Introducing the Dezyne Modelling Language
|
|
- Christopher Reginald Logan
- 8 years ago
- Views:
Transcription
1 Introducing the Dezyne Modelling Language Bits & Chips Smart Systems, 20 November 2014 Paul Hoogendijk.
2 Software Controlled Systems
3 Software Controlled Systems Event driven Concurrent, complex High cost-of-non-quality Field defects (SLA) and field updates Difficult and expensive to test Many scenario's: events interleaving, exceptions (errors) Dependency on hardware availability Managing complexity is key
4 designer/engineer wants Trust
5 designer/engineer wants Trust proper spec?
6 designer/engineer wants Trust proper spec? clean & clear architecture/design?
7 designer/engineer wants Trust proper spec? clean & clear architecture/design? code implements architecture/design?
8 designer/engineer wants Trust proper spec? clean & clear architecture/design? code implements architecture/design? code quality and complexity?
9 designer/engineer wants Trust proper spec? clean & clear architecture/design? code implements architecture/design? code quality and complexity? unit tests?
10 designer/engineer wants Trust proper spec? clean & clear architecture/design? code implements architecture/design? code quality and complexity? unit tests? end-to-end tests?
11 designer/engineer wants Trust proper spec? clean & clear architecture/design? code implements architecture/design? code quality and complexity? unit tests? end-to-end tests? test coverage, including all exceptions?
12 Title Body
13
14
15 Title Body
16 Title Body
17 Create. Dezyne Modelling Language System models subcomponents declaration bindings between ports Component models provides & requires ports declaration behaviour Interface models in & out events declaration behaviour
18
19
20 Components, ports and bindings
21 Components, ports and bindings
22 Interfaces: events and behaviour
23 Interfaces: events and behaviour
24 Interfaces: in and out events
25 Interfaces: in and out events
26 Component: ports and behaviour
27 Component: ports and behaviour
28 Title Body
29 Explore: Simulation and Views Sequence diagrams shown are simulator runs User selects next events from list of possible events Exploring interfaces proper specification? Exploring components use cases present?
30 Explore: Simulation and Views
31 Title Body
32 Verify: discover hidden defects Automatic full simulation based on Formal Methods For all possible execution scenarios for component check Adheres to its interfaces No deadlock No livelock Handles race conditions correctly If issue found: trace generated leading to problem 100% coverage while no test code written (!)
33 Verify: discover hidden defects Automatic full simulation based on Formal Methods For all possible execution scenarios for component check Adheres to its interfaces No deadlock No livelock Handles race conditions correctly If issue found: trace generated leading to problem 100% coverage while no test code written (!)
34 Title Body
35 Trust: code generation Efficient and readable code I could have written that 100% of code is generated No (foreign) code snippets in models Easy integration with external code Via an Dezyne Interface makes assumption about external code explicit Thin wrapper layer Connect to: Legacy software Hardware drivers Non Dezyne subsystem...
36 Trust: code generation (cont.) Due to Create Explore Verify cycle: Validated: proper specification (interfaces) all use cases present (components) Verified: All component implement their specification correctly No deadlock, no livelock and handles all races correctly Code that can be trusted
37 Trust based on hard evidence
38 9 Questions? stand 35
Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
More informationOverview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
More informationThe Future of Model Driven Software Engineering
The Future of Model Driven Software Engineering February 2015 Introduction Degree in Physics, +/- 15 years as Software Engineer 6502 ASM, ASM85, ASM86, Pascal, PLM, C, Smalltalk Built Factory Automation
More informationTesting and Inspecting to Ensure High Quality
Testing and Inspecting to Ensure High Quality Basic definitions A failure is an unacceptable behaviour exhibited by a system The frequency of failures measures the reliability An important design objective
More informationIntroduction to Functional Verification. Niels Burkhardt
Introduction to Functional Verification Overview Verification issues Verification technologies Verification approaches Universal Verification Methodology Conclusion Functional Verification issues Hardware
More informationOVERVIEW OF THE PROJECT...
SYSTEMS ENGINEERING DESIGN PROJECT ENPM 643, Fall 2006 Instructor Authors ENPM643 Dr. M Austin Atul Mehta & Felipe Leite Fall 2006 TABLE OF CONTENTS Section Page 1 OVERVIEW OF THE PROJECT... 3 1.1 PURPOSE...
