Group 24. (Testability) Amin Ben Karroum Magnus Raaum Sibte-Haider Syed Mari Asplem Hansen. Architecture Document. Android Sosial application

Size: px
Start display at page:

Download "Group 24. (Testability) Amin Ben Karroum Magnus Raaum Sibte-Haider Syed Mari Asplem Hansen. Architecture Document. Android Sosial application"

Transcription

1 Group 24 (Testability) Amin Ben Karroum Magnus Raaum Sibte-Haider Syed Mari Asplem Hansen Architecture Document Android Sosial application Konnichiwa

2 TABLE OF CONTENTS 1. Introduction 3 2. Architectural Drivers 3 3. Stakeholders and Concerns The developers The evaluators The end-users 3 4. Viewpoints Logical view Process view Scenario 4 5. Architectural patterns 4 6. Architectural tactics Availability Modifiability Security Testability 5 7. Views Class diagram State diagram Scenario S S S Consistency among views 9 9. Issues References Resources Error! Bookmark not defined Papers Error! Bookmark not defined.

3 1. INTRODUCTION After creating the functional requirements, defining the COTS constraints and formulating the quality requirements, we ve started to model the first edition of our architecture. The following paper contains architectural drivers, patterns and tactics as well as the specification of stakeholders and their individual concerns. The architecture is modeled through different viewpoints and notation. This paper will contain documented changes when the development process (iterative) allows us to revisit our modeling of the architecture in latter stages of the project. 2. ARCHITECTURAL DRIVERS 1. The program work on android Receive messages when the user is online 3. Send messages when user is online 4. Limited time 5. Lack of knowledge (MVC specifically) 3. STAKEHOLDERS AND CONCERNS 3.1 THE DEVELOPERS Members: Amin Ben Karroum, Magnus Raaum, Mari Asplem Hansen og Sibte-Haider Syed. Concerns: The concern of the developers is that the system is satisfiable and has good testability for the staff, as well as we want a good grade for the final delivery. 3.2 THE EVALUATORS Members: ATAM group and teaching staff. Concerns: The concern of the staff is that the system we are making will be well documented and the system shall have consistency with the document. While the concern for the ATAM group is that the document is well written so that they can undergo the ATAM evaluation with us. 3.3 THE END-USERS Members: Hypothetical end-users consisting of members from the development group and the ATAM group. Concern: A functional application that they find useful. 4. VIEWPOINTS 4.1 LOGICAL VIEW

4 Objective: To describe the functionality of the system by using UML or some other type of modeling language. Notation: Object classes, E-R diagrams, data-driven approach. We ve used class diagrams in our project. Stakeholders: The end-users and the evaluators. 4.2 PROCESS VIEW Objective: To describe non-functional requirements constraining performance, concurrency, integrity and availability. Notation: State, Activity and sequence. In our first iteration, we ve only used state. Stakeholders: The developers. 4.3 SCENARIO Objective: To use the other views and create scenarios which works towards validating the architectural choices. Notation: Scenarios, Scenario diagrams. Stakeholders: The developers, end-user, testers and evaluators. 5. ARCHITECTURAL PATTERNS Because we want a high testability, we are going to implement model-view-controller. The MVC makes testing easier, this is because we isolate GUI, controller and model from each other, this makes testing easier. The model will be implemented as the classes DBInterface, Conversation and Friend. The view will be the GUI class and the controller is Main as well as EventHandler, Settings, XML and NetworkHandler. Look at the logical view for class diagram and description. 6. ARCHITECTURAL TACTICS

5 6.1 AVAILABILITY - State storing - Exception handling RATIONALE Exception handling needed to have a user-friendly application. 6.2 MODIFIABILITY - Well documented - Readable code - Commented code RATIONALE These tactics are needed for a well presented project. 6.3 SECURITY - Authorization - Encryption - Store password hashed and salted - Penetration testing RATIONALE Some information will be stored locally on the phone, so it s important to encrypt the sensitive information. We will also do the penetration testing. Method used (we will see which of the 24 attacks that is relevant) is defined by Mike Andrews and James A. Whittaker in their book How To Break Web Security. See scenario TESTABILITY - Incremental development - Use a testing framework - Debugging - State storing - Input/output monitoring - Unit testing - Integration testing RATIONALE Incremental development will allow us to re-evaluate the architectural choices we ve done in earlier iterations. By using a testing framework we mean using tools like NUnit. This will allow us to create unit tests while programming (validating the class input and output). See scenario 1.

