R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.

Size: px
Start display at page:

Download "R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H."

Transcription

1 R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E C T I O N S , ,

2 PRODUCT BACKLOG A sorted and prioritized list of user stories as currently perceived. User stories values is determined according to value, cost, knowledge, and risk) the high-value items appear at the top of the product backlog Product backlog vs. Sprint backlog

3 PRODUCT BACKLOG On new-product development the product backlog items initially are features required to meet the product owner s vision. For ongoing product development, the product backlog might also contain new features, changes to existing features, defects needing repair, technical improvements, and so on.

4 PRODUCT BACKLOG ITEMS (PBI) Are a placeholder for business value. Avoid detailing a user story ahead of time. Later and through a series of conversations among the stakeholders, product owner, and development team, refining them into a collection of smaller, more detailed PBIs user stories.

5 GROOMING Includes three principal activities: creating and refining (adding details to) PBIs estimating PBIs prioritizing PBIs. PBIs near the top of the backlog: small in size, and very detailed so that they can be worked on in a near-term sprint. PBIs towards the bottom of the backlog, larger in size, and less detailed.

6 SPRINT PLANNING AND BACKLOG During sprint planning, the product owner and development team agree on a sprint goal that defines what the upcoming sprint is supposed to achieve. Using this goal, the development team reviews the product backlog and determines the high priority items that the team can realistically accomplish in the upcoming sprint while working at a sustainable pace a pace at which the development team can comfortably work for an extended period of time. spring planning (4-8 hours) Break each user story into a set of tasks.

7 TECHNICAL DEBT A trade off between: Rapid delivery and delayed commitment Increased time to delivery and product failure. Ward Cunningham: inventor of wiki and one of the Agile Manifesto signers.

8 USER STORIES Indicate the estimated size. Includes an estimate for the effort to implement the user story. Assign user story points to each card, a relative indication of how long it will take a pair of programmers to implement the story. The team then knows that if it currently takes them on average 2.5 hours per point; Indicate the priority. can easily maintain a stack of prioritized requirements by moving the cards around in the stack as appropriate. Can use a scale of one to ten with one being the highest priority. Other prioritization approaches are possible priorities of High/Medium/Low Optionally include a unique identifier. You need to maintain some sort of traceability between the user story and other artifacts, in particular acceptance tests.

9 TYPES OF NON-FUNCTIONAL REQUIREMENTS As a user I want the system to have % uptime.

10 NON-FUNCTIONAL REQUIREMENTS Quantifiable format is essential The system should be easy to use by medical staff and should be organized in such a way that user errors are minimized. VS. Medical staff shall be able to use all the system functions after four hours of training. After this training, the average number of errors made by experienced users shall not exceed two per hour of system use.

11 STUDENT PORTFOLIO: NON-FUNCTINOAL REQS Security The system shall require users to register using university s The system shall verify the user is a final year student via the university student database The system shall require users to create a password of medium to high strength The system shall require users to update their passwords every 30 days Speed The system shall retrieve and display portfolio summary in less than 0.5 second Paging, run multiple queries Quantify response time The system shall respond to search queries in less than 0.3 seconds Search : Tokenize description

12 NON-FUNCTIONAL REQUIREMENTS

13 NON-FUNCTIONAL REQUIREMENTS Non-functional requirements These are constraints on the services or functions offered by the system. They include timing constraints, constraints on the development process, and constraints imposed by standards. Non-functional requirements often apply to the system as a whole, rather than individual system features or services. In reality, the distinction between different types of requirement is not as clear-cut as these simple definitions suggest. A user requirement concerned with security, such as a statement limiting access to authorized users, may appear to be a nonfunctional requirement. However, when developed in more detail, this requirement may generate other requirements that are clearly functional, such as the need to include user authentication facilities in the system.

