Small Data in Big Data July 17, 2013 So6ware Experts Summit Sea>le
|
|
- Quentin Shepherd
- 8 years ago
- Views:
Transcription
1 Small Data in Big Data July 17, 2013 So6ware Experts Summit Sea>le Ayse Basar Bener Data Science Lab Mechanical and Industrial Engineering Ryerson University
2 Part 1 ANALYTICS IN SOFTWARE ENGINEERING
3 Data AnalyKcs in So6ware Engineering To make decisions under uncertainty How to assign available resources and budget end- to- end? Where to allocate scarce teskng resources? How much maintenance effort is required? When to stop teskng? How confident are we to release the product?.. Expert judgement is common way to make decisions Bias, availability, limited experience
4 Data AnalyKcs in So6ware Engineering Necessary, but sca>ered Code versioning systems Code metric repositories Issue tracking/ management systems Specialized tools Non- generalizable research outcomes
5 Theory (Kahneman) Human mind works in two modes: Fast Thinking Mode: Default Based on heuriskcs Error prone Slow Thinking Mode: ReacKve: Triggered by Fast Thinking Based on Facts and Logic Clouded by Fast Thinking
6 Where Big Data Techniques fit in SE: Help experts by simulakng human slow thinking mode in a faster mode!
7 The Problem Ø Sca>ered Research Clusters Ø Overlooked Research Clusters Ø Lack of generalizakon Efforts Ø Lack of Theory Ø Privacy Concerns of Industry Turhan, B. & A. Bener, RAISE 2013
8 The Vision Theory Interplay of analykcs techniques and SE to work like human brain Human in the loop models PracKce Use big data and experts to not only predict the future, but cause the future Tool support Caglayan et al., FSE 2012
9 How? Ø Stop validakng, start applying in real sehngs Ø to provide tools that combine individually validated research clusters for enabling applicakons in real sehngs Ø to refocus on overlooked research clusters, i.e. people in 3P (People, Product, Process). Ø to form an academic culture paying a>enkon to underlying theories and assumpkons to avoid academic number crunching exercises. Ø to extend our efforts beyond individual cases to pursue generalizakons. Ø to address the concerns of business side whose data and support are required to realize the above.
10 Puhng the Bricks Together Where we are Where we should be Not only predict the future, but cause the future
11 Part 2 DOES SIZE MATTER?
12 The devil is hidden in the details To uncover hidden pa7erns in big data
13 Big Data versus Data Analysis The sum of small pieces are larger than the whole? Issues Access Storage Processing
14 Size versus Data Any data or meaningful data Centralized or decentralized CollaboraKon or control May be small is beaukful
15 Small Data Data AnalyKcs = Big Data?? Context based Case studies Model assumpkons More data to overcome over fihng? CogniKve biases in determining model parameters
16 Part 3 SMALL DATA EXAMPLES
17 Small data is important in so6ware engineering Sampling: Empirical evidence Under/ micro sampling Dimensionality reduckon T. Menzies, B. Turhan, G. Gay, A. Bener, B. Cukic, H. Jiang PROMISE 08
18 Micro Sampling: Use Even Less... Given N defeckve modules: M = {25, 50, 75,...} <= N Select M defeckve and M defect- free modules. Learn theories on 2M instances Undersampling: M=N 8/12 datasets - > M = 25 1/12 datasets - > M = 75 3/12 datasets - > M = {200, 575, 1025} T. Menzies, B. Turhan, G. Gay, A. Bener, B. Cukic, H. Jiang PROMISE 08
19 QualitaKve Studies in So6ware Engineering ConnecKng the dots Field studies RecommendaKon systems Researcher and PracKKoner work together Be>er understand the overlooked areas
20 Problem Predic'on of defect categories Goal We aimed to increase the informakon content of the output of a defect predickon model by eskmakng the categories of defects in the defect- prone so6ware modules. Challenges Many defect categorizakon methodologies in the literature. No standard categorizakon methodology. Most of the exiskng defect data are not categorized at all.
