Establishing Economic Effectiveness through Software Health-Management
|
|
|
- Buck Booth
- 9 years ago
- Views:
Transcription
1 LLNL-CONF Establishing Economic Effectiveness through Software Health-Management M. Pizka, T. Panas November 16, 2009 Workshop on Software Health Management Pasadena, CA, United States July 21, 2009 through July 21, 2009
2 Disclaimer This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes.
3 Establishing Economic Effectiveness through Software Health-Management Markus Pizka and Thomas Panas, itestra GmbH Abstract More than two thirds of the annual software budget of large-scale organizations dealing with complex software systems is spent on the perfection, correction, and operation of existing software systems. A significant part of these running costs could be saved if the software systems that need to be constantly extended, maintained and operated were in a better technical condition. This paper proposes Software Health-Checks as a method to assess the technical condition of existing software systems and to deduce measures for improving the health of software in a structured manner. Since 2006 numerous commercial software systems with a tota l o f 3 0 M L O C1, implemented in various technologies, were already checked with this method. The actions suggested as a result of these Software Health-Checks, repeatedly yielded dramatic performance improvements, risk reductions and cost savings between 30% and 80%. Index Terms software quality, software maintenance, software management, software economics I. INTRODUCTION I ntegrated Systems Health Management is used in complex heterogeneous physical systems to continuously monitor the state of (sub-)systems and to take appropriate actions in case of anomalies. Unfortunately, there are only few and barely mature techniques to monitor the health of software systems in a similar way. The closest matches are presumably the results of research on fault tolerant systems [1] on the one hand and commercial systems management solutions, such as IBM Tivoli [2] for large scale information systems on the other hand. Besides the absence of health management facilities similar to those found in systems management, we strongly argue that a proper health management of software systems should not solely focus on correct operation of the software system but on overall short-, mid-, and long-term economic effectiveness of software. The intrinsic goal of software health management must be to extend the life-time of software, which is predetermined by its economic effectiveness. A. Situation More than 70% of the overall software budgets of larger organizations are spent on maintaining and operating existing software systems [8], [3]. At the same time large-scale M. Pizka and T. Panas are with itestra GmbH, Garching, Germany (corresponding author: M. Pizka, phone: +49 (179) ; [email protected]). 1 Million lines of code software systems are known to suffer from a gradual quality decay over time if no pro-active countermeasures are taken [4], [5]. This decay affects all of the quality attributes de ned with the ISO 9216 software quality standard: reliability, functionality, efficiency, portability, usability, maintainability [7], and security. Consequently, poorly performing, unstable, misaligned and inflexible systems cause enormous annual costs. Although there is a correlation between the age of a system and the degree of decay, there are numerous other reasons for decreasing reliability and performance besides the age of a software system. As described in [13], many software systems show severe signs of decay causing excessive cost of ownership right after and sometimes even before the first release. B. Requirement Software Health-Management Gradual and even rapid decay, along with the increasing risk and cost of ownership, can be mitigated effectively by a) performing health-checks (structured assessments) of the state of the software system on a regular basis and b) taking immediate action to remove the signs of decay detected during these health-checks. As our experience shows, implementing health-checks and subsequently enforcing actions to eliminate the effects of decay reduces costs and risks. This thereby extends the lifetime of software systems. Based on D.L. Parnas seminal work on software aging [4], we call this iterative process software health management. Note that this view on software health management is deliberately not restricted to a particular quality attribute (such as correctness or reliability during operation) but aims to increase overall economic effectiveness. Therefore it would be unrealistic to assume that this kind of long-term oriented software health management could be performed automatically or even built into systems. Instead, software health management, as described in this paper, is based on a combination of tool-supported analyses, expert reviews and manually performed counter-actions.
