Does function point analysis change with new approaches to software development? January 2013
|
|
|
- Isabella Flynn
- 9 years ago
- Views:
Transcription
1 Does function point analysis change with new approaches to software development? January 2013 Scope of this Report The information technology world is constantly changing with newer products, process models and technologies arriving at a seemingly rapid pace. Every evolutionary step of technology brings with it not only marvelous capabilities but a new set of challenges. One of the major challenges for the function point analysis (FPA) community is adapting the use of function points to be as effective in today s environments as it has been for the last 25 years. Is the function point method still viable as is in newer technologies? The answer is yes but the function point counter must know how to appropriately apply the FPA guidelines. This article will examine 3 types of architectures used in today s business sectors: Client server/cloud computing; Real-time, Process Control and Embedded Systems; and Service Oriented Architecture (SOA); and what to consider when counting in those scenarios: Process Review Let s begin by reviewing the FPA process. When performing a count, the FPA process the counter has to (1) gather the requirements; (2) determine the purpose of the count; (3) determine the scope of the count; (4) determine the application boundaries; and (5) perform the count. The requirements may be in any format (e.g. word, excel, use cases, business rules) or multiple types of documentation (e.g. (functional, system specifications), but are usually available and are not an issue in newer technologies. Likewise the purpose of the count is easily determinable regardless of technology or process (e.g. To determine productivity or perform estimation). What becomes a challenge for the counters is the scope and boundaries in newer technologies. Scope is the applications included in the count; boundaries are determined by the applications involved. When performing the count, there are five components of FPA. There are two (2) types of data functions (internal and external) and three (3) types of transaction functions (inputs, outputs and queries). An internal data functions (called Internal Logical File, or ILF) is data maintained by the application, while an external data function (External Interface File, or EIF) is data that an application uses but does not maintain. An external input (EI) is received from outside the system and generally maintains the internal data or triggers an action. A simple example of an EI is an added or updated transaction. An external output (EO) or external query (EQ) exits the system to be used or seen by a user, and the user can be a person or be another application. An EQ or EO could be an output file, report or query on a screen. In newer technologies, it can be difficult especially for an inexperienced counter to identify the five components because they may have a different look and feel than the more traditional functions David Consulting Group Page 1 of 6 v1
2 Client-Server/Cloud Computing Client-Server is a technical architecture where an application consists of processing on two or more processors: one processor is responsible for requesting information (client) and the other processor is responsible for providing the requested information (server). The client is generally a user interface (usually a workstation or application) whose purpose is to provide a platform from which to perform business operations. The server(s) is a workstation (or workstations) whose purpose is to provide a centralized repository for the handling of data processing, data storage, application version control, and security. Sometimes referred to as the front end and the back end, it is important to realize that from a logical, user perspective the two are not separate applications but they are two equal parts of one whole application. A modified version of the Client-Server architecture, according to NIST, cloud computing means using multiple server computers via a digital network as though they were one computer rather than a dedicated server cluster as with the traditional client-server. This means that if a particular website or application is experiencing high volumes of traffic, other server clusters within the cloud can be utilized for their processing power, if available. A Cloud is designed to send traffic to whichever of the available servers can provide the lowest latency, instead of sending it to the same group of dedicated servers. Generally a pay for play type of service, the cloud can not only be a service but for data storage. Cloud storage is a model of networked data storage where data is stored on multiple virtual servers, generally hosted by third parties in large data centers, rather than being hosted on dedicated servers. According to NIST, there are several types of cloud computing (see Table 1); however the common characteristic is that from a user perspective, it is no different than a client / server architecture. The use of multiple servers is a technical consideration and has no bearing on the counting process. Type of Cloud Infrastructure Public Cloud Community Cloud Hybrid Cloud Combined Cloud Private Cloud Characteristics Resources are dynamically provisioned by a 3 rd party provider on a fine-grained, self-service basis over the internet Several organizations have similar requirements and can share an infrastructure. Costs are spread across more users than a public cloud, though access is not exclusive. A combination of cloud hosting and client / server style dedicated hosting; works well for data centers that need to both maintain data and also make it available for replication Two clouds that have been joined together which allows an easier transition from a client / server structure to the public cloud structure A version of Hybrid cloud which is exclusive and privately available only to the corporation which maintains it Table 1. Types of Clouds 2012 David Consulting Group Page 2 of 6 v1
