Modeling and Verification. Devoir Maison 6 : DSL
|
|
- Evan Reeves
- 8 years ago
- Views:
Transcription
1 Modeling and Verification Devoir Maison 6 : DSL Alexis Marechal & Levi Lucio April 20, 2009 Introduction In homework 3 we saw an introduction to BPMN. BPMN is a well known formalism to define a system behaviour, but it doesn t have formal semantics (you cannot execute a Business Process). On the other hand we saw in the course an in-depth description of Algebraic Petri Nets, that can be used to model the same systems, but also have formal semantics. The objective of the homework 3 was to give semantics to a particular Bussiness Process using a tranlation to APN. In this homework, we will study some elements of a generic way to achieve this translation. We could try to translate directly the Business Process defined with Intalio, but this can be a bit complicated. Instead we ll use the XText plugin, seen during the exercises session, to create a simple language that will allow us to create and translate Business Process. This task presents two major issues, we ll try to avoid them in this exercise. The first issue is data types. In BPMN there is no way to define precisely which data structures are used. In APN, on the other hand, data structures are clearly defined (including semantics) with ADTs. In order to simplify this exercise, we will only consider P/T Petri Nets and we won t care about the data handled. The second issue is that a BPMN activity doesn t have clear semantics, when we create a Business Process we suppose that any activity is simple and that we won t have any problem implementing it. We can t make this assumption if we want to define clear and formal semantics for our Business Process. In order to
2 by-pass this problem, we will consider that a BPMN activity only represents a state of our system, and it doesn t have any behaviour. In clear, a BPMN activity will be translated as a single place in our Petri Nets. If you check the Business Process that we used for the homework 3 (still available in the course website), and consider the first subprocess, you will notice that activities like Database request or decode PIN where complex, and thus were translated using more than one place/transition. On the other hand, the activity called verify PIN was extremely simple, and was translated as a single place. We will consider in the following exercises that all BPMN activites are like the last one. 2 Exercise : DSL creation During the exercises session we saw how to use xtext in order to create a DSL for Petri Nets. Create a DSL for BPMN using XText. Your DSL must allow a user to specify a Business Process that contains the elements defined in the table (given the restrictions stated in the introduction). Please note that, in order to simplify your work, we changed a bit the structure of the BPMN elements: in BPMN there is no difference between an In Gateway" and an Out Gateway". Creating this difference should make the translation into Petri Nets much easier. While creating your DSL try to keep in mind that you will have to generate code from your models like we saw during the exercises session, so try to think how would you translate the elements you are defining into P/T Petri Nets. 3 Exercice 2: Semantics definition by transformation We will now give semantics to the Business Process diagram you have expressed in your DSL. The semantics will be given by translation into a Petri Net and we will then produce the state space for the given Petri Net. We saw in the exrcises session how to translate Petri Nets to Java, using XPand. In this exercise we will use XPand to translate our Business Process to Petri Nets, using a Prolog syntax. The required prolog syntax includes three simple facts: inarc/3 define arcs going from places into transitions; 2
3 outarc/3 initial/ define arcs going from transitions into places; defines the initial state for the Petri Net. for example, the facts: inarc(p,t,). outarc(t,p2,). inarc(p5,t3,). outarc(t3,p,). inarc(p2,t4,). outarc(t4,p3,). inarc(p2,t2,). outarc(t2,p4,). inarc(p,t5,). outarc(t5,p5,). initial([(p,),(p2,0),(p3,0),(p4,0),(p5,0)]). define the Petri Net in figure. p t t5 p2 p5 t4 t2 t3 p3 p4 Figure : Petri Net Example From the course site you can download a file called semantic_tools.zip containing the following files: engine.pl: contains the prolog engine that will produce the state space for a petri net; petri_net.pl: contains a definition of the Petri Net you want to explore, you will have to override this file with your own results; 3