6 Integration testing will be prioritized due to the fact that we have 4 developers. So integration can stir up some problems. 7. VIEWS 7.1 CLASS DIAGRAM XMPP INTRODUCTION XMPP is open-source technology used for real-time communication. Some of the functionality includes: Instant messaging, multi-party chat, voice and video calls. It uses XML as data notation. We will not test this 3 rd party software any more than simple black-box testing CLASS DESCRIPTION GUI: The user interface. The class will be updated by the controller. Eventhandler: Listens for events on the GUI. Main: The controller class from the MVC pattern. XML: Help class for network. Makes the communication with XMPP possible and easy (e.i parses XML). NetworkHandler: Handles the internet communication. Receives and sends information to XMPP. Conversation: A model for a conversation. It s used by the controller. Friend: A model for a friend. It can be used in a conversation. The class will be managed by the controller. DBInterface: Handles the communication with the DB. Closes, opens, reads and writes to the database. The database is the one included in the Android SDK DIAGRAM

7 7.2 STATE DIAGRAM 7.3 SCENARIO Scenario: 1 Stimilus: Performs unit test (class test). Response: Tester controls the unit behavoir, and the unit's output can be observed. Response Measure: Percent of predictable output. Scenario: 2 Stimilus: Performs integration test (multiple class test). Response: Tester controls the behavoir/state of the integrated component, and the components output can be observed. Response Measure: Percent of predictable output. Scenario: 3 Stimilus: Performs system test (multiple class test). Response: Tester controls the behavoir/state of the the whole system, and system output can be observed. Response Measure: Percent of predictable output. Scenario: 4 Stimilus: Receive messages when user is online. Response: Wait for messages. Response Measure: Percent of confirmed messages received. Scenario: 5 Stimilus: Send messages when user is online. Response: Send message to online user. Response Measure: Percent of confirmed messages sent. Scenario: 6 Stimilus: Contact list updates. Response: The GUI is updated when a new user is online. Response Measure: Time from logon to updated UI on the users screen.

8 Scenario: 7 Attribute: Security Stimilus: Penetration testing Response: Try to get sensitive information from the application Response Measure: Amount of information acquired. The scenarios mentioned below will be used as system tests performed by the end-user S1 1. The user starts the app and opens the account information window. 2. The user then adds all the necessary information needed about his gmail account. 3. When the information is now saved, he can now create a new contact. He opens the contactlist. 4. The user then presses the add new contact button. 5. After filling in the necessary information, the save contact button is pressed and he returns to the contactlist page. 6. After adding the contact, he can now open the conversation window by clicking his name. 7. An editbox appears and he can send his first message S2 1. The user enters the contactlist. 2. He presses a button called delete contact and gets the list of all contacts. 3. After clicking on the name, he gets a confirmation box before the contactlist removes the contact S3 1. The user presses a name on the contactlist.

9 2. This opens the conversation window. 3. The app connects to the users inbox. 4. The app then downloads all the previous s from and to this contact. 5. The app parses and displays the s in the conversation window. 6. An edittext box appears and the user can send an to the contact. 8. CONSISTENCY AMONG VIEWS In our first iteration, we ve decided to use the logical and process view (together with scenarios). When going from logical to process, we ve extracted the agent tasks from the class diagram to create a state diagram. The logical and process views are consistent in the sense that our tasks are represented by classes and processes in the individual views. The link between our scenarios and class diagram would be that our unit testing and implementation testing will happen according to the class diagram (unit testing on classes, implementation testing on the different components (model, view, controller). Our scenarios are also described as models using classes from our class diagram. The scenario notation was based architectural choices made in the former views. 9. ISSUES We had some trouble meeting this week, so we haven t had a good discussion about the more specific details of our architecture (especially the class diagram). We do expect changes in the notation of our views in the next iterations. 10. REFERENCES - Slides - Architectural Blueprints The 4+1 View Model of Software Architecture by Philippe Kruchten. - IEEE Standard CHANGES Changed our architecture drivers.

