A Review On Software Testing In SDlC And Testing Tools

Size: px
Start display at page:

Download "A Review On Software Testing In SDlC And Testing Tools"

Transcription

1 International Journal Of Engineering And Computer Science ISSN: Volume - 3 Iue -9 September, 2014 Page No A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*, S.MahaLAkhmi*, K.HariKrihnan* Ait Prof, SKR Engineering college. amrutha1201@gmail.com Ait Prof, SKR Engineering college. maha3088@yahoo.com UG Scholar,SKR Engineering Abtract- The paper review the oftware teting and the different tool ued for teting the oftware.the teting i baed on the method of it attribute,ecurity and it uability.teting i an important part in oftware engineering where the coding get deployed baed on the teting.the teting can be done with different parameter of different type.i do not mean to give here a complete urvey of oftware teting.rather I intend to how how unwieldy mix of theoretical and technical challenge faced by the teter between the tate of art and practice. Keyword-Software teting,teting and debugging,teting method,teting level. 1.Introduction: Software teting i an invetigation conducted to provide takeholder with information about the quality of the product or ervice under tet. Software teting can alo provide an objective, independent view of the oftware to allow the buine to appreciate and undertand the rik of oftware implementation. Tet technique include, but are not limited to the proce of executing a program or application with the intent of finding oftware bug (error or other defect)[1].it involve the execution of a oftware component or ytem to evaluate one or more propertie of interet. In general, thee propertie indicate the extent to which the component or ytem under tet. A the number of poible tet for even imple oftware component i practically infinite, all oftware teting ue ome trategy to elect tet that are feaible for available time and reource. A a reult, oftware teting typically (but not excluively) attempt to execute a program or application with the intent of finding oftware bug (error or other defect).software teting can provide objective, independent information about the quality of oftware and rik of it failure to uer and/or ponor. 2.Software Teting Level: Software teting i the proce of evaluation a oftware item to detect difference between given input and expected output. Alo to ae the feature of A oftware item. Teting aee the quality of the product. Software teting i a proce that hould be done during the development proce. In other word oftware teting i a verification and validation proce[2]. Verification Verification i the proce to make ure the product atifie the condition impoed at the tart of the development phae. In other word, to make ure the product behave the way we want it to. Validation Validation i the proce to make ure the product atifie the pecified requirement at the end of the development phae. In other word, to make ure the product i built a per cutomer requirement. T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8188

2 Black box teting Internal ytem deign i not conidered in thi type of teting. Tet are baed on requirement and functionality. White box teting Thi teting i baed on knowledge of the internal logic of an application code. Alo known a Gla box Teting. Internal oftware and code working hould be known for thi type of teting. Tet are baed on coverage of code tatement, branche, path, condition. Unit teting Teting of individual oftware component or module. Typically done by the programmer and not by teter, a it require detailed knowledge of the internal program deign and code. may require developing tet driver module or tet harnee. Incremental integration teting Bottom up approach for teting i.e continuou teting of an application a new functionality i added; Application functionality and module hould be independent enough to tet eparately. done by programmer or by teter. Integration teting Teting of integrated module to verify combined functionality after integration. Module are typically code module, individual application, client and erver application on a network, etc. Thi type of teting i epecially relevant to client/erver and ditributed ytem. Functional teting Thi type of teting ignore the internal part and focu on the output i a per requirement or not. Black-box type teting geared to functional requirement of an application. Sytem teting Entire ytem i teted a per the requirement. Black-box type teting that i baed on overall requirement pecification, cover all combined part of a ytem. End-to-end teting Similar to ytem teting, involve teting of a complete application environment in a ituation that mimic real-world ue, uch a interacting with a databae, uing network communication, or interacting with other hardware, application, or ytem if appropriate. Sanity teting - Teting to determine if a new oftware verion i performing well enough to accept it for a major teting effort. If application i crahing for initial ue then ytem i not table enough for further teting and build or application i aigned to fix. Regreion teting Teting the application a a whole for the modification in any module or functionality. Difficult to cover all the ytem in regreion teting o typically automation tool are ued for thee teting type. Acceptance teting -Normally thi type of teting i done to verify if ytem meet the cutomer pecified requirement. Uer or cutomer do thi teting to determine whether to accept application. Load teting It a performance teting to check ytem behavior under load. Teting an application under heavy load, uch a teting of a web ite under a range of load to determine at what point the ytem repone time degrade or fail. Stre teting Sytem i treed beyond it pecification to check how and when it fail. Performed under heavy load like putting large number beyond torage capacity, complex databae querie, continuou input to ytem or databae load. Performance teting Term often ued interchangeably with tre and load teting. To check whether ytem meet performance requirement. Ued different performance and load tool to do thi. Uability teting Uer-friendline check. Application flow i teted, Can new uer undertand the application eaily, Proper help documented whenever uer tuck at any point. Baically ytem navigation i checked in thi teting. Intall/unintall teting - Teted for full, partial, or upgrade intall/unintall procee on different operating ytem under different hardware, oftware environment. Recovery teting Teting how well a ytem recover from crahe, hardware failure, or other catatrophic problem. Security teting Can ytem be penetrated by any hacking way. Teting how well the ytem protect againt unauthorized internal or external acce. Checked if ytem, databae i afe from external attack. Compatibility teting Teting how well oftware perform in a particular hardware/oftware/operating ytem/network environment and different combination of above. Comparion teting Comparion of product trength and weaknee with previou verion or other imilar product. Alpha teting In houe virtual uer environment can be created for thi type of teting. Teting i done at the end of development. Still minor deign change may be made a a reult of uch teting. Beta teting Teting typically done by end-uer or other. Final teting before releaing application for commercial purpoe. T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8189

