4 Open Source Software Evaluation Models
|
|
- Edmund McCoy
- 8 years ago
- Views:
Transcription
1 4 Open Source Software Evaluation Models To this point, we have shown the basic elements and highlighted their importance when considering new software acquisition. The OSS selection process in any organization should at least consider gains, either in business strategy, IT strategy, or technical matters that support, improve or create a competitive advantage in the market. According to Navica (2012), The Open Source Maturity Model is a vital tool for planning open source success. Several assessments or models have been created over the years with the primary objective being to provide for the organization tools to evaluate the trustworthiness of OSS and to learn whether or not it is suitable for the organization. As well, these are evidence of the interest and the need of different organizations to systematically assess the quality of a specific OSS. These models can be adapted into a straightforward. Table 4 lists the identified OSS evaluation approaches in chronological order. The last column Method indicates whether or not a model has a well-defined method for describing the required activities, tasks, outputs and inputs. Acronym Name Year Source Corp./Org. Method C-OSMM Open Source Maturity Model 2003 (Duijnhouwer & Widdows, 2003; Duijnhouwer & Widdows, 2003) Cap Gemini Yes O-BRR Open Business Readiness Rating 2005 (Wasserman, Chan, & Pal, 2005) Open-BRR Yes N-OSMM Open Source Maturity Model 2005 (Golden, Making open source Navica ready for the enterprise: The open Software source maturity model, 2005) Yes Methodology of Qualification and Q-SOSS Selection of Open Source 2006 (Atos-Origin, 2006) Atos-Origin Yes software Q-OMM Open Source Maturity Model 2009 (Wittmann & Nambakam, 2009) QualiPSo No Table 4 Identified OSS evaluation models, frameworks and approaches. 28
2 Four out of five models in the table have got well-defined methods. These were designed to evaluate extensively an OSS product, and many the same or similar criteria. However, difference does exist between them. The primary difference is that C-OSMM, N-OSMM and Q-SOSS are practical assessment models developed between 2003 and On the other hand, O-BRRM and Q-OMM were developed after 2007 and they are self-described as scientific assessment models. In the following sections, the most relevant evaluation and selection models will be broadly described in order to provide background for our evaluation model. 4.1 CapGemini Open Source Maturity Model (C-OSMM) CapGemini 23 created its own model in 2003 in order to provide consultation services for its customers. This model is well known as a collaborative process between consultant and customer. The C-OSMM uses two main criteria, product indicators, to assess the maturity of OSS products, and application Indicators, to assess whether a product fulfills the user requirements and anticipated needs. Product indicators are the result of measuring a number of objective and measurable facts (Duijnhouwer & Widdows, 2003) related to OSS. These indicators can be divided in four groups: product, integration, use, and acceptance, which can give us a clear picture of which characteristics each indicator measures. 23 CapGemini - A global leader in consulting, technology, outsourcing, and local professional services
3 An Open Source product cannot be introduced into a working environment based solely on a measurement of it strengths and weaknesses (Duijnhouwer & Widdows, 2003). As mentioned earlier, Application Indicators form the second set of criteria included in the CapGemini model. This group of indicators is intended to take into count the current user ecosystem and future needs. Table 5 shows the importance of these indicators. Group Indicator Immature Mature Score Age The project has just started The project is been active for some time. 1 to 5 Licensing Unclear or non-described. Commercial and OS use. 1 to 5 Human Few or single lead developer. Multiple lead developer 1 to 5 hierarchies Product Selling points Only enthusiasm. Commercial issues like security or 1 to 5 maintainability. Developer Community Small group. Active developer community. 1 to 5 Integration Use Acceptance Modularity No modules. Modules or plugin architecture. 1 to 5 Collaboration with other products Not in focus yet. Attention to integrate with other products. 1 to 5 Standards Incompliant with standards. Compliant with current standards. 1 to 5 Support Limited by the own community. Highly accessible support. 1 to 5 Ease of No training facilities or courses. Training and courses available. 1 to 5 deployment User Community Small group. Large and well organized. 1 to 5 Market Few references. Many references with application cases. 1 to 5 penetration Table 5 Product Indicators of CapGemini Model. Application Indicators assign a priority determined by the user requirements, in order conclude whether a product is suitable or not. Once the priorities have been fixed having a value from one to five, where one represents unimportant and five represents very important. The indicators get their final values, a weighting factor, by multiplying the priority by the score. For example, assuming that the indicator usability has a priority of 5 (five) and the product scores 1 (one) the weight factor will be 5 (five). 30
