Function Point Counting - Hard Lessons Learnt
|
|
- Bernard Bradley
- 5 years ago
- Views:
Transcription
1 Function Point Counting - Hard Lessons Learnt Faustin Moses Rethinam/ Ajay Verma/ Swaminathan Subraman Productivity Center of Excellence India Development Center Accenture
2 Agenda Function Point Counting - Challenges Challenge #1: COTS - Reusable Components Challenge #2: Package Application Challenge #3: Enhancements of Packaged Applications Challenge #4: Interfacing of Applications with Legacy Systems Productivity 2
3 Function Point Counting Challenges Counting complex applications Increasing demands for quicker turnaround Productivity pressure Adherence to CPM rules in tricky situation while counting projects 3
4 Challenge #1 - COTS -Reusable Components Definition: COTS are software components which are acquired from an independent third party for providing certain functionality. It can be in form of packages, dlls or executables. Challenges: How to count application which uses COTS components? Scenario 1: Integrated with the application package and deployed Scenario 2: Resides in Services form and called on demand. 4
5 Challenge #1 - COTS -Reusable Components Scenario #1 : Integrated with the application package and deployed Functional Overview A set of Business Logics have been written as Functions/Methods in an executable formats (exe) or Linking Libraries (DLL). All these are integrated with the application. The DLL has 100 functionalities to offer. Reusable Components Inside Application Boundary Application 5
6 Challenge #1 - COTS -Reusable Components Suggested Solution: Once when the FP Counters are asked to count the APP A after the implementation The following queries that may arise: Can we include the Reusable components into Application Boundary? If Yes, Can we count the functionalities provided by the Reusable component? If Yes, Do I have to count all the DLL Functionalities or only those which are called? 6
7 Challenge #1 - COTS -Reusable Components Look at the user requirement rather than the way it is implemented Require ments User Output Serving Application Include the Reusable Components in the Application Boundary. Count only those functionalities of the DLL which are used by the Application s provided transactions. 7
8 Challenge #1 - COTS -Reusable Components Scenario #2 Functional Overview: A set of Business Logics might have been written as Functions/Methods called services (WEB SERVICES for example) and exist in a different application and serve to multiple applications at a same time. Problem Statement Defining Application Boundary on this scenario can be a challenge to include or exclude these reusable components. Services App 1 App 2 App 3 App 4 8
9 Challenge #1 - COTS -Reusable Components Resides in Services form and called on demand. Outside Application Boundary Reusable Components Application 9
10 Suggested Solution Challenge #1 - COTS -Reusable Components The Service is outside Application Boundary. And the counting methodology will be as follows, Exclude the Reusable Components (External Services) from the Application Boundary. Count the functionalities of the services which are appropriate and called from application for its service. 10
11 Challenge #2 - Package Applications Package applications offer business solution-in-a-box. Most of the functionalities offered by the package software can be enabled or configured easily without minimum effort. The package also provides the flexibility of customizing certain functionality. Don t count the whole package Packaged Applicatio n Customizing to Partial Partial Customized App to the Customer Count only the customized App 11
12 Challenge #2 - Package Applications Usage: Count only the functionalities which have been customized to the users. Most of the Packaged Applications include more number of FP, but a typical customer organization may only use Part of it. 12
13 Problem Statement Challenge #2 - Package Applications Identifying files or tables maintained in the data repositories of packaged applications In package applications, tables structures are predefined and inbuilt. The applications which are built on top of these packages do not alter the structure of the table, it only either uses the fields or leave it unused. Field 1 Field 2 Field 3 Field 4 Field 5 Field 6 Field 7 Field 8 Field 9 Field 10 Used Fields Unused Fields The project normally requires customization i.e. putting one of such fields on the screen or building the screen using one or more of the existing views. There is no coding effort needed. 13
14 Solution Area Challenge #2 - Package Applications For the Data Functions, only count the "logical" files and NOT the "physical" tables. Count only the DETs (fields/columns) that cross the application boundary that the user recognizes. For example, if the user requirement is to remove the maintenance of a field because their particular implementation does not use it, then DET no longer maintained within the application boundary should be removed from its corresponding file 14
