Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix
|
|
- Margery Todd
- 8 years ago
- Views:
Transcription
1 Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix
2 Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt best prctices A ll-in-one toolset Introducing New Comer: CodeReducer Logiscope nd CodeReducer in ction: A demo Q&A 2
3 Qulity Requirements for Tody s Softwre Tody s development stndrds nd best prctices ll gree: Forml Verifiction & Review processes re required! RTCA/DO-178B, IEC 61508, MIL-STD 498, EN 50128, MISRA, JSF++ CMMI, ISO/IEC 12207, Softwre code qulity is now clerly tied to Business Priorities Improve qulity vi efficient bug prevention Reduce development & mintennce costs Improve reuse Outsourced development vlidtion Customer nd regultion cceptnce 3
4 Exmples of regultory requirements: IEC : Softwre requirement for Sfety relted systems «Functionl sfety of electricl / electronic / progrmmble electronic sfety relted systems Prt 3: softwre requirements» Technique/Mesure SIL1 SIL2 SIL3 SIL4 Softwre module testing nd integrtion Softwre nd Hrdwre integrtion Softwre verifiction 1 Probbilistic testing --- R R HR x x x 2 Dynmic nlysis nd testing R HR HR HR x x 3 Dt recording nd nlysis HR HR HR HR x x 4 Functionl nd blck box testing HR HR HR HR x x x x 5 Performnce testing R R HR HR x x x 6 Interfce testing R R HR HR x x 7 Sttic nlysis R HR HR HR x 8 Forml proof --- R R HR x 9 Softwre complexity metrics R R R R x 10 Simultion nd modelling R R HR HR x Softwre sfety vlidtion Softwre verifiction is Highly Recommended (HR) or Recommended (R) whtever the softwre Sfety Integrity Level (SIL) Logiscope supports Sttic nlysis nd Softwre complexity metrics tht re clerly stted s Highly Recommended or Recommended testing techniques.
5 Exmples of regultory requirements: Glileo Softwre Stndrd (Spce industry) Some requirements mong others Structurl Coverge Requirements «The following types of verifiction methods re envisged for the structurl coverge of ech SDD component: Sttement coverge of source nd object code, Decision coverge of source code, Modified consition & decision coverge of source code.» Verifiction of Source nd Executble Object Code «Source code nd executble code re verified by test, Source Code Inspections, Fgn inspections, Sttic Anlysis nd Wlkthroughs. Sttic code nlysis cn be fully or prtilly replced by the use of utomted tools.» 9.4. Softwre Metrics «Metrics collection nd nlysis help to evlute the softwre product in order to identify res of improvement by compring mesured qulity ginst expected qulity. Ech qulity objective is expressed in severl properties of the softwre, which cn be mesured nd quntified. The chosen metrics re nlysed ginst trget vlues to tke remedil ctions, if necessry, to ensure the chievement of the qulity gols. The metrics re pplied tking into ccount thetiloring of the qulity model lso referring to the definition of the criticlity clsses.»
6 Exmples of regultory requirements: ISO/IEC Softwre Life-Cycle Processes 5. Primry Processes 5.1 Acquisition 5.1 Acquisition 5.2 Supply 5.2 Supply 6. Supporting Processes support 6.1 Documenttion 6.1 Documenttion 6.2 Configurtion Mngement 6.2 Configurtion Mngement 6.3 Qulity Assurnce 6.3 Qulity Assurnce Development 5.4 Opertion Mintennce 6.4 Verifiction 6.4 Verifiction 6.5 Vlidtion 6.5 Vlidtion 6.6 Joint Review 6.6 Joint Review 6.7 Audit 6.7 Audit 6.8 Problem Resolution 6.8 Problem Resolution 7. Orgniztionl Processes 7.1 Mngement 7.2 Infrstructure 7.3 Improvement 7.4 Trining 6
7 Exmples of regultory requirements: SEI / CMMI Level 5 Optimizing 4 Quntittively Mnged 3 Defined 2 Mnged 1 Initil Focus Continuous process improvement Quntittive mngement Process stndrdiztion Bsic project mngement Process Ares Orgniztionl Innovtion nd Deployment Cusl Anlysis nd Resolution Orgniztionl Process Performnce Quntittive Project Mngement Requirements Development Technicl Solution Product Integrtion Verifiction Vlidtion Orgniztionl Process Focus Orgniztionl Process Definition Orgniztionl Trining Integrted Project Mngement Risk Anlysis Integrted Teming Integrted Supplier Mngement Decision Anlysis nd Resolution Requirements Mngement Project Plnning Project Monitoring nd Control Supplier Agreement Mngement Mesurement nd Anlysis Process nd Product Qulity Assurnce Configurtion Mngement 7