4 Outline Section Error! Reference source not found.fehler! Verweisquelle konnte nicht gefunden werden. explains the quality model and the analysis process that we use to assess the health of software systems. Thereafter, this paper focuses on our experiences performing software health management in practice. We show key findings from software health checks on more than 30 MLOC and outline actual improvements achieved in Section III. II.HEALTH CHECK MODEL AND PROCESS A.Software Quality Equals Economic Effectiveness In order to assess the health condition of a software system, one needs to establish a proper software health model, which in turn requires software quality to be measured. As stated in [10] and others the frequently used term software quality has many different meanings. The most commonly used definition of software quality is conformance to a specification. However, this entails that quality measurement results are meaningless if the initial specification is incomplete or weak by itself. Since most specifications in practical settings are indeed weak, virtually every software system was deemed high quality under this definition, which is certainly untrue. Q Attribute Performance Reliability Usability Security Correctness Maintainability Errors Staff Maintenance Extension Training Operation Cost Factor Fig. 1. Practically relevant software quality equals economic effectiveness. There are, of course, numerous other definitions for software quality besides conformance as in [7]. However, the ISO9126 standard as well as many other definitions from research on software metrics fall short of explaining the actual importance of software quality defects. For instance, although the cyclomatic complexity metric is agreed upon to be important, its actual effect on a particular software system is unclear. We therefore propose a value-based view on software quality as sketched in Figure 1. With this quality model in mind, a software system has high quality (i.e. is healthy) if and only if its costs are low. Among the consequences of this model are: First, it guarantees that everything that is regarded during quality analysis is relevant to the owner of the system, because everything gets mapped onto the actual cost structure. Second, it allows assessing the quality of a software system from two different perspectives, i.e. economics and technical properties. E.g. a system that does not cause any maintenance costs is by definition highly maintainable. There is hardly any need for a sophisticated technical analysis of the maintainability metrics such as the SEI maintainability index in this case. At the same time, a system that handles large volume of data with inadequate algorithms, such as bubble-sorts or in single linked lists, will be unnecessarily expensive for its owner. Hence, defining cost effectiveness as the quality goal allows combining economic and technical data during quality analysis which produces highly relevant health-check results in a very efficient way. B. Economics-based two-dimensional software quality model Based on this notion of software quality and the Software Re-engineering Assessment Handbook, published by DoD [8], that shares this economic view on software quality, we developed a quality model that organizes the criteria that need to be assessed during software health-checks into two dimensions, see figure 2. Fig 2. Two-dimensional quality model At the top of this model is the breakdown structure of all activities that are performed on a software system and represent the major costs. The activities used in a certain setting depend on the organization that owns the software, its processes and its strategy. Typical relevant activities are maintenance (as shown as an example in fig. 2), development, and operations but also repairing damages due to software failure. At the left of the models are the facts that describe the technical state of the software system including properties of the organization such as it process maturity. The technical facts are more or less context-independent with minor variations between different technologies (e.g. COBOL, Java). The current version of our quality model encompasses 260 criteria that were chosen because of their strong impact on certain activities and therefore costs. Selected examples are: Sample facts about the code: cloning ratio, unused code, number of workarounds, conditional ratio, architectural violations, quality of naming Sample facts about the documentation: homonym ratio, synonym ratio, completeness, actuality Sample facts about the organization: CMMi level, number of employees with process know-how, number of employees with system know-how For more information about our quality-model, please refer to [6][9][12]. C.Health Management Process During our Health-Check, we initially determine costs (top) and then the technical properties (left) of a software system.
5 The analysis of technical properties consists of the following steps: Acquire artefacts Interview with key stakeholders to collect facts about the organization, processes, etc. Tool-supported static analysis of the code base with ConQAT [11] Manual inspection of the code and documents Review of the analysis results with technical experts of system (e.g. former developers) Design of improvement actions if indicated Planning and ROI (return on investment) estimation for all improvement actions Presentation of the results to the owners of the software system, who will decide whether optimizations are executed Note, the analysis uses a tool (ConQAT) only to collect some but important facts about the code and its documentation and to guide manual inspection. All other facts are analysed either through manual inspection or through interviews. However, in practice, the complete analysis phase takes only 5 to 15 man-days, depending on the size of the system under consideration. Of course, Health Management is more than just software analysis. It also encompasses executing appropriate actions to optimize legacy systems. The time and effort needed to implement these actions clearly depends on the number and complexity of the selected actions. However, most times improvement actions can usually only be successful if they are completed and yield a positive ROI within less than 12 months Despite of numerous technical challenges, the biggest challenge to successfully improving the health of software systems is an organizational and psychological issue: i.e. how to gain and preserver acceptance and trust from the stakeholders of the system. Original developers commonly do not understand the need for change, and managers responsible for such systems are also averse to change. This is mainly because managers are afraid that they could be made responsible for actions that they incorrectly or insufficiently supervised in the past. Our Health-Check uses, amongst others, two essential techniques to overcome these problems: 1. We structure the presentation of health-check results according to importance so that management can easily be convinced of problems inherent in their software systems. For this, our initial slide shows the economic potential of improvements followed by an overview of health-check results. Thereafter, we present more details, down to code fragments showing the weaknesses. Interestingly, showing code repeatedly proved to be the most convincing information even to top managers. 