10 Removed pair programming Updated class diagram Updated architectural driver

Software Architecture. New wine in old bottles? (i.e., software architecture global design?, architect designer)

Software Architecture. New wine in old bottles? (i.e., software architecture global design?, architect designer) Software Architecture New wine in old bottles? (i.e., software architecture global design?, architect designer) Overview What is it, why bother? Architecture Design Viewpoints and view models Architectural

More information

Aerospace Software Engineering

Aerospace Software Engineering 16.35 Aerospace Software Engineering Software Architecture The 4+1 view Patterns Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Why Care About Software Architecture? An architecture provides a vehicle

More information

How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer

How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer How to Build an E-Commerce Application using J2EE Carol McDonald Code Camp Engineer Code Camp Agenda J2EE & Blueprints Application Architecture and J2EE Blueprints E-Commerce Application Design Enterprise

More information

You will need your District Google Mail username (e.g. [email protected]) and password to complete the activation process.

You will need your District Google Mail username (e.g. john.doe@palmbeachschools.org) and password to complete the activation process. As a courtesy to the Palm Beach County School District employees, the Division of IT is now providing District Google Mail access for personal mobile devices. Although we do not have the staffing to accept

More information

White Paper What Solutions Architects Should Know About The TOGAF ADM

White Paper What Solutions Architects Should Know About The TOGAF ADM White Paper What Solutions Architects Should Know About The TOGAF ADM WP0015 October 2011 The Open Group Architecture Framework 1 (TOGAF) is the most widely referenced architecture framework currently

More information

The Role of the Software Architect

The Role of the Software Architect IBM Software Group The Role of the Software Architect Peter Eeles [email protected] 2004 IBM Corporation Agenda Architecture Architect Architecting Requirements Analysis and design Implementation

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

Basic Testing Concepts and Terminology

Basic Testing Concepts and Terminology T-76.5613 Software Testing and Quality Assurance Lecture 2, 13.9.2006 Basic Testing Concepts and Terminology Juha Itkonen SoberIT Contents Realities and principles of Testing terminology and basic concepts

More information

Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011

Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011 Use Cases Massimo Felici Use Cases 1 Support requirements engineering activities and the requirement process Capture what a system is supposed to do, i.e., systems functional requirements Describe sequences

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

Roadmap. Software Engineering. Software Engineering. Project Life Cycle. Database. Project Lifecycle

Roadmap. Software Engineering. Software Engineering. Project Life Cycle. Database. Project Lifecycle Database Project Lifecycle Philippe Bonnet, 2006 2 Software Engineering The implementation of a database application is a significant engineering endeavor The project must complete On time On budget The

More information

Vragen. Architecture presentations in practice. Some terms (from IEEE standard)

Vragen. Architecture presentations in practice. Some terms (from IEEE standard) Vragen Architecture presentations in practice Waarom is software architectuur belangrijk? Waarom schiet de volgende definitie tekort? The architecture of a software system defines that system in terms

More information

Requirements Engineering Process

Requirements Engineering Process Software Engineering Requirements Engineering Process Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To describe the principal requirements engineering activities and d their

More information

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Rapid software development Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Objectives To explain how an iterative, incremental development process leads to faster delivery of

More information

Table of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24

Table of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24 Table of Contents CHAPTER 1 Web-Based Systems 1 The Web 1 Web Applications 2 Let s Introduce a Case Study 3 Are WebApps Really Computer Software? 4 Are the Attributes of WebApps Different from the Attributes

More information

Applying 4+1 View Architecture with UML 2. White Paper

Applying 4+1 View Architecture with UML 2. White Paper Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was

More information

Sofware Requirements Engineeing

Sofware Requirements Engineeing Sofware Requirements Engineeing Three main tasks in RE: 1 Elicit find out what the customers really want. Identify stakeholders, their goals and viewpoints. 2 Document write it down (). Understandable

