Agenda. Introduce new members 5 minutes. CISQ status 5 minutes. AEFP work 45 minutes. Assignments and adjourn 5 minutes
|
|
- Hannah Melton
- 5 years ago
- Views:
Transcription
1 AEFP Meeting #4 1
2 2 Agenda Introduce new members 5 minutes CISQ status 5 minutes AEFP work 45 minutes Assignments and adjourn 5 minutes
3 Status CISQ Quality Characteristic Measures: Reliability, Performance Efficiency, Maintainability have entered their 40-day public review period Anticipate approval during at OMG meeting in March Current standards work: Enhancement function points launched Technical debt launch in April Quality adjusted productivity launch in April Certifications: Individual knowledge under discussion CISQ compliance for product and service launch in April 3
4 Study approach - Summary
5 5 Wiki AEFP Project 5: Complexity of the modification AEFP Project 3: Complexity of the transaction AEFP Project 2: What: Composition of the transaction AEFP Project 4: Consider a transaction as modified AEFP Project 1: Identification of transaction AEFP Project 6: Weight of the transaction AEFP data collection tooling AEFP Project 7: Impact of shared components AEFP Project 8: Nature of the modification
6 AEFP data collection tooling New version of the tool We really need to gather more data Available tooling - Toolkit description As of , the toolkit is composed of 2 executable files, compatible with CAST Storage Service implementations: extendedtransactions.exe evolutions.exe Their execution syntaxes are: Notes: replace "-process" with "-reset" to ensure you use the latest implementation tables, etc. replace "-process" with "-delete" to delete results and therefore remove the added volume of data the execution log is stored in DSS_HISTORY (default) and can be externalized into a file can be enriched with JDBC debug information evolutions.exe -url jdbc:postgresql://pdow7lap:2280/postgres -driver org.postgresql.driver -AS_schema cisqxfp_local -DS_schema cisqxfp_central -password CastAIP -process extendedtransactions.exe -url jdbc:postgresql://pdow7lap:2280/postgres -driver org.postgresql.driver -schema cisqxfp_local -password CastAIP -process 6
7 Project 1: What: Identification of transaction Rely on the AFP definition for functional transaction Recommended approach Status update All technical transaction should be track as well under a separate aggregation number Technical modification which not belong to functional transaction or technical transaction can be consider as well under a separate aggregation number or metric since the function point will not be applicable. This will be named as dark matter on the following project. Application + + Functional Transaction Technical Transaction Other components (Dark matter)
8 Project 2: What: Composition of the transaction Recommended approach Transaction should be composed by the artifacts which contain modification and functionality. Consider all branches of a transaction. Actual identification of transaction Deprecated Expanded identification of transaction via reference path on artifacts Require to add some additional file to the artifacts to be complete. Expanded identification of transaction via reference path on all objects Include all object will not make too much sense Artifact as part of the transaction Artifact as part of the transaction Artifact as part of the transaction Artifact not part of the transaction None artifact part of the transaction Artifact not part of the transaction None artifact part of the transaction Artifact not part of the transaction None artifact part of the transaction
9 Project 3: What: Complexity of the transaction The complexity of the transaction should follow the AFP definition. This value is use as input of the AEFP in order to apply the weight of the transaction. If a transaction is added, the AFP definition and value will be apply. If a transaction is deleted, the AFP definition and value will be apply. If a transaction is updated, the AFP definition and value will be apply. For all activity on the code, a weight can be apply based on some other complexity measure. This will be study on some other project Recommended approach Rely on the AFP definition for functional transaction No additional update. Apply the AFP definition we have on functional transaction but on technical transaction Dark matter TBD.
10 Project 4: How: Consider a transaction as modified Recommended approach Technical components should not activate a transaction as modified. Selection of technical components should be define separately by a specific inheritance, name, or group. Shared components should not be activate a transaction as modified. All other artifacts updated should automatically flag the transaction as modified. Threshold should not be a good approach since this will make the rules less predictable.
11 Project 5: How much: Complexity of the modification Recommended approach Delta of RET / DET, FTR between two points of measure will not be enough to track the complexity of the modification. Complexity of the modification as a delta of the effort complexity (mixed of metrics to define) seems the preferred approach. Shared components and technical components should not be considered as part of the delta of modification.
