Does function point analysis change with new approaches to software development? January 2013

Size: px
Start display at page:

Download "Does function point analysis change with new approaches to software development? January 2013"

Transcription

1 Does function point analysis change with new approaches to software development? January 2013 Scope of this Report The information technology world is constantly changing with newer products, process models and technologies arriving at a seemingly rapid pace. Every evolutionary step of technology brings with it not only marvelous capabilities but a new set of challenges. One of the major challenges for the function point analysis (FPA) community is adapting the use of function points to be as effective in today s environments as it has been for the last 25 years. Is the function point method still viable as is in newer technologies? The answer is yes but the function point counter must know how to appropriately apply the FPA guidelines. This article will examine 3 types of architectures used in today s business sectors: Client server/cloud computing; Real-time, Process Control and Embedded Systems; and Service Oriented Architecture (SOA); and what to consider when counting in those scenarios: Process Review Let s begin by reviewing the FPA process. When performing a count, the FPA process the counter has to (1) gather the requirements; (2) determine the purpose of the count; (3) determine the scope of the count; (4) determine the application boundaries; and (5) perform the count. The requirements may be in any format (e.g. word, excel, use cases, business rules) or multiple types of documentation (e.g. (functional, system specifications), but are usually available and are not an issue in newer technologies. Likewise the purpose of the count is easily determinable regardless of technology or process (e.g. To determine productivity or perform estimation). What becomes a challenge for the counters is the scope and boundaries in newer technologies. Scope is the applications included in the count; boundaries are determined by the applications involved. When performing the count, there are five components of FPA. There are two (2) types of data functions (internal and external) and three (3) types of transaction functions (inputs, outputs and queries). An internal data functions (called Internal Logical File, or ILF) is data maintained by the application, while an external data function (External Interface File, or EIF) is data that an application uses but does not maintain. An external input (EI) is received from outside the system and generally maintains the internal data or triggers an action. A simple example of an EI is an added or updated transaction. An external output (EO) or external query (EQ) exits the system to be used or seen by a user, and the user can be a person or be another application. An EQ or EO could be an output file, report or query on a screen. In newer technologies, it can be difficult especially for an inexperienced counter to identify the five components because they may have a different look and feel than the more traditional functions David Consulting Group Page 1 of 6 v1

2 Client-Server/Cloud Computing Client-Server is a technical architecture where an application consists of processing on two or more processors: one processor is responsible for requesting information (client) and the other processor is responsible for providing the requested information (server). The client is generally a user interface (usually a workstation or application) whose purpose is to provide a platform from which to perform business operations. The server(s) is a workstation (or workstations) whose purpose is to provide a centralized repository for the handling of data processing, data storage, application version control, and security. Sometimes referred to as the front end and the back end, it is important to realize that from a logical, user perspective the two are not separate applications but they are two equal parts of one whole application. A modified version of the Client-Server architecture, according to NIST, cloud computing means using multiple server computers via a digital network as though they were one computer rather than a dedicated server cluster as with the traditional client-server. This means that if a particular website or application is experiencing high volumes of traffic, other server clusters within the cloud can be utilized for their processing power, if available. A Cloud is designed to send traffic to whichever of the available servers can provide the lowest latency, instead of sending it to the same group of dedicated servers. Generally a pay for play type of service, the cloud can not only be a service but for data storage. Cloud storage is a model of networked data storage where data is stored on multiple virtual servers, generally hosted by third parties in large data centers, rather than being hosted on dedicated servers. According to NIST, there are several types of cloud computing (see Table 1); however the common characteristic is that from a user perspective, it is no different than a client / server architecture. The use of multiple servers is a technical consideration and has no bearing on the counting process. Type of Cloud Infrastructure Public Cloud Community Cloud Hybrid Cloud Combined Cloud Private Cloud Characteristics Resources are dynamically provisioned by a 3 rd party provider on a fine-grained, self-service basis over the internet Several organizations have similar requirements and can share an infrastructure. Costs are spread across more users than a public cloud, though access is not exclusive. A combination of cloud hosting and client / server style dedicated hosting; works well for data centers that need to both maintain data and also make it available for replication Two clouds that have been joined together which allows an easier transition from a client / server structure to the public cloud structure A version of Hybrid cloud which is exclusive and privately available only to the corporation which maintains it Table 1. Types of Clouds 2012 David Consulting Group Page 2 of 6 v1