4 launch.pl: contains a script that produces a visual form of the Petri Net you are exploring and the state space of that Petri Net. From your XPand translation you will produce a file petri_net.pl that will replace the example given. You can then load the launch.pl script in the prolog interpreter and call the predicate launch. Two files will be created: petri_net.dot: contains the visual description of the Petri Net you have translated from your Business Process diagram; state_space.dot: contains the visual description of the state space of the Petri Net you have you have translated from your Business Process diagram. In order to obtain SWI Prolog you can go to the webpage The output in dot format can be read by an application called Graphviz that pretty prints diagrams. You can obtain Graphviz freely at 4 Exercise 3: example In order to test your implementation, you should provide a very small but fully functional example, i.e. a Business Process described using with your DSL that can be executed using the Prolog API. You should include in your solution the Busines Process specification and talk about your results in your final report. Figure 2: Business Process Example 4
5 Send your solutions by mail to and with the subject of the mail starting by TP and including the number of the devoir maison and you name. Example: TP_7_your_name_here. Deadline: 29th of may, noon, for the first version. 2nd of june, midnight, for the final version. 5
6 Activities (as simple places). Start events. End events. Exclusive in gateways. Exclusive out gateways. Inclusive in gateways. Inclusive out gateways. Control flows. Table : Elements of BPMN to be defined in the DSL. 6
BPMN by example. Bizagi Suite. Copyright 2014 Bizagi
BPMN by example Bizagi Suite Recruitment and Selection 1 Table of Contents Scope... 2 BPMN 2.0 Business Process Modeling Notation... 2 Why Is It Important To Model With Bpmn?... 2 Introduction to BPMN...
More informationBPMN Business Process Modeling Notation
BPMN (BPMN) is a graphical notation that describes the logic of steps in a business process. This notation has been especially designed to coordinate the sequence of processes and messages that flow between
More informationDr. Jana Koehler IBM Zurich Research Laboratory
Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography
More informationNotepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3
Notepad++ The COMPSCI 101 Text Editor for Windows The text editor that we will be using in the Computer Science labs for creating our Python programs is called Notepad++ and http://notepad-plus-plus.org
More informationWHITE PAPER. Peter Drucker. intentsoft.com 2014, Intentional Software Corporation
We know now that the source of wealth is something specifically human: knowledge. If we apply knowledge to tasks we already know how to do, we call it productivity. If we apply knowledge to tasks that
More informationRIC 2007 SNAP: Symbolic Nuclear Analysis Package. Chester Gingrich USNRC/RES 3/13/07
RIC 2007 SNAP: Symbolic Nuclear Analysis Package Chester Gingrich USNRC/RES 3/13/07 1 SNAP: What is it? Standard Graphical User Interface designed to simplify the use of USNRC analytical codes providing:
More informationInterest Rates: Credit Cards and Annuities. Interest Rates: Credit Cards and Annuities 1/24
Interest Rates: Credit Cards and Annuities Interest Rates: Credit Cards and Annuities 1/24 Last Time Last time we discussed loans and saw how big an effect interest rates were on a loan, especially a home
More informationModel Decisions and Business Rules in System Architect. Larry Goldberg & Barbara von Halle Knowledge Partners International LLC
Model Decisions and Business Rules in System Architect Larry Goldberg & Barbara von Halle Knowledge Partners International LLC Who is KPI? Solutions: Decision WorkBench Plug-in for System Architect STEP
More informationBudapest University of Technology and Economics Department of Measurement and Information Systems. Business Process Modeling
Budapest University of Technology and Economics Department of Measurement and Information Systems Business Process Modeling Process, business process Workflow: sequence of given steps executed in order
More informationBP2SAN From Business Processes to Stochastic Automata Networks