More information

How To Use Titanium Studio

How To Use Titanium Studio Crossplatform Programming Lecture 3 Introduction to Titanium http://dsg.ce.unipr.it/ http://dsg.ce.unipr.it/?q=node/37 [email protected] 2015 Parma Outline Introduction Installation and Configuration

More information

UML-based Test Generation and Execution

UML-based Test Generation and Execution UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA [email protected] ABSTRACT

More information

Becoming a Business Analyst

Becoming a Business Analyst Becoming a Business Analyst What is Business Analysis? The practice of enabling change in an organizational context by defining needs and recommending solutions that delivers value to stakeholders When

More information

Design and Functional Specification

Design and Functional Specification 2010 Design and Functional Specification Corpus eready Solutions pvt. Ltd. 3/17/2010 1. Introduction 1.1 Purpose This document records functional specifications for Science Technology English Math (STEM)

More information

Data Migration through an Information Development Approach An Executive Overview

Data Migration through an Information Development Approach An Executive Overview Data Migration through an Approach An Executive Overview Introducing MIKE2.0 An Open Source Methodology for http://www.openmethodology.org Management and Technology Consultants Data Migration through an

More information

Skynax. Mobility Management System. System Manual

Skynax. Mobility Management System. System Manual Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of

More information

Zoom Instructions and Information

Zoom Instructions and Information Zoom Instructions and Information 1. Get Zoom set up Everyone call get a free Zoom account, go to http://zoom.us Put in your Andrews University email account and click Sign Up Free Click Sign Up A box

More information

Tips for writing good use cases.

Tips for writing good use cases. Transforming software and systems delivery White paper May 2008 Tips for writing good use cases. James Heumann, Requirements Evangelist, IBM Rational Software Page 2 Contents 2 Introduction 2 Understanding

More information

Blending Traditional and Agile Project Documentation

Blending Traditional and Agile Project Documentation Blending Traditional and Agile Project Documentation A project Portfolio Perspective Fergal McGovern, Founder, VisibleThread Audience: IT Directors, Program Managers, Project Managers, Business Analyst

More information

Web Application Architectures

Web Application Architectures Web Engineering Web Application Architectures Copyright 2013 Ioan Toma & Srdjan Komazec 1 Where we are? # Date Title 1 5 th March Web Engineering Introduction and Overview 2 12 th March Requirements Engineering

More information

Software Requirements Specification

Software Requirements Specification CSL740 Software Engineering Course, IIT Delhi Software Requirements Specification Submitted By Abhishek Srivastava (2011EEY7511) Anil Kumar (2009CS10180) Jagjeet Singh Dhaliwal (2008CS50212) Ierum Shanaya

More information

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption! Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:

More information

CREDENTIALS & CERTIFICATIONS 2015

CREDENTIALS & CERTIFICATIONS 2015 THE COMMUNITY FOR TECHNOLOGY LEADERS www.computer.org CREDENTIALS & CERTIFICATIONS 2015 KEYS TO PROFESSIONAL SUCCESS CONTENTS SWEBOK KNOWLEDGE AREA CERTIFICATES Software Requirements 3 Software Design

More information

Business Modeling with UML

Business Modeling with UML Business Modeling with UML Hans-Erik Eriksson and Magnus Penker, Open Training Hans-Erik In order to keep up and be competitive, all companies Ericsson is and enterprises must assess the quality of their

More information

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com

More information

Regression Testing of Web Services Using Parsing and Test case Prioritization Approach

Regression Testing of Web Services Using Parsing and Test case Prioritization Approach Regression Testing of Web Services Using Parsing and Test case Prioritization Approach Shaveta Sehgal Desh Bhagat University,Mandi Gobindgarh Abstract- Web services are the basic building blocks for every

More information

Interactive system specification. Interactive system definition. Issues to be taken into account for interactive systems

Interactive system specification. Interactive system definition. Issues to be taken into account for interactive systems Interactive system specification From Requirements Engineering Processes and Techniques by G. Kotonya and I. Sommerville 1998 Slide 1 Interactive system definition Interactive systems can be defined as

