Applying ISO26262 to Tool Qualification
|
|
|
- Ami Green
- 10 years ago
- Views:
Transcription
1 Applying ISO26262 to Tool Qualification Dr. Oscar Slotosch, Validas AG Marco Reiling, Wind River Seite 1
2 Content: Tool Chain Analysis Motivation: ISO 26262: Tool Confidence Method: Tool Chain Analysis General Error Model Validas Tool Chain Analyzer Wind River Diab Compiler Qualification Kit Page 2
3 Content: Tool Chain Analysis Motivation: ISO 26262: Tool Confidence Method: Tool Chain Analysis General Error Model Validas Tool Chain Analyzer Wind River Diab Compiler Qualification Kit Page 3
4 Confidence in Use of Tools Planning Tool Usage [ ] Tool Application Guide [ ] Determination [ ] of... Info for Eval & Use [ ] to be available a) Feature Desc b) User Manual c) Env Tool Evaluation [ ] a) Unique ID b) Config c) Use Cases d) Env e) Max ASIL f) Qual. Mthd d) Anomalous Op Cond e) Known Malfunctions f) Measures for Detect. Malfunctions Tool Criteria Evaluation Report [ ] Tool Qualification [ ] Validity Check [ ] Usage Description [ ] error -prevention & -detection a) Purpose b) Input/Output c) Env.& Func. Constraints Tool Qualification Report [ ] Analysis [ ] a) Tool Impact b) Possible Malfunctions with Tool Error Detection Qualification Info [ ] Tool Confidence Level according to a) and b) Compliance Check [ ] Confirmation Review [ ] a) Unique ID b) Max TCL c) Max ASIL d) Config + Env e) TQ Persons f) Methods g) Measure Res Legend: [x-y] paragraph y in ISO part x (Baseline 19) h) Constraints + Malfunctions
5 ISO , Chapter 11: Confidence in the use of software tools Classification in Tool Confidence Level (TCL) Tool Impact (TI) TI1: no impact => Tool is TCL1 TI2: some impact Tool Error Detection/prevention probability (TD) TD1:high confidence => Tool is TCL1 TD2:medium confidence => Tool is TCL2 TD3: low/unkown confidence => Tool is TCL3 Justification? Dokumentation? Confirmation Review! Page 5
6 Content: Tool Chain Analysis Motivation: ISO 26262: Tool Confidence Method: Tool Chain Analysis General Error Model Validas Tool Chain Analyzer Wind River Diab Compiler Qualification Kit Page 6
7 Modeling Method / Process for TCA 1. Planning: 1. Build a formal model of tool usage based on tool and process information 2. Validate the model (Review, Checklists) 2. Tool Evaluation 1. Systematically build an error model (black box / glass box) 2. Model detection and prevention (including assumptions) 3. Validate assumptions and error/detection/prevention model 4. Compute the TCL (with/without assumptions) 5. Generate tool evaluation report 3. Tool Qualification Validas General Error Model User Process tool usage TCA TCL Report Page 7 Features, possible Checks Tool Provider
8 Tool Chain Analysis & Error Model Motivation / Requirements for Error Model One error model describes possible tool errors in every tool Error model should be extensible (for new kinds of tools) Error model should cover all potential errors Error model should be acceptable (agreeable and simple to apply) Error model should cover the existing (known) errors Systematic ( Repeatable ) approach needed Page 8
9 General Error Model Creation Process Inductive: From known errors to classes of potential errors ( Observing ) Deductive: From tool to potential errors ( Analytic Approach ) Black-Box Approach: Consider Tool Outputs Default errors for typical artifact attributes (XML, Code, ) White-Box Approach: Consider Tool Structure (features & tool components) Management: Default errors for typical tool attributes (Optimizing / Parsing / Searching / ) Relation between errors: Subsuming Assignment of errors to tool chain Validation of error model error model with Default Classes Page 9
10 Tool / Feature Model Tool provider / expert creates this model Based on tool analysis Consisting of Tools Features with input/output artifacts Potential errors Mitigation possibilities with probabilities (HIGH / MEDIUM / LOW) Checks Restrictions Page 10
11 Process/Use Case Model User creates this model Based on his process Consisting of Tools Artifacts Use-Cases with input/output artifacts Potential errors are inferred from required features (including proposals for mitigations) Required features (available from Tool model) Page 11
12 Determine Tool Confidence Level Can be computed automatically from the model Validas General Error Model User Process tool usage TCA TCL Report Features, possible Checks Tool Provider Create a report to document the results Page 12