12 Project 5: How much: Complexity of the modification Complexity Asset At the component level (CC, SQL, OO, Fan in, Fan out, Granularity, Documentation) At the transaction level (Sum(component level), RPF, # of links between different technology, # of technology involve) At the application level (Sum(component level), RPF, # of links between different technology, # of technology involve) On a release (delta of snapshots) At the component level Delta (v2-v1) and status (added, updated, deleted) with a weight At the transaction level Delta (v2-v1) and status (added, updated, deleted) with a weight At the application level Delta (v2-v1) and status (added, updated, deleted) with a weight Note on the Productivity Formula: The positive adjustment factor should be based on two concept. The complexity asset of the updated components The complexity of the modification result of the component A.U.D during the period of time 12
13 Project 5: How much: Complexity of the modification Approach under study: Sum of Risk Propagation Factor a.k.a. sum of the number of distinct call paths to artifacts Sum of Fan-In a.k.a. sum of the number of direct calls to artifacts Number of distinct object types Sum of Fan-In x Cyclomatic Complexity (quite similar to CAST Cost complexity itself, but with no upper limit) or Fan-In x CAST Cost Complexity... (similar to a coupling-boosted CAST Cost complexity, with no upper limit) Sum of Cyclomatic Complexity or... minus Sum of Cyclomatic Complexity or... of related test code Number of distinct cross-technologies interfaces Number of distinct interfaces Number of "serving hatch" (should lead to a quality check as well) Sum of Data complexity (Not limited to 7 max. as with FP data entities. E.g.: number of columns) to account for the complexity of the processed data, functional or not Sum of Data complexity x Fan-in or RPF or... to account for store-them-all tables Sum of (Data Complexity + Algorithmic Complexity) x RPF to be able to assess application subset without data entities Call graph complexity Sum of Cyclomatic Complexity a.k.a. sum of the number of decision points of artifacts Sum of CAST Cost Complexity
14 Project 6: How much: Weight of the transaction Recommended approach TBD, but as of now Nesma weight should be apply 100% for added, 40% for deleted, 100%, 75%, 50%, 25% for modified. Categories of updated ratio should come from project 5.
15 Project 7: How much: Impact of shared components Should we exclude them Should we include them as technical transaction Should we include them as part of the transaction but apply funnel algorithm or other filter Recommended approach TBD. But we should define some specific category of components based on inheritance or dependency in order to define pure technical components. Those components have a high statistic ratio to be shred components between transactions. Transaction impacted by only some shared components should be considered but with a low weight.
16 Project 8: When: Nature of the modification Modification on the Dark matter should be considered but on the side of the AEFP Modification on technical components should be considered but on the side of the AEFP Instead of exclusion of technical transaction in the AFP we should exclude them from the sizing information but consider those as activity of those transaction are modified Recommended approach TBD.
17 17 Future Activities Next call April 7? Face-to-face meeting Asia week of May 12? Assignments:
AEFP Meeting #9. September 10 th 2015
AEFP Meeting #9 September 10 th 2015 1 Agenda 2 Introduction (5 min) Review and acknowledge of approach (20 min) Questions (15 min) Next steps (20 minutes) Objective Effort on code modification Functional
More informationTeiid Designer User Guide 7.5.0
Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata
More informationEnterprise Data Catalog for Microsoft Azure Tutorial
Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise
More informationUsing Metrics To Manage Software Risks. 1. Introduction 2. Software Metrics 3. Case Study: Measuring Maintainability 4. Metrics and Quality
Using Metrics To Manage Software Risks 1. Introduction 2. Software Metrics 3. Case Study: Measuring Maintainability 4. Metrics and Quality 1 1. Introduction Definition Measurement is the process by which
More informationCHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL
64 CHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL 4.1 INTRODUCTION Customers measure the aspects of the final product to determine whether it meets the requirements and provides sufficient quality.
More informationExisting Model Metrics and Relations to Model Quality
Existing Model Metrics and Relations to Model Quality Parastoo Mohagheghi, Vegard Dehlen WoSQ 09 ICT 1 Background In SINTEF ICT, we do research on Model-Driven Engineering and develop methods and tools:
More informationInnovative Approach to FP Automation
Innovative Approach to FP Automation By Siddharth Misra Reviewed By Purnima Jagannathan Accenture Services Pvt. Ltd Bangalore, INDIA Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and
More informationComparing Software Abstractions Baby Steps. Michael Hansen Lab Lunch Talk 2011
Comparing Software Abstractions Baby Steps Michael Hansen Lab Lunch Talk 2011 Comparing Abstractions Need objective comparison method Libraries (OpenGL vs. Direct3D) Language constructs ( -expressions,
More informationTaxonomy Dimensions of Complexity Metrics
96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,
More informationWhat s new in IBM Operational Decision Manager 8.9 Standard Edition
What s new in IBM Operational Decision Manager 8.9 Standard Edition Release themes User empowerment in the Business Console Improved development and operations (DevOps) features Easier integration with
More informationExploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings. October , Assisi, Italy
Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings Çiğdem GENCEL & Carl BIDEAU October 17-19 2012, Assisi, Italy Çiğdem GENCEL Assist.Prof., Free University of Bolzano, ITALY
More informationCISQ Weakness Descriptions
CISQ Weakness Descriptions This document presents descriptions of the 86 weaknesses contained in the 4 CISQ Quality Characteristic measures. These descriptions have been simplified from their description
More informationPart I: Preliminaries 24
Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................