More information

App Distribution Guide

App Distribution Guide App Distribution Guide Contents About App Distribution 10 At a Glance 11 Enroll in an Apple Developer Program to Distribute Your App 11 Generate Certificates and Register Your Devices 11 Add Store Capabilities

More information

Chapter 4 Software Lifecycle and Performance Analysis

Chapter 4 Software Lifecycle and Performance Analysis Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and

More information

Welcome to XO WorkTime

Welcome to XO WorkTime Quick Start Guide End User s Quick Start Guide (for Smartphones) Welcome to XO WorkTime for IP Flex, IP Flex with VPN, Enterprise SIP, and SIP Services Go mobile with your office telephone numbers and

More information

SCHOOL OF SCIENCE AND ENGINEERING PECS MESSAGING A MOBILE APPLICATION (ANDROID) Capstone Design. November 2015

SCHOOL OF SCIENCE AND ENGINEERING PECS MESSAGING A MOBILE APPLICATION (ANDROID) Capstone Design. November 2015 SCHOOL OF SCIENCE AND ENGINEERING PECS MESSAGING A MOBILE APPLICATION (ANDROID) Capstone Design November 2015 Benchekroun Youssef Supervisor: Dr. Naeem Nisar Sheikh SCHOOL OF SCIENCE & ENGINEERING AL AKHAWAYN

More information

Requirements Engineering Processes. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1

Requirements Engineering Processes. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1 Requirements Engineering Processes Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1 Objectives To describe the principal requirements engineering activities and their relationships

More information

Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions

Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions MicroStrategy Mobile SDK 1 Agenda MicroStrategy Mobile SDK Overview Requirements & Setup Custom App Delegate Custom

More information

CPS122 Lecture: State and Activity Diagrams in UML

CPS122 Lecture: State and Activity Diagrams in UML CPS122 Lecture: State and Activity Diagrams in UML Objectives: last revised February 14, 2012 1. To show how to create and read State Diagrams 2. To introduce UML Activity Diagrams Materials: 1. Demonstration

More information

Agile Project Management with Scrum

Agile Project Management with Scrum Agile Project Management with Scrum Resource links http://www.agilealliance.org/ http://www.agilemanifesto.org/ http://www.scrum-master.com/ 1 Manifesto for Agile Software Development Individuals and interactions

More information

Software Requirements Specification of A University Class Scheduler

Software Requirements Specification of A University Class Scheduler Software Requirements Specification of A University Class Scheduler Deanna M. Needell Jeff A. Stuart Tamara C. Thiel Sergiu M. Dascalu Frederick C. Harris, Jr. Department of Computer Science University

More information

OneDrive in Office 365

OneDrive in Office 365 OneDrive in Office 365 OneDrive is a universal tool that allows you to upload and share documents with others. You can upload Word Documents, PDFs, Excel spreadsheets, images, and other Office files. Contents

More information

Benefits of Test Automation for Agile Testing

Benefits of Test Automation for Agile Testing Benefits of Test Automation for Agile Testing Manu GV 1, Namratha M 2, Pradeep 3 1 Technical Lead-Testing Calsoft Labs, Bangalore, India 2 Assistant Professor, BMSCE, Bangalore, India 3 Software Engineer,

More information

ITS Projects Systems Engineering Process Compliance Checklist

ITS Projects Systems Engineering Process Compliance Checklist ITS Projects Systems Engineering Process Compliance Checklist FHWA Final Rule (23 CFR 940) This checklist is to be completed by the MDOT or LPA Project Management Staff. Please refer to the accompanying

More information

An Approach to Software Architecture Description Using UML

An Approach to Software Architecture Description Using UML An Approach to Software Architecture Description Using UML Henrik Bærbak Christensen, Aino Corry, and Klaus Marius Hansen Department of Computer Science, University of Aarhus Aabogade 34, 8200 Århus N,

More information

Resco CRM Guide. Get to know Resco CRM

Resco CRM Guide. Get to know Resco CRM Resco CRM Guide Get to know Resco CRM Table of Contents Introducing Resco CRM... 3 1.1. What is Resco CRM...3 1.2. Capabilities of Resco CRM... 4 1.3. Who should use Resco CRM...5 1.4. What are the main