3 Tet Deigning You deign/detail your tet on the bai of detailed requirement /deign of the oftware (ometime, on the bai of your imagination). Cae/ Tet Script /Tet Data Requir ement Tracea bility Matrix Creativit y teting fundamental 3.Phae of Teting : Fig:1 oftware Tet Environmen t Setup You etup the tet environment (erver/client /network, etc) with the goal of replicating the enduer environment. Enviro nment Rich compan y Phae Activity Deliverable Requiremen t/deign Review Tet Planning You review the oftware requirement /deign (Well, if they exit.) Once you have gathered a general idea of what need to be teted, you plan for the tet. Revie w Defect Report Plan Etima tion Sched ule Neceit y Curioit y Faright edne Tet Execution Tet Reporting You execute your Tet Cae/Script in the Tet Environment to ee whether they pa. You prepare variou report for variou takeholder. Reult (Incre mental ) Defect Report Reult (Final) /D efect Metric Clour e Patience Diploma cy T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8190

4 Report Who Worke d Till Late & on Weeke nd Report analyi and verification of requirement are alo conidered teting. Reviewing the deign in the deign phae with intent to improve the deign i alo conidered a teting. Teting performed by a developer on completion of the code i alo categorized a Unit type of teting. Unlike when to tart teting it i difficult to determine when to top teting, a teting i a never ending proce and no one can ay that any oftware i 100% teted. Following are the apect which hould be conidered to top the teting: teting Deadline. 4.Teting Role: Completion of tet cae execution. It depend on the proce and the aociated takeholder of the project(). In the IT indutry, large companie have a team with reponibilitie to evaluate the developed oftware in the context of the given requirement. Moreover, developer alo conduct teting which i called Unit Teting[3]. In mot cae, following profeional are involved in teting of a ytem within their repective capacitie: Software Teter Completion of Functional and code coverage to a certain point. Bug rate fall below a certain level and no high priority bug are identified. Management deciion. 5.Teting, Quality Aurance and Quality Control: Software Developer Project Lead/Manager End Uer Different companie have difference deignation for people who tet the oftware on the bai of their experience and knowledge uch a Software Teter, Software Quality Aurance Engineer, and QA Analyt etc. It i not poible to tet the oftware at any time during it cycle. The next two ection tate when teting hould be tarted and when to end it during the SDLC. 4.1 Teting time: An early tart to teting reduce the cot, time to rework and error free oftware that i delivered to the client. However in Software Development Life Cycle (SDLC) teting can be tarted from the Requirement Gathering phae and lat till the deployment of the oftware. However it alo depend on the development model that i being ued. For example in Water fall model formal teting i conducted in the Teting phae, but in incremental model, teting i performed at the end of every increment/iteration and at the end the whole application i teted. Mot people are confued with the concept and difference between Quality Aurance, Quality Control and Teting. Although they are interrelated and at ome level they can be conidered a the ame activitie, but there i indeed a difference between them. Mentioned below are the definition and difference between them: S.N. Quality Aurance 1 Activitie which enure the implementation of procee, procedure and tandard in context to verification of developed oftware and intended requirement. Quality Control Activitie which enure the verification of developed oftware with repect to documented (or not in ome cae) requirement. Teting Activitie which enure the identification of bug/error/defect in the Software. Teting i done in different form at every phae of SDLC like during Requirement gathering phae, the T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8191