3 A Client-Server system is composed of the client(s) sending messages to and from the server. This allows all clients in the system to access and update data in a centralized location. The client recognizes the need to begin communication and contacts the server; the server verifies the identity of the client then responds with the necessary information as requested by the client; and the transaction is processed using typical input/validation techniques on both sides of the transaction. Since the client and server are in the same application from a boundary perspective, then the communication transaction between client and server is generally not countable by itself but rather is a step in a larger process which began with client data entry or receipt of an external file or request. It is especially important to look at each elementary process to determine if it leaves the business of the application in a consistent state. Message connections and instance connections contain processing in both the sending & receiving between client and server, but are rarely countable alone. Multiple transmission steps are typically within the same process and not unique under current IFPUG rules. IFPUG Function Points count complete elementary processes regardless of the number of steps it takes to complete that process. For the data functions, identify those external objects used by the application which generally quality as EIFs. When identifying internal objects and other types of data storage being maintained by the application, remember that the data could actually reside on both the client and the server but still be one logical data store. If your organization uses the optional General System Characteristics (GSC) to produce a Value Adjustment Factor for your counts, then there are some considerations for client-server applications. GSC#1 Data Communications is key to these types of applications. You need to determine what the protocols are for the application and generally score this GSC at a 4 - Application more than front-end but supports only one TP communications protocol, or 5 - Application more than front-end and supports more than one TP communications protocol. Other GSCs which may require additional attention for client server are # 2 Distributed Data Processing, # 3 Performance, # 4 Heavily Used Configuration, # 5 Transaction Rate, # 6 On-line Data Entry, and # 9 Complex Processing. When scoring client- server/cloud applications, ensure that the degree of influence reflects the entire application, not a few components. Real time, Process Control and Embedded Systems As technology advances, industry and manufacturing demands for more efficient applications also increases. The major category of applications used in industry, military and communications are real-time, process control and embedded systems. They are very similar applications and frequently are hybrids of one or more types. The principal operating characteristic of a real-time system is that the software must execute almost instantly, at the boundary of the processing limits of the Central Processing Unit. It is often an on-line, continuously available, critically timed system which generates event driven outputs almost simultaneously with their corresponding inputs. Inputs can occur at either fixed or variable intervals, selectively or continuously, and could require interruption to process input of a higher priority, often utilizing a buffer area or queue to determine processing priorities. In some cases, the queues are not considered temporary storage (like the buffer) and could be the only ILFs for this type of system David Consulting Group Page 3 of 6 v1
4 Process control is a statistics and engineering discipline that deals with architectures, mechanisms, and algorithms for maintaining the output of a specific process within a desired range. It is process and event driven, rather than data driven. Typically these processes and/or events are unique transactions (EIs or EOs). An example is a PLC (programmable logic controller) in which a set of digital and analog inputs is read; a set of logic is applied; and it generates analog and digital outputs. Process control systems are known for their abilities to alter the behavior of the system (e.g. open/close hot water valve base upon thermostat entry), which every counter should recognize as external inputs or external outputs. Larger, more complex systems use a Distributed Control System (DCS) or SCADA (supervisory control and data acquisition) system but typically are considered real-time systems and some are even embedded. An embedded system is an application that is designed to do one or more dedicated and/or specific functions often with real-time constraints. It is called embedded because it is a part of complete device often including hardware and mechanical parts. They support portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. Operating with microcontrollers or digital signal processors (DSP), most systems will have some capability for programmability and many allow peripherals to be attached (e.g. handheld computers). Examples of these types of applications are Radar Systems, GPS systems, Telephone Switches and other telecommunications systems, Signal Processors, Satellite Communications, Missile Guidance Systems, Manufacturing Systems, Weapons Systems, Plant Monitoring Systems, Navigation Systems, Safety Systems, Operating Systems, Flight Recorders, and Analyzers. One of the chief benefits of a real time, process control and embedded systems is that they enable a small staff to operate a complex process through central control facility. They often Include mathematical and/or logical complex algorithms (consider GSC#7), memory constraints, timing constraints, interruptions, execution speed requirements, communication constraints, and continuous availability. The constraints are usually documented and tested using performance tools, which qualifies for higher degrees of influence on many GSCs. In addition these constraints and algorithms could drive the uniqueness of the events and transactions. When considering data functions, data must be user recognizable and maintained to be considered an ILF. However, data is not always maintained in a data base but could be in memory storage or some other technical mechanism. File structures that are used by an elementary process to analyze transaction data for the duration of the transaction could be considered an ILF, providing it is maintained by the application. Examples include "state" data, variable processing/control data, location/tracking data, parameter values, maps/topography data, and system tables/directories, system set up data, usage data, industrial production data, provisioning data, switch data, alarms, and scans/faxes/voice data. EIFs could be values read from other platforms/devices but must be an ILF in another application. Examples of control EIs include detection devices, sensors, satellite messages, alarms which might contain processing instructions, setup or shut-down commands, or volume controls. Other inputs could arrive via data packets/files, voice, tones, wireless, teleprocessing signals, calls, tones or radar. EOs could include system status, outgoing messages, commands, alarms, processing instructions, routed calls, faxes, or outgoing s David Consulting Group Page 4 of 6 v1
