Agenda. Introduce new members 5 minutes. CISQ status 5 minutes. AEFP work 45 minutes. Assignments and adjourn 5 minutes

Size: px
Start display at page:

Download "Agenda. Introduce new members 5 minutes. CISQ status 5 minutes. AEFP work 45 minutes. Assignments and adjourn 5 minutes"

Transcription

1 AEFP Meeting #4 1

2 2 Agenda Introduce new members 5 minutes CISQ status 5 minutes AEFP work 45 minutes Assignments and adjourn 5 minutes

3 Status CISQ Quality Characteristic Measures: Reliability, Performance Efficiency, Maintainability have entered their 40-day public review period Anticipate approval during at OMG meeting in March Current standards work: Enhancement function points launched Technical debt launch in April Quality adjusted productivity launch in April Certifications: Individual knowledge under discussion CISQ compliance for product and service launch in April 3

4 Study approach - Summary

5 5 Wiki AEFP Project 5: Complexity of the modification AEFP Project 3: Complexity of the transaction AEFP Project 2: What: Composition of the transaction AEFP Project 4: Consider a transaction as modified AEFP Project 1: Identification of transaction AEFP Project 6: Weight of the transaction AEFP data collection tooling AEFP Project 7: Impact of shared components AEFP Project 8: Nature of the modification

6 AEFP data collection tooling New version of the tool We really need to gather more data Available tooling - Toolkit description As of , the toolkit is composed of 2 executable files, compatible with CAST Storage Service implementations: extendedtransactions.exe evolutions.exe Their execution syntaxes are: Notes: replace "-process" with "-reset" to ensure you use the latest implementation tables, etc. replace "-process" with "-delete" to delete results and therefore remove the added volume of data the execution log is stored in DSS_HISTORY (default) and can be externalized into a file can be enriched with JDBC debug information evolutions.exe -url jdbc:postgresql://pdow7lap:2280/postgres -driver org.postgresql.driver -AS_schema cisqxfp_local -DS_schema cisqxfp_central -password CastAIP -process extendedtransactions.exe -url jdbc:postgresql://pdow7lap:2280/postgres -driver org.postgresql.driver -schema cisqxfp_local -password CastAIP -process 6

7 Project 1: What: Identification of transaction Rely on the AFP definition for functional transaction Recommended approach Status update All technical transaction should be track as well under a separate aggregation number Technical modification which not belong to functional transaction or technical transaction can be consider as well under a separate aggregation number or metric since the function point will not be applicable. This will be named as dark matter on the following project. Application + + Functional Transaction Technical Transaction Other components (Dark matter)

8 Project 2: What: Composition of the transaction Recommended approach Transaction should be composed by the artifacts which contain modification and functionality. Consider all branches of a transaction. Actual identification of transaction Deprecated Expanded identification of transaction via reference path on artifacts Require to add some additional file to the artifacts to be complete. Expanded identification of transaction via reference path on all objects Include all object will not make too much sense Artifact as part of the transaction Artifact as part of the transaction Artifact as part of the transaction Artifact not part of the transaction None artifact part of the transaction Artifact not part of the transaction None artifact part of the transaction Artifact not part of the transaction None artifact part of the transaction

9 Project 3: What: Complexity of the transaction The complexity of the transaction should follow the AFP definition. This value is use as input of the AEFP in order to apply the weight of the transaction. If a transaction is added, the AFP definition and value will be apply. If a transaction is deleted, the AFP definition and value will be apply. If a transaction is updated, the AFP definition and value will be apply. For all activity on the code, a weight can be apply based on some other complexity measure. This will be study on some other project Recommended approach Rely on the AFP definition for functional transaction No additional update. Apply the AFP definition we have on functional transaction but on technical transaction Dark matter TBD.