More informationF-16 Modular Mission Computer Application Software
F-16 Modular Mission Computer Application Software Achieving Cross-Platform Compatibility with Increased Productivity and Quality using the OMG s Model Driven Architecture Lauren E. Clark Chief Engineer
More informationGeneral Problem Solving Model. Software Development Methodology. Chapter 2A
General Problem Solving Model Software Development Methodology These focus on understanding what the problem is about Chapter 2A Concerned with understanding more about the nature of the problem and possible
More informationCertification Report
Certification Report McAfee Enterprise Mobility Management 12.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
More informationPacket Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
More informationIndustrial case study: Zero defect secure software for the National Security Agency
p Industrial case study: Zero defect secure software for the National Security Agency Martin Croxford CEng MBCS Praxis High Integrity Systems Bath, UK Copyright Praxis High Integrity Systems Limited 2006
More informationx86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
More informationCertification Report
Certification Report Trustwave Network Access Control (NAC) Version 4.1 and Central Manager Software Version 4.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria
More informationAdaptive Radio. Cognitive Radio
What are Cognitive Radio and Dynamic Spectrum Access SDR can act as a key enabling technology for a variety of other reconfigurable radio equipments commonly discussed in the advanced wireless market 1.
More informationVDM vs. Programming Language Extensions or their Integration
VDM vs. Programming Language Extensions or their Integration Alexander A. Koptelov and Alexander K. Petrenko Institute for System Programming of Russian Academy of Sciences (ISPRAS), B. Communisticheskaya,
More informationCertification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
More informationSoftware development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali
Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 abb@cs.stir.ac.uk Spring 2014 (elicitation)
More informationThe Case Against Test Cases
The Case Against Test Cases James Bach Satisfice, Inc. james@satisfice.com www.satisfice.com Test Cases describe only a fraction of testing. Programming cases? Driving cases? Traveling cases? Parenting
More informationSoftware Development Life-cycle Hygiene with Message Broker in end-to-end SOA
Software Development Life-cycle Hygiene with Message Broker in end-to-end SOA Tips for building and maintaining a working SOA implementation in MB Stuart Smith - Consultant, Smart421 ssmith@smart421.com
More informationFSW QA Testing Levels Definitions
FSW QA Testing Levels Definitions 1. Overview This document is used to help determine the amount and quality of testing (or its scope) that is planned for or has been performed on a project. This analysis
More informationService Virtualization:
Service Virtualization: Reduce the time and cost to develop and test modern, composite applications Business white paper Table of contents Why you need service virtualization 3 The challenges of composite
More informationNext Generation Siebel Monitoring: A Real World Customer Experience. An Oracle White Paper June 2010
Next Generation Siebel Monitoring: A Real World Customer Experience An Oracle White Paper June 2010 Next Generation Siebel Monitoring: A Real World Customer Experience Table of Contents Introduction...
More informationIntroducing Formal Methods into Industry using Cleanroom and CSP
Guy H. Broadfoot, Chief Technical Director, Verum Consultants. TOOLS Introducing Formal Methods into Industry using Cleanroom and CSP In this paper, we present an overview of our observations and experiences
More informationThe V-model. Validation and Verification. Inspections [24.3] Testing overview [8, 15.2] - system testing. How much V&V is enough?
Validation and Verification Inspections [24.3] Testing overview [8, 15.2] - system testing Requirements Design The V-model V & V Plans Implementation Unit tests System tests Integration tests Operation,
More informationSoftware Design. Software Design. Software design is the process that adds implementation details to the requirements.