More information

Test Plan Online Book Store Phase-II. Vamsi Krishna Mummaneni

Test Plan Online Book Store Phase-II. Vamsi Krishna Mummaneni Test Plan Online Book Store Phase-II Submitted in partial fulfillment of the requirements of the degree of Master of Software Engineering Vamsi Krishna Mummaneni CIS 895 MSE Project Kansas State University

More information

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing

More information

CONCORDIA UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING SOEN390 SOFTWARE ENGINEERING TEAM DEVELOPMENT PROJECT ITERATION 5

CONCORDIA UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING SOEN390 SOFTWARE ENGINEERING TEAM DEVELOPMENT PROJECT ITERATION 5 CONCORDIA UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING SOEN390 SOFTWARE ENGINEERING TEAM DEVELOPMENT PROJECT ITERATION 5 SOFTWARE ARCHITECTURE DOCUMENT Dr. O. Ormandjieva Winter 2012

More information

MTP: Continuous User Authentication on Android Using Face Recognition

MTP: Continuous User Authentication on Android Using Face Recognition MTP: Continuous User Authentication on Android Using Face Recognition Testing of FaceApp Application This experiment is being conducted to find out the accuracy rate of face recognition algorithm used

More information

Integrated Instant Messaging System

Integrated Instant Messaging System Integrated Instant Messaging System Ajinkya Nalawade Dharmik Kamdar Pratik Angolkar Sharmila Gaikwad Assistant Professor, Department of Computer Engineering Abstract -- The Internet-based instant messaging

More information

GUI and Web Programming

GUI and Web Programming GUI and Web Programming CSE 403 (based on a lecture by James Fogarty) Event-based programming Sequential Programs Interacting with the user 1. Program takes control 2. Program does something 3. Program

More information

The Android Developers Guide to 3 rd -Party SDK Assessment and Security

The Android Developers Guide to 3 rd -Party SDK Assessment and Security SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro Advantages of 3 rd -Party SDKs Speed

More information

Michigan State University. Team Meijer. Tablet-Based Point-of-Sale System. Project Plan. Fall 2011

Michigan State University. Team Meijer. Tablet-Based Point-of-Sale System. Project Plan. Fall 2011 Michigan State University Team Meijer Tablet-Based Point-of-Sale System Project Plan Fall 2011 Meijer Contacts: Scott Pallas Murali Rajagopalan Team Members: Riti Adhi Peter Rifel Andrew Rockwell Mark

More information

Standard for Software Component Testing

Standard for Software Component Testing Standard for Software Component Testing Working Draft 3.4 Date: 27 April 2001 produced by the British Computer Society Specialist Interest Group in Software Testing (BCS SIGIST) Copyright Notice This document

More information

The 10 step communication plan

The 10 step communication plan The 10 step communication plan Follow these 10 suggested steps and you will be successful at launching the Specops password reset service. Step 1 Activity: Intranet texts explaining the service Suggested

More information

AIOLOS net access system

AIOLOS net access system AIOLOS net access system Global Network Monitoring Services AIOLOS Business Network Monitoring System ANMS Protected log in screen via SSL encrypted connection to the monitoring tool of hotel chains guest

More information

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015 Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis [email protected] Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android

More information

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997 1 Swirl Multiplayer Gaming Simplified CS4512 Systems Analysis and Design Assignment 1 2010 Marque Browne 0814547 Manuel Honegger - 0837997 Kieran O' Brien 0866946 2 BLANK MARKING SCHEME 3 TABLE OF CONTENTS

More information

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

MICROSOFT OFFICE 365 MIGRATION 2013/05/13 MICROSOFT OFFICE 365 MIGRATION 2013/05/13 WHAT IS OFFICE 365 Office 365 provides virtually anywhere access to familiar Office tools Word WEB App Excel WEB App PowerPoint WEB App Enterprise-grade email

More information

Table of Contents iphone Setup ipad Setup Android Phone Setup Windows Phone Setup