21 1- Big Data Analysis We had to use the category definikons that were available in mulkple datasets: pre- and post- release defect categories. DefiniKon of pre- release and post- release different among projects. Predictor performance not saksfactory. CategorizaKon not worth the trouble? These categories were not meaningful for the customer.
22 1- Big Data Analysis
23 2- Small Data Analysis We idenkfied the defect categories with the quality assurance team of the company. We idenkfied metrics that were significantly correlated with the categories by analyzing the small data. The model since the categorizakon was tailored for the company needs. We improved defect predickon accuracy with the category- aware defect predictor.
24 2- Small Data Analysis
25 Lessons Learned Analysis of data with the key stakeholders of the organizakon is the key for providing delivering a valuable solukon. Knowledge gained from one customer may not be directly transferrable to another. Caglayan et al., Promise 2010 Tosun et al., WeTSOM 2011
26 Problem Confirma'on biases of so9ware engineers Goal to analyze factors affeckng so6ware engineers confirmakon biases. MoDvaDon due to the confirmatory behavior of so6ware engineers, defects may be introduced during any phase of SDLC IdenKficaKon of the factors affeckng confirmakon bias to circumvent its negakve effects Challenges QuanKficaKon of confirmakon bias
27 1- Big Data Analysis DefiniKon of a methodology to quankfy confirmakon bias levels of so6ware engineers. FormaKon of confirmakon bias metrics set. FormaKon of a single derived metric. ConducKng N- way ANOVA. Some results did not turn out to be meaningful.
28 1- Big Data Analysis
29 2- Small Data Analysis IdenKfied outliers in the data and analyzed them. Interviews with PM s and SE s who are outliers InvesKgate task load distribukon of developers. Outliers had heavy task loads and they were mentally exhausted. Hence, their test results did not reflect their actual confirmakon bias levels. We removed the outliers and repeated the analysis procedure.
30 2- Small Data Analysis
31 Lessons Learned Analysis of data with so6ware engineers and project managers who are involved in the field studies is crucial. Field studies should cover so6ware companies from different domains as much as possible to overcome threats to external validity and to obtain meaningful results. Calikli & Bener, ASE 2013 Calikli, Bener & Arslan, ICSE 2010
32 Part 4 CONCLUSION
33 Raw Data- the process case study Schu>, R. 2012, Data Science Course Blog: h>p:// columbiadatascience.com/blog
34 Small Data Meaningful small data is all you need Theories can be learned from a very small sample of available data We need to understand the underlying concepts Combine with available data and models Combined use of big data techniques and local models Remove errors with small data Access and use enourmous amount of data for analysis- with big data Tosun et al., 2014
35 Thank You
Confirmation Bias as a Human Aspect in Software Engineering
Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD Data Science Laboratory, Department of Mechanical and Industrial Engineering, Ryerson University Why Human Aspects in Software
More informationConfirmation Bias as a Human Aspect in Software Engineering
Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD & Ayse Bener, PhD gcalikli@ryerson.ca, ayse.bener@ryerson.ca Data Science Laboratory, Department of Mechanical and Industrial
More informationPractical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry
Practical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry!"#$%&'()* 1, Burak Turhan 1 +%!"#$%,$*$- 1, Tim Menzies 2 ayse.tosun@boun.edu.tr, turhanb@boun.edu.tr,
More informationBIG DATA AND ANALYTICS
BIG DATA AND ANALYTICS Björn Bjurling, bgb@sics.se Daniel Gillblad, dgi@sics.se Anders Holst, aho@sics.se Swedish Institute of Computer Science AGENDA What is big data and analytics? and why one must bother
More informationClass Imbalance Learning in Software Defect Prediction
Class Imbalance Learning in Software Defect Prediction Dr. Shuo Wang s.wang@cs.bham.ac.uk University of Birmingham Research keywords: ensemble learning, class imbalance learning, online learning Shuo Wang
