Function Point Counting - Hard Lessons Learnt

Size: px
Start display at page:

Download "Function Point Counting - Hard Lessons Learnt"

Transcription

1 Function Point Counting - Hard Lessons Learnt Faustin Moses Rethinam/ Ajay Verma/ Swaminathan Subraman Productivity Center of Excellence India Development Center Accenture

2 Agenda Function Point Counting - Challenges Challenge #1: COTS - Reusable Components Challenge #2: Package Application Challenge #3: Enhancements of Packaged Applications Challenge #4: Interfacing of Applications with Legacy Systems Productivity 2

3 Function Point Counting Challenges Counting complex applications Increasing demands for quicker turnaround Productivity pressure Adherence to CPM rules in tricky situation while counting projects 3

4 Challenge #1 - COTS -Reusable Components Definition: COTS are software components which are acquired from an independent third party for providing certain functionality. It can be in form of packages, dlls or executables. Challenges: How to count application which uses COTS components? Scenario 1: Integrated with the application package and deployed Scenario 2: Resides in Services form and called on demand. 4

5 Challenge #1 - COTS -Reusable Components Scenario #1 : Integrated with the application package and deployed Functional Overview A set of Business Logics have been written as Functions/Methods in an executable formats (exe) or Linking Libraries (DLL). All these are integrated with the application. The DLL has 100 functionalities to offer. Reusable Components Inside Application Boundary Application 5

6 Challenge #1 - COTS -Reusable Components Suggested Solution: Once when the FP Counters are asked to count the APP A after the implementation The following queries that may arise: Can we include the Reusable components into Application Boundary? If Yes, Can we count the functionalities provided by the Reusable component? If Yes, Do I have to count all the DLL Functionalities or only those which are called? 6

7 Challenge #1 - COTS -Reusable Components Look at the user requirement rather than the way it is implemented Require ments User Output Serving Application Include the Reusable Components in the Application Boundary. Count only those functionalities of the DLL which are used by the Application s provided transactions. 7

8 Challenge #1 - COTS -Reusable Components Scenario #2 Functional Overview: A set of Business Logics might have been written as Functions/Methods called services (WEB SERVICES for example) and exist in a different application and serve to multiple applications at a same time. Problem Statement Defining Application Boundary on this scenario can be a challenge to include or exclude these reusable components. Services App 1 App 2 App 3 App 4 8

9 Challenge #1 - COTS -Reusable Components Resides in Services form and called on demand. Outside Application Boundary Reusable Components Application 9

10 Suggested Solution Challenge #1 - COTS -Reusable Components The Service is outside Application Boundary. And the counting methodology will be as follows, Exclude the Reusable Components (External Services) from the Application Boundary. Count the functionalities of the services which are appropriate and called from application for its service. 10

11 Challenge #2 - Package Applications Package applications offer business solution-in-a-box. Most of the functionalities offered by the package software can be enabled or configured easily without minimum effort. The package also provides the flexibility of customizing certain functionality. Don t count the whole package Packaged Applicatio n Customizing to Partial Partial Customized App to the Customer Count only the customized App 11

12 Challenge #2 - Package Applications Usage: Count only the functionalities which have been customized to the users. Most of the Packaged Applications include more number of FP, but a typical customer organization may only use Part of it. 12

13 Problem Statement Challenge #2 - Package Applications Identifying files or tables maintained in the data repositories of packaged applications In package applications, tables structures are predefined and inbuilt. The applications which are built on top of these packages do not alter the structure of the table, it only either uses the fields or leave it unused. Field 1 Field 2 Field 3 Field 4 Field 5 Field 6 Field 7 Field 8 Field 9 Field 10 Used Fields Unused Fields The project normally requires customization i.e. putting one of such fields on the screen or building the screen using one or more of the existing views. There is no coding effort needed. 13

14 Solution Area Challenge #2 - Package Applications For the Data Functions, only count the "logical" files and NOT the "physical" tables. Count only the DETs (fields/columns) that cross the application boundary that the user recognizes. For example, if the user requirement is to remove the maintenance of a field because their particular implementation does not use it, then DET no longer maintained within the application boundary should be removed from its corresponding file 14

15 Challenge #2 - Package Applications While customizing the application to user requirements, DETs removed from screens potentially result in changes to the logical files as well as the transactions (screens). Though the package applications comes with preconfigured tables, if any customization results in maintenance of an unused field, count the ILF as a changed ILF. Such fields/columns once defined to have business meaning become additional DETs crossing the application boundary and therefore contribute change to both the data and transactional functions. 15