8 Softwre product evlution: A stndrdised process Requester's Requirements Estblishment of Requirements 1 Requirements ISO/CEI Informtion Technology - Softwre Product - Process Specifiction of the Specifiction Requester's Input Product Description Evlutor's Input Pre-defined Specifictions Product Components Methods 2 3 Tools Design of the Pln Record of Actions Execution of the Synthetised Results Drft Report Conclusion of the Records Reviewed Report 8
9 requirements: Softwre product chrcteristics "The cpbility of the softwre product to provide functions which meet stted nd implied needs when the softwre is used under specified conditions. " USABILITY FUNCTIONALITY "The cpbility of the softwre product to to be understood, lerned, used nd ttrctive to the user when used under specified conditions." RELIABILITY " The cpbility of the softwre product to mintin specified level of performnce when used under specified condition." EFFICIENCY " The cpbility of the softwre product to provide pproprite performnce, reltive to the mount of resources used, under stted conditions." MAINTAINABILITY " The cpbility of the softwre product to be modified. Modifictions my include corrections, improvments or dpttion of the softwre to chnges in environment, nd in requirements nd functionl specifictions" PORTABILITY " The cpbility of the softwre product to be trnsferred from one environment to nother."
10 Softwre product evlution: A stndrdised process Requester's Requirements Estblishment of Requirements Requirements ISO/CEI Informtion Technology - Softwre Product - Process Specifiction of the Specifiction Requester's Input Product Description Evlutor's Input Pre-defined Specifictions Product Components Methods 2 Tools Design of the Pln Record of Actions Execution of the Synthetised Results Drft Report Conclusion of the Records Reviewed Report 10
11 Techniques supported by Logiscope: Progrmming Rule Checking Requirements: The source code shll be "strongly typed" The source code shll follow n homogeneous presenttion Risky or mbiguous constructions shll be voided. Etc. Softwre Item: Source Code Principles: Tool-bsed checking of coding stndrds / conventions / rules : Code Lyout Dt Flow Sttement Complexity Control Flow Structuring Nming Conventions Portbility Complince etc. Source code inspection Instrument: Logiscope RuleChecker
12 Techniques supported by Logiscope: Source Code Metrics Requirements: "A component shll not hve n excessive intrinsic complexity" Softwre Item: Source Code Principles: Mesuring complexity ttributes on ech component Compring the vlues with threshold Rting ccording to the number of mesures exceeding the thresholds Instrument: Logiscope QulityChecker T_COM NPATH LG_PROG SAUT_INCOND T_MOY NB_NIV F_VOC VG NB_ES NB_INS
13 Techniques supported by Logiscope: Control Flow Anlysis Requirements: A function shll not hve n excessive intrinsic complexity" Duplicting source code shll be voided No sttement shll be locted fter brnching sttement or n exit sttement within block" etc. Softwre Item: Source Code Principles: Representing the control flow of ech function s grph Looking for risky structures : Non homogeneous processing flow, Lck of processing hierrchy, Lck of code fctoriztion, Ded code, etc. Instrument: Logiscope QulityChecker
14 Techniques supported by Logiscope: Components Coupling Anlysis Requirements: The dependency on the O.S. shll be optimized/minimized. The dependency on non-developmentl softwre shll be optimized/minimized. Interdependency between softwre unit shll be strictly limited Softwre Item: Source Code Principles: Representing the clling/use reltions between components s grph Grouping components into upper-level components Anlyzing the coupling between components Instrument: Logiscope QulityChecker
15 Techniques supported by Logiscope: Structure-Bsed Testing Test Coverge Anlysis Test Requirements: Complementrities nd synergy between testing techniques shll be ensured. The tests shll show tht ech softwre module does not perform unintended functions. The level of completeness of the test shll be explicitly defined. Softwre Item: Test Pln Principles: Decompose Decompose the the softwre softwre in in elementry elementry objects objects Count Count exercised exercised objects objects Trce Trce exercised exercised objects objects Specify Specify dditionl dditionl test test cses cses for for un-exercised un-exercised objects objects Execute Execute test test cses cses Instrument : Logiscope TestChecker