5 In Table 2, various types of applications in this category are listed with their other characteristics and business use. Type Characteristic Business Sector Robotics Commonly used in auto Manufacturing, motion industry and packaging The production of discrete pieces of product DISCRETE (PROCESS CONTROL) BATCH (PROCESS CONTROL) CONTINUOUS (PROCESS CONTROL) HYBRID Production of raw materials combined in specific ways to produce an intermediate or end result Variables that are smooth and uninterrupted in time (Example: Control of water temperature) Applications having elements of discrete, batch, and continuous process control EMBEDDED Enables automation Enables mass production of continuous processes Adhesives and glues, food, beverages and medicines Production of fuels, chemicals and plastics Manufacturing Oil refining, paper manufacturing, chemicals, power plants and many other industries Table 2. Real Time Systems Characteristics and Business Sectors Service Oriented Architecture (SOA) The definition of SOA according to the Organization for the Advancement of Structured Information Standards (OASIS) is A paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains. It provides a uniform means to offer, discover, interact with and use capabilities to produce desired effects consistent with measurable preconditions and expectations. SOA is a modified version of the object oriented architecture which relies on using multiple services to produce the needed results through a larger API or interface. This allows users to reuse existing functionality to create new applications, based primarily from already existing services or applications. For SOA to be effective, the components chosen need to make use of two main concepts: Components need to be able to operate amongst different systems and programming languages through the use of a common communication protocol. Components also may share or create a large set of resources to be used. This allows new functionality to reference a common format for each element David Consulting Group Page 5 of 6 v1
6 Like many other current technologies, multiple layers of data or services may be employed (e.g. Enterprise services layer; domain service layer, application service layer). These layers are a technical consideration and are considered all in one application. The communication and transfer of data between these layers are typically steps in larger processes and not countable since they are internal to the application. The data used in all layers may be one or more ILFs depending on the logical view and if the data is user recognizable. Unlike object oriented, which uses embedded calls to other objects to pass information, SOA use communication protocols to parse and encapsulate metadata. This is done through a process called orchestration, allowing the developers to arrange applications in a nonhierarchical list containing all services, their characteristics and the ability to use these services. An interface is used as a sort of middleware handling the communication protocols between the services. Some of the protocols or mechanisms used may be Web service or APIs, connecting the separate applications into one service identifiable by the user. While each application will have its own boundaries, the web services and APIs should be counted with each application that uses them. When data is requested of an application and the application takes control and then responds via web service or API then that is generally counted as an EQ or EO. The requesting application, however, is using the data to complete a higher level transaction and it is the higher level transaction that is counted, rather than the API or web service. In some cases, to support productivity and/or support metrics, web services and APIs that are maintained by a team for use in other systems are countable as individual transactions. Conclusion Function points are versatile and adaptable to current technologies and processes. In fact, one of the more useful characteristic of function points is that they are technology independent. The key to counting in newer environments is understanding the terminology, where to consider the application boundaries, and recognizing the myriad types of functions and transactions associated with each environment. Sources The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Special Publication ; Peter Mell and Timothy Grance. September FUNCTION POINT ANALYSIS: Sizing The Software Deliverable; Applying Function Points to Emerging Technologies (Class materials), David Consulting Group, Emdedded Systems, Wikipedia: Bieberstein et al.; Service-Oriented Architecture (SOA) Compass: Business Value, Planning, and Enterprise Roadmap; IBM Press books, David Consulting Group Page 6 of 6 v1
SIZING ANDROID MOBILE APPLICATIONS
SIZING ANDROID MOBILE APPLICATIONS GURUPRASATH S, CFPS Email: [email protected] Reviewed By: Purnima Jagannathan Prashanth CM Copyright 2011 Accenture All Rights Reserved. Accenture, its
Counting Infrastructure Software
Counting Infrastructure Software Dr. Anthony L Rollo, SMS Ltd, Christine Green EDS Many function point counters and managers of software counts believe that only whole applications may be sized using the
APPLYING FUNCTION POINTS WITHIN A SOA ENVIRONMENT
APPLYING FUNCTION POINTS WITHIN A SOA ENVIRONMENT Jeff Lindskoog EDS, An HP Company 1401 E. Hoffer St Kokomo, IN 46902 USA 1 / 16 SEPTEMBER 2009 / EDS INTERNAL So, Ah, How Big is it? 2 / 16 SEPTEMBER 2009
Web Services in SOA - Synchronous or Asynchronous?
