Session 2. Getting started with a well-structured system specification
|
|
- Carol Snow
- 5 years ago
- Views:
Transcription
1 Session 2 Getting started with a well-structured system specification COMP 320/420 Spring, 2018 Conrad Weisert The situation A representative approaches us. (or vice versa) He or she may be a. an executive with funds b. or a worker with a perceived need and may represent a. a department or organization inside our company b. or a potential outside customer He or she makes us aware of the possible need for a computer application system a. to replace an unsatisfactory old (computerized or manual) system b. or to exploit a new opportunity c. or to avoid a future penalty d. (or whatever) Our response We need to determine, at least tentatively, the scope of the proposed system. Who (by role or job function) will use it? What activities will be included? what ones are specifically excluded? What current systems, if any, will it replace? What information will the system provide? Until everyone (who?) agrees on the above, there's no point in proceeding with: Designing the system, Estimating what it will cost, Estimating when it can be ready. Two easy things we can do early Document the preliminary scope One effective technique is the context diagram, a trivial form of dataflow diagram Discuss and negotiate it with stakeholders Give a very rough range of estimates (min & max) Specify some principal system outputs, the information the system will produce. Note: These two activities are largely independent of methodology or choice of tools. COMP 320 / copyright Conrad Weisert
2 Session 2a: Specifying System Outputs The importance of system outputs Why start with outputs? Modes and media Specifying output content Specifying format and presentation Avoiding false outputs COMP 320/420 Spring, 2018 Conrad Weisert What is a system output? A collection of information that is seen and used: a. either by end users (or customers) of the application system printed reports display screens other b. or by another application system or device files signals etc. What's the difference, if any, between information & data? What about other "outputs"? In I.T. the term output is also used to describe the result of a function or of an internal process. Such results are not system outputs or application outputs. They are seen not by users or other systems but by other components of the same system They are addressed (later) in internal system design or architecture, not by systems analysts but by software designers and programmers. The special importance of system outputs Often the very purpose of an application system ("information systems") The most visible components of an application system. End users understand outputs (or should) Suprisingly, many S.A. textbooks and courses don't emphasize (or even mention) system outputs! Outputs are just a special kind of data structure for them. COMP 320 / copyright Conrad Weisert
3 Why start with outputs? Old fashioned analysts often started by specifying system inputs! Probably because reading inputs was the first thing the system would have to do upon starting operation. Also because the analyst had in mind a preconceived system architecture. But once we know what information the system must produce, we can derive many of: The data items that must be stored or computed. The formulas, processes, and decision rules (and the system inputs) needed for producing that information. Methodology independence Of all the ESD components, system output specifications are the least dependent on our choice of systems analysis methodology. They fit well with Structured Analysis, UML, Discrete Requirements Lists, "Agile" methods Prototyping etc.,etc.. Therefore they ought to be non-controversial and should be specified early by every systems analyst on every system development project. So, are they? Specifying an output The analyst will: 1. Identify the output and its purpose 2. Specify the content (i.e. the information) 3. (optional) specify the format or appearance (output prototype or sample) How can an analyst know (or discover) all that? Interviews with (or input from) end-user representatives Examination or observation of the current (old) system, if there is one. Experience, insight, and imagination Step 1: Identifying an output Why are these necessary? The analyst specifies: a name for the output the purpose of the output the distribution (who gets it or may see it) the frequency (or schedule) for producing it the medium (or mode) the content (list of data items) expected volume (avg. & max.) unusual security, confidentiality, or audit requirements usually using a form (paper or screen) provided by some C.A.S.E. tools If yours doesn't, then design your own. COMP 320 / copyright Conrad Weisert
