Small Data in Big Data July 17, 2013 So6ware Experts Summit Sea>le

Size: px
Start display at page:

Download "Small Data in Big Data July 17, 2013 So6ware Experts Summit Sea>le"

Transcription

1 Small Data in Big Data July 17, 2013 So6ware Experts Summit Sea>le Ayse Basar Bener Data Science Lab Mechanical and Industrial Engineering Ryerson University

2 Part 1 ANALYTICS IN SOFTWARE ENGINEERING

3 Data AnalyKcs in So6ware Engineering To make decisions under uncertainty How to assign available resources and budget end- to- end? Where to allocate scarce teskng resources? How much maintenance effort is required? When to stop teskng? How confident are we to release the product?.. Expert judgement is common way to make decisions Bias, availability, limited experience

4 Data AnalyKcs in So6ware Engineering Necessary, but sca>ered Code versioning systems Code metric repositories Issue tracking/ management systems Specialized tools Non- generalizable research outcomes

5 Theory (Kahneman) Human mind works in two modes: Fast Thinking Mode: Default Based on heuriskcs Error prone Slow Thinking Mode: ReacKve: Triggered by Fast Thinking Based on Facts and Logic Clouded by Fast Thinking

6 Where Big Data Techniques fit in SE: Help experts by simulakng human slow thinking mode in a faster mode!

7 The Problem Ø Sca>ered Research Clusters Ø Overlooked Research Clusters Ø Lack of generalizakon Efforts Ø Lack of Theory Ø Privacy Concerns of Industry Turhan, B. & A. Bener, RAISE 2013

8 The Vision Theory Interplay of analykcs techniques and SE to work like human brain Human in the loop models PracKce Use big data and experts to not only predict the future, but cause the future Tool support Caglayan et al., FSE 2012

9 How? Ø Stop validakng, start applying in real sehngs Ø to provide tools that combine individually validated research clusters for enabling applicakons in real sehngs Ø to refocus on overlooked research clusters, i.e. people in 3P (People, Product, Process). Ø to form an academic culture paying a>enkon to underlying theories and assumpkons to avoid academic number crunching exercises. Ø to extend our efforts beyond individual cases to pursue generalizakons. Ø to address the concerns of business side whose data and support are required to realize the above.

10 Puhng the Bricks Together Where we are Where we should be Not only predict the future, but cause the future

11 Part 2 DOES SIZE MATTER?

12 The devil is hidden in the details To uncover hidden pa7erns in big data

13 Big Data versus Data Analysis The sum of small pieces are larger than the whole? Issues Access Storage Processing

14 Size versus Data Any data or meaningful data Centralized or decentralized CollaboraKon or control May be small is beaukful

15 Small Data Data AnalyKcs = Big Data?? Context based Case studies Model assumpkons More data to overcome over fihng? CogniKve biases in determining model parameters

16 Part 3 SMALL DATA EXAMPLES

17 Small data is important in so6ware engineering Sampling: Empirical evidence Under/ micro sampling Dimensionality reduckon T. Menzies, B. Turhan, G. Gay, A. Bener, B. Cukic, H. Jiang PROMISE 08

18 Micro Sampling: Use Even Less... Given N defeckve modules: M = {25, 50, 75,...} <= N Select M defeckve and M defect- free modules. Learn theories on 2M instances Undersampling: M=N 8/12 datasets - > M = 25 1/12 datasets - > M = 75 3/12 datasets - > M = {200, 575, 1025} T. Menzies, B. Turhan, G. Gay, A. Bener, B. Cukic, H. Jiang PROMISE 08

19 QualitaKve Studies in So6ware Engineering ConnecKng the dots Field studies RecommendaKon systems Researcher and PracKKoner work together Be>er understand the overlooked areas

20 Problem Predic'on of defect categories Goal We aimed to increase the informakon content of the output of a defect predickon model by eskmakng the categories of defects in the defect- prone so6ware modules. Challenges Many defect categorizakon methodologies in the literature. No standard categorizakon methodology. Most of the exiskng defect data are not categorized at all.

21 1- Big Data Analysis We had to use the category definikons that were available in mulkple datasets: pre- and post- release defect categories. DefiniKon of pre- release and post- release different among projects. Predictor performance not saksfactory. CategorizaKon not worth the trouble? These categories were not meaningful for the customer.