More informationIBM InfoSphere Information Server Version 8 Release 7. Reporting Guide SC
IBM InfoSphere Server Version 8 Release 7 Reporting Guide SC19-3472-00 IBM InfoSphere Server Version 8 Release 7 Reporting Guide SC19-3472-00 Note Before using this information and the product that it
More informationUSE OF BASELINES. Definition, reasons and examples. RD.11/######.#
USE OF BASELINES Definition, reasons and examples www.ricardo.com 2 Agenda Introduction Principles and reasons for use Examples Advanced features Using Baselines Baseline Views 3 BASELINES Introduction
More informationDecision Manager Help. Version 7.1.7
Version 7.1.7 This document describes products and services of Pegasystems Inc. It may contain trade secrets and proprietary information. The document and product are protected by copyright and distributed
More informationStandard CIP Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-1 3. Purpose: Standard CIP-005 requires the identification and protection of the Electronic Security Perimeter(s)
More informationRiskyProject Enterprise 7
RiskyProject Enterprise 7 Project Risk Management Software RiskyProject Enterprise User Guide Intaver Institute Inc. www.intaver.com email: info@intaver.com COPYRIGHT Copyright 2017 Intaver Institute.
More informationInterface Models and Function Point Calculation
Interface Models and Function Point Calculation Jeannie Bellows Senior Consultant jbellows@castek.com Who is Castek? Who is Castek? Global organization, headquartered in Toronto, Canada with offices in
More informationCourse Modules for MCSA: SQL Server 2016 Database Development Training & Certification Course:
Course Modules for MCSA: SQL Server 2016 Database Development Training & Certification Course: 20762C Developing SQL 2016 Databases Module 1: An Introduction to Database Development Introduction to the
More informationPerformance analysis basics
Performance analysis basics Christian Iwainsky Iwainsky@rz.rwth-aachen.de 25.3.2010 1 Overview 1. Motivation 2. Performance analysis basics 3. Measurement Techniques 2 Why bother with performance analysis
More informationFOR0383 Software Quality Assurance
This method seems much, much bigger than all the other methods. FOR0383 Software Quality Assurance Lecture 15 Code metrics "You cannot control what you cannot measure." Tom DeMarco 2/11/2009 Dr Andy Brooks
More informationRelational Model. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan
Relational Model DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Management Information Systems (MIS) Relational Model Relational Data
More informationIntroduction. As such horrible solutions like the following are still implemented.
Introduction Nowadays most companies use geographic distributed platforms to better serve ir customers. It is quite common to see companies with datacenters in North America, Europe and Asia; each site
More informationTeiid Designer User Guide 7.7.0
Teiid Designer User Guide 1 7.7.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata
More informationBusiness-Driven Software Engineering Lecture 5 Business Process Model and Notation
Business-Driven Software Engineering Lecture 5 Business Process Model and Notation Jochen Küster jku@zurich.ibm.com Agenda BPMN Introduction BPMN Overview BPMN Advanced Concepts Introduction to Syntax
More informationDesigning Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses
Designing Data Warehouses To begin a data warehouse project, need to find answers for questions such as: Data Warehousing Design Which user requirements are most important and which data should be considered
More informationOracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge
Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge atul.goyal@oracle.com Principal Product Manager,
More informationETAP PowerStation 4.0
ETAP PowerStation 4.0 User Guide Copyright 2001 Operation Technology, Inc. All Rights Reserved This manual has copyrights by Operation Technology, Inc. All rights reserved. Under the copyright laws, this
More information1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010
Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes
More informationMETRIC ATTITUDE PLUG-IN FOR ECLIPSE USER GUIDE
METRIC ATTITUDE PLUG-IN FOR ECLIPSE USER GUIDE Metric Attitude Pag. 0 CONTENTS CONTENTS... 1 INTRODUCTION... 2 ECLIPSE... 2 1. INSTALLING ECLIPS FOR WINDOWS SYSTEM... 3 2. INSTALLING METRIC ATTITUDE...