Web Services in SOA - Synchronous or Asynchronous? Asynchronous Sender Stop Data Start Stop Data Start Receiver Synchronous Sender Data Receiver www.thbs.com/soa Introduction The decision whether to expose
Fundamentals of Function Point Analysis
Fundamentals of Function Point Analysis By [email protected] Abstract Systems continue to grow in size and complexity. They are becoming more and more difficult to understand. Improvement of coding
ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS
ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS Abdu Idris Omer Taleb M.M., PhD Majmaah University, Kingdom of Saudia Arabia Abstract This article is aimed to name the levels of industrial automation, describes
Application Architectures
Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch
Real-time Video Monitoring Increases the Efficiency of SCADA Process Management
Harry Hsiao, Moxa Product Manager ([email protected]) Traditional SCADA (Supervisory Control and Data Acquisition) systems have been an important part of automation control systems for many years, and
Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server
Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The
FUNCTION POINT ANALYSIS: Sizing The Software Deliverable. BEYOND FUNCTION POINTS So you ve got the count, Now what?
FUNCTION POINT ANALYSIS: Sizing The Software Deliverable BEYOND FUNCTION POINTS So you ve got the count, Now what? 2008 Course Objectives The primary webinar objectives are to: Review function point methodology
Federal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
Multiagent Control of Traffic Signals Vision Document 2.0. Vision Document. For Multiagent Control of Traffic Signals. Version 2.0
Vision Document For Multiagent Control of Traffic Signals Version 2.0 Submitted in partial fulfillment of the requirements of the degree of MSE Bryan Nehl CIS 895 MSE Project Kansas State University Page
Computer Information Systems (CIS)
Computer Information Systems (CIS) CIS 113 Spreadsheet Software Applications Prerequisite: CIS 146 or spreadsheet experience This course provides students with hands-on experience using spreadsheet software.
The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
Trademark Notice. General Disclaimer
Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment
Master of Science (Electrical Engineering) MS(EE)
Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant
Technology WHITE PAPER
Technology WHITE PAPER What We Do Neota Logic builds software with which the knowledge of experts can be delivered in an operationally useful form as applications embedded in business systems or consulted
HARDWARE ACCELERATION IN FINANCIAL MARKETS. A step change in speed
HARDWARE ACCELERATION IN FINANCIAL MARKETS A step change in speed NAME OF REPORT SECTION 3 HARDWARE ACCELERATION IN FINANCIAL MARKETS A step change in speed Faster is more profitable in the front office
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group [email protected]
Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group [email protected] Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting
Control of Boiler Operation using PLC SCADA
Control of Boiler Operation using PLC SCADA K. Gowri Shankar Abstract This paper outlines the various stages of operation involved in the conversion of a manually operated boiler towards a fully automated
GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS
Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,
PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING
PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING PMI PMBOK & ESTIMATING 03-23-05 Christine Green, PMI PMBOK and Estimating EDS, Delivery
Full Function Points for Embedded and Real-Time Software. UKSMA Fall Conference
Full Function Points for Embedded and Real-Time Software UKSMA Fall Conference London (UK) Oct. 30-31, 1998 Software Engineering Management Research Laboratory Université du Québec à Montréal & Software
Base One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
Appendix G Technical Methodology and Approach Document
Appendix G Technical Methodology and Approach Document Technical Methodology and Approach Document CWS/CMS Technical Architecture Alternatives Analysis (TAAA) California Health and Human Services Agency
SOA Myth or Reality??
