Commercial Contributor must pay those damages.

5. NO WARRANTY

EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely responsible for determining the appropriateness of using and distributing the Program and assumes all risks associated with its exercise of rights under this Agreement , including but not limited to the risks and costs of program errors, compliance with applicable laws, damage to or loss of data, programs or equipment, and unavailability or interruption of operations.

6. DISCLAIMER OF LIABILITY

EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

7. GENERAL

If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this Agreement, and without further action by the parties hereto, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.

If Recipient institutes patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Program itself (excluding combinations of the Program with other software or hardware) infringes such Recipient’s patent(s), then such Recipient’s rights granted under Section 2(b) shall terminate as of the date such litigation is filed.

All Recipient’s rights under this Agreement shall terminate if it fails to comply with any of the material terms or conditions of this Agreement and does not cure such failure in a reasonable period of time after becoming aware of such noncompliance. If all Recipient’s rights under this Agreement terminate, Recipient agrees to cease use and distribution of the Program as soon as reasonably practicable. However, Recipient’s obligations under this Agreement and any licenses granted by Recipient relating to the Program shall continue and survive.

Everyone is permitted to copy and distribute copies of this Agreement, but in order to avoid inconsistency the Agreement is copyrighted and may only be modified in the following manner. The Agreement Steward reserves the right to publish new versions (including revisions) of this Agreement from time to time. No one other than the Agreement Steward has the right to modify this Agreement. The Eclipse Foundation is the initial Agreement Steward. The Eclipse Foundation may assign the responsibility to serve as the Agreement Steward to a suitable separate entity. Each new version of the Agreement will be given a distinguishing version number. The Program (including Contributions) may always be distributed subject to the version of the Agreement under which it was received. In addition, after a new version of the Agreement is published, Contributor may elect to distribute the Program (including its Contributions) under the new version. Except as expressly stated in Sections 2(a) and 2(b) above, Recipient receives no rights or licenses to the intellectual property of any Contributor under this Agreement, whether expressly, by implication, estoppel or otherwise. All rights in the Program not expressly granted under this Agreement are reserved.

This Agreement is governed by the laws of the State of New York and the intellectual property laws of the United States of America. No party to this Agreement will bring a legal action under this Agreement more than one year after the cause of action arose. Each party waives its rights to a jury trial in any resulting litigation.

2. Conventions and Terms

2.1. Typography

A fixed width, non-serif typeface (sample) indicates the term is a Java package, class, interface, or member name. Text written in this typeface is always related to coding. Emphasis (sample) is used the first time an important concept is introduced. Its explanation usually follows directly after the introduction.

2.2. Key Words

This specification consistently uses the words may, should, and must. Their meaning is well-defined in [1] Bradner, S., Key words for use in RFCs to Indicate Requirement Levels. A summary follows.

  • must – An absolute requirement. Both the Framework implementation and bundles have obligations that are required to be fulfilled to conform to this specification.

  • should – Recommended. It is strongly recommended to follow the description, but reasons may exist to deviate from this recommendation.

  • may or can – Optional. Implementations must still be interoperable when these items are not implemented.

3. Technological Approach

Given feedback from users of the current system (OpenMDM® 4) we have determined that the original technology stack set forth for both Web and Desktop clients may not be the best one, specially looking forward to a platform that should last for the next 5 years at the very least. Usage patterns of the different type of users involved with the current system will help us decide which of the following technology options is best suited to continue.

3.1. Full Web Stack

Regardless of the implementing technology (Eclipse RAP, JavaEE + JSF, Grails, etc) a web application delivers the comfort of easy deployments paired with quick updates whenever they are needed. Mobile clients may also benefit from this mode, as long as they stay connected. The usage of a full web stack option is less appealing where direct contact with specialised devices (such as the benchmark measurement machines) is mandatory. Thus, this stack makes total sense for test engineers and test managers but not so for test executors that could leverage automatic import/export of data from measurements machines when possible.