10 Project 4: How: Consider a transaction as modified Recommended approach Technical components should not activate a transaction as modified. Selection of technical components should be define separately by a specific inheritance, name, or group. Shared components should not be activate a transaction as modified. All other artifacts updated should automatically flag the transaction as modified. Threshold should not be a good approach since this will make the rules less predictable.

11 Project 5: How much: Complexity of the modification Recommended approach Delta of RET / DET, FTR between two points of measure will not be enough to track the complexity of the modification. Complexity of the modification as a delta of the effort complexity (mixed of metrics to define) seems the preferred approach. Shared components and technical components should not be considered as part of the delta of modification.

12 Project 5: How much: Complexity of the modification Complexity Asset At the component level (CC, SQL, OO, Fan in, Fan out, Granularity, Documentation) At the transaction level (Sum(component level), RPF, # of links between different technology, # of technology involve) At the application level (Sum(component level), RPF, # of links between different technology, # of technology involve) On a release (delta of snapshots) At the component level Delta (v2-v1) and status (added, updated, deleted) with a weight At the transaction level Delta (v2-v1) and status (added, updated, deleted) with a weight At the application level Delta (v2-v1) and status (added, updated, deleted) with a weight Note on the Productivity Formula: The positive adjustment factor should be based on two concept. The complexity asset of the updated components The complexity of the modification result of the component A.U.D during the period of time 12

13 Project 5: How much: Complexity of the modification Approach under study: Sum of Risk Propagation Factor a.k.a. sum of the number of distinct call paths to artifacts Sum of Fan-In a.k.a. sum of the number of direct calls to artifacts Number of distinct object types Sum of Fan-In x Cyclomatic Complexity (quite similar to CAST Cost complexity itself, but with no upper limit) or Fan-In x CAST Cost Complexity... (similar to a coupling-boosted CAST Cost complexity, with no upper limit) Sum of Cyclomatic Complexity or... minus Sum of Cyclomatic Complexity or... of related test code Number of distinct cross-technologies interfaces Number of distinct interfaces Number of "serving hatch" (should lead to a quality check as well) Sum of Data complexity (Not limited to 7 max. as with FP data entities. E.g.: number of columns) to account for the complexity of the processed data, functional or not Sum of Data complexity x Fan-in or RPF or... to account for store-them-all tables Sum of (Data Complexity + Algorithmic Complexity) x RPF to be able to assess application subset without data entities Call graph complexity Sum of Cyclomatic Complexity a.k.a. sum of the number of decision points of artifacts Sum of CAST Cost Complexity

14 Project 6: How much: Weight of the transaction Recommended approach TBD, but as of now Nesma weight should be apply 100% for added, 40% for deleted, 100%, 75%, 50%, 25% for modified. Categories of updated ratio should come from project 5.

15 Project 7: How much: Impact of shared components Should we exclude them Should we include them as technical transaction Should we include them as part of the transaction but apply funnel algorithm or other filter Recommended approach TBD. But we should define some specific category of components based on inheritance or dependency in order to define pure technical components. Those components have a high statistic ratio to be shred components between transactions. Transaction impacted by only some shared components should be considered but with a low weight.

16 Project 8: When: Nature of the modification Modification on the Dark matter should be considered but on the side of the AEFP Modification on technical components should be considered but on the side of the AEFP Instead of exclusion of technical transaction in the AFP we should exclude them from the sizing information but consider those as activity of those transaction are modified Recommended approach TBD.

