Qualitative & Quantitative Evaluation of Static Code Analysis Tools
|
|
|
- Clemence Lindsey
- 10 years ago
- Views:
Transcription
1 CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Qualitative & Quantitative Evaluation of Static Code Analysis Tools Indiana University-Purdue University Indianapolis Dr. James H. Hill December 16-18, 2014
2 Project Overview Static code analysis (SCA) is a methodology of detecting errors in program based on the review of code marked by the analyzer in areas where potential errors may occur SCA tools aid developers in quickly identifying errors through automation memory leaks dead code code conformance etc.
3 Existing Static Code Analysis Tools Given the vast number of SCA tools, it can be hard identifying what SCA tools are best for the job! It is also a costly & timeconsuming process evaluating the quality of each tool HP Fortify Source Code Analyzer AdaControl Pylint Axivion Bauhaus Suite Astrée Parasoft C/C++test IBM Rational AppScan Source Edition cpplint Klocwork Insight Imagix 4D Clang SofCheck Inspector MALPAS PVS-Studio CodeRush CodeSonar Cppcheck Visual Studio Team System CodeIt.Right Protecode DMS Software Reengineering Toolkit FxCop FindBugs Kalistick Apparat PMD Our objective is to evaluate the quality of static code analysis tool, and understand how to best apply them to a given piece of source code
4 Current Status Acquired and deployed three commercial SCA tools into the System Integration Lab at IUPUI Developed an extensible framework for automating the evaluation of SCA tools (SCATE) Exploring methodology and reporting features Granularity Aggregating multiple tools Permutation heat map
5 Granularity Controls the required accuracy for the tool
6 Granularity Controls the required accuracy for the tool CWE835_Infinite_Loop do_01.c 10 void CWE835_Infinite_Loop do_01_bad() { 11 int i = 0; /* FLAW: Infinite Loop - do..while() with no break point */ 14 do 15 { 16 printintline(i); 17 i = (i + 1) % 256; 18 } while(i >= 0); 19 }
7 Granularity Controls the required accuracy for the tool CWE835_Infinite_Loop do_01.c 10 void CWE835_Infinite_Loop do_01_bad() { 11 int i = 0; /* FLAW: Infinite Loop - do..while() with no break point */ 14 do 15 { 16 printintline(i); 17 i = (i + 1) % 256; 18 } while(i >= 0); 19 } Flaw
8 Granularity Controls the required accuracy for the tool CWE835_Infinite_Loop do_01.c 10 void CWE835_Infinite_Loop do_01_bad() { 11 int i = 0; /* FLAW: Infinite Loop - do..while() with no break point */ 14 do 15 { 16 printintline(i); 17 i = (i + 1) % 256; 18 } while(i >= 0); 19 } Flaw FILE The tool can find the flaw anywhere in the file FUNCTION The tool can find the flaw anywhere in the function LINE The tool must find the flaw on line 14
9 Granularity Controls the required accuracy for the tool Granularity Detected Flaws File 25,511 Function 3,565 Line 2,215 Increasing granularity reduces the quality of a Tool
10 Using Multiple Tools Organizations will often run multiple tools to reduce risk
11 Using Multiple Tools Organizations will often run multiple tools to reduce risk 5, ,433 12,235 9,174 25, ,397 Tool 1 Tool 2 Tool 3
12 Using Multiple Tools Organizations will often run multiple tools to reduce risk 5, ,433 12,235 9,174 25, ,397 Tool 1 Tool 2 Tool 3 Aggregate 31, ,004
13 Using Multiple Tools Organizations will often run multiple tools to reduce risk 5, ,433 12,235 9,174 25, ,397 Tool 1 Tool 2 Tool 3 11,572 Duplicate s Aggregate 31, ,004
14 Using Multiple Tools Organizations will often run multiple tools to reduce risk 5, ,433 12,235 9,174 25, ,397 Tool 1 Tool 2 Tool 3 11,572 Duplicate s Not all s are unique s increase but at the cost of many more s (reduced precision) Aggregate 31, ,004
15 Permutation Heat Map Permutations use Data and/or Control flows to obscurify a Flaw to test SCA tools
16 Permutation Heat Map Permutations use Data and/or Control flows to obscurify a Flaw to test SCA tools Permutation 01: void bad (void) { // FLAW: } Permutation 02: void bad (void) { if (1) { // FLAW: } } Permutation 03: void bad (void) { if (5==5) { // FLAW: } }
17 Permutation Heat Map
18 Permutation Heat Map CWE 415 (Double Free) 15: 50 % Flaws Found 16: 100% Flaws Found
19 Permutation Heat Map CWE 415 (Double Free) 15: 50 % Flaws Found 16: 100% Flaws Found Permutation 15: void bad (void) { switch(6) { case (6): // FLAW: break } } Permutation 16: void bad (void) { while (1) { // FLAW: break } }
20 Permutation Heat Map CWE 415 (Double Free) 15: 50 % Flaws Found 16: 100% Flaws Found Permutation 15: void bad (void) { switch(6) { case (6): // FLAW: break } } Permutation 16: void bad (void) { while (1) { // FLAW: break } } The type of permutation can affect a tool s quality