More informationSoftware Metrics. Alex Boughton
Software Metrics Alex Boughton Executive Summary What are software metrics? Why are software metrics used in industry, and how? Limitations on applying software metrics A framework to help refine and understand
More informationCommunity-Assisted Software Engineering Decision Making. Technical Report
Community-Assisted Software Engineering Decision Making Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 Keller Hall 200 Union Street SE Minneapolis, MN 55455-0159
More informationMiracle Integrating Knowledge Management and Business Intelligence
ALLGEMEINE FORST UND JAGDZEITUNG (ISSN: 0002-5852) Available online www.sauerlander-verlag.com/ Miracle Integrating Knowledge Management and Business Intelligence Nursel van der Haas Technical University
More informationDHL Data Mining Project. Customer Segmentation with Clustering
DHL Data Mining Project Customer Segmentation with Clustering Timothy TAN Chee Yong Aditya Hridaya MISRA Jeffery JI Jun Yao 3/30/2010 DHL Data Mining Project Table of Contents Introduction to DHL and the
More informationXpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
More informationData Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
More informationText Analytics. A business guide
Text Analytics A business guide February 2014 Contents 3 The Business Value of Text Analytics 4 What is Text Analytics? 6 Text Analytics Methods 8 Unstructured Meets Structured Data 9 Business Application
More informationPresented By: Leah R. Smith, PMP. Ju ly, 2 011
Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a
More informationApplication Test Management and Quality Assurance
SAP Brief Extensions SAP Quality Center by HP Objectives Application Test Management and Quality Assurance Deliver new software with confidence Deliver new software with confidence Testing is critical
More informationHexaware E-book on Predictive Analytics
Hexaware E-book on Predictive Analytics Business Intelligence & Analytics Actionable Intelligence Enabled Published on : Feb 7, 2012 Hexaware E-book on Predictive Analytics What is Data mining? Data mining,
More informationThe Business Case for Information Management An Oracle Thought Leadership White Paper December 2008
The Business Case for Information Management An Oracle Thought Leadership White Paper December 2008 NOTE: The following is intended to outline our general product direction. It is intended for information
More informationThe Australian Public Service Big Data Strategy
The Australian Public Service Big Data Strategy Improved understanding through enhanced data-analytics capability AIIA response March 2014 Contact for this submission: Suzanne Roche 39 Torrens St Braddon
More informationFACTS ABOUT BIG DATA ANALYTICS PLATFORA. BIG DATA ANALYTICS Series
5 FACTS ABOUT BIG DATA ANALYTICS PLATFORA BIG DATA ANALYTICS Series BIG DATA ANALYTICS FICTIONS, FEELINGS, AND FAITH Does Your Company Run On Facts? Or Fictions, Feelings and Faith? No doubt you answered
More informationSafe Harbor Statement
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
More informationPredicting More from Less: Synergies of Learning
Predicting More from Less: Synergies of Learning Ekrem Kocaguneli, Bojan Cukic, Huihua Lu Lane Department of Computer Science and Electrical Engineering West Virginia University Morgantown, WV, USA Email:
More informationTAUS Quality Dashboard. An Industry-Shared Platform for Quality Evaluation and Business Intelligence September, 2015
TAUS Quality Dashboard An Industry-Shared Platform for Quality Evaluation and Business Intelligence September, 2015 1 This document describes how the TAUS Dynamic Quality Framework (DQF) generates a Quality
More informationCognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational
More informationSOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS http://www.tutorialspoint.com/software_engineering/software_requirements.htm Copyright tutorialspoint.com The software requirements are description of features and functionalities
More informationThree Reasons to Integrate ERP and HCM. White Paper