IBM TRAINING S04 SOA Myth or Reality Jaqui Lynch IBM Corporation 2007 SOA Myth or Reality?? Jaqui Lynch Mainline Information Systems Email [email protected] Session S04 http://www.circle4.com/papers/s04soa.pdf
A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems
, pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research
QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR
MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR Mobile operators are critical to ensuring the overall efficiency and uptime of the production line and play a critical
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
Reducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
G DATA TechPaper #0275. G DATA Network Monitoring
G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration
Architectures for Distributed Real-time Systems
SDP Workshop Nashville TN 13 Dec 2001 Architectures for Distributed Real-time Systems Michael W. Masters NSWCDD Building Systems for the Real World What is the Problem? Capability sustainment Affordable
IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android
About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments
Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College
Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Agenda Middleware the hidden part of IT CICS (Customer Information Control System) track record as a middleware
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
CHAPTER 15: Operating Systems: An Overview
CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint
Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide
297-2183-909 Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide Product release 5.0 Standard 2.0 February 2007 Nortel Symposium Call Center Server Symposium,
4) CRM provides support for front-end customer facing functionality. Answer: TRUE Diff: 1 Page Ref: 334
Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 12 Customer Relationship Management 1) CRM implementations should be technology driven. Diff: 2 Page Ref: 333 2) CRM stands for "Customer
Why SNAP? What is SNAP (in a nutshell)? Does SNAP work? How to use SNAP when we already use Function Points? How can I learn more? What s next?
1 Agenda Why SNAP? What is SNAP (in a nutshell)? Does SNAP work? How to use SNAP when we already use Function Points? How can I learn more? What s next? 2 Agenda Why SNAP? What is SNAP (in a nutshell)?
Technical Training Module ( 30 Days)
Annexure - I Technical Training Module ( 30 Days) Section 1 : Programmable Logic Controller (PLC) 1. Introduction to Programmable Logic Controller - A Brief History, Need and advantages of PLC, PLC configuration,
Introduction to Function Points www.davidconsultinggroup.com
By Sheila P. Dennis and David Garmus, David Consulting Group IBM first introduced the Function Point (FP) metric in 1978 [1]. Function Point counting has evolved into the most flexible standard of software
Testing Automated Manufacturing Processes
Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 193 ISSN 2278-7763 THROUGH MOBILE
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 193 ANTI ELECTRICAL THEFTING AND TROUBLE SHOOTING THROUGH MOBILE 1. ABSTRACT The proposed project work aims on
SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
Digital Advisory Services Professional Service Description Network Assessment
Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL
PIPELINE SYSTEM AUTOMATION AND CONTROL C. Bruce Warren and Mike S. Yoon BCT Group and Yoon Consulting Keywords: SCADA, RTU, Communications, Data Management, HMI, Alarm, Security, Measurement, Flow Meters,
The Integration Between EAI and SOA - Part I
by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the
OWB Users, Enter The New ODI World
OWB Users, Enter The New ODI World Kulvinder Hari Oracle Introduction Oracle Data Integrator (ODI) is a best-of-breed data integration platform focused on fast bulk data movement and handling complex data
Why a single source for assets should be. the backbone of all your digital activities
Why a single source for assets should be the backbone of all your digital activities Navigating in the digital landscape The old era of traditional marketing has long passed. Today, customers expect to
A Mock RFI for a SD-WAN
A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The
Enterprise Application Designs In Relation to ERP and SOA
Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
Enterprise Service Bus Defined. Wikipedia says (07/19/06)
Enterprise Service Bus Defined CIS Department Professor Duane Truex III Wikipedia says (07/19/06) In computing, an enterprise service bus refers to a software architecture construct, implemented by technologies
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill Objectives: Analyze the operation of sequential logic circuits. Understand the operation of digital counters.
AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.
CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Work Process Management
GE Intelligent Platforms Work Process Management Achieving Operational Excellence through Consistent and Repeatable Plant Operations With Work Process Management, organizations can drive the right actions
Managing Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA [email protected] Len Bass Software Engineering Institute Carnegie
SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
CHAPTER 18 THE PUBLIC TELEPHONE NETWORK # DEFINITIONS TERMS
CHAPTER 18 THE PUBLIC TELEPHONE NETWORK # DEFINITIONS TERMS 1) It uses the largest computer network in the world to interconnect millions of subscribers in such a way that the myriad of companies function
SCADA Questions and Answers
SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...