4 Specifying the purpose of an output This is usually straightforward and obvious However, be careful when replacing an existing (manual or computerized) system "We've always gotten that report!" A user may: feel threatened by losing a tool he or she has been using in everyday work, especially in working with other people (a status indicator?) like to examine areas not needed for his or her job (e.g. other employees' performance reviews) How can we handle that? Output frequencies or schedules Regular schedule daily, weekly, monthly, etc. On demand From whom? Why? When? On event content change / update exceptions, alarms, unusual conditions error Output Distribution List of people (roles) who either automatically get a copy each time it's produced or are authorized to view the output Step 2: Specifying output content` List of rigorously defined data items items from the data dictionary (next course session) or simple formulas on those data items What if the formulas aren't simple? Sequence, breaks, and totals What are those? Step 3 (optional): Specifying format In theory, user representatives ought to be able to review and approve output specifications, based on content, i.e the information to be produced: However, some potential users can be helped to understand by actually seeing what the output will look like. Such a presentation (printed report or screen display) is called an output prototype COMP 320 / copyright Conrad Weisert
5 Pitfalls and downside of I-O prototypes The format and appearance may distract some user-reviewers from the content. Users' expectations may be misdirected: They may be surprised, even disappointed, if the output from the final system doesn't look exactly the same. Unnecessary constraint on the system designers. Obstacle to choosing a packaged application system product. Special output modes Typical outputs of computer application systems are composed of text, often in tabular form. However, keep in mind that modern computer systems can also easily generate: Graphs or plots of various kinds Audio speech synthesis UPC labels and other specialized codes What else? Avoiding false outputs Some information that comes out of a system are not considered to be system outputs. For example: prompt messages error messages progress / status indicators transaction confirmation messages Why? Therefore the analyst doesn't need to (and usually shouldn't) specify them. Who will? When? COMP 320 / copyright Conrad Weisert
Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams
Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams COMP 320 / 420, Spring, 2018 Conrad Weisert Criteria for the ESD (from session
More informationWays of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained
Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Spring, 2017
More informationWays of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained
Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Fall, 2018
More informationSession 3b: Defining data items
Session 3b: Defining data items Sources of data items Establishing a project data dictionary Defining an elementary item Defining a composite data item COMP 320 / 420, Spring, 2018 Mr. Weisert Q: Which
More informationSession 1b: Overview of systems analysis methodology
Session 1b: Overview of systems analysis methodology The system specification (ESD) Ways of documenting an ESD Criteria to be satisfied Historical survey Comp 320 / 420, spring, 2018 Alternative names
More informationSession 3: Data. Session 3a: Data
Session 3: Data Part a: 1. Data types 2. Data representation Part b: Data definition Computer programs manipulate two kinds of data Which are of interest to the analyst? A. Application domain data Exist
More informationWeek 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical?
Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical? Background Many applications deal with records representing
More informationDo these criteria apply to work in this course?
Bonus topic fo COMP 170 Program Quality Part 2: Review of Program readability Commentary Choosing data names Code layout Commentary Pitfalls Reading a program A program is not only something to be run
More informationWeek 6: Data. Let's focus first on application domain data.
review of things we already (should) know criteria for external & internal representation basic elementary data types composite data types container data types derived subtypes abstract data types (ADT)
More informationSession 6b: Specifying constraints
Session 6b: Specifying constraints Analysis vs. Design Constraints on the end product Constraints on the development COMP 320 / 420 Spring, 2018 Mr. Weisert "Analysis & Design" (review from session 1)
More informationWeek 2: The Clojure Language. Background Basic structure A few of the most useful facilities. A modernized Lisp. An insider's opinion
Week 2: The Clojure Language Background Basic structure A few of the most useful facilities A modernized Lisp Review of Lisp's origins and development Why did Lisp need to be modernized? Relationship to
More informationSession 4b: Review of Program Quality
Session 4b: Review of Program Quality What makes one program "better" than another? COMP 170 -- Fall, 2013 Mr. Weisert What is a good program? Suppose we give the same assignment to two programmers (or
More informationSession 8: UML The Unified Modeling (or the Unstructured Muddling) language?
Session 8: UML The Unified Modeling (or the Unstructured Muddling) language? A few observations, opinions, pros & cons COMP 320 / 420 Spring, 2018 Mr. Weisert Where did the UML come from? Object-oriented
More informationWeek 5: Background. A few observations on learning new programming languages. What's wrong with this (actual) protest from 1966?