5 2 3 Focue on procee and procedure rather then conducting actual teting on the ytem. Proce oriented activitie. Focue on actual teting by executing Software with intend to identify bug/defect through implementation of procedure and proce. Product oriented activitie. Focue on actual teting. Product oriented activitie. and tet the Software to identify any un-expected behavior or bug[5]. There are different tage for manual teting like unit teting, Integration teting, Sytem teting and Uer Acceptance teting. Teter ue tet plan, tet cae or tet cenario to tet the Software to enure the completene of teting. Manual teting alo include exploratory teting a teter explore the oftware to identify error in it. Automation teting Automation teting which i alo known a Tet Automation, i when the teter write cript and ue another oftware to tet the oftware. Thi proce involve automation of a manual proce. Automation Teting i ued to re-run the tet cenario that were performed manually, quickly and repeatedly. 4 Preventive activitie. It i a corrective proce. It i a corrective proce. 5 It i a ubet of Software Tet Life Cycle (STLC). QC can be conidered a the ubet of Quality Aurance. Teting i the ubet of Quality Control. 6.Teting and Debugging : TESTING: It involve the identification of bug/error/defect in the oftware without correcting it. Normally profeional with a Quality Aurance background are involved in the identification of bug[4]. Teting i performed in the teting phae. DEBUGGING: It involve identifying, iolating and fixing the problem/bug. Developer who code the oftware conduct debugging upon encountering an error in the code. Debugging i the part of White box or Unit Teting. Debugging can be performed in the development phae while conducting Unit Teting or in phae while fixing the reported bug. 6.1Teting Type : Manual teting Thi type include the teting of the Software manually i.e. without uing any automated tool or any cript. In thi type the teter take over the role of an end uer Apart from regreion teting, Automation teting i alo ued to tet the application from load, performance and tre point of view. It increae the tet coverage; improve accuracy, ave time and money in comparion to manual teting. 7.Teting Method: Black Box Teting The technique of teting without having any knowledge of the interior working of the application i Black Box teting. The teter i obliviou to the ytem architecture and doe not have acce to the ource code. Typically, when performing a black box tet, a teter will interact with the ytem' uer interface by providing input and examining output without knowing how and where the input are worked upon. White Box Teting. In order to perform white box teting on an application, the teter need to poe White box teting i the detailed invetigation of internal logic T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8192