15 Challenge #2 - Package Applications While customizing the application to user requirements, DETs removed from screens potentially result in changes to the logical files as well as the transactions (screens). Though the package applications comes with preconfigured tables, if any customization results in maintenance of an unused field, count the ILF as a changed ILF. Such fields/columns once defined to have business meaning become additional DETs crossing the application boundary and therefore contribute change to both the data and transactional functions. 15
16 Functional Overview Challenge #3 - Package Applications Enhancements of packaged applications As we all know, Packaged Applications would have different modules, however majority of the projects implemented using these application will not be using all the modules. Problem Statement: Do we need to count packaged applications at the module level or at The application/ project level? Solution Area You can count FP for Packaged Applications just as you count for others. But decide on what you are sizing (i.e.) for most of the projects you wouldn't be creating new ILF. 16
17 Challenge #3 - Package Applications Enhancements of packaged applications Function Point Counter always encounter two problems while dealing with the package Applications: 1. ILF / EIF Identifying ILF/EIF can be challenging due to the following reasons: End users are unaware of the underlying logical data structure The project document does not captures the Entity Relationship Data Model in detail Suggested Solution: If DBA is assigned to the system, it may be helpful to understand users logical view of files. If not, you may use programmers as Subject Matter Experts for the files. They may have difficulty trying to see the files through the eyes of an end user and you'll have to guide them. Imagine the data is all in First Normal Form: One Fact in One Place. 17
18 Challenge #3 - Package Applications Enhancements of packaged applications Identification of Functionality Used: Identifying Transaction can be challenging due to the following reasons: The package application provides many functionalities, Identifying the subset of transaction used in the application being counted The user requirements are not documented as clearly as it would have been in case of an In-house developed application Solution: Count only the functions they are using to satisfy their business requirements, not the whole package. To perform an accurate FP count of Packaged Applications, it is absolutely essential to work with end users as Subject Matter Experts for the transactional functions. Apart from programmers it is better to reach out to SME to understand the functionality better from business perspective Reading the user manual and discovering useful functions that are applicable to the application Counter should have a high level understanding of the Packaged applications. 18
19 Challenge #4: Interfacing of Applications with Legacy Systems What are interfaces/middleware application? Interfaces are connecting applications with some Business Logics to transfer data from one application to the other. This interfacing methodology is mostly used when Legacy Applications are interfaced to transfer data to other Applications. These applications do not store the data permanently in its database, the data is retained only for the session. Data & Transactional Functions issues: All the Interface Applications will have Staging Tables which hold data temporarily to manipulate and to produce the final output data to the other Application. Here we need to be very careful about the scope of the FP Count: Problem Statement Is it to count only Interface Application Is it to count Interface Application along with the clients 19
20 Challenge #4: Interfacing of Applications with Legacy Systems Scenario #1: Scope is to count the Interface Application. If the application receives the data, manipulates and sends the data to the other application in a sequential manner, all the transactions will be categorized as External Output as the primary intention of the transaction is to present the information outside the application boundary (Online) Otherwise (Batch) The External Applications which gets data (Outbound) will also be treated as outside of your Application Boundary hence the storing data is not being performed by the interface. All the Outbound data can be considered as External Output (EO) if the data being produced after calculation or satisfying any criteria for EO according to CPM. The Staging Tables of the Interface Applications can be treated as ILFs though the data are not being stored permanently. But we can consider the staging tables as ILFs since it stores the transactional data for the counting application. 20