16 Functional Overview Challenge #3 - Package Applications Enhancements of packaged applications As we all know, Packaged Applications would have different modules, however majority of the projects implemented using these application will not be using all the modules. Problem Statement: Do we need to count packaged applications at the module level or at The application/ project level? Solution Area You can count FP for Packaged Applications just as you count for others. But decide on what you are sizing (i.e.) for most of the projects you wouldn't be creating new ILF. 16

17 Challenge #3 - Package Applications Enhancements of packaged applications Function Point Counter always encounter two problems while dealing with the package Applications: 1. ILF / EIF Identifying ILF/EIF can be challenging due to the following reasons: End users are unaware of the underlying logical data structure The project document does not captures the Entity Relationship Data Model in detail Suggested Solution: If DBA is assigned to the system, it may be helpful to understand users logical view of files. If not, you may use programmers as Subject Matter Experts for the files. They may have difficulty trying to see the files through the eyes of an end user and you'll have to guide them. Imagine the data is all in First Normal Form: One Fact in One Place. 17

18 Challenge #3 - Package Applications Enhancements of packaged applications Identification of Functionality Used: Identifying Transaction can be challenging due to the following reasons: The package application provides many functionalities, Identifying the subset of transaction used in the application being counted The user requirements are not documented as clearly as it would have been in case of an In-house developed application Solution: Count only the functions they are using to satisfy their business requirements, not the whole package. To perform an accurate FP count of Packaged Applications, it is absolutely essential to work with end users as Subject Matter Experts for the transactional functions. Apart from programmers it is better to reach out to SME to understand the functionality better from business perspective Reading the user manual and discovering useful functions that are applicable to the application Counter should have a high level understanding of the Packaged applications. 18

19 Challenge #4: Interfacing of Applications with Legacy Systems What are interfaces/middleware application? Interfaces are connecting applications with some Business Logics to transfer data from one application to the other. This interfacing methodology is mostly used when Legacy Applications are interfaced to transfer data to other Applications. These applications do not store the data permanently in its database, the data is retained only for the session. Data & Transactional Functions issues: All the Interface Applications will have Staging Tables which hold data temporarily to manipulate and to produce the final output data to the other Application. Here we need to be very careful about the scope of the FP Count: Problem Statement Is it to count only Interface Application Is it to count Interface Application along with the clients 19

20 Challenge #4: Interfacing of Applications with Legacy Systems Scenario #1: Scope is to count the Interface Application. If the application receives the data, manipulates and sends the data to the other application in a sequential manner, all the transactions will be categorized as External Output as the primary intention of the transaction is to present the information outside the application boundary (Online) Otherwise (Batch) The External Applications which gets data (Outbound) will also be treated as outside of your Application Boundary hence the storing data is not being performed by the interface. All the Outbound data can be considered as External Output (EO) if the data being produced after calculation or satisfying any criteria for EO according to CPM. The Staging Tables of the Interface Applications can be treated as ILFs though the data are not being stored permanently. But we can consider the staging tables as ILFs since it stores the transactional data for the counting application. 20

21 Challenge #4: Interfacing of Applications with Legacy Systems Scenario #2: Scope is to count the Enhancement of an Application which interfaces with the Interface Application Treat the Interface Application as Outside of Application Boundary of the application being counted Count the transactions using which the data is being sent to the interfacing application as an EQ or EO Count the transactions using which the data is received from the interfacing to maintain the ILF as an EI 21

22 Challenge #4: Interfacing of Applications with Legacy Systems Case Study: Consider there is an Interface A which is interacting with two applications B & C. We will discuss the counting scope of App A, B & C. F F APP B F F Interface APP A APP C Inbound to Interface from App B & C (Through Flat File) Outbound of Interface to App B & C (Through Flat File) 22

23 Challenge #4: Interfacing of Applications with Legacy Systems When Counting APP B Consider Application A and the Interfacing Application outside the application boundary Don t count Flat file as EIF. Inbound to APP B from Flat File is EI (External Input) Outbound to Flat File from APP B is EO (or) EQ depending on the Logic. When Counting APP C Same as Counting Application B. When Counting Interface Application A Application B & C are outside Application Boundary. Staging Tables of Interfacing Application A will counted as an ILF. Inbounds will be EI (External Inputs) Outbound will be EO (or) EQ. 23

24 Thank You 24

EXTERNAL INQUIRIES. Objective of Section: Definition: Rating:

EXTERNAL INQUIRIES. Objective of Section: Definition: Rating: EXTERNAL INQUIRIES 7 Objective of Section: Describe and define the concepts necessary to identify and rate External Inquiries. The exercises at the end of the section help the student demonstrate that

More information

International Function Point Users Group References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998)

International Function Point Users Group  References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998) Function Point Estimation Normalized software project metric Application domain rather than technical domain Application functions and data rather than code International Function Point Users Group www.ifpug.org