Week 5: Background A few observations on learning new programming languages What's wrong with this (actual) protest from 1966? Programmer: "Switching to PL/I as our organization's standard programming
More informationDesigning a Database -- Understanding Relational Design
Designing a Database -- Understanding Relational Design Contents Overview The Database Design Process Steps in Designing a Database Common Design Problems Determining the Purpose Determining the Tables
More informationCHAPTER 19: Building a Preliminary Behavioral Model
1 z 7 CHAPTER 19: Building a Preliminary Behavioral Model Things are always at their best in their beginning. Blaise Pascal Lettres Provinciales, 1656-1657, no. 4 IN THIS CHAPTER, YOU WILL LEARN: Why a
More informationDefining Data Items Conrad Weisert (2003)
Defining Data Items Conrad Weisert (2003) Background -- one more missing component The failed-project documentation I described last month 2 lacked not only output specifications, but, worse, any data
More information6.033 Computer System Engineering
MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Lec 19 : Nested atomic
More informationThe Need for Agile Project Management
The Need for Agile Project Management by Mike Cohn 21 Comments originally published in Agile Times Newsletter on 2003-01-01 One of the common misperceptions about agile processes is that there is no need
More informationBusiness Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3)
Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) COURSE STRUCTURE Introduction to Business Analysis Module 1 Needs Assessment Module 2 Business Analysis Planning Module
More informationWhat is the Joint Application Development (JAD) Process?
What is the Joint Application Development (JAD) Process? By Joy Matthews, Vice President, Pierson Requirements Group, Inc. jmatthews@piersonrequirementsgroup.com JAD is an Important Technique for Software
More informationThe Definitive Guide to Office 365 External Sharing. An ebook by Sharegate
The Definitive Guide to Office 365 External Sharing An ebook by Sharegate The Definitive Guide to External Sharing In any organization, whether large or small, sharing content with external users is an
More informationCHAPTER 18: CLIENT COMMUNICATION
CHAPTER 18: CLIENT COMMUNICATION Chapter outline When to communicate with clients What modes of communication to use How much to communicate How to benefit from client communication Understanding your
More informationMIS5206-Section Protecting Information Assets-Exam 1
Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines
More informationWhy do we have to know all that? The stored program concept (the procedural paradigm) Memory
Session 1b: Background & Preliminaries What is computer programming? The stored-program concept. The procedural paradigm. What is a programming language? The object-oriented paradigm C#: ancestors & origins
More informationWAKEFLY WEBSITE USER EXPERIENCE AUDIT
WAKEFLY WEBSITE USER EXPERIENCE AUDIT Is your website properly optimized to provide the best user experience? BEYOND EXPECTATION USER EXPERIENCE AUDIT SUMMARY The user experience audit provides insight
More informationFLOW CHART AND PSEUDO CODE
FLOW CHART AND PSEUDO CODE Flowchart A Flowchart is a pictorial representation of an algorithm. The First flowchart is made by John Von Newman in 1945. It is a symbolic diagram of operation sequence, dataflow,
More informationWhat's that? Why? Is one "better" than the other? Terminology. Comparison. Loop testing. Some experts (e.g. Pezze & Young) call it structural testing
Week 9: More details of white-box testing What is it? Comparison with black-box testing What we should not validate Automated versus interactive testing Testing conditional and loop constructs COMP 370
More informationSample Exam. Certified Tester Foundation Level
Sample Exam Certified Tester Foundation Level Answer Table ASTQB Created - 2018 American Stware Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,
More informationDoes anyone actually do this?
Session 11: Polymorphism Coding type-dependent logic Virtual functions Pure virtual functions and abstract classes Coding type-dependent logic Suppose we need to do something different depending on what
More informationAns 1-j)True, these diagrams show a set of classes, interfaces and collaborations and their relationships.