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationIBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM
IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard
More informationInternational Function Point Users Group References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998)
Function Point Estimation Normalized software project metric Application domain rather than technical domain Application functions and data rather than code International Function Point Users Group www.ifpug.org
More informationThis draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationGDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0
GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0 Eve Maler VP Innovation & Emerging Technology, ForgeRock @xmlgrrl eve.maler@forgerock.com Chair and founder, Kantara UMA Work Group @UMAWG tinyurl.com/umawg
More informationPre-assessment will be given to determine level of knowledge. *Multiply larger two-digit by two-digit numbers.
Enrichment Math Grade 4 Mrs. Kathy Pisano August- September Topic Resources Unit 1: Multiplication and Division Concepts Component Chapters 2,3,4,5,6 Buckle Down Lessons: 1,6,7,8,9,10,11,12,13,15,16 Illustrative
More informationSalesforce Classic User Guide for Android
Salesforce Classic User Guide for Android Version 36.0, Spring 16 @salesforcedocs Last updated: April 27, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationImplementing the RDA Data Citation Recommendations for Long Tail Research Data. Stefan Pröll
Implementing the RDA Data Citation Recommendations for Long Tail Research Data Stefan Pröll Overview 2 Introduction Recap of the WGDC Recommendations Long Tail Research Data SQL Prototype Git Prototype
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationHow Much Space Do I Need to Run Pearson System of Courses? Calculating space allocation on Pearson System of Courses
How Much Space Do I Need to Run Pearson System of Courses? Calculating space allocation on Pearson System of Courses March 2017 1 Introduction Each student or teacher who uses a Chromebook has their own
More informationCIP Cyber Security Configuration Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationEffective Modular Design
CSC40232: SOFTWARE ENGINEERING Professor: Jane Cleland Huang Metrics sarec.nd.edu/courses/se2017 Department of Computer Science and Engineering Effective Modular Design Modular design Reduces complexity
More informationStandard CIP Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)
More informationMigration from version 7.5 to 9.0. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team
Migration from version 7.5 to 9.0 IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team Agenda Introduction 01 Step 1: Prepare the environment 02 Step 2: Map the agents
More informationAntonio Sgro, Agent Architect for SAPM John Alvord, L2 Support IBM Tivoli Monitoring
ITM v6.x Situations November,2012 Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support Introduction and Agenda Situation Architecture Situation Definition Situation Best Practices Q&A 2 Situation
More informationRefactoring and Rearchitecturing
Refactoring and Rearchitecturing Overview Introduction Refactoring vs reachitecting Exploring the situation Legacy code Code written by others Code already written Not supported code Code without automated
More informationMovicon NExT Pro.Lean Ver.3.2. Print Doc Movicon
Movicon NExT Pro.Lean Ver.3.2 Print Doc Movicon Table of Contents 1. PRO.LEAN... 1 1.1. WHAT IS PRO.LEAN?... 1 1.2. THE ADVANTAGES OF MEASURING PRODUCTION PERFORMANCES... 3 1.3. GETTING STARTED: CONFIGURING
More informationQUIZ #5 - Solutions (5pts each)
CS 435 Spring 2014 SOFTWARE ENGINEERING Department of Computer Science Name QUIZ #5 - Solutions (5pts each) 1. The best reason for using Independent software test teams is that a. software developers do
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationLaserfiche Rio 10.3: Deployment Guide. White Paper
Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6
More informationDeployment Within a Traditional IT environment
Deployment Within a Traditional IT environment Rob Allen akrabat.com ~ @akrabat ~ October 2016 What? Software deployment is all of the activities that make a software system available for use. Wikipedia
More informationSample Exam. Advanced Test Automation - Engineer
Sample Exam Advanced Test Automation - Engineer Questions ASTQB Created - 2018 American Software Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,
More informationCIP Cyber Security Personnel & Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-5.1 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the BES from individuals
More informationForeScout CounterACT. Configuration Guide. Version 3.4
ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT
More information*ANSWERS * **********************************
CS/183/17/SS07 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2007 Answer ALL questions in Section A and TWO
More informationSmartView. User Guide - Analysis. Version 2.0
SmartView User Guide - Analysis Version 2.0 Table of Contents Page i Table of Contents Table Of Contents I Introduction 1 Dashboard Layouts 2 Dashboard Mode 2 Story Mode 3 Dashboard Controls 4 Dashboards
More informationAnnenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application
Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application The Investigator 2 must complete this application to request access to Sensitive NAES Data Set from
More informationSoftware Security and CISQ. Dr. Bill Curtis Executive Director
Software Security and CISQ Dr. Bill Curtis Executive Director Why Measure IT Applications? Six Digit Defects now affect Board of Directors CEO, COO, CFO Business VPs Corporate Auditors CIO accountable
More informationForeScout Open Integration Module: Data Exchange Plugin
ForeScout Open Integration Module: Data Exchange Plugin Version 3.2.0 Table of Contents About the Data Exchange Plugin... 4 Requirements... 4 CounterACT Software Requirements... 4 Connectivity Requirements...