22 1- Big Data Analysis

23 2- Small Data Analysis We idenkfied the defect categories with the quality assurance team of the company. We idenkfied metrics that were significantly correlated with the categories by analyzing the small data. The model since the categorizakon was tailored for the company needs. We improved defect predickon accuracy with the category- aware defect predictor.

24 2- Small Data Analysis

25 Lessons Learned Analysis of data with the key stakeholders of the organizakon is the key for providing delivering a valuable solukon. Knowledge gained from one customer may not be directly transferrable to another. Caglayan et al., Promise 2010 Tosun et al., WeTSOM 2011

26 Problem Confirma'on biases of so9ware engineers Goal to analyze factors affeckng so6ware engineers confirmakon biases. MoDvaDon due to the confirmatory behavior of so6ware engineers, defects may be introduced during any phase of SDLC IdenKficaKon of the factors affeckng confirmakon bias to circumvent its negakve effects Challenges QuanKficaKon of confirmakon bias

27 1- Big Data Analysis DefiniKon of a methodology to quankfy confirmakon bias levels of so6ware engineers. FormaKon of confirmakon bias metrics set. FormaKon of a single derived metric. ConducKng N- way ANOVA. Some results did not turn out to be meaningful.

28 1- Big Data Analysis

29 2- Small Data Analysis IdenKfied outliers in the data and analyzed them. Interviews with PM s and SE s who are outliers InvesKgate task load distribukon of developers. Outliers had heavy task loads and they were mentally exhausted. Hence, their test results did not reflect their actual confirmakon bias levels. We removed the outliers and repeated the analysis procedure.

30 2- Small Data Analysis

31 Lessons Learned Analysis of data with so6ware engineers and project managers who are involved in the field studies is crucial. Field studies should cover so6ware companies from different domains as much as possible to overcome threats to external validity and to obtain meaningful results. Calikli & Bener, ASE 2013 Calikli, Bener & Arslan, ICSE 2010

32 Part 4 CONCLUSION

33 Raw Data- the process case study Schu>, R. 2012, Data Science Course Blog: h>p:// columbiadatascience.com/blog

34 Small Data Meaningful small data is all you need Theories can be learned from a very small sample of available data We need to understand the underlying concepts Combine with available data and models Combined use of big data techniques and local models Remove errors with small data Access and use enourmous amount of data for analysis- with big data Tosun et al., 2014

35 Thank You

Confirmation Bias as a Human Aspect in Software Engineering

Confirmation Bias as a Human Aspect in Software Engineering Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD Data Science Laboratory, Department of Mechanical and Industrial Engineering, Ryerson University Why Human Aspects in Software

More information

Confirmation Bias as a Human Aspect in Software Engineering

Confirmation Bias as a Human Aspect in Software Engineering Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD & Ayse Bener, PhD gcalikli@ryerson.ca, ayse.bener@ryerson.ca Data Science Laboratory, Department of Mechanical and Industrial

More information

Practical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry

Practical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry Practical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry!"#$%&'()* 1, Burak Turhan 1 +%!"#$%,$*$- 1, Tim Menzies 2 ayse.tosun@boun.edu.tr, turhanb@boun.edu.tr,

More information

BIG DATA AND ANALYTICS

BIG DATA AND ANALYTICS BIG DATA AND ANALYTICS Björn Bjurling, bgb@sics.se Daniel Gillblad, dgi@sics.se Anders Holst, aho@sics.se Swedish Institute of Computer Science AGENDA What is big data and analytics? and why one must bother

More information

Class Imbalance Learning in Software Defect Prediction

Class Imbalance Learning in Software Defect Prediction Class Imbalance Learning in Software Defect Prediction Dr. Shuo Wang s.wang@cs.bham.ac.uk University of Birmingham Research keywords: ensemble learning, class imbalance learning, online learning Shuo Wang

More information

Software Metrics. Alex Boughton

Software Metrics. Alex Boughton Software Metrics Alex Boughton Executive Summary What are software metrics? Why are software metrics used in industry, and how? Limitations on applying software metrics A framework to help refine and understand

