Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan

Size: px
Start display at page:

Download "Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan"

Transcription

1 Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan Arcade Game Team July 2003 Unlimited distribution subject to the copyright.

2 This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2004 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and No Warranty statements are included with all reproductions and derivative works. External use. Requests for permission to reproduce this document or prepare derivative works of this document for external and commercial use should be addressed to the SEI Licensing Agent. This work was created in the performance of Federal Government Contract Number F C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at For information about purchasing paper copies of SEI reports, please visit the publications portion of our Web site (

3 Revision Control Table Version Number Date Revised Revision Type A-Add, D-Delete, M-Modify Description of Change Person Responsible 1.0 7/03 A Created document JDMcGregor 1 Overview 1.1 Identification The Arcade Game Maker (AGM) product line will produce a series of arcade games. Each game is a one-player game in which the player controls, to some degree, the moving objects. The objective is to score points by hitting stationary obstacles. The games range from low obstacle count to high. 1.2 Document Map The AGM product line is described in a series of documents that are related to each other as shown in Figure 1. This map shows the order in which the documents should be read for the first time. Once readers are familiar with the documents, they can go directly to the information needed. This is the marketing and product plan. Its purpose is to communicate the marketing strategy that provides the rationale for which products are to be built and when Software Engineering Institute, Carnegie Mellon University 1

4 Requirements Scope Business Case Architecture CONOPS Production Plan System Test Plan Template Unit Test Plan Template Brickles Product Pong product Bowling product Bibliography Glossary Miscellaneous documents Key: The object pointing is dependent on the object being pointed to. Figure 1: Document Map 1.3 Reusable Assets This document establishes the high-level context for decisions in the product line. In a product line, assets are designed to be reusable within the context of the product line. That is, no attempt is made to make an asset as general as possible. Each design decision is made with regard to the extent of the products in the product line. The scope definition document formalizes this context and the architecture further refines the context defined in this document. 1.4 Readership This document is intended primarily for those stakeholders responsible for scoping and business case development. It provides some level of information to all the stakeholders in the AGM framework. Managers will find information that supports product planning, architects will find information that supports commonality and variability analysis, and product developers will find the rationale for each product s membership in the product line Software Engineering Institute, Carnegie Mellon University

5 1.5 Use in Product Planning and Production This document is used in the earliest stages of product line planning. It is used as input to the business case for the software product line. It provides information that is useful in developing the production scope and schedule. 2 Product Context AGM has been producing large scale computer games for many years. Our latest analysis points to new markets, which we have not been serving. While there are players in those markets already, we believe our experience and reputation will allow us to capture a sizable market share, approximately 30%, in a very short time. We have identified three types of products that we want to analyze. These are shown in Table 1. The freeware games are simple implementations of basic games that are used to attract potential customers to our web site. The implementations can be simple but the quality must be high. These games represent us. The commercial PC games will require the resources of a standard personal computer. These games should have additional features beyond the basic freeware games since they will be the professional versions of the freeware games. Finally, the commercial wireless category includes games that we would sell to wireless carriers who would make these games available for download by their subscribers. These games should be a port of the professional PC games to a variety of wireless platforms. Table 1: Feature Example Attribute/Product Matrix Freeware Arcade Games Commercial PC Games Commercial Wireless Games display standard bitmaps vector graphics wireless access protocol WAP bitmap interaction mouse/buttons pointing devices/buttons buttons game pieces simple icons dynamic icons dynamic icons scoring high scores stored locally local storage/scores shared with subscription scores stored on network/subscription required 3 Feature Model In this section we present a high level feature model of the arcade game domain. This model captures the product features that are necessary to compete in the market and to satisfy our existing customers. It includes all of the features that would be in any of the products Software Engineering Institute, Carnegie Mellon University 3

6 arcade game services qualities rules action configuration natural interaction realistic keyboard driver mouse driver graphics display Figure 2- Top level feature model action movement collision straight-line movement Functional algorithm movement elastic collision absorbing collision Figure 3 - Action sub-features services play pause save Figure 4 - Services sub-features Software Engineering Institute, Carnegie Mellon University