13 Content: Tool Chain Analysis Motivation: ISO 26262: Tool Confidence Method: Tool Chain Analysis General Error Model Validas Tool Chain Analyzer Wind River Diab Compiler Qualification Kit Page 13
14 Tool Chain Analyzer (TCA) Automatically determines the TCLs of tools and tool chains Bases on a formal model of Derived Error Model in TCA Tools Use cases (and features) Errors Detection/prevention mechanisms Artifacts (inputs & outputs) Qualifications for tools & features Supports generic error models Checks the validity of qualifications with a given ASIL Generates reports (.docx) Developed from Validas AG within European research project RECOMP Rich client, based on Eclipse modeling framework Evaluation available at Page 14
15 Content: Tool Chain Analysis Motivation: ISO 26262: Tool Confidence Method: Tool Chain Analysis General Error Model Validas Tool Chain Analyzer Wind River Diab Compiler Qualification Kit Page 15
16 Wind River Diab Compiler Provides Classification Information Features Potential Errors Provides Qualification Support (Qualification Kit) Instrumented Compiler Tests Application Method More Details will be presented at Page Juli 2012 Stuttgart, Mövenpick Airport Hotel
17 Summary Systematic method to fulfill the ISO tool requirements Generic Error Model for repeatable results Validas Tool Chain Analyzer Wind River Diab Compiler Qualification Kit Page 17
18 Thank You! Arnulfstraße München Seite 18
ISO 26262 - Tool Chain Analysis Reduces Tool Qualification Costs
ISO 26262 - Tool Chain Analysis Reduces Tool Qualification Costs Oscar Slotosch, Martin Wildmoser, Jan Philipps, Reinhard Jeschull Validas AG München @validas.de Rafael Zalman Infineon Technologies
ISO 26262 Exemplary Tool Classification of Model-Based Design Tools
ISO 26262 Exemplary Classification of Model-Based Design s Mirko Conrad 1, Ines Fey 2 1 The MathWorks, Inc., Natick, MA, USA [email protected] 2 samoconsult GmbH Berlin, Germany [email protected]
.OR.AT.ATTORNEY.AUCTION.BARGAINS.BAYERN.BERLIN.BLACKFRIDAY.BOUTIQUE.BRUSSELS.BUILDERS
.AC.BIO.RESTAURANT.APARTMENTS.CASINO.SCHOOL.KIM.ACADEMY.ACCOUNTANTS.ACTOR.ADULT.AE.AERO.AG.AGENCY.AIRFORCE.ARCHI.ARMY.ASIA.ASSOCIATES.AT.CO.AT.OR.AT.ATTORNEY.AUCTION.AUDIO.BAND.BANK.BAR.BARGAINS.BAYERN.BE.BEER.BERLIN.BID.BIKE.BINGO.BIZ.BLACK.BLACKFRIDAY.BLUE.BOUTIQUE.BRUSSELS.BUILDERS.BUSINESS.BZ.CO.BZ.COM.BZ.ORG.BZ.CAB.CAFE.CAMERA.CAMP.CAPITAL.CARDS.CARE.CAREERS.CASA.CASH.CATERING.CC.CENTER.CH.CHAT.CHEAP.CHRISTMAS
Qualifying Software Tools According to ISO 26262
Qualifying Software Tools According to ISO 26262 Mirko Conrad 1, Patrick Munier 2, Frank Rauch 3 1 The MathWorks, Inc., Natick, MA, USA [email protected] 2 The MathWorks, SAS, Grenoble, France
IBM Rational Rhapsody
IBM Rational Rhapsody IBM Rational Rhapsody Reference Workflow Guide Version 1.9 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated
Anwendung von Polyspace im Software Entwicklungsprozess nach IEC 60880. München, 19.05.2011, Dr.-Ing. Jörg Barrho
Anwendung von Polyspace im Software Entwicklungsprozess nach IEC 60880 München, 19.05.2011, Dr.-Ing. Jörg Barrho Agenda 01 Tognum and MTU Friedrichshafen 02 Background and project 03 Overview IEC 60880
Problems and Measures Regarding Waste 1 Management and 3R Era of public health improvement Situation subsequent to the Meiji Restoration
R214 SPECIFIC REQUIREMENTS: INFORMATION TECHNOLOGY TESTING LABORATORY ACCREDITATION PROGRAM
The American Association for Laboratory Accreditation Document Revised: R214: Specific Requirements: Information Technology Testing Laboratory Accreditation July 13, 2010 Program Page 1 of 26 R214 SPECIFIC
ISO/IEC 15504 Part 2 provides the following copyright release:
Copyright Notice This document reproduces relevant material from ISO/IEC 15504:2003 Information Technology Process Assessment Part 2: Performing an assessment and ISO/IEC FCD 15504:2005 Information Technology
Software Engineering. Software Testing. Based on Software Engineering, 7 th Edition by Ian Sommerville
Software Engineering Software Testing Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To discuss the distinctions between validation testing and defect t testing To describe the
Capital Works Construction Project. [Insert Project Title] [Insert Sponsoring Agency]
Capital Works Construction Project [Insert Project Title] [Insert Sponsoring Agency] Detailed Business Case Commercial - in- Confidence [Insert Date] Table of Contents 1. Executive Summary --------------------------------------------------------------------------------------------------
DRAFT. Propose that environmental considerations be added to the list of strategic considerations.