Software Design Software Design Software design is the process that adds implementation details to the requirements. It produces a design specification that can be mapped onto a program. It may take several
More informationUML-based Test Generation and Execution
UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA jeanhartmann@siemens.com ABSTRACT
More informationSoftware testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
More informationCertification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
More informationDesign and Verification of Nine port Network Router
Design and Verification of Nine port Network Router G. Sri Lakshmi 1, A Ganga Mani 2 1 Assistant Professor, Department of Electronics and Communication Engineering, Pragathi Engineering College, Andhra
More informationSystem Build 2 Test Plan
System Build 2 Test Plan Version 1.0 System Build 2 Test Plan Author s Signature Your signature indicates that this document has been prepared with input from content experts and is in compliance with
More informationMichigan State University. Team Meijer. Tablet-Based Point-of-Sale System. Project Plan. Fall 2011
Michigan State University Team Meijer Tablet-Based Point-of-Sale System Project Plan Fall 2011 Meijer Contacts: Scott Pallas Murali Rajagopalan Team Members: Riti Adhi Peter Rifel Andrew Rockwell Mark
More informationCS Matters in Maryland CS Principles Course
CS Matters in Maryland CS Principles Course Curriculum Overview Project Goals Computer Science (CS) Matters in Maryland is an NSF supported effort to increase the availability and quality of high school
More informationModel Based Software Development for DDG 1000 Advanced Gun System
BAE Systems Land & Armaments Model Based Software Development for DDG 1000 Advanced Gun System Dirk Jungquist BAE Systems Land & Armaments 2012 Distribution Statement A: Approved for public release; distribution
More informationVERIFICATION (TEST) PLAN GUIDELINES
I-680 SMART CARPOOL LANE PROJECT SYSTEM ENGINEERING MANAGEMENT PLAN VERIFICATION (TEST) PLAN GUIDELINES PLAN SECTIONS: 1. GENERAL 2. ROLES AND RESPONSIBILITIES 3. TEST PLAN 4. EQUIPMENT ENVIRONMENTAL TESTING
More informationWorking at a Small-to-Medium Business or ISP Chapter 2
Help Desk Working at a Small-to-Medium Business or ISP Chapter 2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name, logo and materials are
More information應 用 測 試 於 軟 體 發 展 生 命 週 期. Testing In The Software Development Life Cycle
The Second Management Innovation and Practices Conference, Tamsui, Taiwan, April 2001,Volume 2, pp59-68 應 用 測 試 於 軟 體 發 展 生 命 週 期 Testing In The Software Development Life Cycle 蔡 博 元 莊 立 文 真 理 大 學 資 訊
More informationQuestions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
More informationThe Enterprise Service Bus: Making Service-Oriented Architecture Real
The Enterprise Service Bus: Making Service-Oriented Architecture Real M.T. Schmidt et al. Presented by: Mikael Fernandus Simalango SOA in Early Days Introduction Service Requester bind find Service Registry
More informationSoftware Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306
Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project
More informationIBM Business Monitor V8.0 Global monitoring context lab
Copyright IBM Corporation 2012 All rights reserved IBM BUSINESS MONITOR 8.0 LAB EXERCISE IBM Business Monitor V8.0 lab What this exercise is about... 2 Lab requirements... 2 What you should be able to
More informationFundamentals of Measurements
Objective Software Project Measurements Slide 1 Fundamentals of Measurements Educational Objective: To review the fundamentals of software measurement, to illustrate that measurement plays a central role
More informationChapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
More informationIntland s Medical Template
Intland s Medical Template Traceability Browser Risk Management & FMEA Medical Wiki Supports compliance with IEC 62304, FDA Title 21 CFR Part 11, ISO 14971, IEC 60601 and more INTLAND codebeamer ALM is
More informationVoIP Conformance Labs
VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
More informationExamination SUBJECT. Version:
SUBJET Version: 1 Which of the following statements best describes Business nalysis? Business nalysis provides the reasoning for initiating a project. Business nalysis is the strategic part of the project
More informationRentersPLUS Move In Special
$500.00 $658.00 $125.00 Security Deposit Insurance is for $500.00 of coverage and is a non refundable premium. Move In Savings of $375.00 by Choosing Security Deposit Insurance. $288.00 $750.00 $908.00
More informationNotes on the use of the Cost Comparison Spreadsheet
1. Introduction Notes on the use of the Cost Comparison Spreadsheet The spreadsheet is intended to allow Administrations to explore the cost implications of migrating to an OSS installation. It is not
More informationSofware Requirements Engineeing
Sofware Requirements Engineeing Three main tasks in RE: 1 Elicit find out what the customers really want. Identify stakeholders, their goals and viewpoints. 2 Document write it down (). Understandable
More informationOne and a half hours QUESTION PAPER MUST NOT BE REMOVED FROM THE EXAM ROOM AND MUST BE RETURNED UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE
One and a half hours QUESTION PAPER MUST NOT BE REMOVED FROM THE EXAM ROOM AND MUST BE RETURNED UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Software Engineering Date: Monday 19th January 2015 Time:
More informationSpecification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
More informationARM Ltd 110 Fulbourn Road, Cambridge, CB1 9NJ, UK. *peter.harrod@arm.com
Serial Wire Debug and the CoreSight TM Debug and Trace Architecture Eddie Ashfield, Ian Field, Peter Harrod *, Sean Houlihane, William Orme and Sheldon Woodhouse ARM Ltd 110 Fulbourn Road, Cambridge, CB1
More informationData Warehouse and Business Intelligence Testing: Challenges, Best Practices & the Solution
Warehouse and Business Intelligence : Challenges, Best Practices & the Solution Prepared by datagaps http://www.datagaps.com http://www.youtube.com/datagaps http://www.twitter.com/datagaps Contact contact@datagaps.com
More informationA Standards-Based Approach to Extracting Business Rules
A Standards-Based Approach to Extracting Business Rules Ira Baxter Semantic Designs, Inc. Stan Hendryx Hendryx & Associates 1 Who are the presenters? Semantic Designs Automated Analysis and Enhancement
More informationRequirements Management Best Practices
Requirements Management Best Practices Sponsored by: Karl Wiegers Principal Consultant, Process Impact www.processimpact.com Sponsor: RequirementOne Free 30 day trial Sign up by 31 st May and benefit from
More informationSaaS Adoption Lifecycle in Life-Sciences Companies
www.arisglobal.com A White Paper Presented By ArisGlobal SaaS Adoption Lifecycle in Life-Sciences Companies by Achal Verma, Associate Director - Program Delivery, Cloud Services Abstract With increasing
More informationCertification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
More informationAttachment to Data Center Services Multisourcing Service Integrator Master Services Agreement
Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department
More informationSolovatSoft. Load and Performance Test Plan Sample. Title: [include project s release name] Version: Date: SolovatSoft Page 1 of 13
SolovatSoft Load and Performance Test Plan Sample Title: [include project s release name] Version: Date: SolovatSoft Page 1 of 13 Approval signatures Project Manager Development QA Product Development
More informationIntroduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
More informationKnow or Go Practical Quest for Reliable Software
Know or Go Practical Quest for Reliable Software Dr.-Ing. Jörg Barrho Dr.-Ing. Ulrich Wünsche AVACS Project meeting 25.09.2014 2014 Rolls-Royce Power Systems AG The information in this document is the
More informationLEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationChapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
More informationSoftware Engineering for Real- Time Systems.
Software Engineering for Real- Time Systems. Presented by Andrew Dyer-Smith and Jamie McClelland Overview What are Real-Time Systems. Requirements of Real-Time Systems Current Technology Construction 1
More informationITS Projects Systems Engineering Process Compliance Checklist
ITS Projects Systems Engineering Process Compliance Checklist FHWA Final Rule (23 CFR 940) This checklist is to be completed by the MDOT or LPA Project Management Staff. Please refer to the accompanying
More informationMastering increasing product complexity with Collaborative Systems Engineering and PLM
Mastering increasing product complexity with Collaborative Systems Engineering and PLM Thierry Ambroisine Dassault Systèmes 10 rue Marcel Dassault, 78140 Vélizy Villacoublay, France thierry.ambroisine@3ds.com
More informationAccess Control Based on Dynamic Monitoring for Detecting Software Malicious Behaviours
Access Control Based on Dynamic Monitoring for Detecting Software Malicious Behaviours K. Adi, L. Sullivan & A. El Kabbal Computer Security Research Laboratory http://w3.uqo.ca/lrsi NCAC'05 1 Motivation
More informationIT Service Management with System Center Service Manager
Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies
More informationTest Plan1.0 For the project A Credit Assessment System (CAS) Version 1.0
Test Plan1.0 For the project A Credit Assessment System (CAS) Version 1.0 Submitted by Karl Remarais CIS 895 MSE Project Department of Computing and Information Sciences Kansas State University Table of
More informationSOFTWARE PERFORMANCE TESTING SERVICE
SOFTWARE PERFORMANCE TESTING SERVICE Service Definition GTS s performance testing services allows customers to reduce the risk of poor application performance. This is done by performance testing applications
More informationChapter 8 Software Testing
Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is
More informatione-gate USB Smart Card Driver Install Notes (Windows 98/98SE/Me)
e-gate USB Smart Card Driver Install Notes (Windows 98/98SE/Me) By downloading software from the Reflex Readers Download web site, you agree to the terms and conditions of the e-gate Smart Card Driver
More informationIEC 61131-3. The Fast Guide to Open Control Software
IEC 61131-3 The Fast Guide to Open Control Software 1 IEC 61131-3 The Fast Guide to Open Control Software Introduction IEC 61131-3 is the first vendor-independent standardized programming language for
More informationApplication Compatibility Best Practices for Remote Desktop Services
Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to
More informationOverview of Cleanroom Software Engineering. Paul L. Jones, CDP, CSQE FDA/CDRH/OST V: (301) 443-2536 x164 Email: pxj@cdrh.fda.gov
Overview of Cleanroom Software Engineering Paul L. Jones, CDP, CSQE FDA/CDRH/OST V: (301) 443-2536 x164 Email: pxj@cdrh.fda.gov What is Cleanroom Software Engineering? Why the name - Cleanroom? Cleanroom