More information

Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller

Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller Introduction The old adage It s not what you know but when you know it that counts is certainly true

More information

Improving the Accuracy of Function Points Counts

Improving the Accuracy of Function Points Counts The PROJECT PERFECT White Paper Collection Improving the Accuracy of Function Points Counts Abstract Amit Javadekar The Function Point (FP) Analysis model was invented by Allan Albrecht in 1979 as an alternative

More information

Innovative Approach to FP Automation

Innovative Approach to FP Automation Innovative Approach to FP Automation By Siddharth Misra Reviewed By Purnima Jagannathan Accenture Services Pvt. Ltd Bangalore, INDIA Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and

More information

E s timation of effort using F unction Points

E s timation of effort using F unction Points E s timation of effort using F unction Points -Vijay S hankar Vijay Shankar Cognizant Technology Solutions, Feb 2003. All rights reserved. You may make one attributed copy of this material for your own

More information

FP Sizing of SOA applications made easy!

FP Sizing of SOA applications made easy! FP Sizing of SOA applications made easy! Shalini Thulasi (CFPS) Email:Shalini.Thulasi@accenture.com Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are

More information

FPA and Portfolio Counting

FPA and Portfolio Counting FPA and Portfolio Counting Size for Application Maintenance projects the easy way Christine Green CFPS EDS and the EDS logo are registered trademarks of Electronic Data Systems Corporation. EDS is an equal

More information

Function Point Analysis

Function Point Analysis Function Point Analysis Introduction and Basic Overview as an Alternative to SLOC-based Estimation November 17, 2010 Tucker Moore TASC - ASOU Software Cost Estimation Two Main Types of Developed SW Cost

More information

Shared Data Real-time Responses

Shared Data Real-time Responses itip Guidance from the Functional Sizing Standards Committee on topics important to you Shared Data Real-time Responses itip # 06 (Version 1.1 10/19/2014) itips provide guidance on topics important to

More information

Seminar on Software Cost Estimation: Function Points

Seminar on Software Cost Estimation: Function Points : Function Points Institut für Informatik, Universität Zürich Prof. Dr. Martin Glinz Arun Mukhija WS 2002/03 10. December 2002 Author: Christoph Suter Hoffeld 2 8057 Zürich fels@datacomm.ch 1 Introduction...4

More information

Workshop 2: Function Point Analysis. Marlon Dumas

Workshop 2: Function Point Analysis. Marlon Dumas Software Economics Fall 2012 Workshop 2: Function Point Analysis Marlon Dumas (slides partly based on FPA Manual by David Longstreet) Function Point Analysis Function point is a measure of the amount of

More information

EI, EO, EQ QUESTIONS. Expected Result: The student should obtain a score of 90 percent.

EI, EO, EQ QUESTIONS. Expected Result: The student should obtain a score of 90 percent. EI, EO, EQ QUESTIONS Objective: The following questions represent typical questions regarding transactions that will be on the exam. It is important that you become familiar with answering these types

More information

EVOLVED. Function Points. Lee Fischman COCOMO/SCM 15 Forum Spring 2000

EVOLVED. Function Points. Lee Fischman COCOMO/SCM 15 Forum Spring 2000 EVOLVED Function Points Lee Fischman COCOMO/SCM 15 Forum Spring 2000 Galorath Incorporated 2000 1 Traditional Function Points - A Great Start At Functional Scoping Identification Input Inquiry Output Complexity

More information

Workshop 2-3: Function Point Analysis. Dietmar Pfahl

Workshop 2-3: Function Point Analysis. Dietmar Pfahl Software Economics Fall 2015 Workshop 2-3: Function Point Analysis Dietmar Pfahl (slides based on material of Marlon Dumas and (partly) on FPA Manual by David Longstreet) Function Point Analysis Function

More information

Some doubts about the objectivity of logical determination of the uniqueness of the elementary process in the Function Point Analysis

Some doubts about the objectivity of logical determination of the uniqueness of the elementary process in the Function Point Analysis Some doubts about the objectivity of logical determination of the uniqueness of the elementary process in the Function Point Analysis Table of Contents Marian Zalcman, Ph.D. ASSECO Poland, Rzeszów 1. Introduction

More information

Certified Function Point Specialist

Certified Function Point Specialist IFPUG I40-420 Certified Function Point Specialist Version: 4.1 Topic 1, Definitions IFPUG I40-420 Exam QUESTION NO: 1 When counting DETs which of the following rules apply? A. Count a DET for each recursive

More information

Part 1 - Process and Rules

Part 1 - Process and Rules Part 1 - Process and Rules This page intentionally left blank. Part 2 Counting Practices This page intentionally left blank. Part 3 - Examples This page intentionally left blank. Part 4 Appendices and