7 rules Brickles Pong Bowling Figure 5 - Rules sub-features 4 Analysis and Projections 4.1 Hook We have identified a possible hook around which we could build a marketing campaign: a nostalgia series in which we release games such as Brickles, Pong, and maybe a Bowling game. Most of the newest generation of users does not know these games but their parents do. We believe that releasing these games for new platforms and even old ones would be a popular offering. These games are represented by features in the rules feature tree. 4.2 Niche opportunity We have identified an un-served opportunity that might be profitable if we can meet the necessary price point. Companies are continually looking for new items that can be used as giveaways in exhibit booths at conventions to build a mailing list. The latest opportunity is for simple computer games that have been customized to include company specific icons and product presentations. 4.3 Projections Given the information in sections 2 and 3 and our hook idea, we can project the sales (or downloads) totals of the anticipated products as shown in Table 2. The figures are the anticipated sales given three different release dates. Table 2 - Projected Sales Figures December 2004 May 2005 September 2005 Freeware PC games 300,000 (downloads) 300,000 (downloads) 300,000 (downloads) 2004 Software Engineering Institute, Carnegie Mellon University 5

8 Wireless device games Customized convention giveaways 400, , , , ,000 4,500,000 The freeware games will generate moderate attention whenever they are deployed. No revenue will be directly generated but we estimate that the sales figures for the other releases would be 25% lower if they are released before the freeware versions attract users to our web site. The wireless games will be built for the MIDP1.0 standard. It will be about April 2005 before that standard is widely available on wireless devices. It will also have a short life cycle being replaced with MIDP2.0 by the Fall of The convention giveaways sales figures reflect that attendance at conventions is slowly increasing as the economy recovers. We do not expect this business to be profitable until Fall Recommendations We recommend that products of the types described in Table 2 be put into production as soon as possible. Note that the figures in the body of the table give a possible sequence of production based on optimizing the sales figures. We recommend a nostalgia series of games. Brickles, Pong and Bowling are three that tested positively with clients we interviewed. These three should be released in each of the three forms shown in the product table. 5 Maintaining the Marketing and Product Plan 1 Periodically the marketing group will scan the business environment and update the marketing and product plan. A scan will be initiated by one of several events: a recent major change in economic forecasts; or a change in the company s strategic goals; or the passing of one year since the last scan. 1 This section is the attached process described by Clements and Northrop [Clements 02]. For the product line marketing and product plan, the process focuses mainly on tracking industry and consumer changes Software Engineering Institute, Carnegie Mellon University

9 As the process diagrammed in Figure 6 shows, a scan begins with data collection, followed by data analysis, and dissemination of the information to both upstream and downstream consumers. Collect economic data; survey existing customers concerning changes in demand Analyze data and revise marketing and product plan accordingly. Inform party responsible for business case maintenance of revised plan Figure 6: Process Flow for Maintaining the Marketing and Product Plan 6 References For information about the references in this document, see another document in the Arcade Game Maker Product Line series: Arcade Game Maker Pedagogical Product Line: Bibliography Software Engineering Institute, Carnegie Mellon University 7

Arcade Game Maker Product Line Production Plan

Arcade Game Maker Product Line Production Plan Arcade Game Maker Product Line Production Plan ArcadeGame Team July 2003 Table of Contents 1 Overview 1 1.1 Identification 1 1.2 Document Map 1 1.3 Concepts 2 1.4 Readership 2 2 Strategic view of product

More information

Guidelines for Developing a Product Line Production Plan

Guidelines for Developing a Product Line Production Plan Guidelines for Developing a Product Line Production Plan Gary Chastek John D. McGregor June 2002 TECHNICAL REPORT CMU/SEI-2002-TR-006 ESC-TR-2002-006 Pittsburgh, PA 15213-3890 Guidelines for Developing

More information

Guidelines for Developing a Product Line Concept of Operations

Guidelines for Developing a Product Line Concept of Operations Guidelines for Developing a Product Line Concept of Operations Sholom Cohen August 1999 TECHNICAL REPORT CMU/SEI-99-TR-008 ESC-TR-99-008 Pittsburgh, PA 15213-3890 Guidelines for Developing a Product Line

More information

An Application of an Iterative Approach to DoD Software Migration Planning

An Application of an Iterative Approach to DoD Software Migration Planning An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.

More information

Resolving Chaos Arising from Agile Software Development

Resolving Chaos Arising from Agile Software Development Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 523 Author Date High Level Alternatives Approach. Blame the Agile development process, fire the folks who are controlling it and

More information

Assurance Cases for Design Analysis of Complex System of Systems Software

Assurance Cases for Design Analysis of Complex System of Systems Software Assurance Cases for Design Analysis of Complex System of Systems Software Presented at AIAA Infotech@Aerospace Conference Software Assurance Session 8 April 2009 Stephen Blanchette, Jr. Problem: SoS are

More information

2012 CyberSecurity Watch Survey

2012 CyberSecurity Watch Survey 2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY

More information

CMMI: What do we need to do in Requirements Management & Engineering?