Three Reasons to Integrate ERP and HCM White Paper Table of Contents Three Reasons to Integrate ERP and HCM 3 1. Unified Data Wins 3 Releasing the Power of Unified Data 3 2. Employee-Driven Workflows Matter
More informationThe Business Case for Using Big Data in Healthcare
SAP Thought Leadership Paper Healthcare and Big Data The Business Case for Using Big Data in Healthcare Exploring How Big Data and Analytics Can Help You Achieve Quality, Value-Based Care Table of Contents
More informationRevealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures
Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures Michael Maurer, Ivan Breskovic, Vincent C. Emeakaroha, and Ivona Brandic Distributed Systems Group Institute of Information
More informationEnterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
More informationBig Data 101: Harvest Real Value & Avoid Hollow Hype
Big Data 101: Harvest Real Value & Avoid Hollow Hype 2 Executive Summary Odds are you are hearing the growing hype around the potential for big data to revolutionize our ability to assimilate and act on
More informationCRM for Real Estate Part 2: Realizing the Vision
CRM for Real Estate Anne Taylor Contents Introduction... 1 Meet the Challenges... 2 Implementation Approach... 3 Demystifying CRM... 5 Conclusion... 7 Introduction Once the decision to implement a CRM
More informationOracle Data Integrator 12c (ODI12c) - Powering Big Data and Real-Time Business Analytics. An Oracle White Paper October 2013
An Oracle White Paper October 2013 Oracle Data Integrator 12c (ODI12c) - Powering Big Data and Real-Time Business Analytics Introduction: The value of analytics is so widely recognized today that all mid
More informationSoftware Defect Prediction Modeling
Software Defect Prediction Modeling Burak Turhan Department of Computer Engineering, Bogazici University turhanb@boun.edu.tr Abstract Defect predictors are helpful tools for project managers and developers.
More informationTechnical Management Strategic Capabilities Statement. Business Solutions for the Future
Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.
More informationThe demand of Cloud Computing in Europe: drivers, barriers, market estimates
The demand of Cloud Computing in Europe: drivers, barriers, market estimates Gabriella Cattaneo Associate VP IDC European Government Consulting Research In Future Cloud Computing workshop Bruxelles, May
More informationTracking the Impact of Design Changes During Software Development
Tracking the Impact of Design Changes During Software Development Frank Padberg Fakultät für Informatik Universität Karlsruhe, Germany padberg@ira.uka.de Abstract Design changes occur frequently during
More informationAdaptive elearning Accelerating scalable learning impact
Tell me and I forget. Teach me and I remember. Involve me and I learn. Benjamin Franklin Adaptive elearning Accelerating scalable learning impact Adaptive elearning ACCELERATING SCALABLE LEARNING IMPACT
More information1/27/2013. PSY 512: Advanced Statistics for Psychological and Behavioral Research 2
PSY 512: Advanced Statistics for Psychological and Behavioral Research 2 Introduce moderated multiple regression Continuous predictor continuous predictor Continuous predictor categorical predictor Understand
More informationThe Critical Success Factors for Implementation of Customer Relationship Management in the Banking Sector of Saudi Arabia
The Critical Success Factors for Implementation of Customer Relationship Management in the Banking Sector of Saudi Arabia Dr. Sulaiman A. Al-Hudhaif, Associate Dean for Quality and Development, College
More informationManaging the Shadow Cloud
Managing the Shadow Cloud Integrating cloud governance into your existing compliance program August 2014 Shadow IT is not a new concept and organizations are well aware of the risks associated with unauthorized
More informationBig Data More Is Not Always Better For Your Big Data Strategy
Big Data More Is Not Always Better For Your Big Data Strategy Abstract Everyone is talking about Big Data. Enterprises across the globe are spending significant dollars on it and endeavor with their strategy.
More informationKnowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs anton.heijs@treparel.com Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
More informationCHAPTER - 5 CONCLUSIONS / IMP. FINDINGS
CHAPTER - 5 CONCLUSIONS / IMP. FINDINGS In today's scenario data warehouse plays a crucial role in order to perform important operations. Different indexing techniques has been used and analyzed using
More informationBig Data for Banks: 5 Profitable Use Cases
Big Data for Banks: 5 Profitable Use Cases Did you know that one of the earliest forms of structured data as we know it, at least in Western culture, came from trade? Italian merchants saw an increase
More informationWhite Paper. Fundamentals of Performance Testing
etri White Paper Fundamentals of Performance Testing The Increasing Need for Proper Performance Testing due to Increasing Software Complexity in the Enterprise There have been two significant changes in
More informationUIIPA - Security Risk Management. June 2015
UIIPA - Security Risk Management June 2015 1 Introduction Tim Hastings, Chief Information Security Officer State of Utah - Department of Technology Services Tim Hastings has more than 16 years of experience
More informationApplication Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
More informationUsing Earned Value, Part 2: Tracking Software Projects. Using Earned Value Part 2: Tracking Software Projects
Using Earned Value Part 2: Tracking Software Projects Abstract We ve all experienced it too often. The first 90% of the project takes 90% of the time, and the last 10% of the project takes 90% of the time
More informationProject Planning and Project Estimation Techniques. Naveen Aggarwal
Project Planning and Project Estimation Techniques Naveen Aggarwal Responsibilities of a software project manager The job responsibility of a project manager ranges from invisible activities like building
More informationExploratory Testing An Agile Approach STC-2009. Aman Arora. Xebia IT Architects India Pvt. Ltd. Sec-30, Gurgaon 122001, Haryana
1 Exploratory Testing An Agile Approach STC-2009 Aman Arora Xebia IT Architects India Pvt. Ltd. Unit No-612, 6 th floor, BPTP park Centra, Sec-30, Gurgaon 122001, Haryana 2 Abstract As the IT industry
More informationTop Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation
Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely
More informationElimination of Estimation biases in the Software Development
Elimination of Estimation biases in the Software Development Thamarai. I. Research scholar, computer science department Sathyabama University, Chennai, India ilango.thamarai@gmail.com Dr.S.Murugavalli
More informationOn the Cost of Mining Very Large Open Source Repositories
On the Cost of Mining Very Large Open Source Repositories Sean Banerjee Carnegie Mellon University Bojan Cukic University of North Carolina at Charlotte BIGDSE, Florence 2015 Introduction Issue tracking
More informationAcompany that consistently selects the right projects and
PM.01 How to Create a World Class Project Management Organization Dr. Nick J. Lavingia, PE Acompany that consistently selects the right projects and executes them with excellence can improve return on
More informationContinuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
More informationPMI Risk Management Professional (PMI-RMP) Exam Content Outline
PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,
More informationData Governance: A Business Value-Driven Approach
Global Excellence Governance: A Business Value-Driven Approach A White Paper by Dr Walid el Abed CEO Trusted Intelligence Contents Executive Summary......................................................3
More informationEstimating the Size of Software Package Implementations using Package Points. Atul Chaturvedi, Ram Prasad Vadde, Rajeev Ranjan and Mani Munikrishnan
Estimating the Size of Software Package Implementations using Package Points Atul Chaturvedi, Ram Prasad Vadde, Rajeev Ranjan and Mani Munikrishnan Feb 2008 Introduction 3 Challenges with Existing Size
More informationDefect Prediction Leads to High Quality Product
Journal of Software Engineering and Applications, 2011, 4, 639-645 doi:10.4236/jsea.2011.411075 Published Online November 2011 (http://www.scirp.org/journal/jsea) 639 Naheed Azeem, Shazia Usmani Department
More informationA Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files
A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs
More informationBuilding and deploying effective data science teams. Nikita Lytkin, Ph.D.