More information

Interface Models and Function Point Calculation

Interface Models and Function Point Calculation Interface Models and Function Point Calculation Jeannie Bellows Senior Consultant jbellows@castek.com Who is Castek? Who is Castek? Global organization, headquartered in Toronto, Canada with offices in

More information

Boundaries: The Undiscovered Territory

Boundaries: The Undiscovered Territory Boundaries: The Undiscovered Territory 2009 The Problem... Many definitions although lots of similarities Individual perception can and does impact the definition of boundaries Boundary definition can

More information

Technical Report

Technical Report FULL FUNCTION POINTS: COUNTING PRACTICES MANUAL Technical Report 1997-04 Edited by Software Engineering Management Research Laboratory and Software Engineering Laboratory in Applied Metrics (SELAM) In

More information

Simple Function Point! measurement fully compatible with the IFPUG method 4.x

Simple Function Point! measurement fully compatible with the IFPUG method 4.x ! A new method for functional size measurement fully compatible with the IFPUG method 4.x Roberto Meli CEO - Data Processing Organization President Association N. 1 IFPUG FP Reference Model EQ EIF ILF

More information

Aligning Function Point Counting and Test Planning

Aligning Function Point Counting and Test Planning Aligning Function Point Counting and Test Planning Chris Francis, CSTE Senior Consultant Nestlé Purina Petcare Company Checkerboard Square St. Louis, MO 63164 1 Content Brief Background on Testing Similarities

More information

INTERNAL LOGICAL FILES

INTERNAL LOGICAL FILES INTERNAL LOGICAL FILES 9 Objective of Section: Describe and define the concepts necessary to identify and rate Internal Logical Files. The exercises at the end of the section help the student demonstrate

More information

Probabilistic Models of Software Function Point Elements

Probabilistic Models of Software Function Point Elements Probabilistic Models of Software Function Point Elements Masood Uzzafer Amity university Dubai Dubai, U.A.E. Email: muzzafer [AT] amityuniversity.ae Abstract Probabilistic models of software function point

More information

Overview: Understanding the Toolbox

Overview: Understanding the Toolbox 3 Overview: Understanding the Toolbox In this chapter, we will review the different components of SQL Server Integration Services (SSIS). Our intent here is to go over the main components of SSIS, to give

More information

Session 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record

Session 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record Session 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record Requirements for a Security and Privacy Audit System Presented By: John Travis, CPA, MSA, CHFP Director, Solution Management

More information

Functional Measure of a Real-time System

Functional Measure of a Real-time System IWSM/Mensura 2009, November 4-6, 2009 Amsterdam (Netherlands) Functional Measure of a Real-time System Jean-Marc Desharnais, Alain Abran, Pınar Efe Dikici, Mert Can İliş, İrfan Nuri Karaca Agenda Introduction

More information

Measuring Function Points from VDM-SL Specifications

Measuring Function Points from VDM-SL Specifications Measuring Function Points from VDM-SL Specifications Tomoko Miyawaki, Junichi Iijima, Sho Ho 宮脇智子 飯島淳一 包捷 Department of Industrial Engineering and Management Graduate School of Decision Science and Technology

More information

Part 5 Appendices and Glossary

Part 5 Appendices and Glossary Part 5 Appendices and Glossary This page intentionally left blank. Part 5 Appendix A Appendix A: Functional Size Calculation Table Introduction Contents Appendix A includes a table to facilitate measuring

More information

Royce Edwards. Software Composition Technologies 75 Kentucky Way Freehold, New Jersey, USA

Royce Edwards. Software Composition Technologies 75 Kentucky Way Freehold, New Jersey, USA Royce Edwards Software Composition Technologies 75 Kentucky Way Freehold, New Jersey, USA 07728-4604 732-866-0090 (voice) 732-377-8410 (fax) Royce@RoyceEdwards.com Royce Edwards has taught web site counting

More information

Function Point Training

Function Point Training Function Point Training Instructor: David Longstreet David@SoftwareMetrics.Com www.softwaremetrics.com 816-739-4058 tel. or 816-228-8259 fax. 112 Two Day Schedule Day One - Function Points Concepts, Questions

More information

Chapter 17 - Component-based software engineering. Chapter 17 So-ware reuse

Chapter 17 - Component-based software engineering. Chapter 17 So-ware reuse Chapter 17 - Component-based software engineering 1 Topics covered ² Components and component models ² CBSE processes ² Component composition 2 Component-based development ² Component-based software engineering

More information

Ms. Bhawna Sharma 1, Ms. Kavita Choudhary 2, Mr Rajendra Purohit 3 1 M.Tech. Scholar, 2 Associate professor, 3 Research Scholar