DRAFT Proposed changes and reasoning for proposed changes to 5 th Edition of the PMBOK Guide. Rich Maltzman, MSIE, PMP Dave Shirley, MBA, PMP Tom Mochal, PgMP, PMP Andrea Krasnoff, PMP 1.4.3 Strategic
MDEP Generic Common Position No DICWG 02
MDEP Generic Common Position No DICWG 02 Related to: Digital Instrumentation and Controls Working Group activities COMMON POSITION ON SOFTWARE TOOLS FOR THE DEVELOPMENT OF SOFTWARE FOR SAFETY SYSTEMS 1
Fundamental Principles of Software Safety Assurance
Fundamental Principles of Software Safety Assurance Tim Kelly [email protected] Context Lack of agreement in the details of requirements of software safety assurance standards has long been recognised
Service OnBoarding: A Process Approach for Uniting ITIL and DevOps. Bill Cunningham
Service OnBoarding: A Process Approach for Uniting ITIL and DevOps Bill Cunningham Service OnBoarding A Process Approach for Uniting ITIL and DevOps through Standardized Non- Functional Requirements DevOps:
COMPANY LOGO. Project Charter Project Charter
Project Name Project Number The is created in the Initiating Process Group. Typically, a Project Manager, external to the project, writes the as an objective assessment. It formally authorizes the project
Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)
Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization 4.1 Understanding the organization and its context
Introduction to Computers and Programming. Testing
Introduction to Computers and Programming Prof. I. K. Lundqvist Lecture 13 April 16 2004 Testing Goals of Testing Classification Test Coverage Test Technique Blackbox vs Whitebox Real bugs and software
DNV GL Assessment Checklist ISO 9001:2015
DNV GL Assessment Checklist ISO 9001:2015 Rev 0 - December 2015 4 Context of the Organization No. Question Proc. Ref. Comments 4.1 Understanding the Organization and its context 1 Has the organization
SUPPLIER ASSESSMENT CHECKLIST
Sample Pages of SUPPLIER ASSESSMENT CHECKLIST For Standard ISO/IEC 90003:2004 Software engineering: Guidelines for the application of ISO 9001:2000 to computer software ISBN 0-9770309-1-1 7/5/2007 1 Sample
Software Testing. Definition: Testing is a process of executing a program with data, with the sole intention of finding errors in the program.
Software Testing Definition: Testing is a process of executing a program with data, with the sole intention of finding errors in the program. Testing can only reveal the presence of errors and not the
Usability metrics for software components
Usability metrics for software components Manuel F. Bertoa and Antonio Vallecillo Dpto. Lenguajes y Ciencias de la Computación. Universidad de Málaga. {bertoa,av}@lcc.uma.es Abstract. The need to select
The SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
Tinwisle Corporation. ISO/DIS 19439 & 19440, Framework and Constructs for Enterprise Modeling
Tinwisle Corporation ISO/DIS &, Framework and Constructs for Enterprise Modeling Richard A. Martin Convener ISO TC 184/SC 5/WG 1 ISO/DIS &, Framework and Constructs for Enterprise Modeling ISO/FDIS ISO/DIS
How to Improve Database Connectivity With the Data Tools Platform. John Graham (Sybase Data Tooling) Brian Payton (IBM Information Management)
How to Improve Database Connectivity With the Data Tools Platform John Graham (Sybase Data Tooling) Brian Payton (IBM Information Management) 1 Agenda DTP Overview Creating a Driver Template Creating a
Project Management Guidebook
METHOD 12 3 empowering managers to succeed Project Management Guidebook ISBN 0-473-10445-8 A bout this e-book This e-book was created by Method123 (see www.method123.com) to help provide you with a simple
Dealing with digital Information richness in supply chain Management - A review and a Big Data Analytics approach
Florian Kache Dealing with digital Information richness in supply chain Management - A review and a Big Data Analytics approach kassel IH university press Contents Acknowledgements Preface Glossary Figures
Enhanced Project Management for Embedded C/C++ Programming using Software Components
Enhanced Project Management for Embedded C/C++ Programming using Software Components Evgueni Driouk Principal Software Engineer MCU Development Tools 1 Outline Introduction Challenges of embedded software
Certified Secure Web Application Secure Development Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill
Minnesota Health Insurance Exchange (MNHIX)
Minnesota Health Insurance Exchange (MNHIX) 1.2 Plan September 21st, 2012 Version: FINAL v.1.0 11/9/2012 2:58 PM Page 1 of 87 T A B L E O F C O N T E N T S 1 Introduction to the Plan... 12 2 Integration
How To Monitor A Project
Module 4: Monitoring and Reporting 4-1 Module 4: Monitoring and Reporting 4-2 Module 4: Monitoring and Reporting TABLE OF CONTENTS 1. MONITORING... 3 1.1. WHY MONITOR?... 3 1.2. OPERATIONAL MONITORING...