BP2SAN From Business Processes to Stochastic Automata Networks Kelly Rosa Braghetto Department of Computer Science University of São Paulo kellyrb@ime.usp.br March, 2011 Contents 1 Introduction 1 2 Instructions
More informationHow To Set Up A Net Integration Firewall
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
More informationMAXIMUS Telephone Enrollment- Phase I Call Center Script
Hello, is (First Name) there? (Full Name)? Hi, Mr./Ms. (Last Name). This is (Representative Name) calling from California Health Care Options. I m calling about your Medi-Cal benefits. Did you get the
More informationBusiness Process Modelling. CA4 Business Process Modelling 1
Business Process Modelling CA4 Business Process Modelling 1 Historical View of BP Modelling Work Process Flow (early to mid 1900s) + Frank Gilbreth & his 'Flow Process Charts' (= flowcharts) + First structured
More information03 - Lexical Analysis
03 - Lexical Analysis First, let s see a simplified overview of the compilation process: source code file (sequence of char) Step 2: parsing (syntax analysis) arse Tree Step 1: scanning (lexical analysis)
More informationUniversity of Pisa. MSc in Computer Engineering. Business Processes Management. Lectures
University of Pisa MSc in Computer Engineering Business Processes Management Large and complex organizations are a tangible manifestation of advanced technology, more than machinery itself. (J.K. Galbraith)
More informationEngineering Process Software Qualities Software Architectural Design
Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical
More informationSocial Security Number
Social Security Number CHAPTER 4 To be eligible to receive FSA funds, each student must provide a correct Social Security number (SSN). To confirm the student s SSN for schools, the Department conducts
More informationChapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system.
Chapter 1 Introduction to ios Development Objectives: Touch on the history of ios and the devices that support this operating system. Understand the different types of Apple Developer accounts. Introduce
More informationHOW IT WORKS GET STARTED ACCESS FROST MOBILE VIEW ACCOUNT BALANCE VIEW ACCOUNT ACTIVITY MAKE TRANSFERS PAY BILLS LOG OUT SAFETY & SECURITY CONTACT US
WHAT IS FROST MOBILE? HOW IT WORKS GET STARTED ACCESS FROST MOBILE VIEW ACCOUNT BALANCE VIEW ACCOUNT ACTIVITY MAKE TRANSFERS PAY BILLS LOG OUT SAFETY & SECURITY CONTACT US MEMBER FDIC WHAT IS FROST MOBILE?
More informationBPCMont: Business Process Change Management Ontology
BPCMont: Business Process Change Management Ontology Muhammad Fahad DISP Lab (http://www.disp-lab.fr/), Université Lumiere Lyon 2, France muhammad.fahad@univ-lyon2.fr Abstract Change management for evolving
More informationHow To Design An Information System
Information system for production and mounting of plastic windows MARCEL, MELIŠ Slovak University of Technology - Faculty of Material Sciences and Technology in Trnava, Paulínska 16 street, Trnava, 917
More information08 BPMN/1. Software Technology 2. MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard
MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard Software Technology 2 08 BPMN/1 2 ntro Sequence of (three?) lessons on BPMN and technologies related
More informationThe ADOxx Metamodelling Platform Workshop "Methods as Plug-Ins for Meta-Modelling" in conjunction with "Modellierung 2010", Klagenfurt
The ADOxx Metamodelling Platform Workshop "Methods as Plug-Ins for Meta-Modelling" in conjunction with "Modellierung 2010", Klagenfurt Dr. Harald Kühn 24.03.2010 Agenda 1 Overview 2 Deployment and Integration
More informationChapter 13: Program Development and Programming Languages
Understanding Computers Today and Tomorrow 12 th Edition Chapter 13: Program Development and Programming Languages Learning Objectives Understand the differences between structured programming, object-oriented
More informationSupport and Compatibility
Version 1.0 Frequently Asked Questions General What is Voiyager? Voiyager is a productivity platform for VoiceXML applications with Version 1.0 of Voiyager focusing on the complete development and testing
More informationEfficient BPMN: from Anti-Patterns to Best Practices
Efficient BPMN: from Anti-Patterns to Best Practices Architecture Made Simple Kristina Bigelienė, No Magic Europe About Speaker Kristina Bigelienė kristina.bigeliene@nomagic.com Solution Architect for
More informationModel-Driven Development - From Frontend to Code