How to bridge the gap between business, IT and networks
ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can
AXIS 262+ Network Video Recorder
31433/EN/R4/0803 Complete Network Video Recording Solution Complete Network Video Recording Solution Picture this: A simple and reliable, plug-and-play video surveillance system for hotels, shops, banks,
Contents. Chapter 1. Introduction
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
Developing Fleet and Asset Tracking Solutions with Web Maps
Developing Fleet and Asset Tracking Solutions with Web Maps Introduction Many organizations have mobile field staff that perform business processes away from the office which include sales, service, maintenance,
A Real Time Tracking and Alerting System Using LabVIEW
A Real Time Tracking and Alerting System Using LabVIEW J Jyothirmai Joshi Assistant Professor, Dept. of EIE, VNR Vignan Jyothi Institute of Engineering and Technology, Hyderabad, Telangana, India ABSTRACT:
PROCESS AUTOMATION FOR DISTRIBUTION OPERATIONS MANAGEMENT. Stipe Fustar. KEMA Consulting, USA
PROCESS AUTOMATION FOR DISTRIBUTION OPERATIONS MANAGEMENT Stipe Fustar KEMA Consulting, USA INTRODUCTION To prosper in a competitive market, distribution utilities are forced to better integrate their
White Paper. Cloud Vademecum
White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route
Developing SOA solutions using IBM SOA Foundation
Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
CLOUD COMPUTING AND PUBLIC SAFETY SERVICES
CLOUD COMPUTING AND PUBLIC SAFETY SERVICES This paper examines the emergence of Service Oriented Architectures, their implementation in Cloud computing services and the likely impact on Public Safety systems
C2030-280.Examcollection.Premium.Exam.34q
C2030-280.Examcollection.Premium.Exam.34q Number: C2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: C2030-280 Exam Name: IBM Cloud Computing Infrastructure
Implementing a Workflow Solution Leveraging SCADA and GIS/CMMS at the Waterford Township DPW. Charter Township of Waterford Oakland County, Michigan
Implementing a Workflow Solution Leveraging SCADA and GIS/CMMS at the Waterford Township DPW Charter Township of Waterford Oakland County, Michigan DPW Assets 360 Miles of Water Main and Appurtenances
Lotus Domino 8 Monitoring and Maintenance
Lotus Domino 8 Monitoring and Maintenance Course Title Course Code Lotus Domino 8 Monitoring and Maintenance DSMM8 Duration 02 days Course Fee Call to Request Instructor Certified Lotus Instructor or Certified
Crystal Gears. The Next Generation Personal Desktop Call Recording Solution. Why Crystal Gears
The Next Generation Personal Desktop Call Recording Solution Crystal Gears Crystal Gears (CG as short) is a new next generation desktop digital recording system like no other before. By widely compatible
FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW
I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new
NON-INTRUSIVE TRANSACTION MINING FRAMEWORK TO CAPTURE CHARACTERISTICS DURING ENTERPRISE MODERNIZATION ON CLOUD
NON-INTRUSIVE TRANSACTION MINING FRAMEWORK TO CAPTURE CHARACTERISTICS DURING ENTERPRISE MODERNIZATION ON CLOUD Ravikumar Ramadoss 1 and Dr.N.M.Elango 2 1 Technology Architect, Infosys, Bangalore, Karnataka,
Managing Central Monitoring in Distributed Systems
Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle
Client/Server Computing Distributed Processing, Client/Server, and Clusters
Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the
Introduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
Rackspace Cloud Databases and Container-based Virtualization
Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many
Computer Integrated Manufacturing CIM A T I L I M U N I V E R S I T Y
MFGE 404 Computer Integrated Manufacturing CIM A T I L I M U N I V E R S I T Y Manufacturing Engineering Department Lecture 1 - Introduction Dr. Saleh AMAITIK Fall 2005/2006 Production Systems Production
Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA. Hong-lv Wang, Yong Cen
Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA Hong-lv Wang, Yong Cen Information Center, China Tobacco Zhejiang Industrial Co., Ltd Hangzhou, China,
Design and Development of SMS Based Wireless Home Appliance Control and Security System
Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Service Modelling & Service Architecture:
Service Modelling & Service Architecture: From Service Renewal and Service Flows to Service Architecture Presenter: Professor Paul Buhler Head of the Global University Alliance SOA Research & Development
StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data
: High-throughput and Scalable Storage Technology for Streaming Data Munenori Maeda Toshihiro Ozawa Real-time analytical processing (RTAP) of vast amounts of time-series data from sensors, server logs,