21 Challenge #4: Interfacing of Applications with Legacy Systems Scenario #2: Scope is to count the Enhancement of an Application which interfaces with the Interface Application Treat the Interface Application as Outside of Application Boundary of the application being counted Count the transactions using which the data is being sent to the interfacing application as an EQ or EO Count the transactions using which the data is received from the interfacing to maintain the ILF as an EI 21
22 Challenge #4: Interfacing of Applications with Legacy Systems Case Study: Consider there is an Interface A which is interacting with two applications B & C. We will discuss the counting scope of App A, B & C. F F APP B F F Interface APP A APP C Inbound to Interface from App B & C (Through Flat File) Outbound of Interface to App B & C (Through Flat File) 22
23 Challenge #4: Interfacing of Applications with Legacy Systems When Counting APP B Consider Application A and the Interfacing Application outside the application boundary Don t count Flat file as EIF. Inbound to APP B from Flat File is EI (External Input) Outbound to Flat File from APP B is EO (or) EQ depending on the Logic. When Counting APP C Same as Counting Application B. When Counting Interface Application A Application B & C are outside Application Boundary. Staging Tables of Interfacing Application A will counted as an ILF. Inbounds will be EI (External Inputs) Outbound will be EO (or) EQ. 23
24 Thank You 24
EXTERNAL INQUIRIES. Objective of Section: Definition: Rating:
EXTERNAL INQUIRIES 7 Objective of Section: Describe and define the concepts necessary to identify and rate External Inquiries. The exercises at the end of the section help the student demonstrate that
More informationInternational Function Point Users Group References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998)
Function Point Estimation Normalized software project metric Application domain rather than technical domain Application functions and data rather than code International Function Point Users Group www.ifpug.org
More informationJoint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller
Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller Introduction The old adage It s not what you know but when you know it that counts is certainly true
More informationImproving the Accuracy of Function Points Counts
The PROJECT PERFECT White Paper Collection Improving the Accuracy of Function Points Counts Abstract Amit Javadekar The Function Point (FP) Analysis model was invented by Allan Albrecht in 1979 as an alternative
More informationInnovative Approach to FP Automation
Innovative Approach to FP Automation By Siddharth Misra Reviewed By Purnima Jagannathan Accenture Services Pvt. Ltd Bangalore, INDIA Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and
More informationE s timation of effort using F unction Points
E s timation of effort using F unction Points -Vijay S hankar Vijay Shankar Cognizant Technology Solutions, Feb 2003. All rights reserved. You may make one attributed copy of this material for your own
More informationFP Sizing of SOA applications made easy!
FP Sizing of SOA applications made easy! Shalini Thulasi (CFPS) Email:Shalini.Thulasi@accenture.com Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are
More informationFPA and Portfolio Counting
FPA and Portfolio Counting Size for Application Maintenance projects the easy way Christine Green CFPS EDS and the EDS logo are registered trademarks of Electronic Data Systems Corporation. EDS is an equal
More informationFunction Point Analysis
Function Point Analysis Introduction and Basic Overview as an Alternative to SLOC-based Estimation November 17, 2010 Tucker Moore TASC - ASOU Software Cost Estimation Two Main Types of Developed SW Cost
More informationShared Data Real-time Responses
itip Guidance from the Functional Sizing Standards Committee on topics important to you Shared Data Real-time Responses itip # 06 (Version 1.1 10/19/2014) itips provide guidance on topics important to
More informationSeminar on Software Cost Estimation: Function Points
: Function Points Institut für Informatik, Universität Zürich Prof. Dr. Martin Glinz Arun Mukhija WS 2002/03 10. December 2002 Author: Christoph Suter Hoffeld 2 8057 Zürich fels@datacomm.ch 1 Introduction...4
More informationWorkshop 2: Function Point Analysis. Marlon Dumas
Software Economics Fall 2012 Workshop 2: Function Point Analysis Marlon Dumas (slides partly based on FPA Manual by David Longstreet) Function Point Analysis Function point is a measure of the amount of
More informationEI, EO, EQ QUESTIONS. Expected Result: The student should obtain a score of 90 percent.