Ms. Bhawna Sharma 1, Ms. Kavita Choudhary 2, Mr Rajendra Purohit 3 1 M.Tech. Scholar, 2 Associate professor, 3 Research Scholar Function Point Analysis: Converting various design elements into Function Points Ms. Bhawna Sharma 1, Ms. Kavita Choudhary 2, Mr Rajendra Purohit 3 1 M.Tech. Scholar, 2 Associate professor, 3 Research

More information

Function Point Counting Practices Manual. Release 4.2.1

Function Point Counting Practices Manual. Release 4.2.1 Function Point Counting Practices Manual Release 4.2.1 International Function Point Users Group (IFPUG) Function Point Counting Practices Manual Release 4.2.1 Chairperson, Counting Practices Committee

More information

CT41 (ALCCS) SOFTWARE ENGINEERING JUN 2015

CT41 (ALCCS) SOFTWARE ENGINEERING JUN 2015 Q.1 a. What is the role of software engineering? (4) Role of software engineering with reference to producing good quality software, maintainable software, and on time within budget. b. Differentiate between

More information

EXTERNAL INPUTS. Objective of Section: Definition: Rating: Counting Tips:

EXTERNAL INPUTS. Objective of Section: Definition: Rating: Counting Tips: EXTERNAL INPUTS 5 Objective of Section: Describe and define the concepts necessary to identify and rate External Inputs. The exercises at the end of the section help the student demonstrate that they have

More information

Functional Size Measurement for Web Applications

Functional Size Measurement for Web Applications Functional Size Measurement for Web Applications Silvia Abrahão Valencia University of Technology, Spain sabrahao@dsic.upv.es Contents Part I Introduction Why measure? Software Metrics Why measure software

More information

CASE STUDIES ANSWERS. Page 1 Longstreet Consulting Inc.

CASE STUDIES ANSWERS. Page 1 Longstreet Consulting Inc. CASE STUDIES ANSWERS Page 1 Collection Letter Dear , Our records indicate that you are past due . If you do not pay within , then we will kindly repo

More information

Data Loading Best Practice

Data Loading Best Practice Data Loading Best Practice PPDM Association Richard Cook ETL Solutions www.etlsolutions.com Raising data management standards Agenda Data loading PPDM Mapping tables Automated population of PPDM Data Management

More information

WHITE PAPER. Moving Fragmented Test Data Management Towards a Centralized Approach. Abstract

WHITE PAPER. Moving Fragmented Test Data Management Towards a Centralized Approach. Abstract WHITE PAPER Moving Fragmented Test Data Management Towards a Centralized Approach Abstract Test Data Management (TDM) ensures managing test data requests in an automated way to ensure a high degree of

More information

Volume II, Section 5 Table of Contents

Volume II, Section 5 Table of Contents Volume II, Section 5 Table of Contents 5...5-1 5.1 Scope...5-1 5.2 Basis of...5-1 5.3 Initial Review of Documentation...5-2 5.4 Source Code Review...5-2 5.4.1 Control Constructs...5-3 5.4.1.1 Replacement

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

How manual testers can break into Test Automation without programming skills

How manual testers can break into Test Automation without programming skills How manual testers can break into Test Automation without programming skills Jim Trentadue Enterprise Account Manager - Ranorex jtrentadue@ranorex.com Agenda Agenda Test Automation Industry recap Test

More information

Minsoo Ryu. College of Information and Communications Hanyang University.

Minsoo Ryu. College of Information and Communications Hanyang University. Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based

More information

Automate to Innovate L EA RN WHAT SCRIPTING CAN DO FOR YOU P U N E E T S I N G H

Automate to Innovate L EA RN WHAT SCRIPTING CAN DO FOR YOU P U N E E T S I N G H Automate to Innovate LEARN WHAT SCRIPTING CAN DO FOR YOU PUNEET SINGH Agenda Target Audience What will be covered in the session? Why Automate? Where to Automate? Where to Automate Examples How to Start

More information

Building E-Business Suite Interfaces using BPEL. Asif Hussain Innowave Technology

Building E-Business Suite Interfaces using BPEL. Asif Hussain Innowave Technology Building E-Business Suite Interfaces using BPEL Asif Hussain Innowave Technology Agenda About Innowave Why Use BPEL? Synchronous Vs Asynchronous BPEL Adapters Process Activities Building EBS Interfaces

More information

Petro-SIM Simulator and CAPE-OPEN: Experiences and Successes

Petro-SIM Simulator and CAPE-OPEN: Experiences and Successes Petro-SIM Simulator and CAPE-OPEN: Experiences and Successes Michael Aylott, KBC Advanced Technologies, Calgary, AB, Canada Ben van der Merwe, KBC Advanced Technologies, Calgary, AB, Canada Abstract KBC

More information

Software Engineering (CSC 4350/6350) Rao Casturi

Software Engineering (CSC 4350/6350) Rao Casturi Software Engineering (CSC 4350/6350) Rao Casturi Recap 1 to 5 Chapters 1. UML Notation 1. Use Case 2. Class Diagrams 3. Interaction or Sequence Diagrams 4. Machine or State Diagrams 5. Activity Diagrams

More information

Lecture 8. Database Management and Queries

Lecture 8. Database Management and Queries Lecture 8 Database Management and Queries Lecture 8: Outline I. Database Components II. Database Structures A. Conceptual, Logical, and Physical Components III. Non-Relational Databases A. Flat File B.