3 A Client-Server system is composed of the client(s) sending messages to and from the server. This allows all clients in the system to access and update data in a centralized location. The client recognizes the need to begin communication and contacts the server; the server verifies the identity of the client then responds with the necessary information as requested by the client; and the transaction is processed using typical input/validation techniques on both sides of the transaction. Since the client and server are in the same application from a boundary perspective, then the communication transaction between client and server is generally not countable by itself but rather is a step in a larger process which began with client data entry or receipt of an external file or request. It is especially important to look at each elementary process to determine if it leaves the business of the application in a consistent state. Message connections and instance connections contain processing in both the sending & receiving between client and server, but are rarely countable alone. Multiple transmission steps are typically within the same process and not unique under current IFPUG rules. IFPUG Function Points count complete elementary processes regardless of the number of steps it takes to complete that process. For the data functions, identify those external objects used by the application which generally quality as EIFs. When identifying internal objects and other types of data storage being maintained by the application, remember that the data could actually reside on both the client and the server but still be one logical data store. If your organization uses the optional General System Characteristics (GSC) to produce a Value Adjustment Factor for your counts, then there are some considerations for client-server applications. GSC#1 Data Communications is key to these types of applications. You need to determine what the protocols are for the application and generally score this GSC at a 4 - Application more than front-end but supports only one TP communications protocol, or 5 - Application more than front-end and supports more than one TP communications protocol. Other GSCs which may require additional attention for client server are # 2 Distributed Data Processing, # 3 Performance, # 4 Heavily Used Configuration, # 5 Transaction Rate, # 6 On-line Data Entry, and # 9 Complex Processing. When scoring client- server/cloud applications, ensure that the degree of influence reflects the entire application, not a few components. Real time, Process Control and Embedded Systems As technology advances, industry and manufacturing demands for more efficient applications also increases. The major category of applications used in industry, military and communications are real-time, process control and embedded systems. They are very similar applications and frequently are hybrids of one or more types. The principal operating characteristic of a real-time system is that the software must execute almost instantly, at the boundary of the processing limits of the Central Processing Unit. It is often an on-line, continuously available, critically timed system which generates event driven outputs almost simultaneously with their corresponding inputs. Inputs can occur at either fixed or variable intervals, selectively or continuously, and could require interruption to process input of a higher priority, often utilizing a buffer area or queue to determine processing priorities. In some cases, the queues are not considered temporary storage (like the buffer) and could be the only ILFs for this type of system David Consulting Group Page 3 of 6 v1

4 Process control is a statistics and engineering discipline that deals with architectures, mechanisms, and algorithms for maintaining the output of a specific process within a desired range. It is process and event driven, rather than data driven. Typically these processes and/or events are unique transactions (EIs or EOs). An example is a PLC (programmable logic controller) in which a set of digital and analog inputs is read; a set of logic is applied; and it generates analog and digital outputs. Process control systems are known for their abilities to alter the behavior of the system (e.g. open/close hot water valve base upon thermostat entry), which every counter should recognize as external inputs or external outputs. Larger, more complex systems use a Distributed Control System (DCS) or SCADA (supervisory control and data acquisition) system but typically are considered real-time systems and some are even embedded. An embedded system is an application that is designed to do one or more dedicated and/or specific functions often with real-time constraints. It is called embedded because it is a part of complete device often including hardware and mechanical parts. They support portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. Operating with microcontrollers or digital signal processors (DSP), most systems will have some capability for programmability and many allow peripherals to be attached (e.g. handheld computers). Examples of these types of applications are Radar Systems, GPS systems, Telephone Switches and other telecommunications systems, Signal Processors, Satellite Communications, Missile Guidance Systems, Manufacturing Systems, Weapons Systems, Plant Monitoring Systems, Navigation Systems, Safety Systems, Operating Systems, Flight Recorders, and Analyzers. One of the chief benefits of a real time, process control and embedded systems is that they enable a small staff to operate a complex process through central control facility. They often Include mathematical and/or logical complex algorithms (consider GSC#7), memory constraints, timing constraints, interruptions, execution speed requirements, communication constraints, and continuous availability. The constraints are usually documented and tested using performance tools, which qualifies for higher degrees of influence on many GSCs. In addition these constraints and algorithms could drive the uniqueness of the events and transactions. When considering data functions, data must be user recognizable and maintained to be considered an ILF. However, data is not always maintained in a data base but could be in memory storage or some other technical mechanism. File structures that are used by an elementary process to analyze transaction data for the duration of the transaction could be considered an ILF, providing it is maintained by the application. Examples include "state" data, variable processing/control data, location/tracking data, parameter values, maps/topography data, and system tables/directories, system set up data, usage data, industrial production data, provisioning data, switch data, alarms, and scans/faxes/voice data. EIFs could be values read from other platforms/devices but must be an ILF in another application. Examples of control EIs include detection devices, sensors, satellite messages, alarms which might contain processing instructions, setup or shut-down commands, or volume controls. Other inputs could arrive via data packets/files, voice, tones, wireless, teleprocessing signals, calls, tones or radar. EOs could include system status, outgoing messages, commands, alarms, processing instructions, routed calls, faxes, or outgoing s David Consulting Group Page 4 of 6 v1