2. We take full responsibility for our actions. Our funding and success is dependent on the success of our optimizations. Our customers pay based on our performance and results we achieve and not according to our initial projections. III. EXPERIENCES itestra has applied its health-check model to real world systems implemented in PL/I, C, COBOL, Java, Matlab/Simulink and PHP, since The total size of all systems analyzed exceeds 30 MLOC (million lines of code). These systems are worth about $500 million in assets and create $50 million in annual costs for development and maintenance. Our health-check of these systems indicated that these annual costs can be reduced by at least 30% within one year. Figure 3 shows the distribution of our analysis of 20 systems, their annual costs (bottom) and health state (left). Figure 3: Health-Check of 20 software systems. Maintenance costs improved by 30% Through the implementation of the suggested actions to improve the health state of these systems we were able to proof that 30% of these annual costs of $50 million can be economized. As a matter of fact, the improvements achieved so far span from at least 35% up to 80% of the annual operational and maintenance costs. Furthermore, we learned that the need for software health management is steadily increasing. Customers are understanding and adopting software health management practices more and more frequently. This is the result of our strong efforts to communicate our analyses and findings in the most effective ways possible. IV. CONCLUSION Software health checks are essential, especially for aging systems. This is comparable to humans that perform preventive health checks, thereby lowering their risk of diseases and treatment costs. Our health check detects crucial weaknesses and risks in software. These checks have a profound influence on the running costs of such systems. Even if not broken, such systems function less efficiently and are more prone to failures. We learned that many systems are in astonishingly poor technical condition and because of this software health management is crucial not only to correct software and hence reduce system downtime, but primarily to drastically reduce software operation and maintenance costs. Today, companies are still forced to spend large sums to keep these systems running just because the causes of failure and inefficiency are not understood.
6 Our health check helps to discover software weaknesses and allows to drastically cut running costs. Besides, healthy software has the advantage of longer live expectancy which means that risky legacy migration scenarios can be avoided or at least vastly deferred. REFERENCES [1] Brian Randell. System Structure for Software Fault Tolerance. IEEE Transactions on Software Engineering, vol. 1, 1975, pages [2] IBM. IBM Tivoli software [3] Accenture. Editorial - only 40% of the IT budget for new solutions. IS report, June [4] David Lorge Parnas. Software aging. In Proc. International Conference on Software Engineering (ICSE 94), pages IEEE Computer Society, [5] Stephen G. Eick, Todd L. Graves, Alan F. Karr, J. S. Marron, and Audris Mockus. Doescode decay? assessing the evidence from change management data. IEEE Trans. Softw. Eng., 27(1):1 12, [6] Manfred Broy, Florian Deißenböck, and Markus Pizka. Demystifying maintainability. In Proc. of the 2006 Int. Workshop on Software Quality. Shanghai, China, [7] ISO Software engineering - Product quality - Part 1: Quality model. International standard, ISO, [8] STSC. Software Reengineering Assessment Handbook v3.0. Technical report, STSC, U.S. Department of Defense, Mar [9] Florian Deißenböck, Markus Pizka et al. Tool Support for Continuous Quality Control. IEEE Software, vol. 25, 2008, pages [10] Barbara Kitchenham and Shari Lawrence P eeger. Software quality: The elusive target. IEEE Software, 13(1):12 21, [11] ConQAT. [12] Florian Deissenboeck, Markus Pizka, and Tilman Seifert. Tool support for continuous quality assessment. In Proc. IEEE International Workshop on Software Technology and Engineering Practice (STEP), pages IEEE Computer Society, [13] Benedikt Mas y Parareda and Markus Pizka. Web-based and other young legacy-systems. information Management & Consulting, 22(2), June 2007.
The Software Process. The Unified Process (Cont.) The Unified Process (Cont.)
The Software Process Xiaojun Qi 1 The Unified Process Until recently, three of the most successful object-oriented methodologies were Booch smethod Jacobson s Objectory Rumbaugh s OMT (Object Modeling
Department of Energy Quality Managers Software Quality Assurance Subcommittee Reference Document SQAS22.01.00-2002. Software Quality Assurance Control
Department of Energy Quality Managers Software Quality Assurance Subcommittee Reference Document SQAS22.01.00-2002 Software Quality Assurance Control of Existing Systems September 2002 United States Department
An Integrated Quality Assurance Framework for Specifying Business Information Systems
An Integrated Quality Assurance Framework for Specifying Business Information Systems Frank Salger 1, Stefan Sauer 2, Gregor Engels 1,2 1 Capgemini sd&m AG, Carl-Wery-Str. 42, D-81739 München, Germany
Building CHAOS: an Operating System for Livermore Linux Clusters
UCRL-ID-151968 Building CHAOS: an Operating System for Livermore Linux Clusters Jim E. Garlick Chris M. Dunlap February 21, 2002 Approved for public release; further dissemination unlimited DISCLAIMER
MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE
MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE INTRODUCTION The machinery and plant engineering industry is under pressure to transform. Globalization, new competitors,
Ten steps to better requirements management.
