Skip to content

OSS Methodology

FMEA risk analysis, 5 Whys root cause analysis, gap analysis, and best practices research from Google, Microsoft, and Apache Foundation sources — the evidence-based preparation for Jerry's open-source release.


Key Findings

  • 21 risks identified and scored using FMEA methodology with Severity/Occurrence/Detection ratings and RPN ranking
  • 5 root cause patterns discovered through 5 Whys + Ishikawa + 8D frameworks, with systemic countermeasures defined
  • 27 gaps identified using 5W2H + Pareto frameworks — 5 critical gaps account for 80% of release risk
  • Google, Microsoft, and Apache Foundation best practices synthesized into actionable OSS release checklist with OpenSSF Scorecard criteria

OSS Release Best Practices Research

Comprehensive research into open-source release practices from major foundations and companies, covering licensing, documentation, community building, and security.

Methodology

Synthesized best practices from Google Open Source, Microsoft OSS, and Apache Software Foundation. Mapped OpenSSF Scorecard criteria to Jerry's current state. L0/L1/L2 structured analysis with actionable recommendations.

Key Data
  • 945 lines with L0/L1/L2 structure
  • Sources: Google Open Source, Microsoft OSS, Apache Software Foundation
  • License comparison (MIT, Apache 2.0, GPL family)
  • OpenSSF Scorecard criteria mapped to Jerry
  • Semantic versioning strategy and changelog best practices

Best Practices Research (945 lines)


FMEA Analysis: OSS Release Risks

Failure Mode and Effects Analysis applied to the open-source release, scoring 21 identified risks.

Methodology

Applied standard FMEA methodology (MIL-STD-1629A derivative) with:

  • Severity (1-10): Impact if the failure occurs
  • Occurrence (1-10): Likelihood of the failure mode
  • Detection (1-10): Likelihood of detecting before release
  • RPN = Severity × Occurrence × Detection (action thresholds defined)
Key Data
  • 21 risks scored with full S/O/D ratings
  • RPN ranking identifies highest-priority mitigations
  • Action thresholds: RPN > 100 = immediate action, > 50 = planned mitigation
  • L0/L1/L2 structure for multi-audience access

FMEA Analysis (400 lines)


Root Cause Analysis: 5 Whys

Root cause analysis applying 5 Whys, Ishikawa, and 8D frameworks to identify systemic patterns behind Jerry's preparation gaps.

Methodology

Applied three complementary root cause analysis frameworks: 5 Whys for causal chain depth, Ishikawa (fishbone) diagrams for cause categorization, and 8D methodology for corrective/preventive action planning. Each symptom cluster was traced to systemic patterns.

Key Data
  • 5 root cause patterns discovered across multiple symptom clusters
  • Ishikawa (fishbone) diagrams for cause categorization
  • 8D methodology for corrective/preventive action planning
  • Systemic countermeasures defined for each root cause pattern

Root Cause Analysis (545 lines)


Gap Analysis: 5W2H Framework

Systematic gap analysis identifying what Jerry needed before release readiness.

Methodology

Applied 5W2H (Who, What, When, Where, Why, How, How Much) framework combined with Ishikawa categorization and Pareto prioritization. Each gap was classified by impact and urgency to produce a ranked mitigation plan.

Key Data
  • 27 gaps identified using 5W2H + Ishikawa + Pareto frameworks
  • Pareto prioritization: 5 critical gaps = 80% of risk
  • L0/L1/L2 structure with recommendations per gap

Gap Analysis (533 lines)


Divergent Exploration: OSS Release Alternatives

NASA SE divergent exploration covering the full solution space for Jerry's open-source release.

Key Data
  • 1,192 lines of divergent exploration
  • 11 alternative categories explored
  • Full solution space: licensing, repo structure, branding, community, documentation strategies
  • NASA SE methodology applied to ensure no options prematurely excluded

Divergent Exploration (1,192 lines)