Building and deploying effective data science teams Nikita Lytkin, Ph.D. Introduction Ph.D. in Computer Science, Machine Learning (Rutgers University) Postdoc in Machine Learning for Genomics (NYU School
More informationImprove the Agility of Demand-Driven Supply Networks
GE Intelligent Platforms Improve the Agility of Demand-Driven Supply Networks Leverage real-time production data to optimize the supply chain for a sustainable competitive advantage Improve the Agility
More informationTable of Contents. Executive Summary... 3 The Power of Information... 3. How Contact Analytics Works... 4
Table of Contents Executive Summary... 3 The Power of Information... 3 How Contact Analytics Works... 4 Case Study Using Speech Analytics to Predict Churn... 6 Improving Customer Satisfaction... 10 Optimizing
More informationOperational Risk Management - The Next Frontier The Risk Management Association (RMA)
Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first
More informationWhite Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission
White Paper: SAS and Apache Hadoop For Government Unlocking Higher Value From Business Analytics to Further the Mission Inside: Using SAS and Hadoop Together Design Considerations for Your SAS and Hadoop
More information3 myths of email analytics. and how they are impacting your results
3 myths of email analytics and how they are impacting your results Date: 11/17/2008 The volume of insights you can gain by adding ad hoc analysis capabilities to your standard set of email reporting metrics
More informationEIOPACP 13/011. Guidelines on PreApplication of Internal Models
EIOPACP 13/011 Guidelines on PreApplication of Internal Models EIOPA Westhafen Tower, Westhafenplatz 1 60327 Frankfurt Germany Tel. + 49 6995111920; Fax. + 49 6995111919; site: www.eiopa.europa.eu Guidelines
More informationLatest Trends in Testing. Ajay K Chhokra
Latest Trends in Testing Ajay K Chhokra Introduction Software Testing is the last phase in software development lifecycle which has high impact on the quality of the final product delivered to the customer.
More informationAnalyzing Research Data Using Excel
Analyzing Research Data Using Excel Fraser Health Authority, 2012 The Fraser Health Authority ( FH ) authorizes the use, reproduction and/or modification of this publication for purposes other than commercial
More informationFormulate Winning Sales and Operations Strategies Through Integrated Planning
SAP Brief SAP Supply Chain Management SAP Sales and Operations Planning Objectives Formulate Winning Sales and Operations Strategies Through Integrated Planning Keep pace with rapidly changing market conditions
More informationWhat you can accomplish with IBMContent Analytics
What you can accomplish with IBMContent Analytics An Enterprise Content Management solution What is IBM Content Analytics? Alex On February 14-16, IBM s Watson computing system made its television debut
More informationCluster 3 in 2004: Multi-Channel Banking
Cluster 3 in 2004: Multi-Channel Banking (Prof. Dr. Bernd Skiera) 1 Motivation The aim of the Multi-Channel Banking Cluster is to provide research in the area of multi-channel,anagement which should aid
More informationProtect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1. Introduction 1.1 Data Warehouse In the 1990's as organizations of scale began to need more timely data for their business, they found that traditional information systems technology
More information"Practical Security Testing for Web Applications"
T10 Track 5/7/2009 11:15:00 AM "Practical Security Testing for Web Applications" Presented by: Rafal Los Hewlett-Packard Application Security Center Presented at: 330 Corporate Way, Suite 300, Orange Park,
More informationOperational Success: Targeting Performance
Operational Success: Targeting Performance INTRODUCTION Operational success has become widely accepted as a critical factor for real estate service providers (hereinafter referred to as providers ). It
More informationCopyrighted www.eh1infotech.com +919780265007, 0172-5098107 Address :- EH1-Infotech, SCF 69, Top Floor, Phase 3B-2, Sector 60, Mohali (Chandigarh),
Content of 6 Months Software Testing Training at EH1-Infotech Module 1: Introduction to Software Testing Basics of S/W testing Module 2: SQA Basics Testing introduction and terminology Verification and
More informationBusiness Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
More informationVMware vcenter Log Insight Delivers Immediate Value to IT Operations. The Value of VMware vcenter Log Insight : The Customer Perspective
VMware vcenter Log Insight Delivers Immediate Value to IT Operations VMware vcenter Log Insight VMware vcenter Log Insight delivers a powerful real-time log management for VMware environments, with machine
More informationManagers Begin to Apply Business Activity Monitoring
Research Brief Managers Begin to Apply Business Activity Monitoring Abstract: Managers are not fully using real-time capabilities for decision making; they implement BAM with basic analytic methods instead