3.2. Full Desktop Stack

Desktop clients can exploit direct device communication without jumping through hoops like web clients do (most likely through a Java applet which brings in a host of different problems). A desktop client based on Eclipse 4 platform will do the expected job. Or perhaps a non OSGi technology such as a full JavaFX, non-eclipse solution. The important key to remember here is that deployment will not be as smooth as in the web option, and that we also loose the option to deploy to mobile clients, such as tablets.

3.3. Web Stack with Device Helpers

A hybrid approach that can keep both test engineers and test executors happy could be a mix of web and desktop client technologies. The bulk of the application is implemented using a Web stack (this is the part where test engineers will use most of the time); the operations that require direct device communication (the ones required by a test executive) can be implemented using small desktop clients, or command/daemon based applications, that use web-friendly options (such as exporting data in JSON format, running a local web server, etc) in order for the web application to read the data coming from the devices. Deployment and rolling updates for said command based applications still represent an obstacle that must be overcome; the same deploy strategy as a full desktop client stack can be applied here.

3.4. Shared Web and Desktop Stack

This is an option unique to Eclipse RCP, as the same application can be accessed from the web using Eclipse’s RAP technology. However the fact that a web based application cannot access local devices while the RCP one can means that RCP applications must be deployed to benchmark stations while web based applications can be deployed everywhere else. Deployment of RCP applications remains as a hurdle to be overcome. Frankly there are not many advantages for this option as if you have to come with a solution for the deployment problem for a subset of users you can apply it for all of them.

3.5. Separate Web and Desktop Stack

Finally we come to the last option where Web and Client might share some common codebase but they are inherently different from one another. They might implement the same functionality but they do so in totally different ways. In a sense it’s writing the same application twice, using two non-homogeneous technology stacks. This gives the best flexibility overall in terms of richness and behavior required by each user however it’s perhaps the one that requires more thought about its architecture, as it will have much more moving parts that then other options.

4. Client Features

The following features define the behavior and essence of each client stack. We believe them to be the main drivers for picking a technological stack.

4.1. Security

Web/Mobile

They are inherently insecure given that they rely on an execution environment (the browser) that can’t be fully controlled. If needed, opening access to the filesystem or short time persistence storage can cause further security risks, at the very least they require an additional step during deployment and configuration. There may be some environment (such as mobile) where direct access to the hosting environment is not possible.

Desktop

Security is stronger as the running environment can be closed down to every possible outcome (using a very strict SecurityManager for example).

4.2. Ubiquity

Web/Mobile

These applications can be accessed virtually from anywhere. Given responsive design techniques and good styling practices these applications can appear and behave like their native counterparts when accessed from a mobile device.

Desktop

These applications can only run on the computer on which they are installed. This also ties the user to explicit location unless the application is installed on a laptop computer that can be freely moved to anywhere the user needs to be.

4.3. Deployment

Web/Mobile

Deploying a web application is a transparent step as users only need to be concerned by accessing a given URL on their browsers. Mobile applications can use their native application store (iTunes, Play, etc), meaning that installing a new application is basically one click away from the end user’s perspective. Developers can use a combination of scheduled releases, rolling updates, even continues delivery to push new application versions to a web server. Mobile applications still require an authorization process in order to push new releases to the authorized application stores.

Desktop

The first deployment can be performed either manually or using automated solutions as file copying or application provisioning tools. This is perhaps the topic that hinders most this type of applications as IT must be involved directly in order to assess how and when applications can be installed into a particular machine.

4.4. Updates

Web/Mobile

Like deployment, updates can be delivered transparently or with a single click (in the case of application stores) to the end user. A point to consider here is that some users may need/want t access an older version (if possible), in which case versioning the communicating APIs is a good practice.