Model-Driven Development - From Frontend to Code Sven Efftinge sven@efftinge.de www.efftinge.de Bernd Kolb bernd@kolbware.de www.kolbware.de Markus Völter voelter@acm.org www.voelter.de -1- Model Driven
More informationFileMaker. Installation and New Features Guide. for FileMaker Pro 15 and FileMaker Pro 15 Advanced
FileMaker Installation and New Features Guide for FileMaker Pro 15 and FileMaker Pro 15 Advanced 2007-2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California
More informationWave Analytics Data Integration
Wave Analytics Data Integration Salesforce, Spring 16 @salesforcedocs Last updated: April 28, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
More informationOrganization of DSLE part. Overview of DSLE. Model driven software engineering. Engineering. Tooling. Topics:
Organization of DSLE part Domain Specific Language Engineering Tooling Eclipse plus EMF Xtext, Xtend, Xpand, QVTo and ATL Prof.dr. Mark van den Brand GLT 2010/11 Topics: Meta-modeling Model transformations
More informationK-SITE RULES: Integrating Business Rules in the mainstream software engineering practice
K-SITE RULES: Integrating Business Rules in the mainstream software engineering practice José L. Martínez-Fernández (2), José C. González (1,2), Pablo Suárez (2) (1) DAEDALUS Data, Decisions and Language,
More informationIdentifying Gas Ultrasonic Measurement. Problems Using Advanced Techniques. John Lansing CEESI
Identifying Gas Ultrasonic Measurement Problems Using Advanced Techniques John Lansing CEESI Gas Ultrasonic Meter Benefits :! The benefits of gas USM diagnostics are well known :! USM technology has reduced
More informationHuman-Readable BPMN Diagrams
Human-Readable BPMN Diagrams Refactoring OMG s E-Mail Voting Example Thomas Allweyer V 1.1 1 The E-Mail Voting Process Model The Object Management Group (OMG) has published a useful non-normative document
More informationWave Analytics Data Integration Guide
Wave Analytics Data Integration Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 6, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationGenerate Android App
Generate Android App This paper describes how someone with no programming experience can generate an Android application in minutes without writing any code. The application, also called an APK file can
More information2) Remove all the certificates listed by following steps 3-5.
HOW TO SETUP THE NEW DIGITAL SIGNATURE COMPONENT (Version 3.0) Updated on: 8 April 2014 STEP 1: Uninstall the Java Certificate 1) Select the Security tab as shown in the diagram below and Click on 2) Remove
More informationRedpaper Axel Buecker Kenny Chow Jenny Wong
Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single
More informationGates, Plexers, Decoders, Registers, Addition and Comparison
Introduction to Digital Logic Autumn 2008 Gates, Plexers, Decoders, Registers, Addition and Comparison karl.marklund@it.uu.se ...open up a command shell and type logisim and press enter to start Logisim.
More informationJAVA WEB START OVERVIEW
JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start
More informationPOOSL IDE Installation Manual
Embedded Systems Innovation by TNO POOSL IDE Installation Manual Tool version 3.4.1 16-7-2015 1 POOSL IDE Installation Manual 1 Installation... 4 1.1 Minimal system requirements... 4 1.2 Installing Eclipse...
More informationWindows Family Safety Filter
Protecting Your Kids with Family Safety Keeping your kids safe online can be complicated, but Windows Live Family Safety helps make it easier for you. Family Safety provides a website and a free program
More informationContents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large
More informationOffice 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
More informationProcess Modeling using BPMN 2.0
Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes
More informationSoftware Quality Exercise 1
Software Quality Exercise Model Checking Information. Dates Release: 7.0.0.5pm Deadline: 07.0.0.5pm Discussion:.0.0. Formalities While this exercise can be solved and handed in in groups of three, every
More informationBPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS Gabriel Cozgarea 1 Adrian Cozgarea 2 ABSTRACT: Business Process Modeling Notation (BPMN) is a graphical standard in which controls and activities can
More informationG Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
More informationUsing ZeroShell as a NetBalancer, QoS server & Captive Portal.