CMMI: What do we need to do in Requirements Management & Engineering? Colin Hood Page 1 of 11 : What do we need to do in Requirements Management & Engineering? Colin Hood HOOD Group February 2003 : What do we need to do in Requirements Management & Engineering?... 1 1 Abstract...

More information

Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0

Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2004 Vol. 3, No. 3, March-April 2004 Software Product Lines John D. McGregor, Clemson

More information

Sustaining Operational Resiliency: A Process Improvement Approach to Security Management

Sustaining Operational Resiliency: A Process Improvement Approach to Security Management Sustaining Operational Resiliency: A Process Improvement Approach to Security Management Author Richard A. Caralli Principle Contributors James F. Stevens Charles M. Wallen, Financial Services Technology

More information

Risk Management Framework

Risk Management Framework Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.

More information

Introduction to the OCTAVE Approach

Introduction to the OCTAVE Approach Introduction to the OCTAVE Approach Christopher Alberts Audrey Dorofee James Stevens Carol Woody August 2003 Pittsburgh, PA 15213-3890 Introduction to the OCTAVE Approach Christopher Alberts Audree Dorofee

More information

A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering

A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering Building a Business Case for Systems Engineering NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES

More information

Information Asset Profiling

Information Asset Profiling Information Asset Profiling Author James F. Stevens Principal Contributors Richard A. Caralli Bradford J. Willke June 2005 Networked Systems Survivability Program Unlimited distribution subject to the

More information

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon

More information

Monitoring Trends in Network Flow for Situational Awareness

Monitoring Trends in Network Flow for Situational Awareness Monitoring Trends in Network Flow for Situational Awareness SEI CERT NetSA 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE

More information

Preview of the Mission Assurance Analysis Protocol (MAAP): Assessing Risk and Opportunity in Complex Environments

Preview of the Mission Assurance Analysis Protocol (MAAP): Assessing Risk and Opportunity in Complex Environments Preview of the Mission Assurance Analysis Protocol (MAAP): Assessing Risk and Opportunity in Complex Environments Christopher Alberts Audrey Dorofee Lisa Marino July 2008 TECHNICAL NOTE CMU/SEI-2008-TN-011

More information

Getting Started with Service- Oriented Architecture (SOA) Terminology

Getting Started with Service- Oriented Architecture (SOA) Terminology Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a

More information

SOA for Healthcare: Promises and Pitfalls

SOA for Healthcare: Promises and Pitfalls SOA for Healthcare: Promises and Pitfalls Dennis B. Smith dbs@sei.cmu.edu SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The

More information

Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example

Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example Mary Anne Herndon, SAIC Robert Moore, SAIC Mike Phillips, Software

More information

Network Analysis with isilk

Network Analysis with isilk Network Analysis with isilk Presented at FloCon 2011 Ron Bandes CERT Network Situational Awareness (NetSA) Group 2011 Carnegie Mellon University 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL

More information

Field Information Manager Product guide. Field Information Manager version 1.1

Field Information Manager Product guide. Field Information Manager version 1.1 Field Information Manager Product guide Field Information Manager version 1.1 Field Information Manager Product guide Field Information Manager version 1.1 NOTICE TRADEMARKS This document contains information

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

Preparing for Automated Derivation of Products in a Software Product Line

Preparing for Automated Derivation of Products in a Software Product Line Preparing for Automated Derivation of Products in a Software Product Line John D. McGregor September 2005 TECHNICAL REPORT CMU/SEI-2005-TR-017 ESC-TR-2005-017 Pittsburgh, PA 15213-3890 Preparing for Automated

More information

DoD Software Migration Planning

DoD Software Migration Planning DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith August 2001 Product Line Practice Initiative Technical Note CMU/SEI-2001-TN-012 Unlimited distribution subject to the copyright. The

More information

Contracting Officer s Representative (COR) Interactive SharePoint Wiki

Contracting Officer s Representative (COR) Interactive SharePoint Wiki Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material

More information

Supply-Chain Risk Management Framework

Supply-Chain Risk Management Framework Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior

More information

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security. KVM and Hypervisor Security David Shepard and Matt Gaston CMU/SEI Cyber Innovation Center February 2012 2012 by Carnegie Mellon University. Published SEI PROPRIETARY INFORMATION. Distribution: Director

More information

TWAIN Driver Reference Guide

TWAIN Driver Reference Guide TWAIN Driver Reference Guide Version 1.0 9/2/2005 Copyright 2003-2005 by Xerox Corporation. All rights reserved. XEROX is registered trademark of XEROX. Other product names used in this document may be

More information

Moving Target Reference Implementation

Moving Target Reference Implementation CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014

More information

Network Monitoring for Cyber Security

Network Monitoring for Cyber Security Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions

More information

Merging Network Configuration and Network Traffic Data in ISP-Level Analyses

Merging Network Configuration and Network Traffic Data in ISP-Level Analyses Merging Network Configuration and Network Traffic Data in ISP-Level Analyses Timothy J. Shimeall, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Presentation Title

More information

Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors

Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors Donald R. Beynon, Jr. January 2007 Technical Note CMU/SEI-2007-TN-004

More information

Evaluating the Quality of Software Engineering Performance Data

Evaluating the Quality of Software Engineering Performance Data Evaluating the Quality of Software Engineering Performance Data James Over Software Engineering Institute Carnegie Mellon University July 2014 Copyright 2014 Carnegie Mellon University This material is

More information

Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division

Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Nero MediaStreaming for MCE Manual

Nero MediaStreaming for MCE Manual Nero MediaStreaming for MCE Manual Nero AG Copyright and Trademark Information This manual and all its contents are protected by copyright and are the property of Nero AG. All rights reserved. This manual

More information

Deploying the Workspace Application for Microsoft SharePoint Online

Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This

More information

COM Port Stress Test

COM Port Stress Test COM Port Stress Test COM Port Stress Test All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Assurance in Service-Oriented Environments

Assurance in Service-Oriented Environments Assurance in Service-Oriented Environments Soumya Simanta Research, Technology, and System Solutions (RTSS) Program Software Engineering Institute Carnegie Mellon University Pittsburgh 15232 28 th October,

More information

A Systematic Method for Big Data Technology Selection

A Systematic Method for Big Data Technology Selection A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is based upon work funded

More information

Intel Compute Stick STCK1A32WFC User Guide. Intel Compute Stick STCK1A32WFC

Intel Compute Stick STCK1A32WFC User Guide. Intel Compute Stick STCK1A32WFC Intel Compute Stick STCK1A32WFC User Guide 1 Revision History Revision Revisions History Date 01 First release of the Intel Compute Stick STCK1A32WFC User Guide April 2015 Disclaimer INFORMATION IN THIS

More information

CA Nimsoft Monitor. Probe Guide for Cloud Monitoring Gateway. cuegtw v1.0 series

CA Nimsoft Monitor. Probe Guide for Cloud Monitoring Gateway. cuegtw v1.0 series CA Nimsoft Monitor Probe Guide for Cloud Monitoring Gateway cuegtw v1.0 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal

More information

CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update

CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends

More information

Oil & Gas Inventory Management System

Oil & Gas Inventory Management System Oil & Gas Inventory Management System WHITE PAPER EVA ZEISEL Copyright Statement Copyright 2016 RFID4U. All Rights Reserved. This document and other documents on the RFID4U web site (www.rfid4u.com) are

More information

Testing a Software Product Line

Testing a Software Product Line Testing a Software Product Line John D. McGregor December 2001 TECHNICAL REPORT CMU/SEI-2001-TR-022 ESC-TR-2001-022 Pittsburgh, PA 15213-3890 Testing a Software Product Line CMU/SEI-2001-TR-022 ESC-TR-2001-022

More information

Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03

Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03 Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03 Editors: Jack Cooper Matthew Fisher March 2002 TECHNICAL REPORT CMU/SEI-2002-TR-010 ESC-TR-2002-010 Pittsburgh, PA 15213-3890 Software

More information

Software Architecture Professional Certificate

Software Architecture Professional Certificate Software Architecture Professional Certificate The Software Architecture Professional Certificate program will equip you with state-of-the-art architecture practices and concepts. You will gain experience

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

UFO: Verification with Interpolants and Abstract Interpretation

UFO: Verification with Interpolants and Abstract Interpretation : Verification with Interpolants and Abstract Interpretation and Sagar Chaki Software Engineering Institute Carnegie Mellon University Aws Albarghouthi, Yi i and Marsha Chechik University of Toronto A