Table of Contents iphone Setup ipad Setup Android Phone Setup Windows Phone Setup IT Help Desk Location: Siebert 101 Phone: (208) 769-3280 Email: [email protected] Skype for Business (formerly Lync 2013) is collaboration software that can be used to communicate with NIC employees via

More information

STUDENT EMAIL: Guide for Students

STUDENT EMAIL: Guide for Students STUDENT EMAIL: Guide for Students This guide will introduce you to Gmail, which is the student email platform for ACT Public Schools. Gmail is part of our Google Apps for Education offering and will provide

More information

Load Testing Ajax Apps using head-less browser tools. NoVaTAIG April 13, 2011 Gopal Addada and Frank Hurley Cigital Inc.

Load Testing Ajax Apps using head-less browser tools. NoVaTAIG April 13, 2011 Gopal Addada and Frank Hurley Cigital Inc. Load Testing Ajax Apps using head-less browser tools NoVaTAIG April 13, 2011 Gopal Addada and Frank Hurley Cigital Inc. 1 Agenda About Cigital Background : AJAX and Load Test requirements Tools research

More information

Requirements engineering

Requirements engineering Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and

More information

How do I share a file with a friend or trusted associate?

How do I share a file with a friend or trusted associate? Sharing Information How do I share a file with a friend or trusted associate? Sharing a file in InformationSAFE is easy. The share utility in InformationSAFE allows you to securely share your information

More information

Functional Specifications Document

Functional Specifications Document Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007

More information

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved.

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved. Reference Guide Pogoplug Team Reference Guide Table of Contents Table of Contents 1. What s Included 2. Getting Started 3. Customizing the Pogoplug Interface a. Custom UI b. Custom Domain Name c. Custom

More information

Architecture Workshop

Architecture Workshop TIE-13100 / TIE-13106 Tietotekniikan projektityö / Project Work on Pervasive Systems Architecture Workshop Hadaytullah Marko Leppänen 21.10.2014 Workshop Plan Start Technologies Table (Collaboration) Workshop

More information

Going Faster: Testing The Web Application. By Adithya N. Analysis and Testing of Web Applications Filippo Ricca and Paolo Tonella

Going Faster: Testing The Web Application. By Adithya N. Analysis and Testing of Web Applications Filippo Ricca and Paolo Tonella Testing Web Applications Testing Web Applications By Adithya N. Going Faster: Testing The Web Application Edward Hieatt and Robert Mee (IEEE Software) Analysis and Testing of Web Applications Filippo Ricca

More information

HP Business Process Monitor

HP Business Process Monitor HP Business Process Monitor For the Windows operating system Software Version: 9.23 BPM Monitoring Solutions Best Practices Document Release Date: December 2013 Software Release Date: December 2013 Legal

More information

Object Oriented Programming. Risk Management

Object Oriented Programming. Risk Management Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

High-level Design. What is software architecture?

High-level Design. What is software architecture? High-level Design Software Architecture What is it? Examples of common architectures Parnas KWIK index example of information hiding Model view controller in high level layered design 1 What is software

More information

Appium mobile test automation

Appium mobile test automation Appium mobile test automation for Google Android and Apple ios Last updated: 4 January 2016 Pepgo Limited, 71-75 Shelton Street, Covent Garden, London, WC2H 9JQ, United Kingdom Contents About this document...

More information

Appendix A: Encrypting a File and / or Email Message

Appendix A: Encrypting a File and / or Email Message Appendix A: Encrypting a File and / or Email Message Encryption is defined as the conversion of something to code or symbols so that its contents cannot be understood if intercepted. USDB has approved

More information

Introduction to software architecture

Introduction to software architecture Learning Unit 1 Introduction to software architecture Contents Introduction............................................... 7 1.1 What is software architecture?................................. 7 1.1.1

More information

Accelerate Testing Cycles With Collaborative Performance Testing

Accelerate Testing Cycles With Collaborative Performance Testing Accelerate Testing Cycles With Collaborative Performance Testing Sachin Dhamdhere 2005 Empirix, Inc. Agenda Introduction Tools Don t Collaborate Typical vs. Collaborative Test Execution Some Collaborative