Q 1) Attempt all the following questions: (a) Define the term cohesion in the context of object oriented design of systems? (b) Do you need to develop all the views of the system? Justify your answer?
More informationIn our first lecture on sets and set theory, we introduced a bunch of new symbols and terminology.
Guide to and Hi everybody! In our first lecture on sets and set theory, we introduced a bunch of new symbols and terminology. This guide focuses on two of those symbols: and. These symbols represent concepts
More informationCHAPTER 4. About TMS and the SAN
CHAPTER 4 About TMS and the SAN Recently, during assistance visits to the field, it came to our attention that there is confusion between the Security Assistance Network (SAN) and the Training Management
More informationAesop QuickStart User Guide for Campus Users
Aesop QuickStart User Guide for Campus Users This guide will show you how to: Log on to the Aesop system View absences View substitute assignments View unfilled absences View available substitutes Assign
More informationMy SAS Grid Scheduler
ABSTRACT Paper 1148-2017 My SAS Grid Scheduler Patrick Cuba, Cuba BI Consulting No Batch Scheduler? No problem! This paper describes the use of a SAS DI Studio job that can be started by a time dependent
More informationLearn to use the vector and translation tools in GX.
Learning Objectives Horizontal and Combined Transformations Algebra ; Pre-Calculus Time required: 00 50 min. This lesson adds horizontal translations to our previous work with vertical translations and
More informationOracle Database Express Edition: what you need to know about its license rights and limitations
Oracle Database Express Edition: what you need to know about its license rights and limitations Author: Iuliana Donisa Many things are said on a daily basis about licensing rules and their implications
More informationREENGINEERING SYSTEM
GENERAL OBJECTIVES OF THE SUBJECT At the end of the course, Individuals will analyze the characteristics of the materials in the industries, taking into account its advantages and functionality, for their
More informationDesign Proposal: Outline
Design Proposal: Outline This outline should be used as a checklist to help each member of the team make sure that every section of the document meets the requirements for a design proposal. Writing Style
More informationIntroduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014
Introduction to User Stories CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 1 Goals Present an introduction to the topic of user stories concepts and terminology benefits and limitations
More informationHIPAA RISK ADVISOR SAMPLE REPORT
HIPAA RISK ADVISOR SAMPLE REPORT HIPAA Security Analysis Report The most tangible part of any annual security risk assessment is the final report of findings and recommendations. It s important to have
More information05. SINGLETON PATTERN. One of a Kind Objects
BIM492 DESIGN PATTERNS 05. SINGLETON PATTERN One of a Kind Objects Developer: What use is that? Guru: There are many objects we only need one of: thread pools, caches, dialog boxes, objects that handle
More informationFoundation Level Syllabus Usability Tester Sample Exam
Foundation Level Syllabus Usability Tester Sample Exam Version 2017 Provided by German Testing Board Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged.
More informationBusiness Requirements Document (BRD) Template
Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,
More informationTranscript: A Day in the Life Desiree: 7 th Grade Learning Coach Profile
Transcript: A Day in the Life Desiree: 7 th Grade Learning Coach Profile Transcript (Video) Transcript (Video with Audio Description) Transcript (Audio Description) Transcript (Video) 00:00:00.000 [MUSIC]
More informationProject design process by Heartgrenade
Project design process by Heartgrenade The following document aims to familiarize you with the process of software development that we carry out with our Clients. We divided it into subsequent steps and
More informationWindows 10 Tips and Tricks
Windows 10 Tips and Tricks You've made the move to Windows 10. The Start Menu has returned and its cloud integration is obvious, but most everything else is unfamiliar. This session will help you setup
More informationWriting Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30
Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30 BACKGROUND Examinees are permitted to use computers when writing some diploma exams. The principles, directives,
More informationDESCRIPTION HOURS / QTY HOURLY RATE / FEE TOTAL. .