17 17 Future Activities Next call April 7? Face-to-face meeting Asia week of May 12? Assignments:

AEFP Meeting #9. September 10 th 2015

AEFP Meeting #9. September 10 th 2015 AEFP Meeting #9 September 10 th 2015 1 Agenda 2 Introduction (5 min) Review and acknowledge of approach (20 min) Questions (15 min) Next steps (20 minutes) Objective Effort on code modification Functional

More information

Teiid Designer User Guide 7.5.0

Teiid Designer User Guide 7.5.0 Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata

More information

Enterprise Data Catalog for Microsoft Azure Tutorial

Enterprise Data Catalog for Microsoft Azure Tutorial Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise

More information

Using Metrics To Manage Software Risks. 1. Introduction 2. Software Metrics 3. Case Study: Measuring Maintainability 4. Metrics and Quality

Using Metrics To Manage Software Risks. 1. Introduction 2. Software Metrics 3. Case Study: Measuring Maintainability 4. Metrics and Quality Using Metrics To Manage Software Risks 1. Introduction 2. Software Metrics 3. Case Study: Measuring Maintainability 4. Metrics and Quality 1 1. Introduction Definition Measurement is the process by which

More information

CHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL

CHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL 64 CHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL 4.1 INTRODUCTION Customers measure the aspects of the final product to determine whether it meets the requirements and provides sufficient quality.

More information

Existing Model Metrics and Relations to Model Quality

Existing Model Metrics and Relations to Model Quality Existing Model Metrics and Relations to Model Quality Parastoo Mohagheghi, Vegard Dehlen WoSQ 09 ICT 1 Background In SINTEF ICT, we do research on Model-Driven Engineering and develop methods and tools:

More information

Innovative Approach to FP Automation

Innovative Approach to FP Automation Innovative Approach to FP Automation By Siddharth Misra Reviewed By Purnima Jagannathan Accenture Services Pvt. Ltd Bangalore, INDIA Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and

More information

Comparing Software Abstractions Baby Steps. Michael Hansen Lab Lunch Talk 2011

Comparing Software Abstractions Baby Steps. Michael Hansen Lab Lunch Talk 2011 Comparing Software Abstractions Baby Steps Michael Hansen Lab Lunch Talk 2011 Comparing Abstractions Need objective comparison method Libraries (OpenGL vs. Direct3D) Language constructs ( -expressions,

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

What s new in IBM Operational Decision Manager 8.9 Standard Edition

What s new in IBM Operational Decision Manager 8.9 Standard Edition What s new in IBM Operational Decision Manager 8.9 Standard Edition Release themes User empowerment in the Business Console Improved development and operations (DevOps) features Easier integration with

More information

Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings. October , Assisi, Italy

Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings. October , Assisi, Italy Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings Çiğdem GENCEL & Carl BIDEAU October 17-19 2012, Assisi, Italy Çiğdem GENCEL Assist.Prof., Free University of Bolzano, ITALY

More information

CISQ Weakness Descriptions

CISQ Weakness Descriptions CISQ Weakness Descriptions This document presents descriptions of the 86 weaknesses contained in the 4 CISQ Quality Characteristic measures. These descriptions have been simplified from their description

More information

Part I: Preliminaries 24

Part I: Preliminaries 24 Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................

More information

IBM InfoSphere Information Server Version 8 Release 7. Reporting Guide SC

IBM InfoSphere Information Server Version 8 Release 7. Reporting Guide SC IBM InfoSphere Server Version 8 Release 7 Reporting Guide SC19-3472-00 IBM InfoSphere Server Version 8 Release 7 Reporting Guide SC19-3472-00 Note Before using this information and the product that it

More information

USE OF BASELINES. Definition, reasons and examples. RD.11/######.#

USE OF BASELINES. Definition, reasons and examples.  RD.11/######.# USE OF BASELINES Definition, reasons and examples www.ricardo.com 2 Agenda Introduction Principles and reasons for use Examples Advanced features Using Baselines Baseline Views 3 BASELINES Introduction

More information

Decision Manager Help. Version 7.1.7

Decision Manager Help. Version 7.1.7 Version 7.1.7 This document describes products and services of Pegasystems Inc. It may contain trade secrets and proprietary information. The document and product are protected by copyright and distributed

More information

Standard CIP Cyber Security Electronic Security Perimeter(s)

Standard CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-1 3. Purpose: Standard CIP-005 requires the identification and protection of the Electronic Security Perimeter(s)

More information

RiskyProject Enterprise 7

RiskyProject Enterprise 7 RiskyProject Enterprise 7 Project Risk Management Software RiskyProject Enterprise User Guide Intaver Institute Inc. www.intaver.com email: info@intaver.com COPYRIGHT Copyright 2017 Intaver Institute.