5 In Table 2, various types of applications in this category are listed with their other characteristics and business use. Type Characteristic Business Sector Robotics Commonly used in auto Manufacturing, motion industry and packaging The production of discrete pieces of product DISCRETE (PROCESS CONTROL) BATCH (PROCESS CONTROL) CONTINUOUS (PROCESS CONTROL) HYBRID Production of raw materials combined in specific ways to produce an intermediate or end result Variables that are smooth and uninterrupted in time (Example: Control of water temperature) Applications having elements of discrete, batch, and continuous process control EMBEDDED Enables automation Enables mass production of continuous processes Adhesives and glues, food, beverages and medicines Production of fuels, chemicals and plastics Manufacturing Oil refining, paper manufacturing, chemicals, power plants and many other industries Table 2. Real Time Systems Characteristics and Business Sectors Service Oriented Architecture (SOA) The definition of SOA according to the Organization for the Advancement of Structured Information Standards (OASIS) is A paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains. It provides a uniform means to offer, discover, interact with and use capabilities to produce desired effects consistent with measurable preconditions and expectations. SOA is a modified version of the object oriented architecture which relies on using multiple services to produce the needed results through a larger API or interface. This allows users to reuse existing functionality to create new applications, based primarily from already existing services or applications. For SOA to be effective, the components chosen need to make use of two main concepts: Components need to be able to operate amongst different systems and programming languages through the use of a common communication protocol. Components also may share or create a large set of resources to be used. This allows new functionality to reference a common format for each element David Consulting Group Page 5 of 6 v1

6 Like many other current technologies, multiple layers of data or services may be employed (e.g. Enterprise services layer; domain service layer, application service layer). These layers are a technical consideration and are considered all in one application. The communication and transfer of data between these layers are typically steps in larger processes and not countable since they are internal to the application. The data used in all layers may be one or more ILFs depending on the logical view and if the data is user recognizable. Unlike object oriented, which uses embedded calls to other objects to pass information, SOA use communication protocols to parse and encapsulate metadata. This is done through a process called orchestration, allowing the developers to arrange applications in a nonhierarchical list containing all services, their characteristics and the ability to use these services. An interface is used as a sort of middleware handling the communication protocols between the services. Some of the protocols or mechanisms used may be Web service or APIs, connecting the separate applications into one service identifiable by the user. While each application will have its own boundaries, the web services and APIs should be counted with each application that uses them. When data is requested of an application and the application takes control and then responds via web service or API then that is generally counted as an EQ or EO. The requesting application, however, is using the data to complete a higher level transaction and it is the higher level transaction that is counted, rather than the API or web service. In some cases, to support productivity and/or support metrics, web services and APIs that are maintained by a team for use in other systems are countable as individual transactions. Conclusion Function points are versatile and adaptable to current technologies and processes. In fact, one of the more useful characteristic of function points is that they are technology independent. The key to counting in newer environments is understanding the terminology, where to consider the application boundaries, and recognizing the myriad types of functions and transactions associated with each environment. Sources The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Special Publication ; Peter Mell and Timothy Grance. September FUNCTION POINT ANALYSIS: Sizing The Software Deliverable; Applying Function Points to Emerging Technologies (Class materials), David Consulting Group, Emdedded Systems, Wikipedia: Bieberstein et al.; Service-Oriented Architecture (SOA) Compass: Business Value, Planning, and Enterprise Roadmap; IBM Press books, David Consulting Group Page 6 of 6 v1