6 and tructure of the code. White box teting i alo knowledge of the internal working of the code[6]. The teter need to have a look inide the ource code and find out which unit/chunk of the code i behaving inappropriately. Grey Box Teting Grey Box teting i a technique to tet the application with limited knowledge of the internal working of an application. In oftware teting, the term the more you know the better carrie a lot of weight when teting an application. Matering the domain of a ytem alway give the teter an edge over omeone with limited domain knowledge. Unlike black box teting, where the teter only tet the application' uer interface, in grey box teting, the teter ha acce to deign document and the databae. Having thi knowledge, the teter i able to better prepare tet data and tet cenario when making the tet plan. Functional Teting Thi i a type of black box teting that i baed on the pecification of the oftware that i to be teted. The application i teted by providing input and then the reult are examined that need to conform to the functionality it wa intended for. Functional Teting of the oftware i conducted on a complete, integrated ytem to evaluate the ytem' compliance with it pecified requirement[7]. There are five tep that are involved when teting an application for functionality. An effective teting practice will ee the above tep applied to the teting policie of every organization and hence it will make ure that the organization maintain the trictet of tandard when it come to oftware quality. Unit Teting Thi type of teting i performed by the developer before the etup i handed over to the teting team to formally execute the tet cae. Unit teting i performed by the repective developer on the individual unit of ource code aigned area. The developer ue tet data that i eparate from the tet data of the quality aurance team. The goal of unit teting i to iolate each part of the program and how that individual part are correct in term of requirement and functionality. Integration Teting The teting of combined part of an application to determine if they function correctly together i Integration teting. There are two method of doing Integration Teting Bottom-up Integration teting and Top Down Integration teting. S.N. Integration Teting Method 1 Bottom-up integration Thi teting begin with unit teting, followed by tet of progreively higher-level combination of unit called module or build. Step I Decription The determination of the functionality that the intended application i meant to perform. 2 Top-Down integration Thi teting, the highet-level module are teted firt and progreively lower-level module are teted after that. II III IV V The creation of tet data baed on the pecification of the application. The output baed on the tet data and the pecification of the application. The writing of Tet Scenario and the execution of tet cae. The comparion of actual and expected reult baed on the executed tet cae. In a comprehenive oftware development environment, bottom-up teting i uually done firt, followed by top-down teting. The proce conclude with multiple tet of the complete application, preferably in cenario deigned to mimic thoe it will encounter in cutomer' computer, ytem and network. Sytem Teting Thi i the next level in the teting and tet the ytem a a whole. Once all the component are integrated, the application a a whole i teted rigorouly to ee that it meet Quality Standard. Thi type of teting i performed by a pecialized teting team. T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8193

7 Sytem teting i o important becaue of the following reaon: Sytem Teting i the firt tep in the Software Development Life Cycle, where the application i teted a a whole. The application i teted thoroughly to verify that it meet the functional and technical pecification. imple pelling mitake, cometic error or Interface gap, but alo to point out any bug in the application that will reult in ytem craher or major error in the application. By performing acceptance tet on an application the teting team will deduce how the application will perform in production. There are alo legal and contractual requirement for acceptance of the ytem. The application i teted in an environment which i very cloe to the production environment where the application will be deployed. Sytem Teting enable u to tet, verify and validate both the buine requirement a well a the Application Architecture. Regreion Teting Whenever a change in a oftware application i made it i quite poible that other area within the application have been affected by thi change. To verify that a fixed bug han't reulted in another functionality or buine rule violation i Regreion teting. The intent of Regreion teting i to enure that a change, uch a a bug fix did not reult in another fault being uncovered in the application. ALPHA TESTING Thi tet i the firt tage of teting and will be performed amongt the team (developer and QA team). Unit teting, integration teting and ytem teting when combined are known a alpha teting. During thi phae, the following will be teted in the application: Spelling Mitake Broken Link Cloudy Direction The Application will be teted on machine with the lowet pecification to tet loading time and any latency problem. Regreion teting i o important becaue of the following reaon: BETA TESTING Minimize the gap in teting when an application with change made ha to be teted. Teting the new change to verify that the change made did not affect any other area of the application. Mitigate Rik when regreion teting i performed on the application. Thi tet i performed after Alpha teting ha been uccefully performed. In beta teting a ample of the intended audience tet the application. Beta teting i alo known a pre-releae teting. Beta tet verion of oftware are ideally ditributed to a wide audience on the Web, partly to give the program a "real-world" tet and partly to provide a preview of the next releae. In thi phae the audience will be teting the following: Tet coverage i increaed without compromiing timeline. Uer will intall, run the application and end their feedback to the project team. Increae peed to market the product. Acceptance Teting Thi i arguably the mot importance type of teting a it i conducted by the Quality Aurance Team who will gauge whether the application meet the intended pecification and atifie the client. requirement. The QA team will have a et of pre written cenario and Tet Cae that will be ued to tet the application. More idea will be hared about the application and more tet can be performed on it to gauge it accuracy and the reaon why the project wa initiated. Acceptance tet are not only intended to point out Typographical error, confuing application flow, and even crahe. Getting the feedback, the project team can fix the problem before releaing the oftware to the actual uer. The more iue you fix that olve real uer problem, the higher the quality of your application will be. Having a higher-quality application when you releae to the general public will increae cutomer atifaction. T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8194