4 Application indicators Indicator Purpose Priority Score WF Usability Experience of user audience. 1 to 5 1 to 5 P x S Interfacing Direct relationship between product standards and connectivity requirements in the organization. 1 to 5 1 to 5 P x S Performance The expected load and processing capability proportional to user audience. 1 to 5 1 to 5 P x S Reliability Level of availability. 1 to 5 1 to 5 P x S Security Security assessment. Organization security requirements. 1 to 5 1 to 5 P x S Proven Technology Technology has proven in daily production environment. 1 to 5 1 to 5 P x S Vendor independence Level of commitment between client and supplier. 1 to 5 1 to 5 P x S Platform independence Support Platform independent, or the required platform meets with the Organization s. Level of support required. Generally related with the importance of the system. 1 to 5 1 to 5 P x S 1 to 5 1 to 5 P x S Reporting Reporting needs defined by the functional area. 1 to 5 1 to 5 P x S Administration Operation management, patch management, changes management and maintenance tools in general. 1 to 5 1 to 5 P x S Advice Validation or recommendation by independent parties. 1 to 5 1 to 5 P x S Training Required training and facilities. 1 to 5 1 to 5 P x S Staffing Product expertise bought, taught or hired. 1 to 5 1 to 5 P x S Implementation Implementation scenario. 1 to 5 1 to 5 P x S Table 6 Application indicators of CapGemini Model. Therefore, the "CapGemini Open Source Maturity Model" is not necessarily dependent solely on the OSS maturity, but also assesses user needs. 4.2 Business Readiness Rating Model (O-BRRM) The Business Readiness Rating Model (O-BRR) was developed by Spike Source, the Center for Open Source Investigation at Carnegie Mellon West, and Intel Corporation (Wasserman, Chan, & Pal, 2005). Unlike other models, BRR has five ranks from one (1) representing Unacceptable, to five (5) representing Excellent. Furthermore the O- BRR is comprised of four phases shown in Figure 4: quick assessment, target usage assessment, data collection and processing, and data translation. 31
5 Phase 1. Quick Assessment Filter Phase 2. Target Usage Assessment Phase 3. Data Collection & Processing Phase 4. Data Translation Business Readiness Rating Figure 4 The four phases of Business Readiness Rating Model. In the Quick Assessment phase, the idea is to quickly eliminate products that are clearly unsuitable and to decide the target usage of the application: mission-critical, regular, development, or experimental. Later one creates the list of viable candidates, identifying a list of components to be evaluated, in other words, to select a handful of viability indicators based on previously defined target usage (Wasserman, Chan, & Pal, 2005). Whereas the model provides twelve assessment categories such as functionality, usability, quality, security, performance, scalability, architecture, support, documentation, adoption, community and professionalism, the model recommends using no more than seven (7) of these. It is important to emphasize that these categories are quite similar to the categories in Navica/Golden and CapGemini. Once the categories have been selected, an average weighting factor must be set to know how much each category should contribute to the final result. The third phase is 32
6 by far the most time-consuming, because all measurement data need to be compared with a normalized scale in order to convert the measurement in something meaningful. For example, if we are looking at total books published, this phase should reveal whether three to five books is an acceptable level and is a good or bad indicator of maturity. However, this phase can include binary metrics (yes or no). For example, Security: is the communication encrypted? no, evaluates to one (1) and yes, evaluates to three (3). Finally, taking into account the previous normalized data, the data translation phase calculates the final score by computing the ratings and weighted factors. 4.3 The Navica-Golden Open Source Maturity Model (N-OSMM) According to the Burton Group Report, Assessing OSS Projects (2005), the Open Source Maturity Model (OSMM) is by far the easiest to use and best documented. The Navica/Golden OSMM was created by Navica s CEO, Bernard Golden. It was designed to enable organizations to evaluate open source products and understand whether a product can fulfill the organization s requirements (Golden, Making open source ready for the enterprise: The open source maturity model, 2005). Basically, the OSMM evaluates a product s maturity in three phases: assess vital product elements, define a weighting factor for each and calculate the product s overall maturity score. In Figure 5, a graphical representation of the OSMM illustrates the process and gives an understanding of the dependency between phases. 33
7 Phase 1: Assess Element Maturity Phase 2 Phase 3 Product Software Support Define Requirements Locate Resources Assess Element Maturity Assign Element Score Assign Weighting Factor Calculate Product Maturity Score Documentation Training Product Integration Professional Services Figure 5 A graphical Representation of OSMM. Phase one assesses key elements like software, support, documentation, training, integrations and services, and each of one will obtain a maturity score. At the same time, every element needs to be assessed by the process called A four-step Methodology, which is composed of remarkably enough four steps: 1. Define the organization s specific requirements. 2. Locate related resources, for example identifying whether exists a documentation site aka Wiki, or a community or forum to get support. 3. Assess maturity in order to determine how useful and valuable a product will be to the organization. 4. Assign a maturity score between zero (0) and ten (10) to document the level of compliance a product element with the organization s requirements. 34
8 In phase two each vital element has been assigned a score, a weight factor will be applied to indicate its importance to the overall maturity of the project. In phase three, the weighted score for each element is summed to provide an overall maturity of the product where the highest possible maturity score is 100. N-OSMM has relatively few evaluation criteria when compared to C-OSMM and O-BRR. Nevertheless it is well structured with three strong phases giving it a level of flexibility and ease of use. 4.4 Method for Qualification and Selection of OSS (Q-SOSS) Atos Origin, a French multinational IT services and consulting corporation, headquartered in Bezons, France, created the Qualification and Selection of Open Source Software. This model was developed primarily to qualify and select Free and Open Source Software as a basis to its support and technological survey services (Atos-Origin, 2006). The general process of Q-SOSS consists of four main steps: Definition, Evaluation, Qualification and Selection as shown in Figure 6. In the Definition step covers the constitution and enrichment of frames of reference, which are Software families, types of licenses and types of communities. In the first frame, a hierarchical classification of software will be applied related to its features. 35