21 Future Work SWAMP Integration Tool behavioral model Predict tool quality against source code Streamline analysis into a cloud-based testing as a service product
22 Future Work SWAMP Integration Tool behavioral model Predict tool quality against source code Streamline analysis into a cloud-based testing as a service product Tool Results The SWAMP has multiple SCA tools integrated into their environment and can provide tool results SCATE
23 Future Work SWAMP Integration Tool behavioral model Predict tool quality against source code Streamline analysis into a cloud-based testing as a service product Evaluation Results Metadata Tool Model Code Metrics
24 Future Work SWAMP Integration Tool behavioral model Predict tool quality against source code Streamline analysis into a cloud-based testing as a service product Tool Model Source Code Quality Prediction
25 Future Work SWAMP Integration Tool behavioral model Predict tool quality against source code Streamline analysis into a cloud-based testing as a service product
26 Questions 4/30/2015 CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP 25
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Software security assessment based on static analysis
Software security assessment based on static analysis Christèle Faure Séminaire SSI et méthodes formelles Réalisé dans le projet Baccarat cofinancé par l union européenne Context > 200 static tools for
How To Improve Your Software
Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing
Code Dx: Visual analytics for triage of source code vulnerabilities
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Code Dx: Visual analytics for triage of source code vulnerabilities Secure Decisions, a division of Applied Visions, Inc. Anita D Amico Ken Prole September
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security Nominee International Security Executives (ISE ) Information Security Project of the Year
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
Development Environment and Tools for Java. Brian Hughes IBM
Development Environment and Tools for Java Brian Hughes IBM 1 Acknowledgements and Disclaimers Availability. References in this presentation to IBM products, programs, or services do not imply that they
The FDA Forensics Lab, New Tools and Capabilities
U. S. Department of Health and Human Services The FDA Forensics Lab, New Tools and Capabilities Symposium on Static Code Analysis and Complex Medical Devices University of Minnesota July 23, 2009 Static
TOOL EVALUATION REPORT: FORTIFY
TOOL EVALUATION REPORT: FORTIFY Derek D Souza, Yoon Phil Kim, Tim Kral, Tejas Ranade, Somesh Sasalatti ABOUT THE TOOL Background The tool that we have evaluated is the Fortify Source Code Analyzer (Fortify
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
Building Assurance Into Software Development Life- Cycle (SDLC)
Application Software Assurance Center of Excellence (ASACoE) Building Assurance Into Software Development Life- Cycle (SDLC) James Woody Woodworth Operations Chief, ASACoE & Sean Barnum, Principal Consultant
Business Process Testing Accelerator for PeopleSoft Applications
Business Process for PeopleSoft Applications 1 Fault Stream Analysis: Why is Critical Software Development Lifecycle Planning & Requirements Design Development User Acceptance Deploy to Production 10%
POLAR IT SERVICES. Business Intelligence Project Methodology
POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Development Testing for Agile Environments
Development Testing for Agile Environments November 2011 The Pressure Is On More than ever before, companies are being asked to do things faster. They need to get products to market faster to remain competitive
IBM Customer Experience Suite and Predictive Analytics
IBM Customer Experience Suite and Predictive Analytics Introduction to the IBM Customer Experience Suite In order to help customers meet their exceptional web experience goals in the most efficient and
Axivion Bauhaus Suite Technical Factsheet
Axivion Bauhaus Suite Technical Factsheet Inhalt 1 Integrated Solution for Stopping Software Erosion... 2 1.1 Build Process Integration... 2 1.2 Continuous Integration... 2 1.3 Web-Dashboard... 2 1.4 Clone
Using the Juliet Test Suite to compare Static Security Scanners
Using the Juliet Test Suite to compare Static Security Scanners Andreas Wagner 1, Johannes Sametinger 2 1 GAM Project, IT Solutions, Schwertberg, Austria 2 Dept. of Information Systems Software Engineering,
User Guide 1.7.2 Monday, April 27, 2015