White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten
TransAlta Corporation Energy Trading Compliance Program Assessment
www.pwc.com/ca Energy Trading Compliance Program Assessment Disclaimer We prepared this report based on information available at the time of its preparation. Our observations and conclusions are based
Behaviors and Actions That Support Leadership and Team Effectiveness, by Organizational Level
Good Practice INPO 15-012 October 2015 Behaviors and Actions That Support Leadership and Team Effectiveness, by Organizational Level Revision 0 OPEN DISTRIBUTION OPEN DISTRIBUTION: Copyright 2015 by the
Confocal μ-xrf for 3D analysis of elements distribution in hot environmental particles
LLNL-TR-400056 LAWRENCE LIVERMORE NATIONAL LABORATORY Confocal μ-xrf for 3D analysis of elements distribution in hot environmental particles M. Bielewski M. Eriksson J. Himbert R. Simon M. Betti T.F. Hamilton
Should Costing Version 1.1
Should Costing Identify should cost elements early in the design phase, and enable cost down initiatives Version 1.1 August, 2010 WHITE PAPER Copyright Notice Geometric Limited. All rights reserved. No
Use of Agent-Based Service Discovery for Resource Management in Metacomputing Environment
In Proceedings of 7 th International Euro-Par Conference, Manchester, UK, Lecture Notes in Computer Science 2150, Springer Verlag, August 2001, pp. 882-886. Use of Agent-Based Service Discovery for Resource
Practical Metrics and Models for Return on Investment by David F. Rico
Practical Metrics and Models for Return on Investment by David F. Rico Abstract Return on investment or ROI is a widely used approach for measuring the value of a new and improved process or product technology.
Requesting Nodes, Processors, and Tasks in Moab
LLNL-MI-401783 LAWRENCE LIVERMORE NATIONAL LABORATORY Requesting Nodes, Processors, and Tasks in Moab D.A Lipari March 29, 2012 This document was prepared as an account of work sponsored by an agency of
Obligation-based Asset Allocation for Public Pension Plans
Obligation-based Asset Allocation for Public Pension Plans Market Commentary July 2015 PUBLIC PENSION PLANS HAVE a single objective to provide income for a secure retirement for their members. Once the
Client Contracts: Business Risk, Professional Liability & Insurance Coverage
Hanover Architects & Engineers Advantage Client Contracts: Business Risk, Professional Liability & Insurance Coverage Many client-drafted contracts endeavor to transfer unreasonable risk to the design
Address IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
WinMagic Encryption Software Installation and Configuration
WinMagic Encryption Software Installation and Configuration Don Mendonsa, Faranak Nekoogar, Harry Martz Lawrence Livermore National Laboratory Livermore, CA 94551 Work performed on the Science & Technology
Software Process Improvement Software Business. Casper Lassenius
Software Process Improvement Software Business Casper Lassenius Topics covered ² The process process ² Process measurement ² Process analysis ² Process change ² The CMMI process framework 2 Process ² Many
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
WHITE PAPER CREATING A CUSTOMER-CENTRIC COMMUNICATIONS STRATEGY
WHITE PAPER CREATING A CUSTOMER-CENTRIC COMMUNICATIONS STRATEGY CREATING A CUSTOMER-CENTRIC COMMUNICATIONS STRATEGY Executive Summary This white paper is designed to help you create a customer communications
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Synchro-Phasor Data Conditioning and Validation Project Phase 3, Task 1. Report on
Synchro-Phasor Data Conditioning and Validation Project Phase 3, Task 1 Report on Lessons Learned in the DV&C Project Prepared for the Office of Electricity Delivery and Energy Reliability, Transmission
SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT
SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original
What it takes to make integrated care work
What it takes to make integrated care work New McKinsey research shows that integrated care can be implemented in virtually any health system. However, three elements are necessary to ensure success. Health
What do you think? Definitions of Quality
What do you think? What is your definition of Quality? Would you recognise good quality bad quality Does quality simple apply to a products or does it apply to services as well? Does any company epitomise
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
How to achieve excellent enterprise risk management Why risk assessments fail
How to achieve excellent enterprise risk management Why risk assessments fail Overview Risk assessments are a common tool for understanding business issues and potential consequences from uncertainties.