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More information_isms_27001_fnd_en_sample_set01_v2, Group A
1) What is correct with respect to the PDCA cycle? a) PDCA describes the characteristics of information to be maintained in the context of information security. (0%) b) The structure of the ISO/IEC 27001
More informationBusiness Cockpit. Controlling the digital enterprise. Fabio Casati Hewlett-Packard
Business Cockpit Controlling the digital enterprise Fabio Casati Hewlett-Packard UC Berkeley, Oct 4, 2002 page 1 Managing Operational Systems Develop a platform for the semantic management of operational
More informationRelationships and Traceability in PTC Integrity Lifecycle Manager
Relationships and Traceability in PTC Integrity Lifecycle Manager Author: Scott Milton 1 P age Table of Contents 1. Abstract... 3 2. Introduction... 4 3. Workflows and Documents Relationship Fields...
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationAutomated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers
ILMT Central Team Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers Information These slides were just the deck of the ILMT Central Team Questions&Answers session.
More informationThis slide is relevant to providing either a single three hour training session or explaining how a series of shorter sessions focused on per chapter
Welcome to the OpenChain Curriculum Slides. These slides can be used to help train internal teams about FOSS compliance issues and to conform with the OpenChain Specification. You can deliver these slides
More informationMcAfee Security Connected Integrating EPO and MAM
McAfee Security Connected Integrating EPO and MAM Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Value Add 7 FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March
More informationIT Audit Process Prof. Liang Yao Week Six IT Audit Planning
Week Six IT Audit Planning IT Audit Planning Process Institute of Internal Audit Standards - Section 2010: Planning The chief audit executive must establish a risk-based plan to determine the priorities
More informationERO Enterprise Strategic Planning Redesign
ERO Enterprise Strategic Planning Redesign Mark Lauby, Senior Vice President and Chief Reliability Officer Member Representatives Committee Meeting February 10, 2016 Strategic Planning Redesign Current
More informationVisual Programming (CBVP2103) This course is worth 3 credit hours Will be covered in weeks Total 13 topics Assessment
CBVP2103 Visual Programming (CBVP2103) This course is worth 3 credit hours Will be covered in 12-14 weeks Total 13 topics Assessment Assignment 30% (submit by 8 th week) Final Exam 65% Class Participation
More informationStandard COM-002-2a Communications and Coordination
A. Introduction 1. Title: Communication and Coordination 2. Number: COM-002-2a 3. Purpose: To ensure Balancing Authorities, Transmission Operators, and Generator Operators have adequate communications
More informationThis section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationFunctional Size Measurement for Web Applications
Functional Size Measurement for Web Applications Silvia Abrahão Valencia University of Technology, Spain sabrahao@dsic.upv.es Contents Part I Introduction Why measure? Software Metrics Why measure software
More informationpenelope case management software DOCUMENT BUILDING v4.0 and up
penelope case management software DOCUMENT BUILDING v4.0 and up Last modified: May 12, 2016 TABLE OF CONTENTS Documents: The basics... 5 About Documents... 5 View the list of existing Documents... 5 Types
More informationInternet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015
Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09
More informationBUSINESS REQUIREMENTS SPECIFICATION (BRS) Documentation Template
BUSINESS REQUIREMENTS SPECIFICATION (BRS) Documentation Template Approved UN/CEFACT Forum Bonn 2004-03-09 Version: 1 Release: 5 Table of Contents 1 REFERENCE DOCUMENTS...3 1.1 CEFACT/TMWG/N090R10 UN/CEFACTS
More informationWeek. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical
Name of faculty: Gaurav Gambhir Discipline: Computer Science Semester: 6 th Subject: CSE 304 N - Essentials of Information Technology Lesson Plan Duration: 15 Weeks (from January, 2018 to April, 2018)
More informationEI, EO, EQ QUESTIONS. Expected Result: The student should obtain a score of 90 percent.