User Guide 1.7.2 Monday, April 27, 2015 Table of Contents Table of Contents Getting Started Starting Code Dx Code Dx Quick Start Installing the.net Tools Session Management Logging In Changing your Password
Minimizing code defects to improve software quality and lower development costs.
Development solutions White paper October 2008 Minimizing code defects to improve software quality and lower development costs. IBM Rational Software Analyzer and IBM Rational PurifyPlus software Kari
1.2 Tools support for management of testing & tests
1.2 Tools support for management of testing & tests Tools: Requirements management tools store requirements check for consistency and undefined (missing) requirements allow prioritization enable individual
Enabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim Group@danielcornell
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together Dan Cornell CTO, Denim Group@danielcornell This presentation contains information about DHS-funded research: Topic Number:
Software Security Assessment Tools Review
Software Security Assessment Tools Review 2 March 2009 Jointly funded by: Assistant Secretary of the Navy Chief System Engineer 197 Isaac Hull Washington Navy Yard, DC and Naval Ordnance Safety & Security
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
Development Methodologies
Slide 3.1 Development Methodologies Prof. Dr. Josef M. Joller [email protected] Development Methodologies Prof. Dr. Josef M. Joller 1 Session 3 Slide 3.2 SOFTWARE LIFE-CYCLE MODELS Development Methodologies
Introduction to Static Analysis for Assurance
Introduction to Static Analysis for Assurance John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby Static Analysis for Assurance: 1 Overview What is static analysis?
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Effective Software Verification for Medical Devices
STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing
Static Analysis for Software Verification. Leon Moonen
Static Analysis for Software Verification Leon Moonen Today s topics Software inspection it s relation to testing benefits and drawbacks Static (program) analysis potential benefits limitations and their
Contents of This Paper
Contents of This Paper Overview Key Functional Areas of SharePoint Where Varonis Helps And How A Project Plan for SharePoint with Varonis Overview The purpose of this document is to explain the complementary
Practical Applications of Software Security Model Chris Nagel
Practical Applications of Software Security Model Chris Nagel Software Security Consultant Fortify Software Introductions About Me: Chris Nagel Software Security Consultant With Fortify for 2+ Years Before
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell This presentation contains information about DHS-funded research: Topic Number: H-SB013.1-002 - Hybrid
The Avocent Data Center Planner Real-World Insight for Smarter Data Center Management
Infrastructure Management & Monitoring for Business-Critical Continuity TM The Avocent Data Center Planner Real-World Insight for Smarter Data Center Management EXECUTION AVAILABILITY EFFICIENCY What s
META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING
META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING Ramesh Babu Palepu 1, Dr K V Sambasiva Rao 2 Dept of IT, Amrita Sai Institute of Science & Technology 1 MVR College of Engineering 2 [email protected]
A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security
A white paper analysis from Orasi Software Enterprise Security Attacking the problems of application and mobile security Introduction: Securing the Mobile Enterprise The mobile enterprise has created vast
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
Source Code Analysis for Security. Lu Zhao HP Fortify [email protected]
Source Code Analysis for Security through LLVM Lu Zhao HP Fortify [email protected] Static Code Analyzer for Security Static Code Analyzer for Security (HP Fortify SCA) C/C++ Java Vulnerabilities LLVM
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
http://www.wakaleo.com [email protected] Java Software Quality Tools and techniques
Wakaleo Consulting O p t i m i z i n g y o u r s o f t w a r e d e v e l o p m e n t http://www.wakaleo.com [email protected] Java Software Quality Tools and techniques 1 Introduction Agenda tools
Enabling Storage Services in Virtualized Cloud Environments
Cloud Environments Contents 1. Multi-Tenant Architecture... 4 2. Server Groups, Attributes, and Aggregation... 4 3. Capacity Planning as a Service... 6 4. Chargeback as a Service... 9 4.1. Storage Chargeback...