EI, EO, EQ QUESTIONS Objective: The following questions represent typical questions regarding transactions that will be on the exam. It is important that you become familiar with answering these types
More informationEVOLVED. Function Points. Lee Fischman COCOMO/SCM 15 Forum Spring 2000
EVOLVED Function Points Lee Fischman COCOMO/SCM 15 Forum Spring 2000 Galorath Incorporated 2000 1 Traditional Function Points - A Great Start At Functional Scoping Identification Input Inquiry Output Complexity
More informationWorkshop 2-3: Function Point Analysis. Dietmar Pfahl
Software Economics Fall 2015 Workshop 2-3: Function Point Analysis Dietmar Pfahl (slides based on material of Marlon Dumas and (partly) on FPA Manual by David Longstreet) Function Point Analysis Function
More informationSome doubts about the objectivity of logical determination of the uniqueness of the elementary process in the Function Point Analysis
Some doubts about the objectivity of logical determination of the uniqueness of the elementary process in the Function Point Analysis Table of Contents Marian Zalcman, Ph.D. ASSECO Poland, Rzeszów 1. Introduction
More informationCertified Function Point Specialist
IFPUG I40-420 Certified Function Point Specialist Version: 4.1 Topic 1, Definitions IFPUG I40-420 Exam QUESTION NO: 1 When counting DETs which of the following rules apply? A. Count a DET for each recursive
More informationPart 1 - Process and Rules
Part 1 - Process and Rules This page intentionally left blank. Part 2 Counting Practices This page intentionally left blank. Part 3 - Examples This page intentionally left blank. Part 4 Appendices and
More informationInterface Models and Function Point Calculation
Interface Models and Function Point Calculation Jeannie Bellows Senior Consultant jbellows@castek.com Who is Castek? Who is Castek? Global organization, headquartered in Toronto, Canada with offices in
More informationBoundaries: The Undiscovered Territory
Boundaries: The Undiscovered Territory 2009 The Problem... Many definitions although lots of similarities Individual perception can and does impact the definition of boundaries Boundary definition can
More informationTechnical Report
FULL FUNCTION POINTS: COUNTING PRACTICES MANUAL Technical Report 1997-04 Edited by Software Engineering Management Research Laboratory and Software Engineering Laboratory in Applied Metrics (SELAM) In
More informationSimple Function Point! measurement fully compatible with the IFPUG method 4.x
! A new method for functional size measurement fully compatible with the IFPUG method 4.x Roberto Meli CEO - Data Processing Organization President Association N. 1 IFPUG FP Reference Model EQ EIF ILF
More informationAligning Function Point Counting and Test Planning
Aligning Function Point Counting and Test Planning Chris Francis, CSTE Senior Consultant Nestlé Purina Petcare Company Checkerboard Square St. Louis, MO 63164 1 Content Brief Background on Testing Similarities
More informationINTERNAL LOGICAL FILES
INTERNAL LOGICAL FILES 9 Objective of Section: Describe and define the concepts necessary to identify and rate Internal Logical Files. The exercises at the end of the section help the student demonstrate
More informationProbabilistic Models of Software Function Point Elements
Probabilistic Models of Software Function Point Elements Masood Uzzafer Amity university Dubai Dubai, U.A.E. Email: muzzafer [AT] amityuniversity.ae Abstract Probabilistic models of software function point
More informationOverview: Understanding the Toolbox
3 Overview: Understanding the Toolbox In this chapter, we will review the different components of SQL Server Integration Services (SSIS). Our intent here is to go over the main components of SSIS, to give
More informationSession 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record
Session 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record Requirements for a Security and Privacy Audit System Presented By: John Travis, CPA, MSA, CHFP Director, Solution Management
More informationFunctional Measure of a Real-time System
IWSM/Mensura 2009, November 4-6, 2009 Amsterdam (Netherlands) Functional Measure of a Real-time System Jean-Marc Desharnais, Alain Abran, Pınar Efe Dikici, Mert Can İliş, İrfan Nuri Karaca Agenda Introduction