More information

Voice. Internet. Apps. Data Center. Wide Area Networks. Business is better in the cloud

Voice. Internet. Apps. Data Center. Wide Area Networks. Business is better in the cloud Voice Internet Apps Data Center Wide Area Networks Business is better in the cloud Google Apps helps businesses work smarter. Increase Productivity While Reducing Costs Google Apps offers simple, powerful

More information

Contacts: Email, find, and manage your contacts

Contacts: Email, find, and manage your contacts Does your Contact Manager look different than what s shown here? To fix this, switch to the new look! Contacts: Email, find, and manage your contacts With Google Apps, you can easily organize, find, contact,

More information

Maxis BizVoice For iphone User Guide. Version 1.0

Maxis BizVoice For iphone User Guide. Version 1.0 Maxis BizVoice For iphone User Guide Version 1.0 Maxis BizVoice for iphone iphone With Maxis BizVoice for iphone you can be reached via both your mobile number and fixed line extension! Calls to your fixed

More information

Agile Test Planning with the Agile Testing Quadrants

Agile Test Planning with the Agile Testing Quadrants Agile Test Planning with the Agile Testing Quadrants ADP Testing Workshop 2009 Lisa Crispin With Material from Janet Gregory and Brian Marick's Agile Testing Matrix 1 Introduction Me: Coding, testing Joined

More information

Communication Diagrams

Communication Diagrams Communication Diagrams Massimo Felici Realizing Use cases in the Design Model 1 Slide 1: Realizing Use cases in the Design Model Use-case driven design is a key theme in a variety of software processes

More information

SmartCart Design Description

SmartCart Design Description SmartCart Design Description Version 1.0 Revision History Date Version Description Author 2011-10-20 0.1 Initial draft SmartCart Team 2011-24-10 0.8 Revised draft SmartCartTeam 2011-27-10 0.9 Revised draft

More information

How To Write An Slcm Project Plan

How To Write An Slcm Project Plan SLCM 2003.1 Artifacts in a Nutshell ( as of 01/21/2005) Project Development Phases Pension Benefit Guaranty Corporation s (PBGC) System Life Cycle Methodology (SLCM) is comprised of five project development

More information

Yammer Training Guide Facilitator s Notes

Yammer Training Guide Facilitator s Notes Yammer Training Guide Facilitator s Notes Purpose This presentation provides an overview of Yammer to help new users get started. This is meant to be a slide library, so please pick and pull what is appropriate

More information

Classical Software Life Cycle Models

Classical Software Life Cycle Models Classical Software Life Cycle Models SWEN 301 Trimester 1, 2015 Lecturer: Dr Hui Ma Engineering and Computer Science Lecture slides make use of material provided on the textbook's companion website Motivation

More information

Web Content Management System, Migration and Maintenance Services for ECDC Web Portal

Web Content Management System, Migration and Maintenance Services for ECDC Web Portal Web Content Management System, Migration and Maintenance Services for ECDC Web Portal Current System Description Reference H March 2015 Page 1 Table of Contents 1. Introduction... 4 1.1. Purpose and Scope...

More information

Rapid Software Development

Rapid Software Development Software Engineering Rapid Software Development Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain how an iterative, incremental development process leads to faster delivery

More information

Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide

Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide Wave 4.5 Wave ViewPoint Mobile 2.0 User Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Applications

More information

Challenges in Android Application Development: A Case Study

Challenges in Android Application Development: A Case Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294

More information

How to use Dropbox. What is Dropbox. Please read the University of Melbourne Guidelines on Dropbox and University Information prior to use.

How to use Dropbox. What is Dropbox. Please read the University of Melbourne Guidelines on Dropbox and University Information prior to use. How to use Dropbox Please read the University of Melbourne Guidelines on Dropbox and University Information prior to use. What is Dropbox Dropbox lets you easily share and collaborate on documents with

More information

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Rapid software development 1 Objectives To explain how an iterative, incremental development process leads to faster delivery of more useful software To discuss the essence of agile development methods

More information