EI, EO, EQ QUESTIONS Objective: The following questions represent typical questions regarding transactions that will be on the exam. It is important that you become familiar with answering these types
More informationWorkshop 2-3: Function Point Analysis. Dietmar Pfahl
Software Economics Fall 2015 Workshop 2-3: Function Point Analysis Dietmar Pfahl (slides based on material of Marlon Dumas and (partly) on FPA Manual by David Longstreet) Function Point Analysis Function
More informationScott Meder Senior Regional Sales Manager
www.raima.com Scott Meder Senior Regional Sales Manager scott.meder@raima.com Short Introduction to Raima What is Data Management What are your requirements? How do I make the right decision? - Architecture
More informationSWAMID Person-Proofed Multi-Factor Profile
Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0
More informationStandard CIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-1 3. Purpose: Standard CIP-007 requires Responsible Entities to define methods, processes, and procedures for securing
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationCIP Cyber Security Personnel & Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-6 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the Bulk Electric
More informationGraduate Certificate in Business Information Systems
Graduate Certificate in Business Information Systems 2016 Assessment Report April 1, 2017 1. Student Learning Goals Addressed This Year a. Goal 1: Apply technical competencies in business applications
More informationAnalytics: Server Architect (Siebel 7.7)
Analytics: Server Architect (Siebel 7.7) Student Guide June 2005 Part # 10PO2-ASAS-07710 D44608GC10 Edition 1.0 D44917 Copyright 2005, 2006, Oracle. All rights reserved. Disclaimer This document contains
More informationEfficiency Gains in Inbound Data Warehouse Feed Implementation
Efficiency Gains in Inbound Data Warehouse Feed Implementation Simon Eligulashvili simon.e@gamma-sys.com Introduction The task of building a data warehouse with the objective of making it a long-term strategic
More informationInformation Systems. Software Engineering. MCQ - Part 2
Information Systems & Software Engineering MCQ - Part 2 Information Systems & Software Engineering MCQ - Part 2 Changes made to the system to reduce the future system failure chances is called Preventive
More informationMetrics and OO. SE 3S03 - Tutorial 12. Alicia Marinache. Week of Apr 04, Department of Computer Science McMaster University
and OO OO and OO SE 3S03 - Tutorial 12 Department of Computer Science McMaster University Complexity Lorenz CK Week of Apr 04, 2016 Acknowledgments: The material of these slides is based on [1] (chapter
More information1. Analytical queries on the dimensionally modeled database can be significantly simpler to create than on the equivalent nondimensional database.
1. Creating a data warehouse involves using the functionalities of database management software to implement the data warehouse model as a collection of physically created and mutually connected database
More informationIBM. Database Database overview. IBM i 7.1
IBM IBM i Database Database overview 7.1 IBM IBM i Database Database overview 7.1 Note Before using this information and the product it supports, read the information in Notices, on page 39. This edition
More informationRisk-based Object Oriented Testing
Risk-based Object Oriented Testing Linda H. Rosenberg, Ph.D. Ruth Stapko Albert Gallo NASA GSFC SATC NASA, Unisys SATC NASA, Unisys Code 302 Code 300.1 Code 300.1 Greenbelt, MD 20771 Greenbelt, MD 20771
More informationR1 Test Case that tests this Requirement Comments Manage Users User Role Management
2/19/2014 CDISC SHARE Requirements Page 1 of 23 Number Name Req ID Requirement Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage
More informationCA GovernanceMinder. CA IdentityMinder Integration Guide
CA GovernanceMinder CA IdentityMinder Integration Guide 12.6.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationAdvanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector
Advanced Threat Defense Certification Testing Report Trend Micro Deep Discovery Inspector ICSA Labs Advanced Threat Defense July 12, 2016 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,
More informationOracle Database 10g: Introduction to SQL
ORACLE UNIVERSITY CONTACT US: 00 9714 390 9000 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database
More informationBusiness Club. Decision Trees
Business Club Decision Trees Business Club Analytics Team December 2017 Index 1. Motivation- A Case Study 2. The Trees a. What is a decision tree b. Representation 3. Regression v/s Classification 4. Building
More information