More informationMeasuring Function Points from VDM-SL Specifications
Measuring Function Points from VDM-SL Specifications Tomoko Miyawaki, Junichi Iijima, Sho Ho 宮脇智子 飯島淳一 包捷 Department of Industrial Engineering and Management Graduate School of Decision Science and Technology
More informationPart 5 Appendices and Glossary
Part 5 Appendices and Glossary This page intentionally left blank. Part 5 Appendix A Appendix A: Functional Size Calculation Table Introduction Contents Appendix A includes a table to facilitate measuring
More informationRoyce Edwards. Software Composition Technologies 75 Kentucky Way Freehold, New Jersey, USA
Royce Edwards Software Composition Technologies 75 Kentucky Way Freehold, New Jersey, USA 07728-4604 732-866-0090 (voice) 732-377-8410 (fax) Royce@RoyceEdwards.com Royce Edwards has taught web site counting
More informationFunction Point Training
Function Point Training Instructor: David Longstreet David@SoftwareMetrics.Com www.softwaremetrics.com 816-739-4058 tel. or 816-228-8259 fax. 112 Two Day Schedule Day One - Function Points Concepts, Questions
More informationChapter 17 - Component-based software engineering. Chapter 17 So-ware reuse
Chapter 17 - Component-based software engineering 1 Topics covered ² Components and component models ² CBSE processes ² Component composition 2 Component-based development ² Component-based software engineering
More informationMs. Bhawna Sharma 1, Ms. Kavita Choudhary 2, Mr Rajendra Purohit 3 1 M.Tech. Scholar, 2 Associate professor, 3 Research Scholar
Function Point Analysis: Converting various design elements into Function Points Ms. Bhawna Sharma 1, Ms. Kavita Choudhary 2, Mr Rajendra Purohit 3 1 M.Tech. Scholar, 2 Associate professor, 3 Research
More informationFunction Point Counting Practices Manual. Release 4.2.1
Function Point Counting Practices Manual Release 4.2.1 International Function Point Users Group (IFPUG) Function Point Counting Practices Manual Release 4.2.1 Chairperson, Counting Practices Committee
More informationCT41 (ALCCS) SOFTWARE ENGINEERING JUN 2015
Q.1 a. What is the role of software engineering? (4) Role of software engineering with reference to producing good quality software, maintainable software, and on time within budget. b. Differentiate between
More informationEXTERNAL INPUTS. Objective of Section: Definition: Rating: Counting Tips:
EXTERNAL INPUTS 5 Objective of Section: Describe and define the concepts necessary to identify and rate External Inputs. The exercises at the end of the section help the student demonstrate that they have
More informationFunctional Size Measurement for Web Applications
Functional Size Measurement for Web Applications Silvia Abrahão Valencia University of Technology, Spain sabrahao@dsic.upv.es Contents Part I Introduction Why measure? Software Metrics Why measure software
More informationCASE STUDIES ANSWERS. Page 1 Longstreet Consulting Inc.
CASE STUDIES ANSWERS Page 1 Collection Letter Dear , Our records indicate that you are past due . If you do not pay within , then we will kindly repo
More informationData Loading Best Practice
Data Loading Best Practice PPDM Association Richard Cook ETL Solutions www.etlsolutions.com Raising data management standards Agenda Data loading PPDM Mapping tables Automated population of PPDM Data Management
More informationWHITE PAPER. Moving Fragmented Test Data Management Towards a Centralized Approach. Abstract
WHITE PAPER Moving Fragmented Test Data Management Towards a Centralized Approach Abstract Test Data Management (TDM) ensures managing test data requests in an automated way to ensure a high degree of
More informationVolume II, Section 5 Table of Contents
Volume II, Section 5 Table of Contents 5...5-1 5.1 Scope...5-1 5.2 Basis of...5-1 5.3 Initial Review of Documentation...5-2 5.4 Source Code Review...5-2 5.4.1 Control Constructs...5-3 5.4.1.1 Replacement
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationHow manual testers can break into Test Automation without programming skills
How manual testers can break into Test Automation without programming skills Jim Trentadue Enterprise Account Manager - Ranorex jtrentadue@ranorex.com Agenda Agenda Test Automation Industry recap Test
More informationMinsoo Ryu. College of Information and Communications Hanyang University.
Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based
More informationAutomate to Innovate L EA RN WHAT SCRIPTING CAN DO FOR YOU P U N E E T S I N G H
Automate to Innovate LEARN WHAT SCRIPTING CAN DO FOR YOU PUNEET SINGH Agenda Target Audience What will be covered in the session? Why Automate? Where to Automate? Where to Automate Examples How to Start
More informationBuilding E-Business Suite Interfaces using BPEL. Asif Hussain Innowave Technology
Building E-Business Suite Interfaces using BPEL Asif Hussain Innowave Technology Agenda About Innowave Why Use BPEL? Synchronous Vs Asynchronous BPEL Adapters Process Activities Building EBS Interfaces
More informationPetro-SIM Simulator and CAPE-OPEN: Experiences and Successes
Petro-SIM Simulator and CAPE-OPEN: Experiences and Successes Michael Aylott, KBC Advanced Technologies, Calgary, AB, Canada Ben van der Merwe, KBC Advanced Technologies, Calgary, AB, Canada Abstract KBC
More informationSoftware Engineering (CSC 4350/6350) Rao Casturi
Software Engineering (CSC 4350/6350) Rao Casturi Recap 1 to 5 Chapters 1. UML Notation 1. Use Case 2. Class Diagrams 3. Interaction or Sequence Diagrams 4. Machine or State Diagrams 5. Activity Diagrams
More informationLecture 8. Database Management and Queries
Lecture 8 Database Management and Queries Lecture 8: Outline I. Database Components II. Database Structures A. Conceptual, Logical, and Physical Components III. Non-Relational Databases A. Flat File B.
More informationCounting Lotus Notes Applications Copyright The David Consulting Group, Inc.
Counting Lotus tes Applications Thomas Cagley (440) 933-8768 Office (440) 668-5717 Cell tomcagley@davidconsultinggroup.com 1 Items of Interest Definitions Where are the ILFs Subforms Twisties Views Keywords
More informationApplying Auto-Data Classification Techniques for Large Data Sets
SESSION ID: PDAC-W02 Applying Auto-Data Classification Techniques for Large Data Sets Anchit Arora Program Manager InfoSec, Cisco The proliferation of data and increase in complexity 1995 2006 2014 2020
More informationDOMAIN ENGINEERING OF COMPONENTS
4-02-55 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES DOMAIN ENGINEERING OF COMPONENTS Carma McClure INSIDE Definition of Components; Component-Based Development; Reuse Processes; Domain
More informationAEFP Meeting #9. September 10 th 2015
AEFP Meeting #9 September 10 th 2015 1 Agenda 2 Introduction (5 min) Review and acknowledge of approach (20 min) Questions (15 min) Next steps (20 minutes) Objective Effort on code modification Functional
More informationStudy of Component Based Software Engineering
Study of Based Software Ishita Verma House No.4, Village Dayalpur Karawal Nagar Road Delhi-110094, India ish.v.16@gmail.com Abstract based engineering is an approach of development that emphasizes the
More informationPresenter: Dong hyun Park
Presenter: 200412325 Dong hyun Park Design as a life cycle activity bonds the requirements to construction Process of breaking down the system into components, defining interfaces and defining components
More informationSoftware Reuse and Component-Based Software Engineering
Software Reuse and Component-Based Software Engineering Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Contents Software Reuse Components CBSE (Component-Based Software Engineering) Domain Engineering
More informationChapter 2 Overview of the Design Methodology
Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed
More information(Objective-CS605 Software Engeenring-II)
Which one of the following is NOT a useful indicator of software quality? Correctness Code size (Page 67) Maintainability Integrity Usability Which one of the following does not belong to a strategy for
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Wksheet 1 CIP-005-6 Cyber Security Electronic Security Perimeter(s) This section to be completed by the Compliance Enfcement Authity. Audit ID: Registered Entity: NCR Number:
More informationHow Turner Broadcasting can avoid the Seven Deadly Sins That. Can Cause a Data Warehouse Project to Fail. Robert Milton Underwood, Jr.