8 On the other hand Uability teting enure that a good and uer friendly GUI i deigned and i eay to ue for the end uer. UI teting can be conidered a a ub part of Uability teting. Security Teting Security teting involve the teting of Software in order to identify any flaw ad gap from ecurity and vulnerability point of view. Following are the main apect which Security teting hould enure: overall teting of Software with repect to it uage over different environment. Computer Hardware, Operating Sytem and Brower are the major focu of Portability teting. Following are ome precondition for Portability teting: Software hould be deigned and coded, keeping in mind Portability Requirement. Unit teting ha been performed on the aociated component. Confidentiality. Integration teting ha been performed. Integrity. Tet environment ha been etablihed. Authentication. 8.Software Teting Documentation: Availability. Authorization. Teting documentation involve the documentation of artifact which hould be developed before or during the teting of Software. Non-repudiation. Software i ecure againt known and unknown vulnerabilitie. Software data i ecure. Software i according to all ecurity regulation. Input checking and validation. SQL inertion attack. Injection flaw. Seion management iue. Cro-ite cripting attack. Buffer overflow vulnerabilitie. Directory traveral attack. Documentation for Software teting help in etimating the teting effort required, tet coverage, requirement tracking/tracing etc. Thi ection include the decription of ome commonly ued documented artifact related to Software teting uch a: Tet Plan Tet Scenario Tet Cae Traceability Matrix Tet Plan A tet plan outline the trategy that will be ued to tet an application, the reource that will be ued, the tet environment in which teting will be performed, the limitation of the teting and the chedule of teting activitie. Typically the Quality Aurance Team Lead will be reponible for writing a Tet Plan. Portability Teting A tet plan will include the following. Portability teting include the teting of Software with intend that it hould be re-ueable and can be moved from another Software a well[8]. Following are the trategie that can be ued for Portability teting. Tranferred intalled Software from one computer to another. Introduction to the Tet Plan document Aumption when teting the application Lit of tet cae included in Teting the application Lit of feature to be teted Building executable (.exe) to run the Software on different platform. What ort of Approach to ue when teting the oftware Portability teting can be conidered a one of the ub part of Sytem teting, a thi teting type include the Lit of Deliverable that need to be teted T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8195

9 The reource allocated for teting the application Product verion. Any Rik involved during the teting proce Reviion hitory. A Schedule of tak and miletone a teting i tarted Purpoe Tet Scenario Aumption A one line tatement that tell what area in the application will be teted. Tet Scenario are ued to enure that all proce flow are teted from end to end. A particular area of an application can have a little a one tet cenario to a few hundred cenario depending on the magnitude and complexity of the application[9]. Pre-Condition. Step. Expected Outcome. Actual Outcome. The term tet cenario and tet cae are ued interchangeably however the main difference being that tet cenario ha everal tep however tet cae have a ingle tep. When viewed from thi perpective tet cenario are tet cae, but they include everal tet cae and the equence that they hould be executed. Apart from thi, each tet i dependent on the output from the previou tet. Pot Condition. Many Tet cae can be derived from a ingle tet cenario. In addition to thi, ome time it happened that multiple tet cae are written for ingle Software which i collectively known a tet uite. 9.concluion Thu the paper review the teting of different level and different method of teting were been dicued.each and every teting ha ome uniquene in their own way.thu teting which make the module with goodne and atify the requirement of the cutomer. Reference: 1. Exploratory Teting, Cem Kaner, Florida Intitute of Technology, Quality Aurance Intitute Worldwide Annual Software Teting Conference, Orlando, FL, November Tet Cae Tet cae involve the et of tep, condition and input which can be ued while performing the teting tak. The main intent of thi activity i to enure whether the Software Pae or Fail in term of it functionality and other apect. There are many type of tet cae like: functional, negative, error, logical tet cae, phyical tet cae, UI tet cae etc. Furthermore tet cae are written to keep track of teting coverage of Software. Generally, there i no formal template which i ued during the tet cae writing[10]. However, following are the main component which are alway available and included in every tet cae: Tet cae ID. Product Module. 2. Software Teting by Jiantao Pan, Carnegie Mellon Univerity 3.Leitner, A., Ciupa, I., Oriol, M., Meyer, B., Fiva, A., "Contract Driven Development = Tet Drive Development Writing Tet Cae", Proceeding of ESEC/FSE'07: European Software Engineering Conference and the ACM SIGSOFT Sympoium on the Foundation of Software Engineering 2007, (Dubrovnik, Croatia), September Kaner, Cem; Falk, Jack and Nguyen, Hung Quoc (1999). Teting Computer Software, 2nd Ed. New York, et al: John Wiley and Son, Inc. pp. 480 page. ISBN Kolawa, Adam; Huizinga, Dorota (2007). Automated Defect Prevention: Bet Practice in T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8196