More information

Community-Assisted Software Engineering Decision Making. Technical Report

Community-Assisted Software Engineering Decision Making. Technical Report Community-Assisted Software Engineering Decision Making Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 Keller Hall 200 Union Street SE Minneapolis, MN 55455-0159

More information

Miracle Integrating Knowledge Management and Business Intelligence

Miracle Integrating Knowledge Management and Business Intelligence ALLGEMEINE FORST UND JAGDZEITUNG (ISSN: 0002-5852) Available online www.sauerlander-verlag.com/ Miracle Integrating Knowledge Management and Business Intelligence Nursel van der Haas Technical University

More information

DHL Data Mining Project. Customer Segmentation with Clustering

DHL Data Mining Project. Customer Segmentation with Clustering DHL Data Mining Project Customer Segmentation with Clustering Timothy TAN Chee Yong Aditya Hridaya MISRA Jeffery JI Jun Yao 3/30/2010 DHL Data Mining Project Table of Contents Introduction to DHL and the

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Data Mining Applications in Higher Education

Data Mining Applications in Higher Education Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2

More information

Text Analytics. A business guide

Text Analytics. A business guide Text Analytics A business guide February 2014 Contents 3 The Business Value of Text Analytics 4 What is Text Analytics? 6 Text Analytics Methods 8 Unstructured Meets Structured Data 9 Business Application

More information

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

Presented By: Leah R. Smith, PMP. Ju ly, 2 011 Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a

More information

Application Test Management and Quality Assurance

Application Test Management and Quality Assurance SAP Brief Extensions SAP Quality Center by HP Objectives Application Test Management and Quality Assurance Deliver new software with confidence Deliver new software with confidence Testing is critical

More information

Hexaware E-book on Predictive Analytics

Hexaware E-book on Predictive Analytics Hexaware E-book on Predictive Analytics Business Intelligence & Analytics Actionable Intelligence Enabled Published on : Feb 7, 2012 Hexaware E-book on Predictive Analytics What is Data mining? Data mining,

More information

The Business Case for Information Management An Oracle Thought Leadership White Paper December 2008

The Business Case for Information Management An Oracle Thought Leadership White Paper December 2008 The Business Case for Information Management An Oracle Thought Leadership White Paper December 2008 NOTE: The following is intended to outline our general product direction. It is intended for information

More information

The Australian Public Service Big Data Strategy

The Australian Public Service Big Data Strategy The Australian Public Service Big Data Strategy Improved understanding through enhanced data-analytics capability AIIA response March 2014 Contact for this submission: Suzanne Roche 39 Torrens St Braddon

More information

FACTS ABOUT BIG DATA ANALYTICS PLATFORA. BIG DATA ANALYTICS Series

FACTS ABOUT BIG DATA ANALYTICS PLATFORA. BIG DATA ANALYTICS Series 5 FACTS ABOUT BIG DATA ANALYTICS PLATFORA BIG DATA ANALYTICS Series BIG DATA ANALYTICS FICTIONS, FEELINGS, AND FAITH Does Your Company Run On Facts? Or Fictions, Feelings and Faith? No doubt you answered

More information

Safe Harbor Statement

Safe Harbor Statement Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

Predicting More from Less: Synergies of Learning

Predicting More from Less: Synergies of Learning Predicting More from Less: Synergies of Learning Ekrem Kocaguneli, Bojan Cukic, Huihua Lu Lane Department of Computer Science and Electrical Engineering West Virginia University Morgantown, WV, USA Email:

More information

TAUS Quality Dashboard. An Industry-Shared Platform for Quality Evaluation and Business Intelligence September, 2015

TAUS Quality Dashboard. An Industry-Shared Platform for Quality Evaluation and Business Intelligence September, 2015 TAUS Quality Dashboard An Industry-Shared Platform for Quality Evaluation and Business Intelligence September, 2015 1 This document describes how the TAUS Dynamic Quality Framework (DQF) generates a Quality

More information

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Cognitive and Organizational Challenges of Big Data in Cyber Defense Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational

More information

SOFTWARE REQUIREMENTS

SOFTWARE REQUIREMENTS SOFTWARE REQUIREMENTS http://www.tutorialspoint.com/software_engineering/software_requirements.htm Copyright tutorialspoint.com The software requirements are description of features and functionalities