SIZING ANDROID MOBILE APPLICATIONS

SIZING ANDROID MOBILE APPLICATIONS SIZING ANDROID MOBILE APPLICATIONS GURUPRASATH S, CFPS Email: [email protected] Reviewed By: Purnima Jagannathan Prashanth CM Copyright 2011 Accenture All Rights Reserved. Accenture, its

More information

Counting Infrastructure Software

Counting Infrastructure Software Counting Infrastructure Software Dr. Anthony L Rollo, SMS Ltd, Christine Green EDS Many function point counters and managers of software counts believe that only whole applications may be sized using the

More information

APPLYING FUNCTION POINTS WITHIN A SOA ENVIRONMENT

APPLYING FUNCTION POINTS WITHIN A SOA ENVIRONMENT APPLYING FUNCTION POINTS WITHIN A SOA ENVIRONMENT Jeff Lindskoog EDS, An HP Company 1401 E. Hoffer St Kokomo, IN 46902 USA 1 / 16 SEPTEMBER 2009 / EDS INTERNAL So, Ah, How Big is it? 2 / 16 SEPTEMBER 2009

More information

Web Services in SOA - Synchronous or Asynchronous?

Web Services in SOA - Synchronous or Asynchronous? Web Services in SOA - Synchronous or Asynchronous? Asynchronous Sender Stop Data Start Stop Data Start Receiver Synchronous Sender Data Receiver www.thbs.com/soa Introduction The decision whether to expose

More information

Fundamentals of Function Point Analysis

Fundamentals of Function Point Analysis Fundamentals of Function Point Analysis By [email protected] Abstract Systems continue to grow in size and complexity. They are becoming more and more difficult to understand. Improvement of coding

More information

ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS

ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS Abdu Idris Omer Taleb M.M., PhD Majmaah University, Kingdom of Saudia Arabia Abstract This article is aimed to name the levels of industrial automation, describes

More information

Application Architectures

Application Architectures Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch

More information

Real-time Video Monitoring Increases the Efficiency of SCADA Process Management

Real-time Video Monitoring Increases the Efficiency of SCADA Process Management Harry Hsiao, Moxa Product Manager ([email protected]) Traditional SCADA (Supervisory Control and Data Acquisition) systems have been an important part of automation control systems for many years, and

More information

Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server

Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The

More information

FUNCTION POINT ANALYSIS: Sizing The Software Deliverable. BEYOND FUNCTION POINTS So you ve got the count, Now what?

FUNCTION POINT ANALYSIS: Sizing The Software Deliverable. BEYOND FUNCTION POINTS So you ve got the count, Now what? FUNCTION POINT ANALYSIS: Sizing The Software Deliverable BEYOND FUNCTION POINTS So you ve got the count, Now what? 2008 Course Objectives The primary webinar objectives are to: Review function point methodology

More information

Federal Enterprise Architecture and Service-Oriented Architecture

Federal Enterprise Architecture and Service-Oriented Architecture Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

Multiagent Control of Traffic Signals Vision Document 2.0. Vision Document. For Multiagent Control of Traffic Signals. Version 2.0

Multiagent Control of Traffic Signals Vision Document 2.0. Vision Document. For Multiagent Control of Traffic Signals. Version 2.0 Vision Document For Multiagent Control of Traffic Signals Version 2.0 Submitted in partial fulfillment of the requirements of the degree of MSE Bryan Nehl CIS 895 MSE Project Kansas State University Page

More information

Computer Information Systems (CIS)

Computer Information Systems (CIS) Computer Information Systems (CIS) CIS 113 Spreadsheet Software Applications Prerequisite: CIS 146 or spreadsheet experience This course provides students with hands-on experience using spreadsheet software.

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Trademark Notice. General Disclaimer

Trademark Notice. General Disclaimer Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment

More information

Master of Science (Electrical Engineering) MS(EE)

Master of Science (Electrical Engineering) MS(EE) Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant

More information

Technology WHITE PAPER

Technology WHITE PAPER Technology WHITE PAPER What We Do Neota Logic builds software with which the knowledge of experts can be delivered in an operationally useful form as applications embedded in business systems or consulted

More information

HARDWARE ACCELERATION IN FINANCIAL MARKETS. A step change in speed

HARDWARE ACCELERATION IN FINANCIAL MARKETS. A step change in speed HARDWARE ACCELERATION IN FINANCIAL MARKETS A step change in speed NAME OF REPORT SECTION 3 HARDWARE ACCELERATION IN FINANCIAL MARKETS A step change in speed Faster is more profitable in the front office