DESCRIPTION HOURS / QTY HOURLY RATE / FEE PROJECT: Monthly Social Media Marketing Retainer 0 0.00 0.00 PAYMENT TERMS: 1) Month to month. 5 days cancellation notice required to stop for first month. 30
More informationAnswers Java Technical
Building Architect Interview Questions And Answers Java Technical I recently appeared for an interview with Adobe for Technical Architect role Answer:We do not use any of them and I gave the explanation
More informationP1_L6 Mandatory Access Control Page 1
P1_L6 Mandatory Access Control Page 1 We discussed access control in the last lesson. But that was only one kind of access control called discretionary access control, or DAC. That allows you to decide
More informationHow Can a Tester Cope With the Fast Paced Iterative/Incremental Process?
How Can a Tester Cope With the Fast Paced Iterative/Incremental Process? by Timothy D. Korson Version 7.0814 QualSys Solutions 2009 1 Restricted Use This copyrighted material is provided to attendees of
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationWorking with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.
Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to the Fundamentals of Health Workflow
More informationBest Practices for Collecting User Requirements
Federal GIS Conference February 9 10, 2015 Washington, DC Best Practices for Collecting User Requirements Gerry Clancy Glenn Berger Requirements Provide direction for program success Why Requirements are
More information1 of 10 5/11/2006 12:10 AM CS 61A Spring 2006 Midterm 3 solutions 1. Box and pointer. > (let ((x (list 1 2 3))) (set-car! (cdr x) (cddr x)) x) (1 (3) 3) +-------------+ V --------- -- ------ ---------
More informationThe Client Survey Current Site Reasons for Redesign
(Note: The following survey is an example. The actual survey is customized for the particular client, eliminating any inappropriate questions and adding when necessary). The Client Survey Client input
More informationTASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE
SUMMARY AND REFERENCE ACTG 313 TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE PREPARATION PHASE 1. Identification of the Need for a new Information System 2. Initial Feasibility Study (always flawed because
More informationMastering Content Marketing
Mastering Content Marketing (while juggling 97 other tasks) Presented by: Danielle Gray Keep in Mind Be Social! Tweet using hashtag #ContentWhisperer @dgmarketingco Connect on LinkedIn: Danielle Gray,
More informationThe process of interaction design and Prototyping
Chapter 6 edited The process of interaction design and Prototyping 1 Overview What is involved in Interaction Design? Importance of involving users Degrees of user involvement What is a user-centered approach?
More informationProject Management Certification
Project Management Certification PM Certification Project Management Practice June 2015 Four Certification Levels in Project Management If you love your craft, then challenge yourself every day to improve
More informationWhat is orbac? ability to group several authorizations in to profiles to easily add/remove a set of authorizations to an employee
What is orbac? orbac orbac (opns Role Based Access Control) is a IT security solution that enables a structured, centralized, hierarchical and delegated management of IT privileges. orbac is based on the
More informationLosing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data
Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com
More informationIdentify the guidelines for system development. Discuss the purpose of the activities performed in the analysis phase
Discovering Computers 2010 Living in a Digital World Objectives Overview Define system development and list the system development phases Identify the guidelines for system development Discuss the importance
More informationManaging intranets: opportunities and challenges
1 Managing intranets: opportunities and challenges IN THIS CHAPTER: Life in a workflow world The intranet opportunity Life as an intranet manager The challenges of intranet management A framework for intranet
More informationWriting Agile User Stories
RefineM s January 2014 Lunch & Learn Webinar Writing Agile User Stories NK Shrivastava, PMP, RMP, ACP CEO/Consultant - RefineM Agenda 1. What is Virtual Lunch & Learn 2. Your expectations from this webinar
More information2. COURSE DESIGNATION: 3. COURSE DESCRIPTIONS:
College of San Mateo Official Course Outline 1. COURSE ID: CIS 278 TITLE: (CS1) Programming Methods: C++ C-ID: COMP 122 Units: 4.0 units Hours/Semester: 48.0-54.0 Lecture hours; 48.0-54.0 Lab hours; and
More informationisolve page launches with a Single-Sign-On, so you don't need to enter a separate password
USER MANUAL Introduction Welcome to Celebrating You!!!! Celebrating You allows you to recognize your people in a simple way using Recognition portal. The user interfaces on the portal have been designed
More informationBTEC Nationals IT - Unit2 FAQs
BTEC Nationals IT - Unit2 FAQs Q1 Q2 I need more clarity on what is required in the design task Is it expected that the race officials are entering times as raw times and then the table is set up so it
More informationFACETs. Technical Report 05/19/2010
F3 FACETs Technical Report 05/19/2010 PROJECT OVERVIEW... 4 BASIC REQUIREMENTS... 4 CONSTRAINTS... 5 DEVELOPMENT PROCESS... 5 PLANNED/ACTUAL SCHEDULE... 6 SYSTEM DESIGN... 6 PRODUCT AND PROCESS METRICS...