More information

Three Reasons to Integrate ERP and HCM. White Paper

Three Reasons to Integrate ERP and HCM. White Paper Three Reasons to Integrate ERP and HCM White Paper Table of Contents Three Reasons to Integrate ERP and HCM 3 1. Unified Data Wins 3 Releasing the Power of Unified Data 3 2. Employee-Driven Workflows Matter

More information

The Business Case for Using Big Data in Healthcare

The Business Case for Using Big Data in Healthcare SAP Thought Leadership Paper Healthcare and Big Data The Business Case for Using Big Data in Healthcare Exploring How Big Data and Analytics Can Help You Achieve Quality, Value-Based Care Table of Contents

More information

Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures

Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures Michael Maurer, Ivan Breskovic, Vincent C. Emeakaroha, and Ivona Brandic Distributed Systems Group Institute of Information

More information

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database

More information

Big Data 101: Harvest Real Value & Avoid Hollow Hype

Big Data 101: Harvest Real Value & Avoid Hollow Hype Big Data 101: Harvest Real Value & Avoid Hollow Hype 2 Executive Summary Odds are you are hearing the growing hype around the potential for big data to revolutionize our ability to assimilate and act on

More information

CRM for Real Estate Part 2: Realizing the Vision

CRM for Real Estate Part 2: Realizing the Vision CRM for Real Estate Anne Taylor Contents Introduction... 1 Meet the Challenges... 2 Implementation Approach... 3 Demystifying CRM... 5 Conclusion... 7 Introduction Once the decision to implement a CRM

More information

Oracle Data Integrator 12c (ODI12c) - Powering Big Data and Real-Time Business Analytics. An Oracle White Paper October 2013

Oracle Data Integrator 12c (ODI12c) - Powering Big Data and Real-Time Business Analytics. An Oracle White Paper October 2013 An Oracle White Paper October 2013 Oracle Data Integrator 12c (ODI12c) - Powering Big Data and Real-Time Business Analytics Introduction: The value of analytics is so widely recognized today that all mid

More information

Software Defect Prediction Modeling

Software Defect Prediction Modeling Software Defect Prediction Modeling Burak Turhan Department of Computer Engineering, Bogazici University turhanb@boun.edu.tr Abstract Defect predictors are helpful tools for project managers and developers.

More information

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Technical Management Strategic Capabilities Statement. Business Solutions for the Future Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.

More information

The demand of Cloud Computing in Europe: drivers, barriers, market estimates

The demand of Cloud Computing in Europe: drivers, barriers, market estimates The demand of Cloud Computing in Europe: drivers, barriers, market estimates Gabriella Cattaneo Associate VP IDC European Government Consulting Research In Future Cloud Computing workshop Bruxelles, May

More information

Tracking the Impact of Design Changes During Software Development

Tracking the Impact of Design Changes During Software Development Tracking the Impact of Design Changes During Software Development Frank Padberg Fakultät für Informatik Universität Karlsruhe, Germany padberg@ira.uka.de Abstract Design changes occur frequently during

More information

Adaptive elearning Accelerating scalable learning impact

Adaptive elearning Accelerating scalable learning impact Tell me and I forget. Teach me and I remember. Involve me and I learn. Benjamin Franklin Adaptive elearning Accelerating scalable learning impact Adaptive elearning ACCELERATING SCALABLE LEARNING IMPACT

More information

1/27/2013. PSY 512: Advanced Statistics for Psychological and Behavioral Research 2

1/27/2013. PSY 512: Advanced Statistics for Psychological and Behavioral Research 2 PSY 512: Advanced Statistics for Psychological and Behavioral Research 2 Introduce moderated multiple regression Continuous predictor continuous predictor Continuous predictor categorical predictor Understand

More information

The Critical Success Factors for Implementation of Customer Relationship Management in the Banking Sector of Saudi Arabia

The Critical Success Factors for Implementation of Customer Relationship Management in the Banking Sector of Saudi Arabia The Critical Success Factors for Implementation of Customer Relationship Management in the Banking Sector of Saudi Arabia Dr. Sulaiman A. Al-Hudhaif, Associate Dean for Quality and Development, College

More information

Managing the Shadow Cloud

Managing the Shadow Cloud Managing the Shadow Cloud Integrating cloud governance into your existing compliance program August 2014 Shadow IT is not a new concept and organizations are well aware of the risks associated with unauthorized

More information

Big Data More Is Not Always Better For Your Big Data Strategy

Big Data More Is Not Always Better For Your Big Data Strategy Big Data More Is Not Always Better For Your Big Data Strategy Abstract Everyone is talking about Big Data. Enterprises across the globe are spending significant dollars on it and endeavor with their strategy.