Using ZeroShell as a NetBalancer, QoS server & Captive Portal. (Among other things) By Jose Menendez orallo at gmail dot com Acknowledgments: Let me start this document by thanking all the people that
More informationModeling BPMN Diagrams within XTT2 Framework. A Critical Analysis**
AUTOMATYKA 2011 Tom 15 Zeszyt 2 Antoni Ligêza*, Tomasz Maœlanka*, Krzysztof Kluza*, Grzegorz Jacek Nalepa* Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** 1. Introduction Design, analysis
More informationSetting Up Your Android Development Environment. For Mac OS X (10.6.8) v1.0. By GoNorthWest. 3 April 2012
Setting Up Your Android Development Environment For Mac OS X (10.6.8) v1.0 By GoNorthWest 3 April 2012 Setting up the Android development environment can be a bit well challenging if you don t have all
More informationSet internet safety parental controls with Windows
How to Microsoft lets parents set up internet safety settings on a Windows computer for their kids, using Family Safety. Family Safety provides a website and a free program that you install on the computers
More informationKirsten Sinclair SyntheSys Systems Engineers
Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use
More informationEntity / Activity Table for Causeway Cash Receipts System
Entity / Activity Table for Causeway Cash System Entity Activity 1 Sends checks and remittance advices (together) 2 Mailroom Clerk Endorses checks 3 Mailroom Clerk Processes remittance - writes amount
More informationGroup for Programming & Software Engineering (PSE ), master thesis
Group for Programming & Software Engineering (PSE ), master thesis 22 th September 2015 23.09.2015 1 PSE, at the core of computer science OO Programming and programming languages Making new programming
More informationINTRODUCTION TO BUSINESS PROCESS MODELING NOTATION BPMN 1.2 AND BPMN 2.0
INTRODUCTION TO BUSINESS PROCESS MODELING NOTATION BPMN 1.2 AND BPMN 2.0 Email: {goliva,gerosa}@ime.usp.br / Twitter: @golivax Agenda 2 Introduction to Business Processes BPMN 1.2 Introduction Elements
More informationCSC 120: Computer Science for the Sciences (R section)
CSC 120: Computer Science for the Sciences (R section) Radford M. Neal, University of Toronto, 2015 http://www.cs.utoronto.ca/ radford/csc120/ Week 2 Typing Stuff into R Can be Good... You can learn a
More information1/20/2016 INTRODUCTION
INTRODUCTION 1 Programming languages have common concepts that are seen in all languages This course will discuss and illustrate these common concepts: Syntax Names Types Semantics Memory Management We
More informationSAML single sign-on configuration overview
Chapter 34 Configurin guring g Clarizen Configure the Clarizen Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with Clarizen. Configuration also specifies how the application
More informationIntegers are positive and negative whole numbers, that is they are; {... 3, 2, 1,0,1,2,3...}. The dots mean they continue in that pattern.
INTEGERS Integers are positive and negative whole numbers, that is they are; {... 3, 2, 1,0,1,2,3...}. The dots mean they continue in that pattern. Like all number sets, integers were invented to describe
More informationFileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
More informationHigh-level Petri Nets
High-level Petri Nets Model-based system development Aarhus University, Denmark Presentation at the Carl Adam Petri Memorial Symposium, Berlin, February 4, 2011 1 Concurrent systems are very important
More informationSouth East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
More informationVDM vs. Programming Language Extensions or their Integration
VDM vs. Programming Language Extensions or their Integration Alexander A. Koptelov and Alexander K. Petrenko Institute for System Programming of Russian Academy of Sciences (ISPRAS), B. Communisticheskaya,
More informationSecuring PHP Based Web Application Using Vulnerability Injection
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing
More informationThe Subnet Training Guide
The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP
More informationUsing Speccy to Report on Your Computer Components
Using Speccy to Report on Your Computer Components Ronald Ross rross@spkaa.com Today we re going to have a look at what I consider to be a useful Windows reporting utility. I ll be talking about Speccy,
More informationIntroducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
More informationService Description and Expectations. September 2010
Service Description and Expectations September 2010 If no custom design features are requested, the package includes the following elements: Service Element Pages: Up to 5 Included Design Consultation:
More informationStructural Detection of Deadlocks in Business Process Models
Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de
More informationeasyobject modern web applications made easy Project presentation
easyobject modern web applications made easy Project presentation version 1.0 - December 2012 par Cédric Françoys http://www.cedricfrancoys.be/easyobject This document is released under the Attribution-NonCommercial-ShareAlike
More informationWoPeD - An Educational Tool for Workflow Nets
WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany freytag@dhbw-karlsruhe.de Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany m.saenger09@web.de
More informationUnipass Securemail Client. User Guide v1.2
Unipass Securemail Client User Guide v1.2 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team 28/06/2015 Contents
More informationThis walk-through was created using Windows XP as a guide, however alternate versions of the Windows OS will be very similar in procedure as well.