More informationPrivacy Breach Policy
1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure
More informationScope and Sequence: CCNA Discovery
Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level
More informationThe process of interaction design
Chapter 9 The process of interaction design 1 Overview What is involved in Interaction Design? Importance of involving users Degrees of user involvement What is a user-centered approach? Four basic activities
More informationAdvanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual
Advanced Accounting Software & Secure Internet Solutions Advanced Security Administrator Reference Manual Version 7.3 Information in this document is subject to change without notice and does not represent
More informationLo-Fidelity Prototype Report
Lo-Fidelity Prototype Report Introduction A room scheduling system, at the core, is very simple. However, features and expansions that make it more appealing to users greatly increase the possibility for
More informationThe PROCESS of Interaction DESIGN
The PROCESS of Interaction DESIGN O V E R V I E W What is involved in Interaction Design? Importance of involving users Degrees of user involvement What is a user-centered approach? Four basic activities
More informationSharing the Calendar
Sharing the Calendar The new feature allows you to Share your calendar. To enable this feature, select the Calendar icon on the lower left side of your screen also known as the Navigation Pane. Then Click
More informationUniversity of Cambridge International Examinations Teacher Support Site User Guide for Coordinators
University of Cambridge International Examinations Teacher Support Site User Guide for Coordinators Getting started Log into the Teacher Support Site http://teachers.cie.org.uk/ Click the Administer Users
More informationCMGt Style Guide: Discovery, Strategy & Design
CMGt Style Guide: Discovery, Strategy & Design 2 Table of Contents INTRODUCTION UX Process Overview... 3 DISCOVERY Stakeholder Interviews... 4-5 Discovery Summary... 6 STRATEGY White boarding...7 Sitemap...
More informationTable of Contents INTRODUCTION TO VIDEO MARKETING... 3 CREATING HIGH QUALITY VIDEOS... 5 DISTRIBUTING YOUR VIDEOS... 9
Table of Contents INTRODUCTION TO VIDEO MARKETING... 3 CREATING HIGH QUALITY VIDEOS... 5 DISTRIBUTING YOUR VIDEOS... 9 ENHANCING YOUR VIDEO RESPONSE RATE... 11 Introduction To Video Marketing There is
More informationbalancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin
balancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin Problem and Solution Overview A healthy work-life balance is vital for both employers and employees.