9 Figure 6 QSOS four main steps. The frame of reference type of licenses will list and classify the major licenses taking into account the three main criteria: Ownership defines whether a derived code become proprietary or may remain free. Virality specifies whether or not a module linked to the source code will be affected by the original license. Inheritance sets the inevitability of preserving the license in the derived code (Atos-Origin, 2006). Table 5 lists a comparison of common licenses showing the aforementioned criteria. License Ownership Virality Inheritance GPL No Yes Yes CeCILL No Yes Yes LGPL No Partial Yes BSD Yes No No Artistic Yes No No MIT Yes No No Apache v1.1 Yes No No Apache v2.0 Yes No No MPL v1.1 No No Yes Common Public License v1.1 No No No Academic Free License v2.1 Yes No No PHP License v3.0 Yes No No Open Software License v.20 No No No Zope Public License v2.0 Yes No No Python SF License v2.0 Yes No No Table 7 Non Comprehensive list of licenses QSOS 1.6, Atos Origin, 2005, pp. 11, table 3. 36
10 Finally, in the frame of reference types of communities, a classification of the OSS project community will occur considering its size. The types of communities included in the model are: Insulated developer, group of developers, organization of developers, legal entity, and commercial entity. Figure 7 shows a graphic representation of these types of communities assessing the number of contributors involved in the software s lifecycle and support. The second step involved in this method is Evaluation. It consists of collecting information from the Open Source Community (shown in Figure 7) in order to build the identity card of the software and the evaluation sheet, by scoring on three major axes: functional coverage, risks from the user s perspective and risks from the service provider s perspective (Atos-Origin, 2006). Commercial entity Legal entity Organization of developers Group of Developers Insulated developer Figure 7 A graphic representation of the types of communities, according to QSOS. Moreover, the identity card will include the following main elements, each of which has sub-elements listed in Appendix A: General information, Existing services, 37
11 functional and technical aspects and synthesis. The evaluation sheet includes more detailed information than the identity card, such as scoring from zero (0) to two (2) the three axes of criteria. For instance, if the functionality is not covered at all, the score is zero (0); if it is completely covered, the score is two (2). The scoring criterion for risks from the user s perspective includes five categories: intrinsic durability, industrialized solution, integration, technical adaptability and strategy. Each category is further divided as shown in table 8. Category Criterion Sub-Criterion Age Maturity Stability History, know problems Fork probability, source of forking Adoption Popularity References Intrinsic durability Industrialized Solutions Technic al Adapta bility Strategy Development Leadership Activity Independence of developments Services Documentation Quality Assurance Packing Exploitability Modularity By-products License Copyright owners Modification of source code Roadmap Sponsor Strategic independence Contributing community Books Leading team Management style Developers identification Activity on bugs Activity on functionalities Activity on releases Independence of developments Training Support Consulting Documentation Quality Assurance Tools Source Debian FreeBSD HP-UX MacOSX Mandriva NetBSD OpenBSD Redhat/Fedora Solaris SuSE Windows Ease of ergonomics Administration/Monitoring Modularity Code modification Code extension Permissiveness Protection against proprietary forks Copyright owners Modification of source code Roadmap Sponsor Strategic independence Table 8 Risks from the user's perspective criterion. Refer to appendix B for the scoring description. 38
12 The final evaluation criterion risk from the service provider s perspective estimates how much risk is encountered by a contractor offering services either for support only or for the software delivered in the Software as a Service (SaaS) business model. In certain evaluations this may not be present because a vendor is not necessarily a developer or contributor to an OSS project. This criterion has only one category, service providing and its criteria are shown in Table 9. Category Criterion Sub-criterion Service Providing Quality of source code Technological dispersion Maintainability Intrinsic complexity Technical documentation Direct Code mastery Indirect Table 9 Risks from the service provider's perspective. Refer to appendix C for the scoring description. The next step in the QOSS model is Qualification where the objective is to define filters that translate the needs and constraints related to a specific requirement. This is accomplished by filtering by identity card (first level) or filtering on a functional grid (second level) which includes all functional requirements the software must meet defined as: required, optional or not required. Filtering on user and service provider risks relies on a relevance criterion having one of three values: irrelevant, relevant or critical. Both requirements and relevance criteria will be converted into a numerical weighted value at the final step. In that step, Qualification, weightings of functionalities and user and provider risks are set, based 39