Important!: If you are working from a computer within your office environment, it may be advisable to have your local IT/Helpdesk personnel validate that this software meets acceptable standards prior
More informationWhite Paper. Java Security. What You Need to Know, and How to Protect Yourself. 800.266.7798 www.inductiveautomation.com
White Paper Java Security What You Need to Know, and How to Protect Yourself Java Security: What You Need to Know, and How to Protect Yourself Ignition HMI, SCADA and MES software by Inductive Automation
More information14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë
14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected
More informationWhy are Business Process Models often too complex? Do s and Don ts for Business Process Modelers
Why are Business Process Models often too complex? Do s and Don ts for Business Process Modelers Version 1.0 This document developed by Dr. Juergen Pitschke, BCS-Dr. Juergen Pitschke, www.enterprise-design.eu
More informationPOWER WAVE SOFTWARE SOLUTIONS TECHNOLOGY TOOLS THAT ENABLE SMART BUSINESS DECISIONS
POWER WAVE SOFTWARE SOLUTIONS TECHNOLOGY TOOLS THAT ENABLE SMART BUSINESS DECISIONS Power Wave Manager Set-Up Tool IFY CheckPoint Weld Production Monitoring Tool WeldScore Process Analysis Tool Weld Sequencer
More informationA-LINE S GUIDE TO GOOGLE MY BUSINESS. Using Google s My Business, Maps and Google+ to increase your organization s visibility online.
A-LINE S GUIDE TO GOOGLE MY BUSINESS Using Google s My Business, Maps and Google+ to increase your organization s visibility online. A-LINE s Strategic Guide to Google My Business When it comes to reaching
More informationAutomation Testing in Mobile Applications Swati Hajela
Automation Testing in Mobile Applications Swati Hajela Test Engineer QAI's International Software Testing Conference 2012 Agenda Overview Objectives of the Research Paper Challenges : Mobile Application
More informationAndroid: Setup Hello, World: Android Edition. due by noon ET on Wed 2/22. Ingredients.
Android: Setup Hello, World: Android Edition due by noon ET on Wed 2/22 Ingredients. Android Development Tools Plugin for Eclipse Android Software Development Kit Eclipse Java Help. Help is available throughout
More informationIntroduction to Fractions
Section 0.6 Contents: Vocabulary of Fractions A Fraction as division Undefined Values First Rules of Fractions Equivalent Fractions Building Up Fractions VOCABULARY OF FRACTIONS Simplifying Fractions Multiplying
More informationCircles and Diamonds and Squares, Oh My! Demystifying the BPMN Standard
Circles and Diamonds and Squares, Oh My! Demystifying the BPMN Standard BPMN standards can be confusing, but once you understand their purpose and how to use them, they can be lifesavers. This paper, based
More information15 minutes is not much so I will try to give some crucial guidelines and basic knowledge.
1 Presentation. Good morning ladies and gentlemen, dear colleagues. First of all I would like to thank the committee for this invitation and letting me speak about one of my favourite topics: the internet.