Harness Your SAP Data with User-Driven Dashboards
AUGUST 2010 Harness Your SAP Data with User-Driven Dashboards Sponsored by Contents Introduction 1 The Problems of Big BI 2 The Road to Big BI 2 Unacceptable Delays 3 Big BI and Sticky Information 4 Power
Common Errors in C/C++ Code and Static Analysis
Common Errors in C/C++ Code and Static Analysis Red Hat Ondřej Vašík and Kamil Dudka 2011-02-17 Abstract Overview of common programming mistakes in the C/C++ code, and comparison of a few available static
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
IBM Software A Journey to Adaptive MDM
IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive
PRODUCT INFORMATION. Know Your Business Better.
PRODUCT INFORMATION Know Your Business Better. Introduction Successful companies leverage business intelligence from the datasets they gather and store from their operations. Cornerstone s cloud-based
Customer Experience Audit
SOLUTION OVERVIEW Customer Experience Audit Understanding customer experience is vital Developed in partnership with Customer Experience Foundation The Customer Experience Audit provides a fast, independent
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
CRN# 23614 CPET 58100-02 Cloud Computing: Technologies & Enterprise IT Strategies
CRN# 23614 CPET 58100-02 Cloud Computing: Technologies & Enterprise IT Strategies A Specialty Course for Purdue University s M.S. in Technology: Information Technology/Advanced Computer Apps Track Spring
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
Five Fundamental Data Quality Practices
Five Fundamental Data Quality Practices W H I T E PA P E R : DATA QUALITY & DATA INTEGRATION David Loshin WHITE PAPER: DATA QUALITY & DATA INTEGRATION Five Fundamental Data Quality Practices 2 INTRODUCTION
Data Governance Implementation
Service Offering Data Governance Implementation Leveraging Data to Transform the Enterprise Benefits Use existing data to enable new business initiatives Reduce costs of maintaining data by increasing
CA NSM System Monitoring Option for OpenVMS r3.2
PRODUCT SHEET CA NSM System Monitoring Option for OpenVMS CA NSM System Monitoring Option for OpenVMS r3.2 CA NSM System Monitoring Option for OpenVMS helps you to proactively discover, monitor and display
IoT Potential Risks and Challenges
IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC
Senem Kumova Metin & Ilker Korkmaz 1
Senem Kumova Metin & Ilker Korkmaz 1 A loop is a block of code that can be performed repeatedly. A loop is controlled by a condition that is checked each time through the loop. C supports two categories
Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
Software Code Quality Checking (SCQC) No Clearance for This Secret: Software Assurance is MORE Than Security
Software Code Quality Checking (SCQC) No Clearance for This Secret: Software Assurance is MORE Than Security Nominee International Security Executives (ISE ) Information Security Project of the Year North
BUSINESS INTELLIGENCE COMPETENCY CENTER (BICC) HELPING ORGANIZATIONS EFFECTIVELY MANAGE ENTERPRISE DATA
BUSINESS INTELLIGENCE COMPETENCY CENTER (BICC) HELPING ORGANIZATIONS EFFECTIVELY MANAGE ENTERPRISE DATA Executive Summary Companies continue to remain challenged in deriving meaningful insights from the
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
PUB (MPI) 1-62 Reference: Gartner Scorecard
Information Requests Round 1 PUB (MPI) 1-62 Reference: Gartner Scorecard PUB/MPI 2-23 2013 GRA a) Please file an update to the response to Gartner s recommendations provided at PUB/MPI 2-23 from last year
Architectural Risk Analysis for Android Applications