13 on gathered data, in order to identify how close the software comes to meeting the organization s requirements relative to other OSS packages in a same family. 4.5 Other models David A. Wheeler s Open Source Evaluation Model bases the evaluation in four steps: identify, read reviews, compare and analyze - IRCA. The author recommends for the first step to review lists of "generally recognized as mature" (GRAM) or "generally recognized as safe" (GRAS) OSS/FS programs (Wheeler, 2011) and looking for already completed OSS assessments on the internet. Reading reviews from user s communities is among the most effective ways to learn about OSS strengths and weaknesses, the author pointed out. The third step is putting together the key software attributes with user requirements. These attributes are: functionality, cost, market share, support, maintenance, reliability, performance, scalability, usability, security, flexibility/customizability, interoperability and legal/license issues (Wheeler, 2011). Lastly, an analysis of the top contenders must be conducted by trying them out on representative workloads. This means being pragmatic when looking for a particular functionality, aside from testing performance and scalability with a representative set of data called dummy-data. This is likely to be usability testing and load testing. 40
14 The Open Source software evaluation model written by Karin van den Berg (Berg, 2005) consists of two steps. In the first step selection on the candidate list is performed, using four of the criteria: Functionality, Community, Release Activity and Longevity (Berg, 2005), in order to evaluate the candidates quickly. After filtering the results to generate a short list of candidates, they are evaluated in-depth in the second step. Van den Berg gives a case study to test this model on real OSS applied to Course Management Systems. 4.6 Summary The existing OSS evaluation models suggest selection guidelines with similar criteria. Thus they provide recommendations on how to conduct the analysis. Comparing N-OSMM to C-OSSM, the latter has the broader scope. None of the models presented thus far include Interoperability. That is one characteristic that both CSS and OSS must meet, to be considered enterprise ready. Considered that O-BRR does not include IT management, administrative or interoperability in any explicit criteria, even though it is a model based on business readiness. Neither the Navica or the CapGemini maturity model takes into account this important element. In contrast, the QSOS model does contain three IT management indicators: training, consulting and support. 41
15 In order to provide a solution to the absence of IT management indicators and to enhance the evaluation criteria, we have designed a new OSS selection model that includes missing indicators and comprises mature practices of O-BRR, Q-SOS, N- OSMM and C-OSMM. These new criteria are TCO-centric and interoperability-related. Moreover, we are consolidating twelve useful indicators from other models that contribute to a more accurate OSS evaluation process. 42
Open-Source vs. Proprietary Software Pros and Cons
Open-Source vs. Proprietary Software Pros and Cons Analyze the strengths and weaknesses of proprietary vs. open source software to determine what is best for your business. White Paper Weighing the Options
More informationCSPA. Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software
CSPA Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software Carlo Vaccari Istat (vaccari@istat.it) Index Costs categories
More informationSelection and Management of Open Source Software in Libraries.
Selection and Management of Open Source Software in Libraries. Vimal kumar V. Asian School of Business Padmanabha Building Technopark, Trivandrum-695 581 vimal0212@yahoo.com Abstract Open source software
More informationOpen Source Sustainability and RDM. Scott Wilson scott.wilson@oucs.ox.ac.uk
Open Source Sustainability and RDM Scott Wilson scott.wilson@oucs.ox.ac.uk What does sustainability mean? To be sustainable a project must meet its own costs. Most projects have their initial costs covered
More informationEvaluating the Readiness of Proprietary Software for Open Source Development
Evaluating the Readiness of Proprietary Software for Open Source Development Terhi Kilamo 1, Timo Aaltonen 1, Imed Hammouda 1, Teemu J. Heinimäki 1 and Tommi Mikkonen 1 Department of Software Systems,
More informationOpen Source Compliance: The Challenge of Managing Abundance. Peter Vescuso Black Duck Software
Open Source Compliance: The Challenge of Managing Abundance Peter Vescuso Black Duck Software Open Source Compliance: The Challenge of Managing Abundance Agenda The abundance The Challenges Meeting the
More informationRepOSS: A Flexible OSS Assessment Repository
RepOSS: A Flexible OSS Assessment Repository November 5, 2012 Masahiro Date, Fujitsu Northeast Asia OSS Promotion Forum WG3 0 Background and Goal 1 Surrounding OSS 1. In the ICT (Information and Communication
More informationA Comparison Framework for Open Source Software Evaluation Methods
A Comparison Framework for Open Source Software Evaluation Methods Klaas-Jan Stol 1 and Muhammad Ali Babar 2 1 Lero University of Limerick, Limerick, Ireland 2 IT University of Copenhagen, Denmark klaas-jan.stol@lero.ie,
More informationA Review of Models for Evaluating Quality in Open Source Software
Available online at www.sciencedirect.com IERI Procedia 00 (2012) 000 000 2013 International Conference on Electronic Engineering and Computer Science A Review of Models for Evaluating Quality in Open
More informationExperience with Open Source for e-learning
Experience with Open Source for e-learning Firoz Kaderali, Olaf Ehlert FernUniversität Hagen / Germany firoz.kaderali@fernuni-hagen.de, olaf.ehlert@fernuni-hagen.de Abstract A learning management system
More informationOpen Source Software Test Tools. Norbert Jansen Capgemini
Open Source Software Test Tools Norbert Jansen Capgemini TE3 Open Source Test Tools Norbert Jansen Introduction Managing consultant at Capgemini Netherlands. Active in IT and testing for 14 years. Experience
More informationMonitoring and Reporting Drafting Team Monitoring Indicators Justification Document
INSPIRE Infrastructure for Spatial Information in Europe Monitoring and Reporting Drafting Team Monitoring Indicators Justification Document Title Creator Justification document Creation date 2008-12-15
More information".,!520%'$!#)!"#$%&!>#($!#)! <*+,-(./0!/+!567!5+:,($2,+$! @,'/(/#+(!