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary
SANDIA REPORT SAND2015-20815X Unlimited Release January 2015 IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary Version 1.0 James Mark Harris, Robert M. Huelskamp Prepared by Sandia
The Travel and Expense Management Guide for 2014
The Travel and Expense Management Guide for 2014 Trends for the Future March 2014 Louis Berard The Travel and Expense Management Guide for 2014: Trends for the Future In December 2013 and January 2014,
Achieve greater efficiency in asset management by managing all your asset types on a single platform.
Asset solutions To support your business objectives Achieve greater efficiency in asset by managing all your asset types on a single platform. When you use Maximo Asset Management to help maximize the
A High Performance Computing Scheduling and Resource Management Primer
LLNL-TR-652476 A High Performance Computing Scheduling and Resource Management Primer D. H. Ahn, J. E. Garlick, M. A. Grondona, D. A. Lipari, R. R. Springmeyer March 31, 2014 Disclaimer This document was
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations
Data Discovery, Analytics, and the Enterprise Data Hub
Data Discovery, Analytics, and the Enterprise Data Hub Version: 101 Table of Contents Summary 3 Used Data and Limitations of Legacy Analytic Architecture 3 The Meaning of Data Discovery & Analytics 4 Machine
The Case for Rack Scale Architecture
The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage
ORACLE VM MANAGEMENT PACK
ORACLE VM MANAGEMENT PACK Effective use of virtualization promises to deliver significant cost savings and operational efficiencies. However, it does pose some management challenges that need to be addressed
Achieve greater efficiency in asset management by managing all your asset types on a single platform.
Asset solutions To support your business objectives Achieve greater efficiency in asset by managing all your asset types on a single platform. Obtain an entirely new level of asset awareness Every company
Lessons Learned in Security Measurement. Nadya Bartol & Brian Bates Booz Allen Hamilton
Lessons Learned in Security Measurement Nadya Bartol & Brian Bates Booz Allen Hamilton Contents Overview Lessons Learned Case Studies Summary Reasons Behind Security Metrics Information security measurement
Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012
Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012 Prepared by Hilda B. Klasky Paul T. Williams B. Richard Bass This report was prepared as an account of
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? GARP Overview Creation Purpose GARP Overview Creation About ARMA International and the Generally Accepted Recordkeeping Principles
Online Banking Payment Website
Consultation Paper Online Banking Payment Website In the field of e-commerce, various payment processes have been established. During the last year, the so-called "online transfer has been added. This
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
What went wrong? Unsuccessful information technology projects
Brenda Whittaker Senior Consultant, KPMG Consulting, Toronto, Canada words Computer software, Information technology, Project control, Project management, Software development Abstract Information technology
Requirements-Based Testing: Encourage Collaboration Through Traceability
White Paper Requirements-Based Testing: Encourage Collaboration Through Traceability Executive Summary It is a well-documented fact that incomplete, poorly written or poorly communicated requirements are
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
Software Engineering: Analysis and Design - CSE3308
CSE3308/DMS/2004/25 Monash University - School of Computer Science and Software Engineering Software Engineering: Analysis and Design - CSE3308 Software Quality CSE3308 - Software Engineering: Analysis
Center for Effective Organizations
Center for Effective Organizations HR METRICS AND ANALYTICS USES AND IMPACTS CEO PUBLICATION G 04-8 (460) EDWARD E. LAWLER III ALEC LEVENSON JOHN BOUDREAU Center for Effective Organizations Marshall School
Guidance on Professional Judgment for CPAs
2015I17-066 Guidance on Professional Judgment for CPAs (Released by The Chinese Institute of Certified Public Accountants on March 26, 2015) CONTENTS 1 General Provisions...1 2 Necessity of professional
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
The Business Value of Meetings: Test Your Knowledge Jack J. Phillips PhD Chairman, ROI Institute, Inc.