10 Software Management. Wiley-IEEE Computer Society Pre. pp ISBN Kolawa, Adam; Huizinga, Dorota (2007). Automated Defect Prevention: Bet Practice in Software Management. Wiley-IEEE Computer Society Pre. p ISBN Section 1.1.2, Certified Teter Foundation Level Syllabu, International Software Teting Qualification Board 8. Principle 2, Section 1.3, Certified Teter Foundation Level Syllabu, International Software Teting Qualification Board 9. "Proceeding from the 5th International Conference on Software Teting and Validation (ICST) Software Competence Center Hagenberg. "Tet Deign: Leon Learned and Practical Implication.". 10. Software error cot U.S. economy $59.5 billion annually, NIST report T.Amruthavalli, IJECS Volume-3 Iue-9 September 2014 Page No Page 8197

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Levels of Software Testing. Functional Testing

Levels of Software Testing. Functional Testing Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Requirements Engineering Databases: The Good, The Bad, and The Ugly

Requirements Engineering Databases: The Good, The Bad, and The Ugly New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction

More information

Software Testing Tutorial

Software Testing Tutorial Software Testing Tutorial SOFTWARE TESTING TUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i C O P Y R I G H T & D I S C L A I M E R N O T I C E All the content and graphics on this

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

SOFTWARE TESTING - QUICK GUIDE SOFTWARE TESTING - OVERVIEW

SOFTWARE TESTING - QUICK GUIDE SOFTWARE TESTING - OVERVIEW http://www.tutorialspoint.com/software_testing/software_testing_quick_guide.htm What is Testing? SOFTWARE TESTING - QUICK GUIDE SOFTWARE TESTING - OVERVIEW Copyright tutorialspoint.com Testing is the process

More information

Bio-Plex Analysis Software

Bio-Plex Analysis Software Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not.

Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. About the Tutorial Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. Testing is executing a system in order

More information

SGROI FINANCIAL. Contact us if you are interested in getting access to our new Client Portal

SGROI FINANCIAL. Contact us if you are interested in getting access to our new Client Portal the SGROI FINANCIAL N E W S L E T T E R INVESTMENTS ANNUITIES ESTATE PLANNING IRA S 401K PLANS 403(b) PLANS ROLLOVERS INSURANCE Sgroi Financial New Client Portal Streamline Information Acce Volume 5 Number

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

Get Here Jeffrey M. Kurtz Client Feedback Evaluation Implementation Extenion/Termination Solution Development Analyi Data Collection Problem Definition Entry & Contracting CORE to all Problem Solving Equilibrium

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

APEC Environmental Goods and Services Work Program

APEC Environmental Goods and Services Work Program APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Achieving Quality Through Problem Solving and Process Improvement

Achieving Quality Through Problem Solving and Process Improvement Quality Aurance Methodology Refinement Serie Achieving Quality Through Problem Solving and Proce Improvement Second Edition By Lynne Miller Franco Jeanne Newman Gaël Murphy Elizabeth Mariani Quality Aurance

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

Products and Services

Products and Services Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible. Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

INSIDE REPUTATION BULLETIN

INSIDE REPUTATION BULLETIN email@inidetory.com.au www.inidetory.com.au +61 (2) 9299 9979 The reputational impact of outourcing overea The global financial crii ha reulted in extra preure on Autralian buinee to tighten their belt.