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group [email protected]

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group [email protected] Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting

More information

Control of Boiler Operation using PLC SCADA

Control of Boiler Operation using PLC SCADA Control of Boiler Operation using PLC SCADA K. Gowri Shankar Abstract This paper outlines the various stages of operation involved in the conversion of a manually operated boiler towards a fully automated

More information

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,

More information

PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING

PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING 03-23-05 Christine Green, PMI PMBOK and Estimating EDS, Delivery

More information

Full Function Points for Embedded and Real-Time Software. UKSMA Fall Conference

Full Function Points for Embedded and Real-Time Software. UKSMA Fall Conference Full Function Points for Embedded and Real-Time Software UKSMA Fall Conference London (UK) Oct. 30-31, 1998 Software Engineering Management Research Laboratory Université du Québec à Montréal & Software

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Appendix G Technical Methodology and Approach Document

Appendix G Technical Methodology and Approach Document Appendix G Technical Methodology and Approach Document Technical Methodology and Approach Document CWS/CMS Technical Architecture Alternatives Analysis (TAAA) California Health and Human Services Agency

More information

SOA Myth or Reality??

SOA Myth or Reality?? IBM TRAINING S04 SOA Myth or Reality Jaqui Lynch IBM Corporation 2007 SOA Myth or Reality?? Jaqui Lynch Mainline Information Systems Email [email protected] Session S04 http://www.circle4.com/papers/s04soa.pdf

More information

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems , pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research

More information

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR Mobile operators are critical to ensuring the overall efficiency and uptime of the production line and play a critical

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]

More information

Reducing Configuration Complexity with Next Gen IoT Networks

Reducing Configuration Complexity with Next Gen IoT Networks Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration

More information

G DATA TechPaper #0275. G DATA Network Monitoring

G DATA TechPaper #0275. G DATA Network Monitoring G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration

More information

Architectures for Distributed Real-time Systems

Architectures for Distributed Real-time Systems SDP Workshop Nashville TN 13 Dec 2001 Architectures for Distributed Real-time Systems Michael W. Masters NSWCDD Building Systems for the Real World What is the Problem? Capability sustainment Affordable

More information

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments

More information

Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College

Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Agenda Middleware the hidden part of IT CICS (Customer Information Control System) track record as a middleware

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

CHAPTER 15: Operating Systems: An Overview

CHAPTER 15: Operating Systems: An Overview CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint

More information

Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide

Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide 297-2183-909 Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide Product release 5.0 Standard 2.0 February 2007 Nortel Symposium Call Center Server Symposium,

More information

4) CRM provides support for front-end customer facing functionality. Answer: TRUE Diff: 1 Page Ref: 334

4) CRM provides support for front-end customer facing functionality. Answer: TRUE Diff: 1 Page Ref: 334 Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 12 Customer Relationship Management 1) CRM implementations should be technology driven. Diff: 2 Page Ref: 333 2) CRM stands for "Customer

More information

Why SNAP? What is SNAP (in a nutshell)? Does SNAP work? How to use SNAP when we already use Function Points? How can I learn more? What s next?

Why SNAP? What is SNAP (in a nutshell)? Does SNAP work? How to use SNAP when we already use Function Points? How can I learn more? What s next? 1 Agenda Why SNAP? What is SNAP (in a nutshell)? Does SNAP work? How to use SNAP when we already use Function Points? How can I learn more? What s next? 2 Agenda Why SNAP? What is SNAP (in a nutshell)?

More information

Technical Training Module ( 30 Days)

Technical Training Module ( 30 Days) Annexure - I Technical Training Module ( 30 Days) Section 1 : Programmable Logic Controller (PLC) 1. Introduction to Programmable Logic Controller - A Brief History, Need and advantages of PLC, PLC configuration,

More information

Introduction to Function Points www.davidconsultinggroup.com

Introduction to Function Points www.davidconsultinggroup.com By Sheila P. Dennis and David Garmus, David Consulting Group IBM first introduced the Function Point (FP) metric in 1978 [1]. Function Point counting has evolved into the most flexible standard of software

More information

Testing Automated Manufacturing Processes

Testing Automated Manufacturing Processes Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 193 ISSN 2278-7763 THROUGH MOBILE

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 193 ISSN 2278-7763 THROUGH MOBILE International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 193 ANTI ELECTRICAL THEFTING AND TROUBLE SHOOTING THROUGH MOBILE 1. ABSTRACT The proposed project work aims on

More information

SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions

SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...