".,!520%'$!#)!"#$%&!>#($!#)!
More informationMaking Your Organization Open Source-Ready
Making Your Organization Open Source-Ready Bernard Golden CEO, Navica Copyright 2006 Navica. All rights reserved. www.navicasoft.com Agenda Introduction Overview of open source best practices Key differences
More informationOPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE
OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE Martin Callinan Martin.callinan@sourcecodecontrol.co Wednesday, June 15, 2016 Table of Contents Introduction... 2 Source Code Control... 2 What we do... 2 Service
More informationPart 2: sourcing models
The Fundamentals of Managed Service Provider (MSP) Programs Part 2 of 3 Part 2: sourcing models By Jennifer Spicher contents This is the second of a three-part series designed to outline key components
More informationA Comparison Framework for Open Source Software Evaluation Methods
A Comparison Framework for Open Source Software Evaluation Methods Klaas-Jan Stol 1 and Muhammad Ali Babar 2 1 Lero University of Limerick, Limerick, Ireland 2 IT University of Copenhagen, Denmark klaas-jan.stol@lero.ie,
More informationContents. Intended Audience for This Book How This Book Is Structured. Acknowledgements
Preface Intended Audience for This Book How This Book Is Structured xvii xviii xix Acknowledgements xxi 1 Open Source Software: Definitions and History 1 1.1 Definition of Terms 1 1.1.1 What Is Free Software?
More informationWhat is Open Source? Open source is defined by three key components:
Integrating Open Source into your business To help businesses deal with the complexity of globalization, unanticipated opportunities, unexpected threats, competitive demands and fiscal constraints, a business
More informationMetatron Technology Consulting s Strategic Guide to Open Source Software
Metatron Technology Consulting s Strategic Guide to Open Source Software Chris Travers April 30, 2004 Copyright c April 30, 2004 Metatron Technology Consulting. Permission is granted for verbatim redistribution
More informationAssessment of Software for Government
Version 1.0, April 2012 Aim 1. This document presents an assessment model for selecting software, including open source software, for use across Government, and the wider UK public sector. 2. It is presented
More informationSaaS Model - A Solution For Clean Up Garbage Stamps
APPLYING THE SOFTWARE AS A SERVICE MODEL TO AIR EMISSIONS INVENTORY COLLECTION Dan Derby MACTEC Engineering and Consulting, Inc. 5001 South Miami Blvd #300, Research Triangle Park, North Carolina, 27709
More informationTechnology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
More informationAn Open Source Work Shop. Luciano Resende (lresende@apache.org) Haleh Mahbod (hmahbod@gmail.com) Aug. 2008
An Open Source Work Shop Luciano Resende (lresende@apache.org) Haleh Mahbod (hmahbod@gmail.com) Aug. 2008 1 Topics General knowledge about open source Importance of Open Source What is Open Source License
More informationFOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle
FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle Table of contents Executive summary......2 What is FOSS Governance 3 The importance of open source governance...3 Why
More informationTYPO3 6.x Enterprise Web CMS
An Acira Group Whitepaper April 2013 TYPO3 6.x Enterprise Web CMS A cloud ready open source web platform with enterprise systems integration Executive Summary TYPO3 separates content from design and function,
More informationW H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o
More informationCertified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
More informationConsider 8 Before You Integrate
Consider 8 Before You Integrate An Evaluation of Free Versus For Fee ESBs Sachin Gadre Director, Product Management Business White Paper Dinesh Chandrasekhar Senior Manager, Application Integration February
More informationDimension Weight. 9% 13% Cost 43%
CDC Informatics Research and Development Unit (IRDU) Guide to Public Health Informatics Structured Technology Evaluations V1.0.1 May 2011 This document serves as a guide for completing a structured technology
More informationQualipso Project: Quality Recommendations for FLOSS development processes
UNIVERSIDADE DE SÃO PAULO Qualipso Project: Quality Recommendations for FLOSS development processes A perspective based on trustworthy elements Viviane Malheiros, Erika Höhn, José Carlos Maldonado RT-335
More informationTCO for Application Servers: Comparing Linux with Windows and Solaris
TCO for Application Servers: Comparing Linux with Windows and Solaris Robert Frances Group August 2005 IBM sponsored this study and analysis. This document exclusively reflects the analysis and opinions
More informationA Systematic Security Approach in Software Requirements Engineering
A Systematic Security Approach in Software Requirements Engineering (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. (2) Dr.K.Alagarsamy, Associate
More informationT H E F U T U R E I S O P E N
T H E F U T U R E I S O P E N B E T T E R S Y S T E M S. B E T T E R B U S I N E S S. B E T T E R C U S T O M E R S E R V I C E. M O R E F O R L E S S. T H E L E A D E R S I N L I N U X The demand for
More informationAn Approach to Establish a Software Reliability Model for Different Free and Open Source Software Development Paradigms. Kemal Kağan Işıtan
An Approach to Establish a Software Reliability Model for Different Free and Open Source Software Development Paradigms Kemal Kağan Işıtan University of Tampere School of Information Sciences Computer
More informationGuideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
More informationWhy Open Source Software Only Seems More Secure
Purdue University Center for Education and Research in Information Assurance and Security Why Open Source Software Only Seems More Secure Eugene H. Spafford Professor and
More informationPinkVERIFY 2011 IT SERVICE MANAGEMENT TOOL ASSESSMENT. Produced By : Pink Elephant Date : May 2015
PinkVERIFY 2011 IT SERVICE MANAGEMENT TOOL ASSESSMENT Produced By : Pink Elephant Date : May 2015 1 Table Of Contents 1 PinkVERIFY IT Service Management Tool Assessment Service... 3 1.1 Executive Summary...
More informationCloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity
Reprinted from PHARMACEUTICAL ENGINEERING THE OFFICIAL TECHNICAL MAGAZINE OF ISPE JANUARY/FEBRUARY 2014, VOL 34, NO 1 Copyright ISPE 2014 www.pharmaceuticalengineering.org information systems in a GxP
More informationOPENKONSEQUENZ WORKING GROUP CHARTER
OPENKONSEQUENZ WORKING GROUP CHARTER CONTENTS Contents...1 Goals and Vision...4 Scope and Core Domains...5 Governance and Precedence...5 Applicable Documents and Processes...5 Collaboration...6 Working
More informationView Point. The Enterprise QA Transformation Model. A solution to enhance an enterprises testing maturity. Abstract. www.infosys.
View Point The Enterprise QA Transformation Model A solution to enhance an enterprises testing maturity - Reghunath Balaraman, Aromal Mohan Abstract With the increasing acceptance of testing/qa as an independent
More informationEnterprise Social Collaboration: The Choice Between Open Source & SaaS
Enterprise Social Collaboration: The Choice Between Open Source & SaaS Analyzing the benefit of moving your social business software applications to the cloud Contents Introduction... 3 Definitions...
More informationVendor Managed Services: Question and Answer
I. The Program a. In General how does the Vendor Managed Services (VMS) Program work and what are the benefits? The DSI VMS program is focused on solving a business challenge: Contingent labor procurement,
More informationSeptember 2005 Report No. 06-009
An Audit Report on The Health and Human Services Commission s Consolidation of Administrative Support Functions Report No. 06-009 John Keel, CPA State Auditor An Audit Report on The Health and Human Services
More informationI D C E X E C U T I V E B R I E F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F P e netration Testing: Taking the Guesswork Out of Vulnerability
More informationLeveraging open source licenses and open source communities in hybrid commercial open source business models
Leveraging open source licenses and open source communities in hybrid commercial open source business models Author. Karl Michael Popp. SAP AG Corporate Development Dietmar-Hopp-Allee 16 69190 Walldorf
More informationGPL, MIT, BSD, GEHC (and me)
GPL, MIT, BSD, GEHC (and me) Introduction to Open Source Therese Catanzariti author reproduce literary employer COPYRIGHT OWNER commission work for hire has the exclusive right to distribute prepare derivatives
More informationManagement- Operational Analysis Execution of Operation and Maintenance Plan Post-Implementation Review Execution of Asset Disposal Plan
IV. MANAGEMENT-IN-USE PHASE Introduction. The Management- In-Use Phase includes the Steps an agency should take to manage and evaluate the continued viability of an acquired capital asset as part of the
More informationERA System Development Statement of Objectives
ATTACHMENT 1 STATEMENT OF OBJECTIVES NARA Electronic Records Archives (ERA) ERA System Development Statement of Objectives 1.0 Purpose of the Statement of Objectives (SOO) This Statement of Objectives
More informationAbout this guide. 4 The syllabus requires knowledge of this topic. 4. 8 This is material that may be of interest to the reader but is
About this guide This guide provides a quick reference to the ITIL framework for good practice in. It is designed as a study aid for students taking ITIL Foundation qualifications, and as a handy portable
More informationThe DoD and Open Source Software. An Oracle White Paper February 2009
The DoD and Open Source Software An Oracle White Paper February 2009 The DoD and Open Source Software Oracle is committed to offering choice, flexibility, and a lower cost of computing for end users. By
More informationc University of Oxford This document is licensed under http://creativecommons.org/licenses/by-sa/2.0/uk/
OSS Watch c University of Oxford This document is licensed under http://creativecommons.org/licenses/by-sa/2.0/uk/ key messages... These are the points to take away from this talk: is more than just a
More informationTesting Metrics. Introduction
Introduction Why Measure? What to Measure? It is often said that if something cannot be measured, it cannot be managed or improved. There is immense value in measurement, but you should always make sure
More informationWhat is Open Source (Quick Answer)? Collaboration Platform for Web Applications. Virtuous Cycle Model of Open Source (2/2)
Open Source Software - a Collaboration Platform for Web Applications Bebo White bebo@slac.stanford.edu Hong Kong June 6 2007 What is Open Source (Quick Answer)? A community of developers Sharing a code
More informationCloud Computing; the GOOD, the BAD and the BEAUTIFUL
Cloud Computing; the GOOD, the BAD and the BEAUTIFUL The quest for increased cost savings and reduced capital expenditures with comprehensive cloud solutions Executive summary Asking the hard dollar questions.