More informationThe Cloud for Insights
The Cloud for Insights A Guide for Small and Midsize Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external
More informationAssessing Software Productivity with An Estimation Model: A Case Study. Elizabeth A. Miller, Galorath Incorporated
Assessing Software Productivity with An Estimation Model: A Case Study Elizabeth A. Miller, Galorath Incorporated Trade publications in the software field as well as the popular media are filled with articles
More information20 A Visualization Framework For Discovering Prepaid Mobile Subscriber Usage Patterns
20 A Visualization Framework For Discovering Prepaid Mobile Subscriber Usage Patterns John Aogon and Patrick J. Ogao Telecommunications operators in developing countries are faced with a problem of knowing
More informationContinuous delivery Release software on-demand, not on Red Alert
Continuous delivery Release software on-demand, not on Red Alert Have it all. Ahead of the competition Value In a world where customers expect a mobile and connected 24x7 experience, businesses must adapt
More informationADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
More informationA Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review Susan M. Mitchell and Carolyn B. Seaman Information Systems Department,
More informationINST 714 INFORMATION FOR DECISION MAKING Section SG01, Shady Grove, Building III, Room 2203 M 6:00 PM 8:45 PM. 4120K Hornbake, South Building
INST 714 INFORMATION FOR DECISION MAKING Section SG01, Shady Grove, Building III, Room 2203 M 6:00 PM 8:45 PM Instructor: E-mail: Office: Office Hours: Dr. Brian Butler bsbutler@umd.edu 4120K Hornbake,
More informationTRUE PERFORMANCE ENGINEERING
TRUE PERFORMANCE ENGINEERING Quality with Testing, Testing with Quality WHITE PAPER TWO CONTENTS Introduction 3 The Challenges 3 Dependable Applications Testing 3 Traditional Load Testing 4 Large Capital
More informationIncrease Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation
White Paper Increase Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation What You Will Learn That business intelligence (BI) is at a critical crossroads and attentive
More informationApplying Customer Attitudinal Segmentation to Improve Marketing Campaigns Wenhong Wang, Deluxe Corporation Mark Antiel, Deluxe Corporation
Applying Customer Attitudinal Segmentation to Improve Marketing Campaigns Wenhong Wang, Deluxe Corporation Mark Antiel, Deluxe Corporation ABSTRACT Customer segmentation is fundamental for successful marketing
More informationTestScape. On-line, test data management and root cause analysis system. On-line Visibility. Ease of Use. Modular and Scalable.
TestScape On-line, test data management and root cause analysis system On-line Visibility Minimize time to information Rapid root cause analysis Consistent view across all equipment Common view of test
More informationElectronic Data Validation Using the Locus Environmental Information Management System. Tricia Walters Locus Technologies
Electronic Data Validation Using the Locus Environmental Information Management System Tricia Walters Locus Technologies Locus Technologies 2014 Agenda Introduction Environmental Information Management
More informationUnderstand why, when and how-to to formally close a project
Project Closure Purpose: Understand why, when and how-to to formally close a project Audience: Project managers, project sponsors, team members and other key stakeholders Learning Objectives: Describe
More informationASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
More informationApplying Data Analysis to Big Data Benchmarks. Jazmine Olinger
Applying Data Analysis to Big Data Benchmarks Jazmine Olinger Abstract This paper describes finding accurate and fast ways to simulate Big Data benchmarks. Specifically, using the currently existing simulation
More informationIT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
More informationDEMYSTIFYING BIG DATA. What it is, what it isn t, and what it can do for you.
DEMYSTIFYING BIG DATA What it is, what it isn t, and what it can do for you. JAMES LUCK BIO James Luck is a Data Scientist with AT&T Consulting. He has 25+ years of experience in data analytics, in addition
More informationSecuring your IT infrastructure with SOC/NOC collaboration
Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and
More informationLearning and Academic Analytics in the Realize it System
Learning and Academic Analytics in the Realize it System Colm Howlin CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Danny Lynch CCKF Limited Dublin, Ireland danny.lynch@cckf-it.com Abstract: Analytics
More informationSECTION 2 PROGRAMMING & DEVELOPMENT
Page 1 SECTION 2 PROGRAMMING & DEVELOPMENT DEVELOPMENT METHODOLOGY THE WATERFALL APPROACH The Waterfall model of software development is a top-down, sequential approach to the design, development, testing
More information