More information

Digital Advisory Services Professional Service Description Network Assessment

Digital Advisory Services Professional Service Description Network Assessment Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL

PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL PIPELINE SYSTEM AUTOMATION AND CONTROL C. Bruce Warren and Mike S. Yoon BCT Group and Yoon Consulting Keywords: SCADA, RTU, Communications, Data Management, HMI, Alarm, Security, Measurement, Flow Meters,

More information

The Integration Between EAI and SOA - Part I

The Integration Between EAI and SOA - Part I by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the

More information

OWB Users, Enter The New ODI World

OWB Users, Enter The New ODI World OWB Users, Enter The New ODI World Kulvinder Hari Oracle Introduction Oracle Data Integrator (ODI) is a best-of-breed data integration platform focused on fast bulk data movement and handling complex data

More information

Why a single source for assets should be. the backbone of all your digital activities

Why a single source for assets should be. the backbone of all your digital activities Why a single source for assets should be the backbone of all your digital activities Navigating in the digital landscape The old era of traditional marketing has long passed. Today, customers expect to

More information

A Mock RFI for a SD-WAN

A Mock RFI for a SD-WAN A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The

More information

Enterprise Application Designs In Relation to ERP and SOA

Enterprise Application Designs In Relation to ERP and SOA Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

Enterprise Service Bus Defined. Wikipedia says (07/19/06)

Enterprise Service Bus Defined. Wikipedia says (07/19/06) Enterprise Service Bus Defined CIS Department Professor Duane Truex III Wikipedia says (07/19/06) In computing, an enterprise service bus refers to a software architecture construct, implemented by technologies

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill

Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill Objectives: Analyze the operation of sequential logic circuits. Understand the operation of digital counters.

More information

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Work Process Management

Work Process Management GE Intelligent Platforms Work Process Management Achieving Operational Excellence through Consistent and Repeatable Plant Operations With Work Process Management, organizations can drive the right actions

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA [email protected] Len Bass Software Engineering Institute Carnegie

More information

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond

More information

CHAPTER 18 THE PUBLIC TELEPHONE NETWORK # DEFINITIONS TERMS

CHAPTER 18 THE PUBLIC TELEPHONE NETWORK # DEFINITIONS TERMS CHAPTER 18 THE PUBLIC TELEPHONE NETWORK # DEFINITIONS TERMS 1) It uses the largest computer network in the world to interconnect millions of subscribers in such a way that the myriad of companies function

More information

SCADA Questions and Answers

SCADA Questions and Answers SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...

More information

How to bridge the gap between business, IT and networks

How to bridge the gap between business, IT and networks ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can

More information

AXIS 262+ Network Video Recorder

AXIS 262+ Network Video Recorder 31433/EN/R4/0803 Complete Network Video Recording Solution Complete Network Video Recording Solution Picture this: A simple and reliable, plug-and-play video surveillance system for hotels, shops, banks,

More information

Contents. Chapter 1. Introduction

Contents. Chapter 1. Introduction Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Developing Fleet and Asset Tracking Solutions with Web Maps

Developing Fleet and Asset Tracking Solutions with Web Maps Developing Fleet and Asset Tracking Solutions with Web Maps Introduction Many organizations have mobile field staff that perform business processes away from the office which include sales, service, maintenance,

More information

A Real Time Tracking and Alerting System Using LabVIEW

A Real Time Tracking and Alerting System Using LabVIEW A Real Time Tracking and Alerting System Using LabVIEW J Jyothirmai Joshi Assistant Professor, Dept. of EIE, VNR Vignan Jyothi Institute of Engineering and Technology, Hyderabad, Telangana, India ABSTRACT:

More information

PROCESS AUTOMATION FOR DISTRIBUTION OPERATIONS MANAGEMENT. Stipe Fustar. KEMA Consulting, USA

PROCESS AUTOMATION FOR DISTRIBUTION OPERATIONS MANAGEMENT. Stipe Fustar. KEMA Consulting, USA PROCESS AUTOMATION FOR DISTRIBUTION OPERATIONS MANAGEMENT Stipe Fustar KEMA Consulting, USA INTRODUCTION To prosper in a competitive market, distribution utilities are forced to better integrate their