More informationEvaluation of educational open-source software using multicriteria decision analysis methods
1 Evaluation of educational open-source software using multicriteria decision analysis methods Georgia Paschalidou 1, Nikolaos Vesyropoulos 1, Vassilis Kostoglou 2, Emmanouil Stiakakis 1 and Christos K.
More informationVendor Landscape: Uninterruptible Power Supply (UPS)
Vendor Landscape: Uninterruptible Power Supply (UPS) A consolidating market with few viable vendors and many solutions. Info-Tech Research Group 1 Introduction The UPS market is dominated by few, but many
More informationReaching CMM Levels 2 and 3 with the Rational Unified Process
Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project
More information[project.headway] Integrating Project HEADWAY And CMMI
[project.headway] I N T E G R A T I O N S E R I E S Integrating Project HEADWAY And CMMI P R O J E C T H E A D W A Y W H I T E P A P E R Integrating Project HEADWAY And CMMI Introduction This white paper
More informationprocesses 1 This survey report is written within the PWO Project: Production scheduling of batch
REPORT SURVEY SCHEDULING SOFTWARE* 1 Pieter Caluwaerts, Wim De Bruyn, Luiza Gabriel, Bert Van Vreckem University College Ghent Hogeschool GENT. GENT BELGIUM Pieter.Caluwaerts@hogent.be, Wim.Debruyn@hogent.be,
More informationClarifying a vision on certification of MDA tools
SCIENTIFIC PAPERS, UNIVERSITY OF LATVIA, 2010. Vol. 757 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES 23 29 P. Clarifying a vision on certification of MDA tools Antons Cernickins Riga Technical University,
More informationPolicy on Device Drivers for Procurement of Hardware for e-governance
Policy on Device Drivers for Procurement of Hardware for e-governance (Draft for Public Review) Government of India Department of Information Technology Ministry of Communications and Information Technology
More informationBOM based on what they input into fossology.
SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org
More informationSOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith dbs@sei.cmu.edu SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
More informationMapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
More informationBusiness Intelligence
Transforming Information into Business Intelligence Solutions Business Intelligence Client Challenges The ability to make fast, reliable decisions based on accurate and usable information is essential
More informationVendor Landscape: Enterprise Service Desk Software
1234 Vendor Landscape: Enterprise Service Desk Software Move past tickets to proactive, integrated service., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services
More informationebay Enterprise Is A Strong Performer Among Omnichannel Order
For ebusiness & Channel Strategy Professionals July 29, 2014 ebay Enterprise Is A Performer Among Omnichannel Order Management Vendors Excerpted From The Forrester Wave : Omnichannel Order Management,
More informationImplementing SharePoint 2010 as a Compliant Information Management Platform
Implementing SharePoint 2010 as a Compliant Information Management Platform Changing the Paradigm with a Business Oriented Approach to Records Management Introduction This document sets out the results
More informationDecember 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.
Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,
More informationVendor Comparison Research Methodology. Proud to be the trusted source of quality IT research for 21,000+ IT professionals worldwide.
Proud to be the trusted source of quality IT research for 21,000+ IT professionals worldwide Quick Links Vendor Comparison Research Methodology www.infotech.com 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Introduction
More informationVAIL-Plant Asset Integrity Management System. Software Development Process
VAIL-Plant Asset Integrity Management System Software Development Process Document Number: VAIL/SDP/2008/008 Engineering For a Safer World P u b l i c Approved by : Ijaz Ul Karim Rao Revision: 0 Page:2-of-15
More informationOpen-Source Learning Management Systems: Sakai and Moodle
Monarch Media, Inc., Business White Paper Open-Source Learning Management Systems: Sakai and Moodle Monarch Media, Inc. 406 Mission Street, Suite J Santa Cruz, CA 95060 www.monarchmedia.com 831.457.4414
More informationD6.1: Service management tools implementation and maturity baseline assessment framework
D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)
More informationThe IT Infrastructure Library (ITIL)
IT service management is often equated with the Information Technology Infrastructure Library (ITIL), even though there are a variety of standards and frameworks contributing to the overall ITSM discipline.