More information

Interface Models and Function Point Calculation

Interface Models and Function Point Calculation Interface Models and Function Point Calculation Jeannie Bellows Senior Consultant jbellows@castek.com Who is Castek? Who is Castek? Global organization, headquartered in Toronto, Canada with offices in

More information

Course Modules for MCSA: SQL Server 2016 Database Development Training & Certification Course:

Course Modules for MCSA: SQL Server 2016 Database Development Training & Certification Course: Course Modules for MCSA: SQL Server 2016 Database Development Training & Certification Course: 20762C Developing SQL 2016 Databases Module 1: An Introduction to Database Development Introduction to the

More information

Performance analysis basics

Performance analysis basics Performance analysis basics Christian Iwainsky Iwainsky@rz.rwth-aachen.de 25.3.2010 1 Overview 1. Motivation 2. Performance analysis basics 3. Measurement Techniques 2 Why bother with performance analysis

More information

FOR0383 Software Quality Assurance

FOR0383 Software Quality Assurance This method seems much, much bigger than all the other methods. FOR0383 Software Quality Assurance Lecture 15 Code metrics "You cannot control what you cannot measure." Tom DeMarco 2/11/2009 Dr Andy Brooks

More information

Relational Model. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan

Relational Model. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan Relational Model DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Management Information Systems (MIS) Relational Model Relational Data

More information

Introduction. As such horrible solutions like the following are still implemented.

Introduction. As such horrible solutions like the following are still implemented. Introduction Nowadays most companies use geographic distributed platforms to better serve ir customers. It is quite common to see companies with datacenters in North America, Europe and Asia; each site

More information

Teiid Designer User Guide 7.7.0

Teiid Designer User Guide 7.7.0 Teiid Designer User Guide 1 7.7.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata

More information

Business-Driven Software Engineering Lecture 5 Business Process Model and Notation

Business-Driven Software Engineering Lecture 5 Business Process Model and Notation Business-Driven Software Engineering Lecture 5 Business Process Model and Notation Jochen Küster jku@zurich.ibm.com Agenda BPMN Introduction BPMN Overview BPMN Advanced Concepts Introduction to Syntax

More information

Designing Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses

Designing Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses Designing Data Warehouses To begin a data warehouse project, need to find answers for questions such as: Data Warehousing Design Which user requirements are most important and which data should be considered

More information

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge atul.goyal@oracle.com Principal Product Manager,

More information

ETAP PowerStation 4.0

ETAP PowerStation 4.0 ETAP PowerStation 4.0 User Guide Copyright 2001 Operation Technology, Inc. All Rights Reserved This manual has copyrights by Operation Technology, Inc. All rights reserved. Under the copyright laws, this

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

METRIC ATTITUDE PLUG-IN FOR ECLIPSE USER GUIDE

METRIC ATTITUDE PLUG-IN FOR ECLIPSE USER GUIDE METRIC ATTITUDE PLUG-IN FOR ECLIPSE USER GUIDE Metric Attitude Pag. 0 CONTENTS CONTENTS... 1 INTRODUCTION... 2 ECLIPSE... 2 1. INSTALLING ECLIPS FOR WINDOWS SYSTEM... 3 2. INSTALLING METRIC ATTITUDE...

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft

More information

IBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM

IBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard

More information

International Function Point Users Group References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998)

International Function Point Users Group  References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998) Function Point Estimation Normalized software project metric Application domain rather than technical domain Application functions and data rather than code International Function Point Users Group www.ifpug.org

More information

This draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.

This draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791. Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0

GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0 GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0 Eve Maler VP Innovation & Emerging Technology, ForgeRock @xmlgrrl eve.maler@forgerock.com Chair and founder, Kantara UMA Work Group @UMAWG tinyurl.com/umawg

More information

Pre-assessment will be given to determine level of knowledge. *Multiply larger two-digit by two-digit numbers.

Pre-assessment will be given to determine level of knowledge. *Multiply larger two-digit by two-digit numbers. Enrichment Math Grade 4 Mrs. Kathy Pisano August- September Topic Resources Unit 1: Multiplication and Division Concepts Component Chapters 2,3,4,5,6 Buckle Down Lessons: 1,6,7,8,9,10,11,12,13,15,16 Illustrative

More information

Salesforce Classic User Guide for Android

Salesforce Classic User Guide for Android Salesforce Classic User Guide for Android Version 36.0, Spring 16 @salesforcedocs Last updated: April 27, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Implementing the RDA Data Citation Recommendations for Long Tail Research Data. Stefan Pröll

Implementing the RDA Data Citation Recommendations for Long Tail Research Data. Stefan Pröll Implementing the RDA Data Citation Recommendations for Long Tail Research Data Stefan Pröll Overview 2 Introduction Recap of the WGDC Recommendations Long Tail Research Data SQL Prototype Git Prototype

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

How Much Space Do I Need to Run Pearson System of Courses? Calculating space allocation on Pearson System of Courses

How Much Space Do I Need to Run Pearson System of Courses? Calculating space allocation on Pearson System of Courses How Much Space Do I Need to Run Pearson System of Courses? Calculating space allocation on Pearson System of Courses March 2017 1 Introduction Each student or teacher who uses a Chromebook has their own

More information

CIP Cyber Security Configuration Management and Vulnerability Assessments

CIP Cyber Security Configuration Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Effective Modular Design

Effective Modular Design CSC40232: SOFTWARE ENGINEERING Professor: Jane Cleland Huang Metrics sarec.nd.edu/courses/se2017 Department of Computer Science and Engineering Effective Modular Design Modular design Reduces complexity

More information

Standard CIP Cyber Security Electronic Security Perimeter(s)

Standard CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

Migration from version 7.5 to 9.0. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team

Migration from version 7.5 to 9.0. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team Migration from version 7.5 to 9.0 IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team Agenda Introduction 01 Step 1: Prepare the environment 02 Step 2: Map the agents

More information

Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support IBM Tivoli Monitoring

Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support IBM Tivoli Monitoring ITM v6.x Situations November,2012 Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support Introduction and Agenda Situation Architecture Situation Definition Situation Best Practices Q&A 2 Situation

More information

Refactoring and Rearchitecturing

Refactoring and Rearchitecturing Refactoring and Rearchitecturing Overview Introduction Refactoring vs reachitecting Exploring the situation Legacy code Code written by others Code already written Not supported code Code without automated

More information

Movicon NExT Pro.Lean Ver.3.2. Print Doc Movicon

Movicon NExT Pro.Lean Ver.3.2. Print Doc Movicon Movicon NExT Pro.Lean Ver.3.2 Print Doc Movicon Table of Contents 1. PRO.LEAN... 1 1.1. WHAT IS PRO.LEAN?... 1 1.2. THE ADVANTAGES OF MEASURING PRODUCTION PERFORMANCES... 3 1.3. GETTING STARTED: CONFIGURING

More information

QUIZ #5 - Solutions (5pts each)

QUIZ #5 - Solutions (5pts each) CS 435 Spring 2014 SOFTWARE ENGINEERING Department of Computer Science Name QUIZ #5 - Solutions (5pts each) 1. The best reason for using Independent software test teams is that a. software developers do

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Deployment Within a Traditional IT environment

Deployment Within a Traditional IT environment Deployment Within a Traditional IT environment Rob Allen akrabat.com ~ @akrabat ~ October 2016 What? Software deployment is all of the activities that make a software system available for use. Wikipedia