More information

White Paper. Cloud Vademecum

White Paper. Cloud Vademecum White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route

More information

Developing SOA solutions using IBM SOA Foundation

Developing SOA solutions using IBM SOA Foundation Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this

More information

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth. 5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt

More information

CLOUD COMPUTING AND PUBLIC SAFETY SERVICES

CLOUD COMPUTING AND PUBLIC SAFETY SERVICES CLOUD COMPUTING AND PUBLIC SAFETY SERVICES This paper examines the emergence of Service Oriented Architectures, their implementation in Cloud computing services and the likely impact on Public Safety systems

More information

C2030-280.Examcollection.Premium.Exam.34q

C2030-280.Examcollection.Premium.Exam.34q C2030-280.Examcollection.Premium.Exam.34q Number: C2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: C2030-280 Exam Name: IBM Cloud Computing Infrastructure

More information

Implementing a Workflow Solution Leveraging SCADA and GIS/CMMS at the Waterford Township DPW. Charter Township of Waterford Oakland County, Michigan

Implementing a Workflow Solution Leveraging SCADA and GIS/CMMS at the Waterford Township DPW. Charter Township of Waterford Oakland County, Michigan Implementing a Workflow Solution Leveraging SCADA and GIS/CMMS at the Waterford Township DPW Charter Township of Waterford Oakland County, Michigan DPW Assets 360 Miles of Water Main and Appurtenances

More information

Lotus Domino 8 Monitoring and Maintenance

Lotus Domino 8 Monitoring and Maintenance Lotus Domino 8 Monitoring and Maintenance Course Title Course Code Lotus Domino 8 Monitoring and Maintenance DSMM8 Duration 02 days Course Fee Call to Request Instructor Certified Lotus Instructor or Certified

More information

Crystal Gears. The Next Generation Personal Desktop Call Recording Solution. Why Crystal Gears

Crystal Gears. The Next Generation Personal Desktop Call Recording Solution. Why Crystal Gears The Next Generation Personal Desktop Call Recording Solution Crystal Gears Crystal Gears (CG as short) is a new next generation desktop digital recording system like no other before. By widely compatible

More information

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new

More information

NON-INTRUSIVE TRANSACTION MINING FRAMEWORK TO CAPTURE CHARACTERISTICS DURING ENTERPRISE MODERNIZATION ON CLOUD

NON-INTRUSIVE TRANSACTION MINING FRAMEWORK TO CAPTURE CHARACTERISTICS DURING ENTERPRISE MODERNIZATION ON CLOUD NON-INTRUSIVE TRANSACTION MINING FRAMEWORK TO CAPTURE CHARACTERISTICS DURING ENTERPRISE MODERNIZATION ON CLOUD Ravikumar Ramadoss 1 and Dr.N.M.Elango 2 1 Technology Architect, Infosys, Bangalore, Karnataka,

More information

Managing Central Monitoring in Distributed Systems

Managing Central Monitoring in Distributed Systems Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle

More information

Client/Server Computing Distributed Processing, Client/Server, and Clusters

Client/Server Computing Distributed Processing, Client/Server, and Clusters Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Rackspace Cloud Databases and Container-based Virtualization

Rackspace Cloud Databases and Container-based Virtualization Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many

More information

Computer Integrated Manufacturing CIM A T I L I M U N I V E R S I T Y

Computer Integrated Manufacturing CIM A T I L I M U N I V E R S I T Y MFGE 404 Computer Integrated Manufacturing CIM A T I L I M U N I V E R S I T Y Manufacturing Engineering Department Lecture 1 - Introduction Dr. Saleh AMAITIK Fall 2005/2006 Production Systems Production

More information

Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA. Hong-lv Wang, Yong Cen

Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA. Hong-lv Wang, Yong Cen Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA Hong-lv Wang, Yong Cen Information Center, China Tobacco Zhejiang Industrial Co., Ltd Hangzhou, China,

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

Service Modelling & Service Architecture:

Service Modelling & Service Architecture: Service Modelling & Service Architecture: From Service Renewal and Service Flows to Service Architecture Presenter: Professor Paul Buhler Head of the Global University Alliance SOA Research & Development

More information

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data : High-throughput and Scalable Storage Technology for Streaming Data Munenori Maeda Toshihiro Ozawa Real-time analytical processing (RTAP) of vast amounts of time-series data from sensors, server logs,

More information