The Business Value of Meetings: Test Your Knowledge Jack J. Phillips PhD Chairman, ROI Institute, Inc. The Issue The recession has brought radical changes to the meetings and events industry. With the
A Conformiq White Paper Next Generation Testing: Transforming Software Test
A Conformiq White Paper Next Generation Testing: Transforming Software Test Software complexity is increasing exponentially. Yet even today, an uncomfortably large part of testing in the industry is carried
Company Background EMAGINED SECURITY. 2014 All rights reserved. www.emagined.com
Company Background Emagined Security, a privately owned and operated company, has been helping organizations with their security needs with an excellent track record of success since 2002. The company
Introducing a Capacity Management Maturity Model
Introducing a Capacity Management Maturity Model Business units are demanding more services and greater reliability from IT, while also trying to constrain, or even reduce, budgets. In those rare cases
pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS
pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
CMMI 100 Success Secrets
CMMI 100 Success Secrets Capability Maturity Model Integration 100 Success Secrets - 100 Most Asked Questions: The Missing CMMI-DEV, CMMI-ACQ Project Management and Process Guide Lance Batten CMMI 100
Requirements Engineering in Healthcare: Challenges, Solution Approaches and Best Practices
Requirements Engineering in Healthcare: Challenges, Solution Approaches and Best Practices MedConf 2009 Munich, October 13-15,2009 Table of Contents Siemens Healthcare and Vector Consulting Services Motivation
The European Financial Reporting Advisory Group (EFRAG) and the Autorité des Normes Comptables (ANC) jointly publish on their websites for
The European Financial Reporting Advisory Group (EFRAG) and the Autorité des Normes Comptables (ANC) jointly publish on their websites for information purpose a Research Paper on the proposed new Definition
Publication for professional use only April 2016 The materiality of ESG factors for equity investment decisions: academic evidence
The materiality of ESG factors for equity investment decisions: academic evidence www.nnip.com Content Executive Summary... 3 Introduction... 3 Data description... 4 Main results... 4 Results based on
Comparative Analysis of Different Software Quality Models
Comparative Analysis of Different Software Quality Models Ranbireshwar S. Jamwal, Deepshikha Jamwal & Devanand Padha [email protected], [email protected],[email protected] Lecturer, Research
RESTRICTION ON DISCLOSURE AND USE OF DATA
RESTRICTION ON DISCLOSURE AND USE OF DATA This document includes data that shall not be disclosed outside the Government and shall not be duplicated, used, or disclosed in whole or in part for any purpose
Transitioning Your Software Process To Agile Jeffery Payne Chief Executive Officer Coveros, Inc. [email protected] www.coveros.
Transitioning Your Software Process To Agile Jeffery Payne Chief Executive Officer Coveros, Inc. [email protected] www.coveros.com 1 About Coveros Coveros helps organizations accelerate the delivery
Implement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
The role of integrated requirements management in software delivery.
Software development White paper October 2007 The role of integrated requirements Jim Heumann, requirements evangelist, IBM Rational 2 Contents 2 Introduction 2 What is integrated requirements management?
City of Cleveland Social Media Policy
City of Cleveland Social Media Policy Mayor s Office of Communications October 2012 City of Cleveland Social Media Policy and Guidelines for Public Use The City of Cleveland is participating in social
HR Function Optimization
HR Function Optimization People & Change Advisory Services kpmg.com/in Unlocking the value of human capital Human Resources function is now recognized as a strategic enabler, aimed at delivering sustainable
Audi's Three Steps to a Winning CRM Strategy
Case Studies, E. Thompson, A. Bona Research Note 14 January 2004 Audi's Three Steps to a Winning CRM Strategy This case study shows how Audi takes reactive, proactive and selective approaches to customer
Executive Summary April 2009
Executive Summary April 2009 About the International Coach Federation The International Coach Federation (ICF) is the largest worldwide resource for business and personal coaches, and the source for those
Fraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
Methodology to Implement SAP Process Integration
Methodology to Implement SAP Process Integration Applies to: SAP NetWeaver, SAP Exchange Infrastructure, SAP Process Integration Summary When starting a SAP PI project from scratch, it is very important
Research Investments in Large Indian Software Companies
Research Investments in Large Indian Software Companies Pankaj Jalote Professor, Department of Computer Science and Engineering Indian Institute of Technology Kanpur, India 208016 [email protected], www.cse.iitk.ac.in/users/jalote
An Introduction to. Metrics. used during. Software Development
An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote
Guaranteed Income for Life Select
Guaranteed Income for Life Select Adding a source of guaranteed income to your retirement A source of guaranteed income for life Retirement planning that incorporates a guarantee At John Hancock Retirement
International Trade and Corporate Social Responsibility
International Trade and Corporate Social Responsibility Professor Kevin Kolben Rutgers Business School, Newark and New Brunswick, New Jersey, USA Testimony Before the Committee on International Trade European