More information

Knowledge Discovery from patents using KMX Text Analytics

Knowledge Discovery from patents using KMX Text Analytics Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs anton.heijs@treparel.com Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers

More information

CHAPTER - 5 CONCLUSIONS / IMP. FINDINGS

CHAPTER - 5 CONCLUSIONS / IMP. FINDINGS CHAPTER - 5 CONCLUSIONS / IMP. FINDINGS In today's scenario data warehouse plays a crucial role in order to perform important operations. Different indexing techniques has been used and analyzed using

More information

Big Data for Banks: 5 Profitable Use Cases

Big Data for Banks: 5 Profitable Use Cases Big Data for Banks: 5 Profitable Use Cases Did you know that one of the earliest forms of structured data as we know it, at least in Western culture, came from trade? Italian merchants saw an increase

More information

White Paper. Fundamentals of Performance Testing

White Paper. Fundamentals of Performance Testing etri White Paper Fundamentals of Performance Testing The Increasing Need for Proper Performance Testing due to Increasing Software Complexity in the Enterprise There have been two significant changes in

More information

UIIPA - Security Risk Management. June 2015

UIIPA - Security Risk Management. June 2015 UIIPA - Security Risk Management June 2015 1 Introduction Tim Hastings, Chief Information Security Officer State of Utah - Department of Technology Services Tim Hastings has more than 16 years of experience

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Using Earned Value, Part 2: Tracking Software Projects. Using Earned Value Part 2: Tracking Software Projects

Using Earned Value, Part 2: Tracking Software Projects. Using Earned Value Part 2: Tracking Software Projects Using Earned Value Part 2: Tracking Software Projects Abstract We ve all experienced it too often. The first 90% of the project takes 90% of the time, and the last 10% of the project takes 90% of the time

More information

Project Planning and Project Estimation Techniques. Naveen Aggarwal

Project Planning and Project Estimation Techniques. Naveen Aggarwal Project Planning and Project Estimation Techniques Naveen Aggarwal Responsibilities of a software project manager The job responsibility of a project manager ranges from invisible activities like building

More information

Exploratory Testing An Agile Approach STC-2009. Aman Arora. Xebia IT Architects India Pvt. Ltd. Sec-30, Gurgaon 122001, Haryana

Exploratory Testing An Agile Approach STC-2009. Aman Arora. Xebia IT Architects India Pvt. Ltd. Sec-30, Gurgaon 122001, Haryana 1 Exploratory Testing An Agile Approach STC-2009 Aman Arora Xebia IT Architects India Pvt. Ltd. Unit No-612, 6 th floor, BPTP park Centra, Sec-30, Gurgaon 122001, Haryana 2 Abstract As the IT industry

More information

Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation

Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely

More information

Elimination of Estimation biases in the Software Development

Elimination of Estimation biases in the Software Development Elimination of Estimation biases in the Software Development Thamarai. I. Research scholar, computer science department Sathyabama University, Chennai, India ilango.thamarai@gmail.com Dr.S.Murugavalli

More information

On the Cost of Mining Very Large Open Source Repositories

On the Cost of Mining Very Large Open Source Repositories On the Cost of Mining Very Large Open Source Repositories Sean Banerjee Carnegie Mellon University Bojan Cukic University of North Carolina at Charlotte BIGDSE, Florence 2015 Introduction Issue tracking

More information

Acompany that consistently selects the right projects and

Acompany that consistently selects the right projects and PM.01 How to Create a World Class Project Management Organization Dr. Nick J. Lavingia, PE Acompany that consistently selects the right projects and executes them with excellence can improve return on