Clarifying a vision on certification of MDA tools
SCIENTIFIC PAPERS, UNIVERSITY OF LATVIA, 2010. Vol. 757 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES 23 29 P. Clarifying a vision on certification of MDA tools Antons Cernickins Riga Technical University,
Software Project Management using an Iterative Lifecycle Model
Software Corporation Software Project Management using an Iterative Lifecycle Model 1 Objectives of this Presentation To understand what the Unified Process is To understand the iterative lifecycle approach
Module 10. Coding and Testing. Version 2 CSE IIT, Kharagpur
Module 10 Coding and Testing Lesson 23 Code Review Specific Instructional Objectives At the end of this lesson the student would be able to: Identify the necessity of coding standards. Differentiate between
Course Topics: Course Name: Oracle Purchasing. Duration 5 Days. Procure To Pay Lifecycle Overview. Oracle Purchasing Overview
Course Name: Oracle Purchasing Duration 5 Days Course Topics: Procure To Pay Lifecycle Overview Understanding Procure to Pay Lifecycle Understanding Oracle Procure to Pay Process Oracle Purchasing Overview
Configuration Notes Aastra MX-ONE in Ascom VoWiFi System
Configuration Notes Aastra MX-ONE in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 VoWiFi Handset Configuration... 2 2.1 Automatic Callback... 2 3 MX-ONE Configuration...
WHITE PAPER. Effectively managing project performance reporting.
WHITE PAPER Effectively managing project performance reporting. Summary This white paper helps project teams identify performance measures for Information Technology (IT) support and maintenance projects,
Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities
September 2, 2003 Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities Purpose This document provides a summary of the requirements relating to use of computer-based systems in activities
METADATA-DRIVEN QLIKVIEW APPLICATIONS AND POWERFUL DATA INTEGRATION WITH QLIKVIEW EXPRESSOR
METADATA-DRIVEN QLIKVIEW APPLICATIONS AND POWERFUL DATA INTEGRATION WITH QLIKVIEW EXPRESSOR A QlikView Technical Brief Document March 2013 qlikview.com Introduction This technical brief highlights a subset
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Institutionen för datavetenskap Department of Computer and Information Science
Institutionen för datavetenskap Department of Computer and Information Science Examensarbete Development of an ISO 26262 ASIL D compliant verification system Daniel Carlsson LIU-IDA/LITH-EX-A-13/005-SE
VDA6.3 Process Audit Webinar 1 st April 2014. Paul Hardiman Qualified VDA6.3 trainer
VDA6.3 Process Audit Webinar 1 st April 2014 Paul Hardiman Qualified VDA6.3 trainer During presentations (11:00 11:30) everyone will be muted so that only the presenter will be heard. The presentation
Configuring budget planning for Microsoft Dynamics AX 2012 R2
Microsoft Dynamics AX 2012 R2 Configuring budget planning for Microsoft Dynamics AX 2012 R2 White Paper This document describes configuration considerations for implementing budget planning. October 2012
Software Engineering talk
Software Engineering talk Title: Lean or Agile software engineering process: an industry perspective By Keith Hanson, CEO, Twin Engine Labs Time & Place: 5:30pm, Jan 9 2014, Bogard Hall 1/7/14 1 ITEC420:
A Case study based Software Engineering Education using Open Source Tools
A Case study based Software Engineering Education using Open Source Tools Sowmya B J Dept. of CSE M. S. Ramaiah Institute of Technology [email protected] Srinidhi Hiriyannaiah Dept. of CSE M.S. Ramaiah
A. Programme Specification
A. Programme Specification Programme Title: MSc Project (Malawi Institute of ) Awarding Institution: Teaching Institution: University of Bolton University of Bolton Malawi Institute of (MIM) Division and/or
CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN
CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN Central to this research is how the service industry or service providers use idesign as a new methodology to analyze, design,
Movicon in energy efficiency management: the ISO 50001 standard