More information

Sample Exam. Advanced Test Automation - Engineer

Sample Exam. Advanced Test Automation - Engineer Sample Exam Advanced Test Automation - Engineer Questions ASTQB Created - 2018 American Software Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,

More information

CIP Cyber Security Personnel & Training

CIP Cyber Security Personnel & Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-5.1 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the BES from individuals

More information

ForeScout CounterACT. Configuration Guide. Version 3.4

ForeScout CounterACT. Configuration Guide. Version 3.4 ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT

More information

*ANSWERS * **********************************

*ANSWERS * ********************************** CS/183/17/SS07 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2007 Answer ALL questions in Section A and TWO

More information

SmartView. User Guide - Analysis. Version 2.0

SmartView. User Guide - Analysis. Version 2.0 SmartView User Guide - Analysis Version 2.0 Table of Contents Page i Table of Contents Table Of Contents I Introduction 1 Dashboard Layouts 2 Dashboard Mode 2 Story Mode 3 Dashboard Controls 4 Dashboards

More information

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application The Investigator 2 must complete this application to request access to Sensitive NAES Data Set from

More information

Software Security and CISQ. Dr. Bill Curtis Executive Director

Software Security and CISQ. Dr. Bill Curtis Executive Director Software Security and CISQ Dr. Bill Curtis Executive Director Why Measure IT Applications? Six Digit Defects now affect Board of Directors CEO, COO, CFO Business VPs Corporate Auditors CIO accountable

More information

ForeScout Open Integration Module: Data Exchange Plugin

ForeScout Open Integration Module: Data Exchange Plugin ForeScout Open Integration Module: Data Exchange Plugin Version 3.2.0 Table of Contents About the Data Exchange Plugin... 4 Requirements... 4 CounterACT Software Requirements... 4 Connectivity Requirements...

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

_isms_27001_fnd_en_sample_set01_v2, Group A

_isms_27001_fnd_en_sample_set01_v2, Group A 1) What is correct with respect to the PDCA cycle? a) PDCA describes the characteristics of information to be maintained in the context of information security. (0%) b) The structure of the ISO/IEC 27001

More information

Business Cockpit. Controlling the digital enterprise. Fabio Casati Hewlett-Packard

Business Cockpit. Controlling the digital enterprise. Fabio Casati Hewlett-Packard Business Cockpit Controlling the digital enterprise Fabio Casati Hewlett-Packard UC Berkeley, Oct 4, 2002 page 1 Managing Operational Systems Develop a platform for the semantic management of operational

More information

Relationships and Traceability in PTC Integrity Lifecycle Manager

Relationships and Traceability in PTC Integrity Lifecycle Manager Relationships and Traceability in PTC Integrity Lifecycle Manager Author: Scott Milton 1 P age Table of Contents 1. Abstract... 3 2. Introduction... 4 3. Workflows and Documents Relationship Fields...

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers

Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers ILMT Central Team Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers Information These slides were just the deck of the ILMT Central Team Questions&Answers session.

More information

This slide is relevant to providing either a single three hour training session or explaining how a series of shorter sessions focused on per chapter

This slide is relevant to providing either a single three hour training session or explaining how a series of shorter sessions focused on per chapter Welcome to the OpenChain Curriculum Slides. These slides can be used to help train internal teams about FOSS compliance issues and to conform with the OpenChain Specification. You can deliver these slides

More information

McAfee Security Connected Integrating EPO and MAM

McAfee Security Connected Integrating EPO and MAM McAfee Security Connected Integrating EPO and MAM Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Value Add 7 FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March

More information

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning Week Six IT Audit Planning IT Audit Planning Process Institute of Internal Audit Standards - Section 2010: Planning The chief audit executive must establish a risk-based plan to determine the priorities