More information

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. ???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app

More information

PMI Risk Management Professional (PMI-RMP) Exam Content Outline

PMI Risk Management Professional (PMI-RMP) Exam Content Outline PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,

More information

Data Governance: A Business Value-Driven Approach

Data Governance: A Business Value-Driven Approach Global Excellence Governance: A Business Value-Driven Approach A White Paper by Dr Walid el Abed CEO Trusted Intelligence Contents Executive Summary......................................................3

More information

Estimating the Size of Software Package Implementations using Package Points. Atul Chaturvedi, Ram Prasad Vadde, Rajeev Ranjan and Mani Munikrishnan

Estimating the Size of Software Package Implementations using Package Points. Atul Chaturvedi, Ram Prasad Vadde, Rajeev Ranjan and Mani Munikrishnan Estimating the Size of Software Package Implementations using Package Points Atul Chaturvedi, Ram Prasad Vadde, Rajeev Ranjan and Mani Munikrishnan Feb 2008 Introduction 3 Challenges with Existing Size

More information

Defect Prediction Leads to High Quality Product

Defect Prediction Leads to High Quality Product Journal of Software Engineering and Applications, 2011, 4, 639-645 doi:10.4236/jsea.2011.411075 Published Online November 2011 (http://www.scirp.org/journal/jsea) 639 Naheed Azeem, Shazia Usmani Department

More information

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs

More information

Building and deploying effective data science teams. Nikita Lytkin, Ph.D.

Building and deploying effective data science teams. Nikita Lytkin, Ph.D. Building and deploying effective data science teams Nikita Lytkin, Ph.D. Introduction Ph.D. in Computer Science, Machine Learning (Rutgers University) Postdoc in Machine Learning for Genomics (NYU School

More information

Improve the Agility of Demand-Driven Supply Networks

Improve the Agility of Demand-Driven Supply Networks GE Intelligent Platforms Improve the Agility of Demand-Driven Supply Networks Leverage real-time production data to optimize the supply chain for a sustainable competitive advantage Improve the Agility

More information

Table of Contents. Executive Summary... 3 The Power of Information... 3. How Contact Analytics Works... 4

Table of Contents. Executive Summary... 3 The Power of Information... 3. How Contact Analytics Works... 4 Table of Contents Executive Summary... 3 The Power of Information... 3 How Contact Analytics Works... 4 Case Study Using Speech Analytics to Predict Churn... 6 Improving Customer Satisfaction... 10 Optimizing

More information

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first

More information

White Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission

White Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission White Paper: SAS and Apache Hadoop For Government Unlocking Higher Value From Business Analytics to Further the Mission Inside: Using SAS and Hadoop Together Design Considerations for Your SAS and Hadoop

More information

3 myths of email analytics. and how they are impacting your results

3 myths of email analytics. and how they are impacting your results 3 myths of email analytics and how they are impacting your results Date: 11/17/2008 The volume of insights you can gain by adding ad hoc analysis capabilities to your standard set of email reporting metrics

More information

EIOPACP 13/011. Guidelines on PreApplication of Internal Models

EIOPACP 13/011. Guidelines on PreApplication of Internal Models EIOPACP 13/011 Guidelines on PreApplication of Internal Models EIOPA Westhafen Tower, Westhafenplatz 1 60327 Frankfurt Germany Tel. + 49 6995111920; Fax. + 49 6995111919; site: www.eiopa.europa.eu Guidelines

More information

Latest Trends in Testing. Ajay K Chhokra

Latest Trends in Testing. Ajay K Chhokra Latest Trends in Testing Ajay K Chhokra Introduction Software Testing is the last phase in software development lifecycle which has high impact on the quality of the final product delivered to the customer.