How Turner Broadcasting can avoid the Seven Deadly Sins That Can Cause a Data Warehouse Project to Fail Robert Milton Underwood, Jr. 2000 Robert Milton Underwood, Jr. Page 2 2000 Table of Contents Section
More informationOracle Financials Accounting Hub in Banking Industry
Oracle Financials Accounting Hub in Banking Industry Anil Patil FUJITSU AMERICA anil.patil@us.fujitsu.com 0 Agenda Introduction Case Study - Overview Integration Challenges in a non FAH world FAH Solution
More informationLesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015
Lesson Learned CIP Version 5 Transition Program CIP-002-5.1: Communications and Networking Cyber Assets Version: October 6, 2015 Authorized by the Standards Committee on October 29, 2015 for posting as
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:
More informationBasel Dudin
Measuring Internal Product Attributes: Size Basel Dudin dudinbk@mcmaster.ca Outline Aspects of Software Size Length (LOC) Lines of Code Halstead s Theory Functionality Unadjusted Function Point Count (UFC)
More informationSSIM Collection & Archiving Infrastructure Scaling & Performance Tuning Guide
SSIM Collection & Archiving Infrastructure Scaling & Performance Tuning Guide April 2013 SSIM Engineering Team Version 3.0 1 Document revision history Date Revision Description of Change Originator 03/20/2013
More information- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE
More informationDLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER. Calle 4 N La Loma Office SENA facilities La Jagua de Ibirico
DLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER Calle 4 N 4-104 La Loma 5533244 Office SENA facilities La Jagua de Ibirico Cesar Department, Colombia Colombia, 2013 TABLE OF CONTENTS
More informationDatabase Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design
Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information
More informationData Tier Application In SQL Sever Nikhil A. Govekar Scalability Experts
Data Tier Application In SQL Sever 2012 Nikhil A. Govekar Scalability Experts Introduction of Data-tier Application (DAC) Benefits of DAC Implementation of Data-tier Applications. Working with Data-tier
More informationHKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access
Databases and Microsoft Access Introduction to Databases A well-designed database enables huge data storage and efficient data retrieval. Term Database Table Record Field Primary key Index Meaning A organized
More informationChapter 13. Application Architecture and Modeling. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 13 Application Architecture and Modeling McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 13-2 Define an information system s architecture in
More informationCopyright 2014, Oracle and/or its affiliates. All rights reserved.
1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges
More informationPublishing automation using DevOps STC India Annual Conference. Srikanta Dash and Visagan Santhanam, Unisys India Pvt. Ltd.
Publishing automation using DevOps STC India Annual Conference Srikanta Dash and Visagan Santhanam, Unisys India Pvt. Ltd. December 8, 2017 Disclaimers The contents and opinions expressed in the following
More informationAlma Analytics Beyond out-of-the-box reports: Tips for formatting and customization
Alma Analytics Beyond out-of-the-box reports: Tips for formatting and customization Tricia Clayton tclayton3@gsu.edu Collection Services Librarian Georgia State University GIL User Group Meeting, 2018
More informationA System for Measuring Function Points from Specifications
A System for Measuring Function Points from Specifications Technical Report DEIS-LIA-97-006 Fausto Gramantieri 1, Evelina Lamma 1, Paola Mello 2, Fabrizio Riguzzi 1 1 DEIS - Università di Bologna Viale
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN:
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 20131 Improve Search Engine Relevance with Filter session Addlin Shinney R 1, Saravana Kumar T
More informationOracle Database 10g Resource Manager. An Oracle White Paper October 2005
Oracle Database 10g Resource Manager An Oracle White Paper October 2005 Oracle Database 10g Resource Manager INTRODUCTION... 3 SYSTEM AND RESOURCE MANAGEMENT... 3 ESTABLISHING RESOURCE PLANS AND POLICIES...
More informationTOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:
TOGAF Foundation (Level 1) 9 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (voucher included) Accredited By: The Open Group Mock Exam:
More informationExploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings. October , Assisi, Italy
Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings Çiğdem GENCEL & Carl BIDEAU October 17-19 2012, Assisi, Italy Çiğdem GENCEL Assist.Prof., Free University of Bolzano, ITALY
More information512-Kilobit 2.7-volt Minimum SPI Serial Flash Memory AT25BCM512B. Preliminary
Features Single 2.7V - 3.6V Supply Serial Peripheral Interface (SPI) Compatible Supports SPI Modes and 3 7 MHz Maximum Operating Frequency Clock-to-Output (t V ) of 6 ns Maximum Flexible, Optimized Erase
More informationERP/CRM System Implementation Methodology
ERP/CRM System Implementation Methodology Prepared by Admiral Consulting Group Date Submitted May 27, 2016 TABLE OF CONTENTS Implementation Methodology... 3 1.1. Analysis (Solution Envisioning) Phase...