More information

Counting Lotus Notes Applications Copyright The David Consulting Group, Inc.

Counting Lotus Notes Applications Copyright The David Consulting Group, Inc. Counting Lotus tes Applications Thomas Cagley (440) 933-8768 Office (440) 668-5717 Cell tomcagley@davidconsultinggroup.com 1 Items of Interest Definitions Where are the ILFs Subforms Twisties Views Keywords

More information

Applying Auto-Data Classification Techniques for Large Data Sets

Applying Auto-Data Classification Techniques for Large Data Sets SESSION ID: PDAC-W02 Applying Auto-Data Classification Techniques for Large Data Sets Anchit Arora Program Manager InfoSec, Cisco The proliferation of data and increase in complexity 1995 2006 2014 2020

More information

DOMAIN ENGINEERING OF COMPONENTS

DOMAIN ENGINEERING OF COMPONENTS 4-02-55 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES DOMAIN ENGINEERING OF COMPONENTS Carma McClure INSIDE Definition of Components; Component-Based Development; Reuse Processes; Domain

More information

AEFP Meeting #9. September 10 th 2015

AEFP Meeting #9. September 10 th 2015 AEFP Meeting #9 September 10 th 2015 1 Agenda 2 Introduction (5 min) Review and acknowledge of approach (20 min) Questions (15 min) Next steps (20 minutes) Objective Effort on code modification Functional

More information

Study of Component Based Software Engineering

Study of Component Based Software Engineering Study of Based Software Ishita Verma House No.4, Village Dayalpur Karawal Nagar Road Delhi-110094, India ish.v.16@gmail.com Abstract based engineering is an approach of development that emphasizes the

More information

Presenter: Dong hyun Park

Presenter: Dong hyun Park Presenter: 200412325 Dong hyun Park Design as a life cycle activity bonds the requirements to construction Process of breaking down the system into components, defining interfaces and defining components

More information

Software Reuse and Component-Based Software Engineering

Software Reuse and Component-Based Software Engineering Software Reuse and Component-Based Software Engineering Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Contents Software Reuse Components CBSE (Component-Based Software Engineering) Domain Engineering

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

(Objective-CS605 Software Engeenring-II)

(Objective-CS605 Software Engeenring-II) Which one of the following is NOT a useful indicator of software quality? Correctness Code size (Page 67) Maintainability Integrity Usability Which one of the following does not belong to a strategy for

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Wksheet 1 CIP-005-6 Cyber Security Electronic Security Perimeter(s) This section to be completed by the Compliance Enfcement Authity. Audit ID: Registered Entity: NCR Number:

More information

How Turner Broadcasting can avoid the Seven Deadly Sins That. Can Cause a Data Warehouse Project to Fail. Robert Milton Underwood, Jr.

How Turner Broadcasting can avoid the Seven Deadly Sins That. Can Cause a Data Warehouse Project to Fail. Robert Milton Underwood, Jr. How Turner Broadcasting can avoid the Seven Deadly Sins That Can Cause a Data Warehouse Project to Fail Robert Milton Underwood, Jr. 2000 Robert Milton Underwood, Jr. Page 2 2000 Table of Contents Section

More information

Oracle Financials Accounting Hub in Banking Industry

Oracle Financials Accounting Hub in Banking Industry Oracle Financials Accounting Hub in Banking Industry Anil Patil FUJITSU AMERICA anil.patil@us.fujitsu.com 0 Agenda Introduction Case Study - Overview Integration Challenges in a non FAH world FAH Solution

More information

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015 Lesson Learned CIP Version 5 Transition Program CIP-002-5.1: Communications and Networking Cyber Assets Version: October 6, 2015 Authorized by the Standards Committee on October 29, 2015 for posting as

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:

More information

Basel Dudin

Basel Dudin Measuring Internal Product Attributes: Size Basel Dudin dudinbk@mcmaster.ca Outline Aspects of Software Size Length (LOC) Lines of Code Halstead s Theory Functionality Unadjusted Function Point Count (UFC)