More informationOPEN SOURCE SOFTWARE (OSS) IMPLEMENTATION GUIDELINES MALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) INITIATIVE
OPEN SOURCE SOFTWARE (OSS) IMPLEMENTATION GUIDELINES MALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) INITIATIVE COPYRIGHT The Copyright to this document is owned by the Government of Malaysia TABLE
More informationAn ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
More informationSolution White Paper Connect Hadoop to the Enterprise
Solution White Paper Connect Hadoop to the Enterprise Streamline workflow automation with BMC Control-M Application Integrator Table of Contents 1 EXECUTIVE SUMMARY 2 INTRODUCTION THE UNDERLYING CONCEPT
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Microsoft SQL Server Versus Linux Enterprise RDBMS in Enterprise Computing: Comparing
More informationHow To Use Open Source Software For Library Work
USE OF OPEN SOURCE SOFTWARE AT THE NATIONAL LIBRARY OF AUSTRALIA Reports on Special Subjects ABSTRACT The National Library of Australia has been a long-term user of open source software to support generic
More informationFrom Private to Hybrid Clouds through Consistency and Portability
Extending IT Governance From Private to Hybrid Clouds through Consistency and Portability Gordon Haff 2 Executive summary 3 beyond information security 3 from private to public and back again 4 consistency
More informationHow To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
More informationLMS Evaluation Tool User Guide
LMS Evaluation Tool User Guide August 2004 CC-BY-SA 3waynet Inc. and the Commonwealth of Learning LMS Evaluation Tool User Guide: Issue 1.2 ii Table of Contents 1. Introduction...1 2. General Overview...2
More informationWHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI
WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI Sponsored by: Red Hat Tim Grieser Randy Perry October 2009 Eric Hatcher Global Headquarters: 5 Speen
More informationSQL Server Master Data Services A Point of View
SQL Server Master Data Services A Point of View SUBRAHMANYA V SENIOR CONSULTANT SUBRAHMANYA.VENKATAGIRI@WIPRO.COM Abstract Is Microsoft s Master Data Services an answer for low cost MDM solution? Will
More informationCisco Cloud Enablement Services for Adopting Clouds
Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud
More informationWhitepaper: Commercial Open Source vs. Proprietary Data Integration Software
Overview The debate about the advantages of open source versus proprietary data integration software is ongoing. The reality of the situation is that the decision about whether open source or proprietary
More informationWhite Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in
More informationCloud Computing. Key Initiative Overview
David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they
More informationSA4 Software Developer Survey Survey Specification v2.2
Last updated: 30-06-2009 Activity: SA4 Dissemination Level: PP (Project Participants) Authors: Branko Marović (UoB/AMRES), Cezary Mazurek (PSNC), Gina Kramer (DANTE) Table of Contents 1 Introduction 1
More informationImproving Java Migration Outcomes with Rapid Assessment
Improving Java Migration Outcomes with Rapid Assessment Proven Strategies for Making Java 8 or JDK 8 Migrations Timely, Cost-Effective, and Predictable By G Venkat, Rajneesh Kumar, Sheenam Maheshwari Nagarro
More informationChapter X. Costing Labor Contracts
Chapter X Costing Labor Contracts It is regrettable but possibly inevitable that the negotiation process will be, at least in some measure, adversarial. Labor seeks to maximize its gain and government
More informationDeadline for submission of completed RFP questionnaire is 8/3/2015.
I. Introduction A. Overview The LOTT Clean Water Alliance is a non-profit corporation responsible for wastewater management services for the urban area of north Thurston County, Washington. Its services
More informationCapture Share Report Global salesforce.com Systems Integration and Services Providers
Capture Share Report Global salesforce.com Systems Integration and Services Providers September, 2014 Phil Hassey CEO capioit Capture Share Report Global salesforce.com Systems Integration and Services
More informationStepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
More informationRealizing the Breakthrough Economics of Linux and Open Source through Hybrid Development. Tim Yeaton, President and CEO Black Duck Software
Realizing the Breakthrough Economics of Linux and Open Source through Hybrid Development Tim Yeaton, President and CEO Black Duck Software Linux Collaboration Summit April 9, 2009 Agenda Current Market
More informationContents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.
iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 4 1.2 Context 4 1.3 Purpose 8 1.4 Usage 8 2 Management
More informationDeveloping SAP Enterprise Cloud Computing Strategy
White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to
More informationFOSS License Restrictions and Some Important Issues
Free and Open Source Software (FOSS) Part II presented by Wolfgang Leister INF 5780 Høstsemester 2009 Ifi Universitetet i Oslo Some thoughts about FOSS Open Source Software (1) 1. Free Redistribution The
More information