More information

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff

More information

WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY

WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY BACKGROUND The purpose of the Wi-Fi Alliance ( WFA ) is to promote the IEEE 802.11 wireless networking standard by encouraging manufacturers of wireless

More information

SACAM: The Software Architecture Comparison Analysis Method

SACAM: The Software Architecture Comparison Analysis Method SACAM: The Software Architecture Comparison Analysis Method Christoph Stoermer Felix Bachmann Chris Verhoef December 2003 TECHNICAL REPORT CMU/SEI-2003-TR-006 ESC-TR-2003-006 Pittsburgh, PA 15213-3890

More information

Common Testing Problems: Pitfalls to Prevent and Mitigate

Common Testing Problems: Pitfalls to Prevent and Mitigate : Pitfalls to Prevent and Mitigate AIAA Case Conference 12 September 2012 Donald Firesmith Software Engineering Institute (SEI) Carnegie Mellon University Pittsburgh, PA 15213 Clarification and Caveat

More information

NVIDIA GeForce Experience

NVIDIA GeForce Experience NVIDIA GeForce Experience DU-05620-001_v02 October 9, 2012 User Guide TABLE OF CONTENTS 1 NVIDIA GeForce Experience User Guide... 1 About GeForce Experience... 1 Installing and Setting Up GeForce Experience...

More information

Quick Installation Guide For Sensors with Cacti

Quick Installation Guide For Sensors with Cacti Quick Installation Guide For Sensors with Cacti Edited January 23, 2011 - Rev 1 PART DOC-MANUAL-SENSORGATEWAY-CACTI 1 Copyright: Copyright 2011 ServersCheck BVBA All rights reserved. Reproduction without

More information

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring

More information

PT500 500Mbps Powerline Adapter. User Guide

PT500 500Mbps Powerline Adapter. User Guide PT500 500Mbps Powerline Adapter User Guide PT500 500Mbps Powerline Adapter V100R001 User Guide 202593_04 Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service.

More information

VoIP in Flow A Beginning

VoIP in Flow A Beginning VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT -RMM), both developed at Carnegie

More information

Ipek Ozkaya Senior Researcher

Ipek Ozkaya Senior Researcher Strategic Management of Architectural Technical Debt Ipek Ozkaya Senior Researcher A senior member of the SEI technical staff, Ipek Ozkaya is the co-organizer of the Third International Workshop on Managing

More information

Deriving Enterprise-Based Measures Using the Balanced Scorecard and Goal-Driven Measurement Techniques

Deriving Enterprise-Based Measures Using the Balanced Scorecard and Goal-Driven Measurement Techniques Deriving Enterprise-Based Measures Using the Balanced Scorecard and Goal-Driven Measurement Techniques Wolfhart Goethert Matt Fisher October 2003 Software Engineering Measurement and Analysis Initiative

More information

USB FM Radio-RD USB FM RADIO USER S GUIDE. 1. USB FM Radio Setup. One-time set-up enables configuration of presets and region specific FM band

USB FM Radio-RD USB FM RADIO USER S GUIDE. 1. USB FM Radio Setup. One-time set-up enables configuration of presets and region specific FM band USB FM RADIO USER S GUIDE 1. USB FM Radio Setup Follow the instructions listed below to set up and configure the USB FM Radio. 1. Download the USB FM Radio Player from the Silicon Laboratories website

More information

Agile Development and Software Architecture: Understanding Scale and Risk

Agile Development and Software Architecture: Understanding Scale and Risk Agile Development and Software Architecture: Understanding Scale and Risk Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert L. Nord SSTC, April 2012 In collaboration

More information

Oracle. Human Capital Management Cloud Using Workforce Reputation Management. Release 11. This guide also applies to on-premise implementations

Oracle. Human Capital Management Cloud Using Workforce Reputation Management. Release 11. This guide also applies to on-premise implementations Oracle Human Capital Management Cloud Using Workforce Reputation Management Release 11 This guide also applies to on-premise implementations Oracle Human Capital Management Cloud Part Number E67266-01

More information

Microsoft Dynamics GP. Manufacturing Planning Functions

Microsoft Dynamics GP. Manufacturing Planning Functions Microsoft Dynamics GP Manufacturing Planning Functions Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user.