More information

ERO Enterprise Strategic Planning Redesign

ERO Enterprise Strategic Planning Redesign ERO Enterprise Strategic Planning Redesign Mark Lauby, Senior Vice President and Chief Reliability Officer Member Representatives Committee Meeting February 10, 2016 Strategic Planning Redesign Current

More information

Visual Programming (CBVP2103) This course is worth 3 credit hours Will be covered in weeks Total 13 topics Assessment

Visual Programming (CBVP2103) This course is worth 3 credit hours Will be covered in weeks Total 13 topics Assessment CBVP2103 Visual Programming (CBVP2103) This course is worth 3 credit hours Will be covered in 12-14 weeks Total 13 topics Assessment Assignment 30% (submit by 8 th week) Final Exam 65% Class Participation

More information

Standard COM-002-2a Communications and Coordination

Standard COM-002-2a Communications and Coordination A. Introduction 1. Title: Communication and Coordination 2. Number: COM-002-2a 3. Purpose: To ensure Balancing Authorities, Transmission Operators, and Generator Operators have adequate communications

More information

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft

More information

Functional Size Measurement for Web Applications

Functional Size Measurement for Web Applications Functional Size Measurement for Web Applications Silvia Abrahão Valencia University of Technology, Spain sabrahao@dsic.upv.es Contents Part I Introduction Why measure? Software Metrics Why measure software

More information

penelope case management software DOCUMENT BUILDING v4.0 and up

penelope case management software DOCUMENT BUILDING v4.0 and up penelope case management software DOCUMENT BUILDING v4.0 and up Last modified: May 12, 2016 TABLE OF CONTENTS Documents: The basics... 5 About Documents... 5 View the list of existing Documents... 5 Types

More information

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09

More information

BUSINESS REQUIREMENTS SPECIFICATION (BRS) Documentation Template

BUSINESS REQUIREMENTS SPECIFICATION (BRS) Documentation Template BUSINESS REQUIREMENTS SPECIFICATION (BRS) Documentation Template Approved UN/CEFACT Forum Bonn 2004-03-09 Version: 1 Release: 5 Table of Contents 1 REFERENCE DOCUMENTS...3 1.1 CEFACT/TMWG/N090R10 UN/CEFACTS

More information

Week. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical

Week. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical Name of faculty: Gaurav Gambhir Discipline: Computer Science Semester: 6 th Subject: CSE 304 N - Essentials of Information Technology Lesson Plan Duration: 15 Weeks (from January, 2018 to April, 2018)

More information

EI, EO, EQ QUESTIONS. Expected Result: The student should obtain a score of 90 percent.

EI, EO, EQ QUESTIONS. Expected Result: The student should obtain a score of 90 percent. EI, EO, EQ QUESTIONS Objective: The following questions represent typical questions regarding transactions that will be on the exam. It is important that you become familiar with answering these types

More information

Workshop 2-3: Function Point Analysis. Dietmar Pfahl

Workshop 2-3: Function Point Analysis. Dietmar Pfahl Software Economics Fall 2015 Workshop 2-3: Function Point Analysis Dietmar Pfahl (slides based on material of Marlon Dumas and (partly) on FPA Manual by David Longstreet) Function Point Analysis Function

More information

Scott Meder Senior Regional Sales Manager

Scott Meder Senior Regional Sales Manager www.raima.com Scott Meder Senior Regional Sales Manager scott.meder@raima.com Short Introduction to Raima What is Data Management What are your requirements? How do I make the right decision? - Architecture

More information

SWAMID Person-Proofed Multi-Factor Profile

SWAMID Person-Proofed Multi-Factor Profile Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0

More information

Standard CIP Cyber Security Systems Security Management

Standard CIP Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-1 3. Purpose: Standard CIP-007 requires Responsible Entities to define methods, processes, and procedures for securing

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

CIP Cyber Security Personnel & Training

CIP Cyber Security Personnel & Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-6 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the Bulk Electric