More information

SSIM Collection & Archiving Infrastructure Scaling & Performance Tuning Guide

SSIM Collection & Archiving Infrastructure Scaling & Performance Tuning Guide SSIM Collection & Archiving Infrastructure Scaling & Performance Tuning Guide April 2013 SSIM Engineering Team Version 3.0 1 Document revision history Date Revision Description of Change Originator 03/20/2013

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

DLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER. Calle 4 N La Loma Office SENA facilities La Jagua de Ibirico

DLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER. Calle 4 N La Loma Office SENA facilities La Jagua de Ibirico DLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER Calle 4 N 4-104 La Loma 5533244 Office SENA facilities La Jagua de Ibirico Cesar Department, Colombia Colombia, 2013 TABLE OF CONTENTS

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information

More information

Data Tier Application In SQL Sever Nikhil A. Govekar Scalability Experts

Data Tier Application In SQL Sever Nikhil A. Govekar Scalability Experts Data Tier Application In SQL Sever 2012 Nikhil A. Govekar Scalability Experts Introduction of Data-tier Application (DAC) Benefits of DAC Implementation of Data-tier Applications. Working with Data-tier

More information

HKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access

HKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access Databases and Microsoft Access Introduction to Databases A well-designed database enables huge data storage and efficient data retrieval. Term Database Table Record Field Primary key Index Meaning A organized

More information

Chapter 13. Application Architecture and Modeling. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 13. Application Architecture and Modeling. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 13 Application Architecture and Modeling McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 13-2 Define an information system s architecture in

More information

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Copyright 2014, Oracle and/or its affiliates. All rights reserved. 1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges

More information

Publishing automation using DevOps STC India Annual Conference. Srikanta Dash and Visagan Santhanam, Unisys India Pvt. Ltd.

Publishing automation using DevOps STC India Annual Conference. Srikanta Dash and Visagan Santhanam, Unisys India Pvt. Ltd. Publishing automation using DevOps STC India Annual Conference Srikanta Dash and Visagan Santhanam, Unisys India Pvt. Ltd. December 8, 2017 Disclaimers The contents and opinions expressed in the following

More information

Alma Analytics Beyond out-of-the-box reports: Tips for formatting and customization

Alma Analytics Beyond out-of-the-box reports: Tips for formatting and customization Alma Analytics Beyond out-of-the-box reports: Tips for formatting and customization Tricia Clayton tclayton3@gsu.edu Collection Services Librarian Georgia State University GIL User Group Meeting, 2018

More information

A System for Measuring Function Points from Specifications

A System for Measuring Function Points from Specifications A System for Measuring Function Points from Specifications Technical Report DEIS-LIA-97-006 Fausto Gramantieri 1, Evelina Lamma 1, Paola Mello 2, Fabrizio Riguzzi 1 1 DEIS - Università di Bologna Viale

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN: IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 20131 Improve Search Engine Relevance with Filter session Addlin Shinney R 1, Saravana Kumar T

More information

Oracle Database 10g Resource Manager. An Oracle White Paper October 2005

Oracle Database 10g Resource Manager. An Oracle White Paper October 2005 Oracle Database 10g Resource Manager An Oracle White Paper October 2005 Oracle Database 10g Resource Manager INTRODUCTION... 3 SYSTEM AND RESOURCE MANAGEMENT... 3 ESTABLISHING RESOURCE PLANS AND POLICIES...

More information

TOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:

TOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language: TOGAF Foundation (Level 1) 9 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (voucher included) Accredited By: The Open Group Mock Exam:

More information

Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings. October , Assisi, Italy

Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings. October , Assisi, Italy Exploring the Convertibility between IFPUG and COSMIC FP: Preliminary Findings Çiğdem GENCEL & Carl BIDEAU October 17-19 2012, Assisi, Italy Çiğdem GENCEL Assist.Prof., Free University of Bolzano, ITALY

More information

512-Kilobit 2.7-volt Minimum SPI Serial Flash Memory AT25BCM512B. Preliminary

512-Kilobit 2.7-volt Minimum SPI Serial Flash Memory AT25BCM512B. Preliminary Features Single 2.7V - 3.6V Supply Serial Peripheral Interface (SPI) Compatible Supports SPI Modes and 3 7 MHz Maximum Operating Frequency Clock-to-Output (t V ) of 6 ns Maximum Flexible, Optimized Erase

More information

ERP/CRM System Implementation Methodology

ERP/CRM System Implementation Methodology ERP/CRM System Implementation Methodology Prepared by Admiral Consulting Group Date Submitted May 27, 2016 TABLE OF CONTENTS Implementation Methodology... 3 1.1. Analysis (Solution Envisioning) Phase...

More information

What is a multi-model database and why use it?