16 Softwre product evlution: A stndrdized process Requester's Requirements Estblishment of Requirements Requirements ISO/CEI Informtion Technology - Softwre Product - Process Specifiction of the Specifiction Requester's Input Product Description Evlutor's Input Pre-defined Specifictions Product Components Methods Tools Design of the 3 Pln Record of Actions Execution of the Synthetised Results Drft Report Conclusion of the Records Reviewed Report 16
17 The tool: Logiscope A set of evlution modules supporting sttic nlysis techniques: Logiscope Modules Qulity Checker Rule Checker Code Reducer Test Checker Control Flow Anlysis Component Coupling Anlysis Source Code Metrics Progrmming Rules Checking Structure-Bsed Testing Processing C, C++, Ad nd Jv source code Avilble on Windows, UNIX nd LINUX pltforms
18 Sttic Anlysis A risk mngement mixed technique Frequency of filure Construction Uncceptble Risk Mixed technique Prevention Acceptble Risk Severity of filures Construction : Better structuring the code to reduce severity of filures Prevention : Chnging the code to correct violtions thus reducing the number of ltent bugs in the code
19 Sttic Anlysis: Expecting high ROI No risky / erroneous construction No duplicted code No complex function No useless/unused item Less defects Relibility Less code Less Review nd Testing Higher Productivity Hierchicl processing Structured flow Mintinbility Esier to dive in code Less Rework Homogeneous code
20 Source code verifiction using Logiscope & CodeReducer A Demo 20
21 Logiscope CodeReducer A New Comer in the Logiscope Toolset Find similrities in the code t the code structure level Independently of the formtting, nming of files, functions, vribles, etc. NOT just n other File Compre tool! Increse Softwre Mintinbility through pproprite code re-fctoring in identifying duplicted code possibly cross mny source code trees. through voidble code dupliction resulting of low qulity mintennce ctivities. 21
22 CodeReducer A New Comer in the Logiscope Toolset Severl Use Cses: Finding code similrities in the overll code of project Compring two versions of the sme project nd highlighting differences. Finding ll instnces similr to reference code in the project 22
23 Pieces re NOT identicl CodeReducer Similrity Vs. Identity // Here is comment for (i=0;i<5;++i) { j = j+1; } for (j=5; j<10; ++j) { // here is nother comment k = k+1; } But there re similr (A loop) 23
24 Pieces re NOT identicl CodeReducer Similrity Vs. Identity // Here is comment for (i=0;i<max_size;i++) { j = j+1; } // Here is comment for (i=0;i<max_size;i++) { j = j+i; } But there re (very) similr: Is tht fix not reported? 24
25 Pieces re NOT identicl CodeReducer Similrity Vs. Identity // Here is comment for (i=0;i<max_size;i++) { j = j+1; } // Here is comment for (i=0;i<max_size;i++) { j = j+1; k = k+1; // BugRep No 25 } But there re (lso very) similr: Is tht gin fix not reported? 25
26 CodeReducer Using code tokens For CodeReducer, similrity is two or more of sequences of identicl tokens found A token is code structurl element: e.g. control structures, structure nd instructions delimiters, ssignment opertors, For ll lnguges, tokens re broken down into ctegories: Ctegory 1: Control structures (if, else, loops, switch, procedures, pckges, clsses), Ctegory 2: Blocks (begin, end, {}), Ctegory 3: Assignments, Ctegory 4: Opertors (+, -, *,...), Ctegory 5: Prenthesis nd instructions termintors. 26
27 CodeReducer Code tokens nd «precision» The higher the precision, the more tokens will be considered when looking for similrities. A given precision considers ll tokens for this precision nd lower ones too. - Precision 1 uses only tokens of Ctegory 1; - Precision 2 uses tokens of Ctegory 1 nd Ctegory 2, -etc. The serch results grnulrity is linked to the precision: Precision 1: Detection of similr lgorithms, Precision 2: + detection of similr code structure, Precision 3: + detection of sme number of vribles ssignments in code blocks, Precision 4: + detection of similr expressions, Precision 5: + detection of sme number of instructions with similr contents. 27
28 Source code verifiction using Logiscope & CodeReducer Bck to the Demo 28
29 Thnk You - Questions Source Code Verifiction Using Logiscope nd CodeReducer
30 Source Code Verifiction Using Logiscope Avoidnce nd Erly Detection of Defects Detection of risky / erroneous constructions Correltion between code complexity nd defect number 8 residul defects by verge for cyclomtic complexity of 50 2 residul defects by verge for cyclomtic complexity of 25 NCBody [CNES Study on Arine CCO Ad source code ] 0 10,0 20,0 30,0 40,0 50,0 60,0 70,0 80,0 90,0 X4 Bugs for only X2 Complexity ct_cyclo.sum Moyenne cumulée Moyenne Prog. Lin.
Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationCorporate Compliance vs. Enterprise-Wide Risk Management
Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationHow To Be A Successful Mobile Ppliction And Regression Tester
July/August 2009 Volume 3 SOFTWARE This issue of Softwre Testing delves into mobile ppliction nd regression testing. HOTSPOTS 1 Mobile pplictions nd regression testing p WANT JOB SECURITY? This issue of
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationl,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -
rrsrgfqmrreremrers I Publiction dte: My 2g,Z01S Pilol Progrm tof g_llpqtg Resilience: Building Resilience to Climte Retted Hzrds-AMtS (ppcr: BRCH-AM S) Project ld No.: P1275Ao Vj.nplry of Agriculturl Development
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationThe LENA TM Language Environment Analysis System:
FOUNDATION The LENA TM Lnguge Environment Anlysis System: Audio Specifictions of the DLP-0121 Michel Ford, Chrles T. Ber, Dongxin Xu, Umit Ypnel, Shrmi Gry LENA Foundtion, Boulder, CO LTR-03-2 September
More informationFile Storage Guidelines Intended Usage
Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess
More informationAN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS
AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology
More informationVirtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationAdvanced Baseline and Release Management. Ed Taekema
Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre
More informationElectrical Engineering
Electricl Engineering R Wherever Energy Flows or Goods re Produced Our Electricl Engineering Group provides electricl design nd consulting services to electric & gs utilities, oil & gs pipelines, refineries,
More informationBlackbaud The Raiser s Edge
Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com
More informationAn Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
More informationcollection, dissemination and security of data. inform the access and utilisation of data within the organisation.
Corporte Policies & Procedures Generl Administrtion Document CPP123 Dt Governnce Policy First Produced: Current Version: Pst Revisions: Review Cycle: Applies From: 17/07/13 17/07/13 Nil 3 yer cycle Immeditely
More informationPsychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013
Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationProject 6 Aircraft static stability and control
Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The
More informationOutline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)
Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationAssessing authentically in the Graduate Diploma of Education
Assessing uthenticlly in the Grdute Diplom of Eduction Dr Mree DinnThompson Dr Ruth Hickey Dr Michelle Lsen WIL Seminr JCU Nov 12 2009 Key ides plnning process tht embeds uthentic ssessment, workintegrted
More informationCurrent Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015
Current Topics Implictions for Complince Orgniztions Presenttion to the IIB October, 2015 This presenttion contins generl informtion only nd Deloitte is not, by mens of this presenttion, rendering ccounting,
More informationHP Application Lifecycle Management
HP Appliction Lifecycle Mngement Softwre Version: 11.00 Tutoril Document Relese Dte: Novemer 2010 Softwre Relese Dte: Novemer 2010 Legl Notices Wrrnty The only wrrnties for HP products nd services re set
More informationImplementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory
Implementtion Evlution Modeling of Selecting ERP Softwre Bsed on Fuzzy Theory Xukn Xu 1, Ydong Jing 1 nd Zheng Shi 2 1 Informtion Mngement Deprtment, Chngzhou Cmpus, Hohi University, Chngzhou 213022, Jingsu,
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationRecognition Scheme Forensic Science Content Within Educational Programmes
Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationFacilitating Rapid Analysis and Decision Making in the Analytical Lab.
Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires
More informationUnderstanding Life Cycle Costs How a Northern Pump Saves You Money
Understnding Life Cycle Costs How Nrn Pump Sves You Money Reference: Hydrulic Institute (www.s.g) Introduction Wht Life Cycle Cost (LCC) Clculting Totl LCC LCC Components Wht Life Cycle Cost Life Cycle
More informationSTRM Log Manager Installation Guide
Security Thret Response Mnger Relese 2012.0 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Pulished: 2012-09-12 Copyright Notice Copyright 2012 Juniper
More informationSoftware Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning
Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology
More informationPortfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationHow To Improve Network Performance
Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More informationE-Commerce Comparison
www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationLong Term Financial Planning
Long Term Finncil Plnning Overview of New Pltform City of Knss City, Missouri 2013 2018 Long term finncil plnning combines finncil forecsting with finncil strtegizing to identify future chllenges nd opportunities
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationMONITOR AND CONTROL SOFTWARE FOR GROUND SYSTEMS IN THE DEEP SPACE NETWORK
MONITOR AND CONTRO OFTWARE FOR GROUND YTEM IN THE DEEP PACE NETWORK Pul Pechkm Network Control Tsk NAA/ Jet Propulsion bortory July 22,22 ABTRACT NAA s Deep pce Network (DN) is n interntionl network of
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)
ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems
More informationIn addition, the following elements form an integral part of the Agency strike prevention plan:
UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes
More informationIFC3 India-Android Application Development
IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students
More informationIndustrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen
Tutoril Industril informtion system security Prt 3 Stndrds for securing industril utomtion systems Mrtin Nedele, Dick Oyen Prt 2 of this three-prt tutoril on informtion system security in industril networks
More informationD T IC. 052 Research Laboratory D A 0 05
I JI Iw I1m I@ US Army Corps of Engineers Construction Engineering,s o,,ad-a205 :,Lo 052 Reserch Lbortory D A 0 05 USA-CERL TECHNICAL REPORT P-89/09 December 1988 Dt Envelopment Anlysis s Tool To Evlute
More informationSPECIAL PRODUCTS AND FACTORIZATION
MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come
More informationInformation and Software Technology
Informtion nd Softwre Technology 53 (2011) 1199 1208 Contents lists vilble t ScienceDirect Informtion nd Softwre Technology journl homepge: www.elsevier.com/locte/infsof Determinnts of softwre qulity in
More informationASG Techniques of Adaptivity
ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationelearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007
elerning pltforms nd consulttion service t CU Presented by Judy Lo 31 August 2007 Agend The elerning guidelines How elerning cn lower your work burden nd enhnce lerning? The elerning pltforms The elerning
More informationa GAO-03-568 GAO COLLEGE COMPLETION Additional Efforts Could Help Education with Its Completion Goals Report to Congressional Requesters
GAO United Sttes Generl Accounting Office Report to Congressionl Requesters My 2003 COLLEGE COMPLETION Additionl Efforts Could Help Eduction with Its Completion Gols GAO-03-568 My 2003 COLLEGE COMPLETION
More information2 Workload and duration of the Program 3 Courses 4 Types of course units and number of participants
The English version of the consolidted curriculum for the "Bchelor Progrm in Mngement nd Economics" is not leglly inding nd is for informtionl purposes only. The leglly inding text which regultes the different
More informationPerformance analysis model for big data applications in cloud computing
Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationRevisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509
Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished
More informationDEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.
Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER
More informationProtection of Critical Information Infrastructure in Korea
Protection of Criticl Informtion Infrstructure in Kore Kim, Woonyon 2005. 10 Ntionl Security Reserch Institute Contents Ntionl Cyber Security Mngement System Criticl Informtion Infrstructure (CII) Mngement
More informationAny opinions, findings, conclusions, or recommendations expressed in this publication do not necessarily reflect the views of FEMA.
Any opinions, findings, conclusions, or recommendtions expressed in this publiction do not necessrily reflect views FEMA. Additionlly, neir FEMA or ny its employees mkes ny wrrntee, expressed or implied,
More informationHow To Study The Effects Of Music Composition On Children
C-crcs Cognitive - Counselling Reserch & Conference Services (eissn: 2301-2358) Volume I Effects of Music Composition Intervention on Elementry School Children b M. Hogenes, B. Vn Oers, R. F. W. Diekstr,
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationPower consumption In operation At rest For wire sizing. Rated impulse voltage Control pollution degree 3. Non-operating temperature
echnicl dt sheet SRF2A-5(-O) Rotry ctutor with emergency function for utterfly vlves orque orue 2 2 2 m m m ominl voltge AC/DC 2 V Control Control Open-close Oen-close SRF2A-5 SRF2A-5 Deenergised C C SRF2A-5-O
More informationMulti-Scale Modeling of Nano Scale Phenomenon using CUDA based HPC Setup
Multi-Scle Modeling of Nno Scle Phenomenon using CUDA bsed HPC Setup Rohit Pthk nd Stydhr Joshi Acropolis Institute of Technology & Reserch, Indore, Mdhy Prdesh, Indi Shri Vishnv Institute of Technology
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationUplift Capacity of K-Series Open Web Steel Joist Seats. Florida, Gainesville, FL 32611; email: psgreen@ce.ufl.edu
Uplift Cpcity of K-Series Open Web Steel Joist Sets Perry S. Green, Ph.D, M.ASCE 1 nd Thoms Sputo, Ph.D., P.E., M.ASCE 2 1 Assistnt Professor, Deprtment of Civil nd Costl Engineering, University of Florid,
More informationPower consumption In operation At rest For wire sizing. Auxiliary switch
echnicl dt sheet SRF2A-S2-5(-O) Rotry ctutor with emergency function for utterfly vlves orque orue 2 2 2 m m m ominl voltge AC/DC 2 V Control Control Open-close Oen-close wo integrted uxiliry uiliry switches
More informationAgenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A
Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM
More informationICT Support - How Many Contractors Are Running?