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

MINUTES (Adopted at August 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair s Remarks, Attendance

MINUTES (Adopted at August 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair s Remarks, Attendance IAP2 BC Chapter Executive Committee (EC) Meeting #15 Wedneday, July 13, 2011 Teleconference 5:05-6:40 p.m. MINUTES ( at Augut 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair Remark, Attendance

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1 Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast Date of Reviion Date of Previou Reviion Programme Specification (2014-15) A programme pecification i required for any programme on which a tudent may be regitered. All programme of the Univerity are ubject

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Third Party Technical Guidelines

Third Party Technical Guidelines Third Party Technical Guideline Configuration Guide Releae: Document Reviion: Ditribution Statu: NICE Engage Platform 6.3 / NICE Interaction Management 4.1 Real-Time Solution 4.9 NICE Perform 3.2 / 3.5

More information

Submission to the Network Rail s Long Term Planning Process London and South East Market Study

Submission to the Network Rail s Long Term Planning Process London and South East Market Study Submiion to the Network Rail Long Term Planning Proce London and South Eat Market Study Introduction Thi i the repone of London Luton Airport to Network Rail Long Term Planning Proce (LTPP) mot pecifically

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

A Novel Web-Based Student Academic Records Information System

A Novel Web-Based Student Academic Records Information System A Novel Web-Baed Student Record Information Sytem Nmaju Obai, E. O. Nwachukwu, and C. Ugwu Department of Computer Science, Univerity of Port Harcourt, Port Harcourt, River State, Nigeria nmajuobai@yahoo.com,

More information

The Cash Flow Statement: Problems with the Current Rules

The Cash Flow Statement: Problems with the Current Rules A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Turbulent Mixing and Chemical Reaction in Stirred Tanks Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Applications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu

Applications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu Application of Rik Analyi in Border Security Niyazi Onur Bakir, Univerity of Southern California nbakir@uc.edu 1. Overview... 1. Reearch Accomplihment....1. Security of Incoming Truck to U.S. Southwetern

More information

Genuine Bendix. a l v e. c o m p r e. s o r s. s y e r. a i r. d r. s t r o n i c. e l e c. d i s c. b r a k e s. w h e e l. e n d X V.

Genuine Bendix. a l v e. c o m p r e. s o r s. s y e r. a i r. d r. s t r o n i c. e l e c. d i s c. b r a k e s. w h e e l. e n d X V. v a l v e AHEAD OF THE CURVE AHEAD OF THE CURVE Genuine Bendix c o m p r e o r a i r d r y e r e l e c t r o n i c a i r d i c b r a k e w h e e l e n d X V i i o n GENUINE BENDIX NO CUTTING CORNERS. V

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

TRID Technology Implementation

TRID Technology Implementation TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU

More information

naifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS

naifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS naifa Member: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS National Aociation of Inurance and Financial Advior Serving America Neigborhood for Over 120 Year Since 1890, NAIFA ha worked to afeguard the

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006 ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal

More information

Production Management II. Product Life-Cycle Management II

Production Management II. Product Life-Cycle Management II Production Management II - - Product Life-Cycle Management II Contact: Dipl.-Ing. Wolfgang Boo w.boo@wzl.rwth-aachen.de WZL 53B Raum 507 Tel.: 80-28 469 Objective of the Lecture: Overview of Product-Data-Management-Sytem

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Proceedings of Power Tech 2007, July 1-5, Lausanne

Proceedings of Power Tech 2007, July 1-5, Lausanne Second Order Stochatic Dominance Portfolio Optimization for an Electric Energy Company M.-P. Cheong, Student Member, IEEE, G. B. Sheble, Fellow, IEEE, D. Berleant, Senior Member, IEEE and C.-C. Teoh, Student

More information

MBA 570x Homework 1 Due 9/24/2014 Solution

MBA 570x Homework 1 Due 9/24/2014 Solution MA 570x Homework 1 Due 9/24/2014 olution Individual work: 1. Quetion related to Chapter 11, T Why do you think i a fund of fund market for hedge fund, but not for mutual fund? Anwer: Invetor can inexpenively

More information

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program Pediatric Nure Practitioner Program Pediatric Clinical Nure Specialit Program Dual Pediatric Nure Practitioner / Clinical Nure Specialit Program UCLA School of Nuring Overview: The Pediatric Nure Practitioner

More information

MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems)

MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems) Guide for Marine Health, Safety, Quality and vironmental Management GUIDE FOR MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Sytem) APRIL 2012

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information