What is a multi-model database and why use it? What is a multi-model database and why use it? An When it comes to choosing the right technology for a new project, ongoing development or a full system upgrade, it can often be challenging to define the

More information

Siebel 8.0 Consultant Certified Expert Exam - Sample Questions. Exam Code: IZ0-202

Siebel 8.0 Consultant Certified Expert Exam - Sample Questions. Exam Code: IZ0-202 Siebel 8.0 Consultant Certified Expert Exam - Sample Questions. Exam Code: IZ0-202 1) What are the types of Siebel applications? (Choose three) a) Partner b) Web c) Customer d) Employee 2) How many business

More information

SOME TYPES AND USES OF DATA MODELS

SOME TYPES AND USES OF DATA MODELS 3 SOME TYPES AND USES OF DATA MODELS CHAPTER OUTLINE 3.1 Different Types of Data Models 23 3.1.1 Physical Data Model 24 3.1.2 Logical Data Model 24 3.1.3 Conceptual Data Model 25 3.1.4 Canonical Data Model

More information

Guideline for Determining the TOE

Guideline for Determining the TOE Guideline for Determining the TOE in Certification Applications that Do Not Use PPs Version 2.0 This "Guideline for Determining the TOE" describes what kinds of matters to note when determining the scope

More information

Evaluation Guide for ASP.NET Web CMS and Experience Platforms

Evaluation Guide for ASP.NET Web CMS and Experience Platforms Evaluation Guide for ASP.NET Web CMS and Experience Platforms CONTENTS Introduction....................... 1 4 Key Differences...2 Architecture:...2 Development Model...3 Content:...4 Database:...4 Bonus:

More information

Key Differentiators. What sets Ideal Anaytics apart from traditional BI tools

Key Differentiators. What sets Ideal Anaytics apart from traditional BI tools Key Differentiators What sets Ideal Anaytics apart from traditional BI tools Ideal-Analytics is a suite of software tools to glean information and therefore knowledge, from raw data. Self-service, real-time,

More information

Release Notes Documentum Release 1.4

Release Notes Documentum Release 1.4 Release Notes Documentum Release 1.4 Released April 30, 2010 Copyright Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights reserved DCTM Release Notes 1.4 2 Contents

More information

IBM. IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns. Version 2 Release 1 BA

IBM. IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns. Version 2 Release 1 BA IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns Version 2 Release 1 IBM BA21-8475-00 Note Before using this information and the product it supports, read the information in Notices

More information

Organizing Database Project Work. (Chapter 4)

Organizing Database Project Work. (Chapter 4) Organizing Database Project Work (Chapter 4) 1 Learn the rules like a pro, so you can break them like an artist Pablo Picasso 2 Database Life Cycle The life cycle starts when the need is identified and

More information

Organizing Database Project Work

Organizing Database Project Work Organizing Database Project Work (Chapter 4) 1 Learn the rules like a pro, so you can break them like an artist Pablo Picasso 2 Database Life Cycle The life cycle starts when the need is identified and

More information

Exploring Microsoft Office Access 2007

Exploring Microsoft Office Access 2007 Exploring Microsoft Office Access 2007 Chapter 1: Finding Your Way Through a Database Robert Grauer, Keith Mulbery, Maurie Wigman Lockley Committed to Shaping the Next Generation of IT Experts. Copyright

More information

Teiid Designer User Guide 7.5.0

Teiid Designer User Guide 7.5.0 Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata

More information

Designing Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses

Designing Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses Designing Data Warehouses To begin a data warehouse project, need to find answers for questions such as: Data Warehousing Design Which user requirements are most important and which data should be considered

More information

Taming Rave: How to control data collection standards?

Taming Rave: How to control data collection standards? Paper DH08 Taming Rave: How to control data collection standards? Dimitri Kutsenko, Entimo AG, Berlin, Germany Table of Contents Introduction... 1 How to organize metadata... 2 How to structure metadata...

More information

MAVEN INTERVIEW QUESTIONS

MAVEN INTERVIEW QUESTIONS MAVEN INTERVIEW QUESTIONS http://www.tutorialspoint.com/maven/maven_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Maven Interview Questions have been designed specially to get

More information

D&D Knowledge Management Information Tool

D&D Knowledge Management Information Tool D&D Knowledge Management Information Tool 2011-11297 H. Upadhyay*, L. Lagos*, W. Quintero*, P. Shoffner*, J. DeGregory**, J. Hunter*** *Applied Research Center, Florida International University, Miami.

More information

Universal Model Framework -- An Introduction

Universal Model Framework -- An Introduction Universal Model Framework -- An Introduction By Visible Systems Corporation www.visible.com This document provides an introductory description of the Universal Model Framework an overview of its construct

More information