Architectural Risk Analysis for Android Applications ComNets - AG RN-Kolloquium, 13.07.2015 Karsten Sohr TZI Universität Bremen 1 Outline Software security as an own discipline Security problems in Android
Streamline Processes and Gain Business Insights in the Cloud
SAP Brief SAP s for Small Businesses and Midsize Companies SAP Business One Cloud Objectives Streamline Processes and Gain Business Insights in the Cloud Drive profitable growth affordably and without
WebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
THE NEXT-GENERATION PRIVATE CAPITAL DATA PLATFORM
THE NEXT-GENERATION PRIVATE CAPITAL DATA PLATFORM ilevel 6.0 RELEASE OVERVIEW JULY 2013 This latest version extends ilevel s lead in the private capital software market by launching cash transaction monitoring
Software Qualimetry at Schneider Electric: a field background
Software Qualimetry at Schneider Electric: a field background By Hervé Dondey - Strategy & Innovation - Software Efficiency Team Schneider Electric and Christophe Peron SQuORING Technologies Abstract:
DATA GOVERNANCE AT UPMC. A Summary of UPMC s Data Governance Program Foundation, Roles, and Services
DATA GOVERNANCE AT UPMC A Summary of UPMC s Data Governance Program Foundation, Roles, and Services THE CHALLENGE Data Governance is not new work to UPMC. Employees throughout our organization manage data
IBM Software Group. IBM WebSphere Process Integration Technical Overview
IBM Software Group IBM WebSphere Process Integration Technical Overview Business Flexibility Depends on IT Flexibility Today s IT architectures, arcane as they may be, are the biggest roadblocks most companies
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Ten steps to better requirements management.
White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten
Measuring your most important Asset: Human Capital
Measuring your most important Asset: Human Capital Workforce Analytics Training We are all familiar with the conventional HR metrics that are frequently used in organizations today Turnover rate, time
Software infrastructure for Java development projects
Tools that can optimize your development process Software infrastructure for Java development projects Presentation plan Software Development Lifecycle Tools What tools exist? Where can tools help? Practical
Top 4 Common Mistakes Made by IT Managers in Financial Services
Top 4 Common Mistakes Made by IT Managers in Financial Services www.axcient.com A trend affecting companies everywhere but especially in financial services is the explosion of data. As stated in Accenture
Application Test Management and Quality Assurance
SAP Brief Extensions SAP Quality Center by HP Objectives Application Test Management and Quality Assurance Deliver new software with confidence Deliver new software with confidence Testing is critical
Data Governance Implementation
Service Offering Implementation Leveraging Data to Transform the Enterprise Benefits Use existing data to enable new business initiatives Reduce costs of maintaining data by increasing compliance, quality
Pivotal CRM for Small and Mid-Sized Business. Big Benefits. Small Price.
Pivotal CRM for Small and Mid-Sized Business Big Benefits. Small Price. Before Pivotal CRM, we were like an eight-cylinder car that was operating on only two cylinders. When we jumped into Pivotal CRM,
Ubuntu and Hadoop: the perfect match
WHITE PAPER Ubuntu and Hadoop: the perfect match February 2012 Copyright Canonical 2012 www.canonical.com Executive introduction In many fields of IT, there are always stand-out technologies. This is definitely