More informationWeb Application Development Using UML
Web Application Development Using UML Dilip Kothamasu West Chester University West Chester, PA - 19382 dk603365@wcupa.edu Zhen Jiang Department of Computer Science Information Assurance Center West Chester
More informationBIG DATA, MAPREDUCE & HADOOP
BIG, MAPREDUCE & HADOOP LARGE SCALE DISTRIBUTED SYSTEMS By Jean-Pierre Lozi A tutorial for the LSDS class LARGE SCALE DISTRIBUTED SYSTEMS BIG, MAPREDUCE & HADOOP 1 OBJECTIVES OF THIS LAB SESSION The LSDS
More informationUnited States Naval Academy Electrical and Computer Engineering Department. EC262 Exam 1
United States Naval Academy Electrical and Computer Engineering Department EC262 Exam 29 September 2. Do a page check now. You should have pages (cover & questions). 2. Read all problems in their entirety.
More informationThe Five Steps to Scaling Your Business Development
The Five Steps to Scaling Your Business Development Using Web Services. What is an API? Biz Dev 2.0 caterina fake flickr Executive Summary Business has always been about connections. Whether it s communication
More informationIntroduction to the course, Eclipse and Python
As you arrive: 1. Start up your computer and plug it in. 2. Log into Angel and go to CSSE 120. Do the Attendance Widget the PIN is on the board. 3. Go to the Course Schedule web page. Open the Slides for
More informationThe power of IBM SPSS Statistics and R together
IBM Software Business Analytics SPSS Statistics The power of IBM SPSS Statistics and R together 2 Business Analytics Contents 2 Executive summary 2 Why integrate SPSS Statistics and R? 4 Integrating R
More informationOpen-Xchange Guard Major Release v2.0.0. Feature Overview V1.4
Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in
More informationJoomla Admin Protection
Joomla Admin Protection We congratulate you on installation of our plug-in that will not only help you to protect your website but will also make your work with CMS much easier and secure. Our plug-in
More informationIntroduction. It would appear that. we have reached the. limits of what it is. possible to achieve with. computer technology, although one should be
Introduction It would appear that we have reached the limits of what it is possible to achieve with computer technology, although one should be careful with such statements, as they tend to sound pretty
More informationAplicando enfoque MDE a aplicaciones WEB-SOA
Aplicando enfoque MDE a aplicaciones WEB-SOA María Consuelo Franky lfranky@javeriana.edu.co Dpto. Ingeniería de Sistemas Universidad Javeriana Bogotá - 2010 http://sophia.javeriana.edu.co/~lfranky/ 1 Temario
More informationAccess NSF Frequently Asked Questions
Access NSF FAQs What is Access NSF? What do I need to use Access NSF? Where can I go for help with Access NSF? What is the difference between Access NSF and RLS? Will RLS still be available? What is the
More informationUsing FGAG to export ETS data for Visualization
Using FGAG to export ETS data for Visualization Cezary Szczegielniak, Markus A. Wischy cezary.szczegielniak@tuhh.de, markus.wischy@siemens.com Siemens AG, CT SE 2, Corporate Technology, Software & Engineering
More informationLearning Links Understanding the Power of NSLDS
Learning Links The webinar will begin at 10:30 a.m. CDT / 11:30 a.m. ET / 8:30 a.m. PT The audio portion of our presentation will not be heard until we get started. September 21, 2011 Learning Links September
More informationProfiling and Testing with Test and Performance Tools Platform (TPTP)
Profiling and Testing with Test and Performance Tools Platform (TPTP) 2009 IBM Corporation and Intel Corporation; made available under the EPL v1.0 March, 2009 Speakers Eugene Chan IBM Canada ewchan@ca.ibm.com
More information3PlayMedia. Closed Captioning, Transcription, and Subtitling
Closed Captioning, Transcription, and Subtitling 1 Introduction This guide shows you the basics of how to quickly create high quality transcripts, closed captions, translations, and interactive transcripts
More information