More information

Analyzing Research Data Using Excel

Analyzing Research Data Using Excel Analyzing Research Data Using Excel Fraser Health Authority, 2012 The Fraser Health Authority ( FH ) authorizes the use, reproduction and/or modification of this publication for purposes other than commercial

More information

Formulate Winning Sales and Operations Strategies Through Integrated Planning

Formulate Winning Sales and Operations Strategies Through Integrated Planning SAP Brief SAP Supply Chain Management SAP Sales and Operations Planning Objectives Formulate Winning Sales and Operations Strategies Through Integrated Planning Keep pace with rapidly changing market conditions

More information

What you can accomplish with IBMContent Analytics

What you can accomplish with IBMContent Analytics What you can accomplish with IBMContent Analytics An Enterprise Content Management solution What is IBM Content Analytics? Alex On February 14-16, IBM s Watson computing system made its television debut

More information

Cluster 3 in 2004: Multi-Channel Banking

Cluster 3 in 2004: Multi-Channel Banking Cluster 3 in 2004: Multi-Channel Banking (Prof. Dr. Bernd Skiera) 1 Motivation The aim of the Multi-Channel Banking Cluster is to provide research in the area of multi-channel,anagement which should aid

More information

Protect Your Customers and Brands with Multichannel Two-Factor Authentication

Protect Your Customers and Brands with Multichannel Two-Factor Authentication SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1. Introduction 1.1 Data Warehouse In the 1990's as organizations of scale began to need more timely data for their business, they found that traditional information systems technology

More information

"Practical Security Testing for Web Applications"

Practical Security Testing for Web Applications T10 Track 5/7/2009 11:15:00 AM "Practical Security Testing for Web Applications" Presented by: Rafal Los Hewlett-Packard Application Security Center Presented at: 330 Corporate Way, Suite 300, Orange Park,

More information

Operational Success: Targeting Performance

Operational Success: Targeting Performance Operational Success: Targeting Performance INTRODUCTION Operational success has become widely accepted as a critical factor for real estate service providers (hereinafter referred to as providers ). It

More information

Copyrighted www.eh1infotech.com +919780265007, 0172-5098107 Address :- EH1-Infotech, SCF 69, Top Floor, Phase 3B-2, Sector 60, Mohali (Chandigarh),

Copyrighted www.eh1infotech.com +919780265007, 0172-5098107 Address :- EH1-Infotech, SCF 69, Top Floor, Phase 3B-2, Sector 60, Mohali (Chandigarh), Content of 6 Months Software Testing Training at EH1-Infotech Module 1: Introduction to Software Testing Basics of S/W testing Module 2: SQA Basics Testing introduction and terminology Verification and

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

VMware vcenter Log Insight Delivers Immediate Value to IT Operations. The Value of VMware vcenter Log Insight : The Customer Perspective

VMware vcenter Log Insight Delivers Immediate Value to IT Operations. The Value of VMware vcenter Log Insight : The Customer Perspective VMware vcenter Log Insight Delivers Immediate Value to IT Operations VMware vcenter Log Insight VMware vcenter Log Insight delivers a powerful real-time log management for VMware environments, with machine

More information

Managers Begin to Apply Business Activity Monitoring

Managers Begin to Apply Business Activity Monitoring Research Brief Managers Begin to Apply Business Activity Monitoring Abstract: Managers are not fully using real-time capabilities for decision making; they implement BAM with basic analytic methods instead

More information

The Cloud for Insights

The Cloud for Insights The Cloud for Insights A Guide for Small and Midsize Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external

More information

Assessing Software Productivity with An Estimation Model: A Case Study. Elizabeth A. Miller, Galorath Incorporated

Assessing Software Productivity with An Estimation Model: A Case Study. Elizabeth A. Miller, Galorath Incorporated Assessing Software Productivity with An Estimation Model: A Case Study Elizabeth A. Miller, Galorath Incorporated Trade publications in the software field as well as the popular media are filled with articles

More information

20 A Visualization Framework For Discovering Prepaid Mobile Subscriber Usage Patterns

20 A Visualization Framework For Discovering Prepaid Mobile Subscriber Usage Patterns 20 A Visualization Framework For Discovering Prepaid Mobile Subscriber Usage Patterns John Aogon and Patrick J. Ogao Telecommunications operators in developing countries are faced with a problem of knowing

More information

Continuous delivery Release software on-demand, not on Red Alert

Continuous delivery Release software on-demand, not on Red Alert Continuous delivery Release software on-demand, not on Red Alert Have it all. Ahead of the competition Value In a world where customers expect a mobile and connected 24x7 experience, businesses must adapt