More information

Wireless Keyboard & Optical Mouse. User Manual

Wireless Keyboard & Optical Mouse. User Manual Wireless Keyboard & Optical Mouse User Manual Table of Contents Introduction... 1 Software Compatibility... 1 Product Features... 2 Quick Installation Setup for PS/2 Connections (PC-only)... 5 Quick Installation

More information

LinkPlus Interface Guide

LinkPlus Interface Guide Toshiba Strata DK/CTX System LinkPlus Interface Guide SpectraLink 6000 System SpectraLink 8000 System July 2008 Edition 1725-36145-001 Version E LinkPlus Interface Guide: Toshiba Strata DK/CTX System Trademark

More information

Defining Incident Management Processes for CSIRTs: A Work in Progress

Defining Incident Management Processes for CSIRTs: A Work in Progress Defining Incident Management Processes for CSIRTs: A Work in Progress Chris Alberts Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek October 2004 TECHNICAL REPORT CMU/SEI-2004-TR-015 ESC-TR-2004-015

More information

Intel Unite. User Guide

Intel Unite. User Guide Intel Unite User Guide Intel Unite Users Guide September 2015 Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain

More information

PL-2303 (Chip Rev H, HX, X) USB to Serial Adapter Windows Driver Installer Manual

PL-2303 (Chip Rev H, HX, X) USB to Serial Adapter Windows Driver Installer Manual PL-2303 (Chip Rev H, HX, X) USB to Serial Adapter Windows Driver Installer Manual For Windows 98/ME/2000/XP/Vista/7 Release Version 1.3 (2/4/2010) Contents Introduction Features & Specifications System

More information

Quintet Enterprise Unified Communication Solutions

Quintet Enterprise Unified Communication Solutions White Paper Quintet Enterprise Unified Communication Solutions Product Overview Quintet Enterprise UniVoice Technology, Inc. 1 INTRODUCTION We live and work in a new world rich in communication media telephone,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

PrinterOn Mobile App for ios and Android

PrinterOn Mobile App for ios and Android PrinterOn Mobile App for ios and Android User Guide Version 3.4 Contents Chapter 1: Getting started... 4 Features of the PrinterOn Mobile App... 4 Support for PrinterOn Secure Release Anywhere printer

More information

QUICK GUIDE FOR. Installing Nokia Connectivity Cable Drivers

QUICK GUIDE FOR. Installing Nokia Connectivity Cable Drivers QUICK GUIDE FOR Installing Nokia Connectivity Cable Drivers Contents 1. Introduction...1 2. Must haves...1 3. Installing Nokia Connectivity Cable Drivers...1 3.1 Before installation...1 3.2 Installing

More information

Nokia Internet Modem User Guide

Nokia Internet Modem User Guide Nokia Internet Modem User Guide 9219840 Issue 1 EN 2010 Nokia. All rights reserved. Nokia, Nokia Connecting People and Nokia Original Accessories logo are trademarks or registered trademarks of Nokia Corporation.

More information

F-Series Desktop User Manual F20. English - Europe/New Zealand

F-Series Desktop User Manual F20. English - Europe/New Zealand F-Series Desktop User Manual F20 en English - Europe/New Zealand Contents Key to icons and text...3 What is F-Series Desktop?...4 How do I install F-Series Desktop onto my computer?...4 How do I subscribe

More information

Sample- for evaluation only. Advanced PowerPoint. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

Sample- for evaluation only. Advanced PowerPoint. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2010 Advanced PowerPoint TeachUcomp, Inc. it s all about you Copyright: Copyright 2010 by TeachUcomp, Inc. All rights reserved. This

More information

Application note: Handset Sharing on Spectralink IP- DECT Server 400 and 6500

Application note: Handset Sharing on Spectralink IP- DECT Server 400 and 6500 Spectralink IP-DECT Server Application note: Handset Sharing on Spectralink IP- DECT Server 400 and 6500 Using a Spectralink IP-DECT Server 400/6500 in a handset sharing setup 14219105 ed.2 Copyright Notice

More information

LinkPlus Interface Guide

LinkPlus Interface Guide Panasonic Digital Business System (DBS) LinkPlus Interface Guide SpectraLink 6000 System SpectraLink 8000 System July 2008 Edition 1725-36141-001 Version E LinkPlus Interface Guide: Panasonic Digital Business

More information

Software Vulnerabilities in Java

Software Vulnerabilities in Java Software Vulnerabilities in Java Fred Long October 2005 CERT Unlimited distribution subject to the copyright. Technical Note CMU/SEI-2005-TN-044 This work is sponsored by the U.S. Department of Defense.