2e2 Report into Supplier Management and Support MONITORING NLYTICS INTEGRTION PPLICTION UTOMTION BCK UP INTEGRTION DT RCHIVING DT STORGE PPLICTION DT MNGEMENT Introduction ICT is increasingly underpinning
More informationBalanced Scorecard. Linking Strategy to Actions. KPMG Swiss Practice Benchmarking Congress, Bürgenstock May 28 th, 1997, Roger Jaquet
Blnced Scorecrd Linking Strtegy to Actions KPMG Swiss Prctice Benchmrking Congress, Bürgenstock My 28 th, 1997, Roger Jquet Contents ❶ Objectives 1 ❶ Wht s the historicl bckground of the BSC? 2-4 ❶ BSC
More informationChromebook Parent/Student Information
Chromebook Prent/Student Informtion 1 Receiving Your Chromebook Student Distribution Students will receive their Chromebooks nd cses during school. Students nd prents must sign the School City of Hmmond
More informationHealth Information Systems: evaluation and performance of a Help Desk
536 Digitl Helthcre Empowering Europens R. Cornet et l. (Eds.) 2015 Europen Federtion for Medicl Informtics (EFMI). This rticle is published online with Open Access by IOS Press nd distributed under the
More informationEfficient load-balancing routing for wireless mesh networks
Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,
More informationSTATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services
Dtes of Review: FY '09 Evluttor(s): S. Crpenter DESK REVIEW: Accredittion: Acredittion is no longer required by the stte contrct. Significnt Events from the Agency: Developomentl Disbilities Progrm Comprehensive
More informationDecision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationYour Image through Client Reporting
Your Imge through Client Reporting Prtnerships: Logits is n escrow gent, prtner of Softwre editors nd users, to design, control nd preserve ccurte deposits of sources. Contct: For ny dditionl informtion
More informationProject Recovery. . It Can Be Done
Project Recovery. It Cn Be Done IPM Conference Wshington, D.C. Nov 4-7, 200 Wlt Lipke Oklhom City Air Logistics Center Tinker AFB, OK Overview Mngement Reserve Project Sttus Indictors Performnce Correction
More informationRoudmup for Los Angeles Pierce College ADIV Program ancl csu Dominguez Hilk Rlt-B^sr/ progrum
Roudmup for Los Angeles Pierce College ADIV Progrm ncl csu Dominguez Hilk Rlt-B^sr/ progrum Admission Requirements for Los Angeles pierce (LApC) LAPC hs four-semester Associte Degree in Nursing (ADN) Progrm.
More informationNOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1
Cohsset Assocites, Inc. Expnding Your Skill Set: How to Apply the Right Serch Methods to Your Big Dt Problems Juli L. Brickell H5 Generl Counsel MER Conference My 18, 2015 H5 POWERING YOUR DISCOVERY GLOBALLY
More informationNote: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014
Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).
More informationModeling POMDPs for Generating and Simulating Stock Investment Policies
Modeling POMDPs for Generting nd Simulting Stock Investment Policies Augusto Cesr Espíndol Bff UNIRIO - Dep. Informátic Aplicd Av. Psteur, 458 - Térreo Rio de Jneiro - Brzil ugusto.bff@uniriotec.br Angelo
More informationLearner-oriented distance education supporting service system model and applied research
SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied
More information