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review

A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review Susan M. Mitchell and Carolyn B. Seaman Information Systems Department,

More information

INST 714 INFORMATION FOR DECISION MAKING Section SG01, Shady Grove, Building III, Room 2203 M 6:00 PM 8:45 PM. 4120K Hornbake, South Building

INST 714 INFORMATION FOR DECISION MAKING Section SG01, Shady Grove, Building III, Room 2203 M 6:00 PM 8:45 PM. 4120K Hornbake, South Building INST 714 INFORMATION FOR DECISION MAKING Section SG01, Shady Grove, Building III, Room 2203 M 6:00 PM 8:45 PM Instructor: E-mail: Office: Office Hours: Dr. Brian Butler bsbutler@umd.edu 4120K Hornbake,

More information

TRUE PERFORMANCE ENGINEERING

TRUE PERFORMANCE ENGINEERING TRUE PERFORMANCE ENGINEERING Quality with Testing, Testing with Quality WHITE PAPER TWO CONTENTS Introduction 3 The Challenges 3 Dependable Applications Testing 3 Traditional Load Testing 4 Large Capital

More information

Increase Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation

Increase Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation White Paper Increase Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation What You Will Learn That business intelligence (BI) is at a critical crossroads and attentive

More information

Applying Customer Attitudinal Segmentation to Improve Marketing Campaigns Wenhong Wang, Deluxe Corporation Mark Antiel, Deluxe Corporation

Applying Customer Attitudinal Segmentation to Improve Marketing Campaigns Wenhong Wang, Deluxe Corporation Mark Antiel, Deluxe Corporation Applying Customer Attitudinal Segmentation to Improve Marketing Campaigns Wenhong Wang, Deluxe Corporation Mark Antiel, Deluxe Corporation ABSTRACT Customer segmentation is fundamental for successful marketing

More information

TestScape. On-line, test data management and root cause analysis system. On-line Visibility. Ease of Use. Modular and Scalable.

TestScape. On-line, test data management and root cause analysis system. On-line Visibility. Ease of Use. Modular and Scalable. TestScape On-line, test data management and root cause analysis system On-line Visibility Minimize time to information Rapid root cause analysis Consistent view across all equipment Common view of test

More information

Electronic Data Validation Using the Locus Environmental Information Management System. Tricia Walters Locus Technologies

Electronic Data Validation Using the Locus Environmental Information Management System. Tricia Walters Locus Technologies Electronic Data Validation Using the Locus Environmental Information Management System Tricia Walters Locus Technologies Locus Technologies 2014 Agenda Introduction Environmental Information Management

More information

Understand why, when and how-to to formally close a project

Understand why, when and how-to to formally close a project Project Closure Purpose: Understand why, when and how-to to formally close a project Audience: Project managers, project sponsors, team members and other key stakeholders Learning Objectives: Describe

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Applying Data Analysis to Big Data Benchmarks. Jazmine Olinger

Applying Data Analysis to Big Data Benchmarks. Jazmine Olinger Applying Data Analysis to Big Data Benchmarks Jazmine Olinger Abstract This paper describes finding accurate and fast ways to simulate Big Data benchmarks. Specifically, using the currently existing simulation

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

DEMYSTIFYING BIG DATA. What it is, what it isn t, and what it can do for you.

DEMYSTIFYING BIG DATA. What it is, what it isn t, and what it can do for you. DEMYSTIFYING BIG DATA What it is, what it isn t, and what it can do for you. JAMES LUCK BIO James Luck is a Data Scientist with AT&T Consulting. He has 25+ years of experience in data analytics, in addition

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

Learning and Academic Analytics in the Realize it System

Learning and Academic Analytics in the Realize it System Learning and Academic Analytics in the Realize it System Colm Howlin CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Danny Lynch CCKF Limited Dublin, Ireland danny.lynch@cckf-it.com Abstract: Analytics

More information

SECTION 2 PROGRAMMING & DEVELOPMENT

SECTION 2 PROGRAMMING & DEVELOPMENT Page 1 SECTION 2 PROGRAMMING & DEVELOPMENT DEVELOPMENT METHODOLOGY THE WATERFALL APPROACH The Waterfall model of software development is a top-down, sequential approach to the design, development, testing

More information