Movicon in energy efficiency management: the ISO 50001 standard The importance of energy consumption within the company reflects the importance of the world energy crisis due to a growing demand and the
Knowledge Area Inputs, Tools, and Outputs. Knowledge area Process group/process Inputs Tools Outputs
HUMAN RESOURCE MANAGEMENT Organizational planning Staff Acquisition Project interfaces such as organizational interfaces, technical interfaces and interpersonal interfaces. Staffing requirements Staffing
Software Estimation: Practical Insights & Orphean Research Issues
Software Estimation: Practical Insights & Orphean Research Issues Alain Abran École de Technologie Supérieure, University of Québec, Montréal, Canada [email protected] 9 th International Conference
Safe Automotive software architecture (SAFE) WP3 Deliverable D3.6.b: Safety Code Generator Specification
Contract number: ITEA2 10039 Safe Automotive software architecture (SAFE) ITEA Roadmap application domains: Major: Services, Systems & Software Creation Minor: Society ITEA Roadmap technology categories:
TESSY Automated dynamic module/unit and. CTE Classification Tree Editor. integration testing of embedded applications. for test case specifications
TESSY Automated dynamic module/unit and integration testing of embedded applications CTE Classification Tree Editor for test case specifications Automated module/unit testing and debugging at its best
Threat Modeling. 1. Some Common Definition (RFC 2828)
Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.
8. Master Test Plan (MTP)
8. Master Test Plan (MTP) The purpose of the Master Test Plan (MTP) is to provide an overall test planning and test management document for multiple levels of test (either within one project or across
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004
[CRT14] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004 Date: Wednesday 27 th May 2015 Time: 14:00 16:00
NATO GUIDANCE ON THE USE OF THE AQAP 2000 SERIES
NATO GUIDANCE ON THE USE OF THE AQAP 2000 SERIES (June 2003) I ORIGINAL Page blank II ORIGINAL NORTH ATLANTIC TREATY ORGANIZATION NATO STANDARDISATION AGENCY (NSA) NATO LETTER OF PROMULGATION June 2003
Project Proposal: SAP Big Data Analytics on Mobile Usage Inferring age and gender of a person through his/her phone habits
George Mason University SYST 699: Masters Capstone Project Spring 2014 Project Proposal: SAP Big Data Analytics on Mobile Usage Inferring age and gender of a person through his/her phone habits February
SOFTWARE ENGINEERING INTERVIEW QUESTIONS
SOFTWARE ENGINEERING INTERVIEW QUESTIONS http://www.tutorialspoint.com/software_engineering/software_engineering_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Software Engineering
Site Configuration SETUP GUIDE. Windows Hosts Single Workstation Installation. May08. May 08
Site Configuration SETUP GUIDE Windows Hosts Single Workstation Installation May08 May 08 Copyright 2008 Wind River Systems, Inc. All rights reserved. No part of this publication may be reproduced or transmitted
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING THE BUSINESS ANALYTICS PROCESS FOR BIG DATA J/505/5326 LEVEL 3 UNIT 39 GUIDED LEARNING HOURS: 60 UNIT CREDIT
Development Process Automation Experiences in Japan
Development Process Automation Experiences in Japan Dr. Olaf Kath ikv ++ technologies ag Germany ikv++ technologies ag 2007 who we are core business optimization and automation of our customer s system
Turning Data into Actionable Insights: Predictive Analytics with MATLAB WHITE PAPER
Turning Data into Actionable Insights: Predictive Analytics with MATLAB WHITE PAPER Introduction: Knowing Your Risk Financial professionals constantly make decisions that impact future outcomes in the
Institute of Chartered Accountants Ghana (ICAG) Paper 2.2 Management Accounting
Institute of Chartered Accountants Ghana (ICAG) Paper. Management Accounting Final Mock Exam Marking scheme and suggested solutions DO NOT TURN THIS PAGE UNTIL YOU HAVE COMPLETED THE MOCK EXAM ii Management
RUnit - A Unit Test Framework for R
RUnit - A Unit Test Framework for R Thomas König, Klaus Jünemann, and Matthias Burger Epigenomics AG November 5, 2015 Contents 1 Introduction 2 2 The RUnit package 4 2.1 Test case execution........................