More information

Graduate Certificate in Business Information Systems

Graduate Certificate in Business Information Systems Graduate Certificate in Business Information Systems 2016 Assessment Report April 1, 2017 1. Student Learning Goals Addressed This Year a. Goal 1: Apply technical competencies in business applications

More information

Analytics: Server Architect (Siebel 7.7)

Analytics: Server Architect (Siebel 7.7) Analytics: Server Architect (Siebel 7.7) Student Guide June 2005 Part # 10PO2-ASAS-07710 D44608GC10 Edition 1.0 D44917 Copyright 2005, 2006, Oracle. All rights reserved. Disclaimer This document contains

More information

Efficiency Gains in Inbound Data Warehouse Feed Implementation

Efficiency Gains in Inbound Data Warehouse Feed Implementation Efficiency Gains in Inbound Data Warehouse Feed Implementation Simon Eligulashvili simon.e@gamma-sys.com Introduction The task of building a data warehouse with the objective of making it a long-term strategic

More information

Information Systems. Software Engineering. MCQ - Part 2

Information Systems. Software Engineering. MCQ - Part 2 Information Systems & Software Engineering MCQ - Part 2 Information Systems & Software Engineering MCQ - Part 2 Changes made to the system to reduce the future system failure chances is called Preventive

More information

Metrics and OO. SE 3S03 - Tutorial 12. Alicia Marinache. Week of Apr 04, Department of Computer Science McMaster University

Metrics and OO. SE 3S03 - Tutorial 12. Alicia Marinache. Week of Apr 04, Department of Computer Science McMaster University and OO OO and OO SE 3S03 - Tutorial 12 Department of Computer Science McMaster University Complexity Lorenz CK Week of Apr 04, 2016 Acknowledgments: The material of these slides is based on [1] (chapter

More information

1. Analytical queries on the dimensionally modeled database can be significantly simpler to create than on the equivalent nondimensional database.

1. Analytical queries on the dimensionally modeled database can be significantly simpler to create than on the equivalent nondimensional database. 1. Creating a data warehouse involves using the functionalities of database management software to implement the data warehouse model as a collection of physically created and mutually connected database

More information

IBM. Database Database overview. IBM i 7.1

IBM. Database Database overview. IBM i 7.1 IBM IBM i Database Database overview 7.1 IBM IBM i Database Database overview 7.1 Note Before using this information and the product it supports, read the information in Notices, on page 39. This edition

More information

Risk-based Object Oriented Testing

Risk-based Object Oriented Testing Risk-based Object Oriented Testing Linda H. Rosenberg, Ph.D. Ruth Stapko Albert Gallo NASA GSFC SATC NASA, Unisys SATC NASA, Unisys Code 302 Code 300.1 Code 300.1 Greenbelt, MD 20771 Greenbelt, MD 20771

More information

R1 Test Case that tests this Requirement Comments Manage Users User Role Management

R1 Test Case that tests this Requirement Comments Manage Users User Role Management 2/19/2014 CDISC SHARE Requirements Page 1 of 23 Number Name Req ID Requirement Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage

More information

CA GovernanceMinder. CA IdentityMinder Integration Guide

CA GovernanceMinder. CA IdentityMinder Integration Guide CA GovernanceMinder CA IdentityMinder Integration Guide 12.6.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector Advanced Threat Defense Certification Testing Report Trend Micro Deep Discovery Inspector ICSA Labs Advanced Threat Defense July 12, 2016 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,

More information

Oracle Database 10g: Introduction to SQL

Oracle Database 10g: Introduction to SQL ORACLE UNIVERSITY CONTACT US: 00 9714 390 9000 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database

More information

Business Club. Decision Trees

Business Club. Decision Trees Business Club Decision Trees Business Club Analytics Team December 2017 Index 1. Motivation- A Case Study 2. The Trees a. What is a decision tree b. Representation 3. Regression v/s Classification 4. Building

More information