Desktop

Rolling new updates is the second pain point that these application suffer. Either the same deployment techniques are used (updating the application as a whole, like a black box), or a customized update solution is built and put in place (for updating just the changed deltas). Such customized solution may be provided by the chosen technology stack (Eclipse auto-update feature) or built from scratch.

4.5. Device Communication

Devices can be separated in two camps depending on their communication strategy with the external world.

  • passive: they output data to a know location using files or sockets, i.e. their data is made available and external consumers request it explicitly. They may also expose a REST interface or a webservice.

  • active: they can push data to a registered endpoint (webservice, REST, other) when data is available, i.e. the consumers receive the data directly form the device. This requires a registration mechanism of consumers into the device.

Active devices should pose a smaller integration risk than passive devices, as the former define a strict API that consumers must follow.

Web/Mobile

By design, web applications can’t break out of the browser. Consuming data directly from an external passive device can be very tricky depending of the communication interface that the device exposes. Mobile application will face the same problem.

Desktop

Desktop applications can talk with both types of devices without much problem as they run on hardware that’s physically linked to the device or reachable by other means without compromising security.

5. User Feedback

5.1. From BMW

The test engineers (Versuchsingenieure) at BMW work mostly at their desktop in their office. Test executives (Prüfstandstechniker) run tests at workbenches in industrial buildings. One interview partner stated that the test executors in his department do not use the OpenMDM® application. Instead they use their own application to gather the specification of the tests as well as to forward the measurement results to the ODS system. Another interview partner told that some test executors use the OpenMDM® application to search for the full test specification by entering the key information from the event generated for the testbench’s Outlook calendar.

Currently the client is distributed as a zipped file by superiors and colleagues. In order to fulfil special business needs of certain users/ user groups the client has been extended by plugins. Thus many different versions are in use now among the departments. Some departments do not benefit of plugins because they do not know of their existence.

Explicitly assigned roles and rights assure that only authorized users can manipulate test specifications (prior to the test order) and add measurement results and other associated data.

One interview partner mentioned that the OpenMDM® application has to easily connect to sophisticated analysis tools i.e. to be able to open external desktop applications while providing an ASAM ODS path to the data of interest. Simplified analyses should be possible from within the application (in order to get an overview of the testsuite, find the test of interest). Another interview partner uses the OpenMDM® system just for revision-safe archiving.

5.1.1. From Others

Security is regarded as a core requirement. The OpenMDM® application has to provide storage and transport encryption and has to support data backup and recovery. Central infrastructure services like databases, file shares, corporate directories and authorization/authentification services which are already in place must be easily integrable.

The logged-in user should only see test data he is authorized for. In order to get access to data from others the user has to file a permission request which is either granted or denied by a designated administrator.

6. Evaluation

The previous categories have been summarized in the following table along with a valuation of their impact given the proposed set of technological stacks.

A - indicates less (or negative) impact where as a + indicates a higher (or positive) impact.

Category Sub-Category Full Web Stack Full Desktop Stack Web Stack with Device Helpers Shared Web & Desktop Stack Separate Web & Desktop Stack

Security

Can close down environment

- - -

+ + +

-

+ +

+ +

Requires local setup

+ + +

- - -

-

- -

- -

Ubiquity

Runs on desktop

+ + +

+ + +

+ + +

+ + +

+ + +

Runs no mobile/tablet

+ + +

- - -

-

+ +

+ +

Deployment

Requires local install

- -

+ +

+

+

+

Requires downtime

+ +

- -

+ +

+

+

Updates

Requires local install

- -

+ +

+

+

+

Requires downtime

+ +

- -

+ +

+

+

Device Communication

Direct

- - -

+ + +

+ +

+ +

+ +

REST / Webservice

+

+ +

+ +

+ +

+ +

Time to Market

Development Speed

+ +

+ +

+

+

- -

Evaluation

13

17

14

16

15

7. References

[1] Bradner, S., Key words for use in RFCs to Indicate Requirement Levels
http://tools.ietf.org/html/rfc2119