More informationIndependent Validation of Software Safety Requirements for System of Systems by S. Driskell, J. Murphy, J.B. Michael, M. Shing
Independent Validation of Software Safety Requirements for System of Systems by S. Driskell, J. Murphy, J.B. Michael, M. Shing Presented by Stephen Driskell Stephen.Driskell@TASC.com Judy Murphy jmurphy@mpl.com
More informationCloud A Practitioner Prakat Solutions
Demystifying the Cloud A Practitioner s Perspective Prakat Solutions Contents Introductions Impacts of Cloud Adoption Other Side of the Cloud Key Business Drivers Testing, Continuous Integration and Production
More informationExperience report on developing the Front-end Client unit under the control of formal methods
Experience report on developing the Front-end Client unit under the control of formal methods J.F. Groote 1, A.A.H. Osaiweran 1, and J.H. Wesselius 2 1 Eindhoven University of Technology, Eindhoven, The
More informationInterfaces and Payload Testing
application note 225 Packet Optical Transport Network Testing: From Commissioning to In-Service Monitoring Mai Abou-Shaban, Product Specialist, Transport and Datacom For network service providers considering
More informationCSC340S Asst3 Information System Design Detailed Marking Scheme
CSC340S Asst3 Information System Design Detailed Marking Scheme Marker: Team: Total Marks: /101 Marks for this assignment depend on the factors listed below. A: Global Architecture (20%). Description and
More informationSystem modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems
System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.
More informationCDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5. No. 8, November-December 2006 Requirements Engineering Tasks Donald Firesmith,
More informationEnvironment Modeling for Automated Testing of Cloud Applications
Environment Modeling for Automated Testing of Cloud Applications Linghao Zhang, Tao Xie, Nikolai Tillmann, Peli de Halleux, Xiaoxing Ma, Jian Lv {lzhang25, txie}@ncsu.edu, {nikolait, jhalleux}@microsoft.com,
More informationModel Checking of Software
Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving
More informationFrom Business Event to BUC
From Business Event to BUC This is the third article in a series that explains the thinking behind the Volere 1 requirements techniques. Subsequent articles will explore various aspects of applying these
More informationQTP Open Source Test Automation Framework Introduction
Version 1.0 April 2009 D ISCLAIMER Verbatim copying and distribution of this entire article are permitted worldwide, without royalty, in any medium, provided this notice is preserved. Table of Contents
More informationCertification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
More information70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day
70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include
More informationCyberSource and NetSuite Getting Started Guide
CyberSource and NetSuite Getting Started Guide Abstract A comprehensive guide to setting up CyberSource and NetSuite to accept payments Table of Contents This document explains the different steps to set
More informationVirtualization with VMWare
Virtualization with VMWare When it comes to choosing virtualization solutions for your business, you need to choose a company that you can trust. Out of all the respected virtualization solutions available,
More informationHardware safety integrity Guideline
Hardware safety integrity Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se Quoting of this report is allowed
More informationCHAPTER 1: INTRODUCTION TO THE COURSE
Chapter 1: Introduction to the Course CHAPTER 1: INTRODUCTION TO THE COURSE Objectives Introduction The objectives are: Know the structure and scope of the course. This chapter provides an overview of
More informationG.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15
G.80 Ethernet Ring Protection Overview March, 008 ITU-T Q9 SG 5 genda G.80 Recommendation Introduction G.80 Objectives and Principles G.80 Concepts G.80 Protection Switching G.80 R-PS Messages G.80 Items
More informationA complete platform for proactive data management
Brochure A complete platform for proactive data management HP Structured Data Manager Software for Oracle e-business Suite The right data management strategy The increased size and unmanaged growth of
More informationPerformance testing as a full life cycle activity. Julian Harty
Performance testing as a full life cycle activity Julian Harty Julian Harty & Stuart Reid 2004 Scope of Performance Performance What is performance testing? Various views 3 outcomes 3 evaluation techniques
More informationThis Unit is aimed at candidates who have no previous experience of computer programming.
National Unit Specification: general information Computing: Programming in a High-level Language Fundamentals CODE F1K0 10 SUMMARY This Unit is designed to introduce the concept of computer programming
More informationWhat s new with IBM Tivoli Workload automation?
May 2012 What s new with IBM Tivoli Workload automation? 2 IT Budget constraint Drive innovation Process constraint SLA constraint Today s conflicting pressures Change imperative Meet business needs quickly
More informationModelli di sviluppo software. Enrico Giunchiglia
Modelli di sviluppo software Enrico Giunchiglia The software development process A structured set of activities required to develop a software system, including Specification Design & Development Validation
More information