Fortinet Solutions for Compliance Requirements
s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized
ISTQB Certified Tester. Foundation Level. Sample Exam 1
ISTQB Certified Tester Foundation Level Version 2015 American Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. #1 When test cases are designed
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Model Based Engineering and Its Integration with Safety Assurance Cases for Medical Device Software
Model Based Engineering and Its Integration with Safety Assurance Cases for Medical Device Software Yi Zhang Ph.D., Paul Jones Office of Science and Engineering Laboratories Center for Devices and Radiological
How to Upgrade SPICE-Compliant Processes for Functional Safety
How to Upgrade SPICE-Compliant Processes for Functional Safety Dr. Erwin Petry KUGLER MAAG CIE GmbH Leibnizstraße 11 70806 Kornwestheim Germany Mobile: +49 173 67 87 337 Tel: +49 7154-1796-222 Fax: +49
ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: 0207 444 4080 Email: [email protected].
ediscovery G-Cloud V Service Definition Lot 4 SCS Tender Validity Period: 120 days from 10/04/14 Contact us: Danielle Pratt Email: [email protected] Contents About... 1 Specialist Cloud
Introduction to Quality Assessment
Introduction to Quality Assessment EU Twinning Project JO/13/ENP/ST/23 23-27 November 2014 Component 3: Quality and metadata Activity 3.9: Quality Audit I Mrs Giovanna Brancato, Senior Researcher, Head
TIME KEEP LEGAL BILLING SOFTWARE REQUIREMENTS SPECIFICATION
TIME KEEP LEGAL BILLING SOFTWARE REQUIREMENTS SPECIFICATION 1. Introduction: This document defines the Software Requirements Specification (SRS) for the Time Keep Legal Billing software application. This
What changes will ISO 9001:2015 bring?
What changes will ISO 9001:2015 bring? 1 Introduction This presentation will cover the following topics: The ISO 9001 Revision Process Key Inputs to ISO 9001:2015 The High Level Structure Key Changes in
TREE RISK ASSESSMENT
TREE RISK ASSESSMENT Tree Risk Assessment What has ISA done and why? Tree Risk Assessment What has ISA done and why? What is risk assessment and how does it fit within the context of risk management? Tree
Unit 1: Introduction to Quality Management
Unit 1: Introduction to Quality Management Definition & Dimensions of Quality Quality Control vs Quality Assurance Small-Q vs Big-Q & Evolution of Quality Movement Total Quality Management (TQM) & its
Analyzing Plan Diagrams of Data Query Optimizers
Analyzing Plan Diagrams of Data Query Optimizers INSTITUT FÜR PROGRAMMSTRUKTUREN UND DATENORGANISATION (IPD), FAKULTY OF INFORMATICS 1 KIT University of the State of Baden-Wuerttemberg and National Research
Quality-Oriented Requirements Engineering for Agile Development of RESTful Participation Service
Quality-Oriented Requirements Engineering for Agile Development of RESTful Participation Service Michael Gebhart iteratec GmbH Stuttgart, Germany [email protected] Pascal Giessler, Pascal Burkhardt,
Testing of safety-critical software some principles
1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6
Continuous Delivery Workshop
Continuous Delivery Workshop deployment pipelines Workshop materials created by Jez Humble, Martin Fowler, Tom Sulston, & Neal Ford deployment pipelines tests, synergistic practices, incremental deployment
Sample Pages for TEMPLATE FOR A SOFTWARE DOCUMENTATION MANAGEMENT PLAN
Sample Pages for TEMPLATE FOR A SOFTWARE DOCUMENTATION MANAGEMENT PLAN Author: George Jackelen, PMP Produced by: Software Engineering Process Technology (SEPT) 2725 NW Pine Cone Drive Issaquah WA 98027
Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2. Last revised September 26, 2014
Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2 Last revised September 26, 2014 i Copyright Notice All rights reserved. Printed in the United States of America. No part
Using Web Security Scanners to Detect Vulnerabilities in Web Services
DSN 2009 Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira,, Henrique Madeira {mvieira, nmsa, henrique}@dei.uc.pt CISUC Department of Informatics Engineering University