More information

A Comparison of Requirements Specification Methods from a Software Architecture Perspective

A Comparison of Requirements Specification Methods from a Software Architecture Perspective A Comparison of Requirements Specification Methods from a Software Architecture Perspective Len Bass John Bergey Paul Clements Paulo Merson Ipek Ozkaya Raghvinder Sangwan August 2006 TECHNICAL REPORT CMU/SEI-2006-TR-013

More information

Wavelink TelnetCE Client User s Guide

Wavelink TelnetCE Client User s Guide Wavelink TelnetCE Client User s Guide wltn-wince-20050805-03 Revised 8/5/05 Copyright 2004 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Building Process Improvement Business Cases Using Bayesian Belief Networks and Monte Carlo Simulation

Building Process Improvement Business Cases Using Bayesian Belief Networks and Monte Carlo Simulation Building Process Improvement Business Cases Using Bayesian Belief Networks and Monte Carlo Simulation Ben Linders July 2009 TECHNICAL NOTE CMU/SEI-2009-TN-017 Software Engineering Measurement and Analysis

More information

Incident Management Capability Metrics Version 0.1

Incident Management Capability Metrics Version 0.1 Incident Management Capability Metrics Version 0.1 Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek April 2007 TECHNICAL REPORT CMU/SEI-2007-TR-008 ESC-TR-2007-008 CERT Program Unlimited distribution

More information

NetDisk & NetDisk Mini

NetDisk & NetDisk Mini HANTZ + PARTNER The Upgrade Company! www.hantz.com Quick Install Guide For Windows 2000 / XP Software Version 2.3 NetDisk & NetDisk Mini Powered by Technology www.ximeta.de HANTZ + PARTNER The Upgrade

More information

SIEMENS MOBILE PHONE MANAGER (MPM) AND BLACKBERRY BUILT-IN DESKTOP MANAGER IN USE WITH THE SIEMENS SK65

SIEMENS MOBILE PHONE MANAGER (MPM) AND BLACKBERRY BUILT-IN DESKTOP MANAGER IN USE WITH THE SIEMENS SK65 SIEMENS MOBILE PHONE MANAGER (MPM) AND BLACKBERRY BUILT-IN DESKTOP MANAGER IN USE WITH THE SIEMENS SK65 www.siemens.com/sk65 Content Overview... 3 Technical Requirements... 3 Siemens Mobile Phone Manager...

More information

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform CA Cloud Service Delivery Platform Business Relationship Manager Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

Building a Human Resources Portal Using Business Portal

Building a Human Resources Portal Using Business Portal Building a Human Resources Portal Using Business Portal Published: December 2005 For the latest information, please see http://mbs.microsoft.com/public/gponline Table of contents Introduction...1 What

More information

CA Nimsoft Monitor. Probe Guide for File and directory checking. dirscan v3.0 series

CA Nimsoft Monitor. Probe Guide for File and directory checking. dirscan v3.0 series CA Nimsoft Monitor Probe Guide for File and directory checking dirscan v3.0 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

Installing/Uninstalling Logitech desktop for Bluetooth on my computer

Installing/Uninstalling Logitech desktop for Bluetooth on my computer Installing/Uninstalling Logitech desktop for Bluetooth on my computer 2005 Logitech, Inc. Contents Introduction 3 Before you start 3 I have a computer without Bluetooth. What should I do? 4 I have or I

More information

Pipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com Lead Management 205 Pipelinersales Inc. www.pipelinersales.com Lead Management Learn how to use sales lead management with Pipeliner Sales CRM Application. CONTENT. Creating and sharing the Sales Lead

More information

Open Source Software used in the product

Open Source Software used in the product Open Source Software used in the product The software in this product contains parts licensed under various Open Source licenses. Please refer to the below list for further information on the software

More information

Quick Reference Guide

Quick Reference Guide Quick Reference Guide Quick Reference Guide LAPTOPS AND PCS To get started... You will need to have a MyRCN username to begin using RCNGO. To sign up, visit rcn.com and click MyRCN located at the top of

More information

Intel WiDi Remote 1.0 Release Notes

Intel WiDi Remote 1.0 Release Notes Intel WiDi Remote 1.0 Release Notes DISCLAIMER Information in this document is provided in connection with Intel products. Except as expressly stated in the Intel WiDi Remote Pre-Release software license

More information