More informationITG. Information Security Management System Manual
ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005
More informationEarly programming languages ca. 1960
Session 5: Intro. to Java collections History Collection / container concept Shortcoming of original version Parameterized collections Example: ArrayList Comp 271, Spring, 2012 Mr. Weisert Early programming
More informationCharacteristic of the Proposed System. Characteristic of the Proposed System DFD. ER Diagram. Functions used DISADVANTAGES OF PRESENT WORKING SYSTEM
Table of contents:- Project Description Functions used Project Vision Feasibility Study Working Of Present System DISADVANTAGES OF PRESENT WORKING SYSTEM Characteristic of the Proposed System Characteristic
More informationFind funding on Research Professional Training session
Find funding on Research Professional Training session Gaelle Jolly Senior Information & Communications Officer Research Services research.services@admin.ox.ac.uk Hilary term 2018 Research funding opportunities
More informationOVERVIEW. 120 minutes. Technology tools / Platforms Tested (Mandatory) i) NA ii) Technology tools / Platforms Tested (Select any one) i) NA ii)
QP CODE: QP TITLE: Q6702 Software Developer OVERVIEW Test Duration Duration - SSC/N0502 Duration - SSC/N9001 Duration SSC/N9002 Duration SSC/N9003 Duration SSC/N9004 Duration SSC/N9005 Natural Language
More informationDepartment of Organizational Performance and Workplace Learning, Boise State University Basic Use of Qualtrics Instructional Materials for OPWL 530
Department of Organizational Performance and Workplace Learning, Boise State University Basic Use of Qualtrics Instructional Materials for OPWL 530 OPWL 530 Evaluation Basic Use of Qualtrics Instructional
More informationADDING VALUE TO PERFORMANCE MANAGEMENT WITH BUSINESS METRICS
ADDING VALUE TO PERFORMANCE MANAGEMENT WITH BUSINESS METRICS Scott Chapman American Electric Power A great deal of system and human effort is expended to collect detailed technical measurements. These
More informationPerfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation
Perfect Timing Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation Problem & Solution College students do their best to plan out their daily tasks, but
More informationProcess of Interaction Design and Design Languages
Process of Interaction Design and Design Languages Process of Interaction Design This week, we will explore how we can design and build interactive products What is different in interaction design compared
More informationVoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES
VoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES VoIP Internet-based phone systems chock full of features TABLE OF CONTENTS What is VoIP? Switching to VoIP is easy Business Telecom Features Improved
More informationUsing X-Particles with Team Render
Using X-Particles with Team Render Some users have experienced difficulty in using X-Particles with Team Render, so we have prepared this guide to using them together. Caching Using Team Render to Picture
More informationOracle Adapter for Salesforce Lightning Winter 18. What s New
Oracle Adapter for Salesforce Lightning Winter 18 What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 RELEASE FEATURE SUMMARY... 5 PRE-UPGRADE CONSIDERATIONS... 6 POST-UPGRADE REQUIREMENTS...
More informationValidation and Use of Excel Spreadsheets in Regulated Environments
Validation and Use of Excel Spreadsheets in Regulated Environments February 13, 2007 Ludwig Huber Fax.: +49 7802 981948 Tel.: +49 7802 980582 E-mail:Ludwig_Huber@labcompliance.com Today s Agenda Regulatory
More informationNetLogo Lab 3 Tutorial: Finding Peaks
NetLogo Lab 3 Tutorial: Finding Peaks You've already been exposed to the three types of agents you can give commands to in NetLogo: turtles, patches, and the observer. As you start to write your own procedures,
More informationImage Application Proposal
Executive Summary Image Application Proposal 6.9.2010 Jesse Warden, Web App Solution Draft 2 Company X is creating a new application to help their clients better streamline their work flow and add additional
More informationThis is an oral history interview conducted on. October 30, 2003, with IBM researcher Chieko Asakawa and IBM
This is an oral history interview conducted on October 30, 2003, with IBM researcher Chieko Asakawa and IBM Corporate Archivist, Paul Lasewicz, conducted the interview. Thank you, and welcome. Thank you
More informationThe Office, Procedures and Technology Chapter 4 Test 1
Chapter 4 Test 1 True/False Name Indicate whether the statement is true or false by writing T or F on the line below the statement. 1. Employees must often read at work to understand directions for using
More information9/17/2017. The Brain and Neuroplasticity. Why is this any of this important? Have you ever had an angry outburst at work?
The Brain and Neuroplasticity Finding Space to Live and Work Better Trainnovations, Moving from Better to Brilliant 1 Why is this any of this important? 1. I feel stressed at work most days 2. I find myself
More informationCHAPTER 1: INTRODUCTION TO GOOGLE APPS
CHAPTER 1: INTRODUCTION TO GOOGLE APPS 1.1 What is Google Apps Google Apps is a collection of advance Gmail which is the premier email solution which bundle up with few more online collaborative applications
More information