More informationWhat is a multi-model database and why use it?
What is a multi-model database and why use it? An When it comes to choosing the right technology for a new project, ongoing development or a full system upgrade, it can often be challenging to define the
More informationSiebel 8.0 Consultant Certified Expert Exam - Sample Questions. Exam Code: IZ0-202
Siebel 8.0 Consultant Certified Expert Exam - Sample Questions. Exam Code: IZ0-202 1) What are the types of Siebel applications? (Choose three) a) Partner b) Web c) Customer d) Employee 2) How many business
More informationSOME TYPES AND USES OF DATA MODELS
3 SOME TYPES AND USES OF DATA MODELS CHAPTER OUTLINE 3.1 Different Types of Data Models 23 3.1.1 Physical Data Model 24 3.1.2 Logical Data Model 24 3.1.3 Conceptual Data Model 25 3.1.4 Canonical Data Model
More informationGuideline for Determining the TOE
Guideline for Determining the TOE in Certification Applications that Do Not Use PPs Version 2.0 This "Guideline for Determining the TOE" describes what kinds of matters to note when determining the scope
More informationEvaluation Guide for ASP.NET Web CMS and Experience Platforms
Evaluation Guide for ASP.NET Web CMS and Experience Platforms CONTENTS Introduction....................... 1 4 Key Differences...2 Architecture:...2 Development Model...3 Content:...4 Database:...4 Bonus:
More informationKey Differentiators. What sets Ideal Anaytics apart from traditional BI tools
Key Differentiators What sets Ideal Anaytics apart from traditional BI tools Ideal-Analytics is a suite of software tools to glean information and therefore knowledge, from raw data. Self-service, real-time,
More informationRelease Notes Documentum Release 1.4
Release Notes Documentum Release 1.4 Released April 30, 2010 Copyright Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights reserved DCTM Release Notes 1.4 2 Contents
More informationIBM. IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns. Version 2 Release 1 BA
IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns Version 2 Release 1 IBM BA21-8475-00 Note Before using this information and the product it supports, read the information in Notices
More informationOrganizing Database Project Work. (Chapter 4)
Organizing Database Project Work (Chapter 4) 1 Learn the rules like a pro, so you can break them like an artist Pablo Picasso 2 Database Life Cycle The life cycle starts when the need is identified and
More informationOrganizing Database Project Work
Organizing Database Project Work (Chapter 4) 1 Learn the rules like a pro, so you can break them like an artist Pablo Picasso 2 Database Life Cycle The life cycle starts when the need is identified and
More informationExploring Microsoft Office Access 2007
Exploring Microsoft Office Access 2007 Chapter 1: Finding Your Way Through a Database Robert Grauer, Keith Mulbery, Maurie Wigman Lockley Committed to Shaping the Next Generation of IT Experts. Copyright
More informationTeiid Designer User Guide 7.5.0
Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata
More informationDesigning Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses
Designing Data Warehouses To begin a data warehouse project, need to find answers for questions such as: Data Warehousing Design Which user requirements are most important and which data should be considered
More informationTaming Rave: How to control data collection standards?
Paper DH08 Taming Rave: How to control data collection standards? Dimitri Kutsenko, Entimo AG, Berlin, Germany Table of Contents Introduction... 1 How to organize metadata... 2 How to structure metadata...
More informationMAVEN INTERVIEW QUESTIONS
MAVEN INTERVIEW QUESTIONS http://www.tutorialspoint.com/maven/maven_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Maven Interview Questions have been designed specially to get
More informationD&D Knowledge Management Information Tool
D&D Knowledge Management Information Tool 2011-11297 H. Upadhyay*, L. Lagos*, W. Quintero*, P. Shoffner*, J. DeGregory**, J. Hunter*** *Applied Research Center, Florida International University, Miami.
More informationUniversal Model Framework -- An Introduction
Universal Model Framework -- An Introduction By Visible Systems Corporation www.visible.com This document provides an introductory description of the Universal Model Framework an overview of its construct
More information