14 TYPES OF NON-FUNCTIONAL REQUIREMENTS

15 SYSTEM DEPENDABILITY Dependability covers the related systems attributes of reliability, availability and security. These are all inter-dependent. For many computer-based systems, the most important system property is the dependability of the system. The dependability of a system reflects the user s degree of trust in that system. It reflects the extent of the user s confidence that it will operate as users expect and that it will not fail in normal use. C H A P T E R 11 S E C U R I T Y A N D D E P E N D A B I L I T Y 15

16 PRINCIPAL PROPERTIES Availability The probability that the system will be up and running and able to deliver useful services to users. Reliability The probability that the system will correctly deliver services as expected by users. Safety A judgment of how likely it is that the system will cause damage to people or its environment. Security A judgment of how likely it is that the system can resist accidental or deliberate intrusions. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 16

17 DEPENDABILITY ECONOMICS Dependability costs tend to increase exponentially as increasing levels of dependability are required. There are two reasons for this The use of more expensive development techniques and hardware that are required to achieve the higher levels of dependability. The increased testing and system validation that is required to convince the system client and regulators that the required levels of dependability have been achieved. C H A P T E R 11 S E C U R I T Y A N D D E P E N D A B I L I T Y 17

18 AVAILABILITY Measure of the fraction of the time that the system is available for use. Takes repair and restart time into account Availability of means software is available for 998 out of 1000 time units. Relevant for non-stop, continuously running systems telephone switching systems, railway signalling systems. C H A P T E R 12 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 18

19 AVAILABILITY SPECIFICATION Availability Explanation 0.9 The system is available for 90% of the time. This means that, in a 24-hour period (1,440 minutes), the system will be unavailable for 144 minutes In a 24-hour period, the system is unavailable for 14.4 minutes The system is unavailable for 84 seconds in a 24-hour period The system is unavailable for 8.4 seconds in a 24-hour period. Roughly, one minute per week. C H A P T E R 12 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 19

20 AVAILABILITY AND RELIABILITY Reliability The probability of failure-free system operation over a specified time in a given environment for a given purpose Availability The probability that a system, at a point in time, will be operational and able to deliver the requested services Both of these attributes can be expressed quantitatively e.g. availability of means that the system is up and running for 99.9% of the time. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 20

21 FAILURE TERMINOLOGY Term Human error or mistake System fault System error System failure Description Human behavior that results in the introduction of faults into a system. For example, in the wilderness weather system, a programmer might decide that the way to compute the time for the next transmission is to add 1 hour to the current time. This works except when the transmission time is between and midnight (midnight is in the 24-hour clock). A characteristic of a software system that can lead to a system error. The fault is the inclusion of the code to add 1 hour to the time of the last transmission, without a check if the time is greater than or equal to An erroneous system state that can lead to system behavior that is unexpected by system users. The value of transmission time is set incorrectly (to 24.XX rather than 00.XX) when the faulty code is executed. An event that occurs at some point in time when the system does not deliver a service as expected by its users. No weather data is transmitted because the time is invalid. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 21

22 FAULTS AND FAILURES Failures are a usually a result of system errors that are derived from faults in the system However, faults do not necessarily result in system errors The erroneous system state resulting from the fault may be transient and corrected before an error arises. The faulty code may never be executed. Errors do not necessarily lead to system failures The error can be corrected by built-in error detection and recovery The failure can be protected against by built-in protection facilities. These may, for example, protect system resources from system errors C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 22

23 PERCEPTIONS OF RELIABILITY The formal definition of reliability does not always reflect the user s perception of a system s reliability The assumptions that are made about the environment where a system will be used may be incorrect Usage of a system in an office environment is likely to be quite different from usage of the same system in a university environment The consequences of system failures affects the perception of reliability Unreliable windscreen wipers in a car may be irrelevant in a dry climate Failures that have serious consequences (such as an engine breakdown in a car) are given greater weight by users than failures that are inconvenient C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 23

24 RELIABILITY METRICS Reliability metrics are units of measurement of system reliability. System reliability is measured by counting the number of operational failures and, where appropriate, relating these to the demands made on the system and the time that the system has been operational. A long-term measurement programme is required to assess the reliability of critical systems. Metrics Probability of failure on demand Rate of occurrence of failures/mean time to failure Availability C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 24

25 PROBABILITY OF FAILURE ON DEMAND (POFOD) This is the probability that the system will fail when a service request is made. Useful when demands for service are intermittent and relatively infrequent. Appropriate for protection systems where services are demanded occasionally and where there are serious consequence if the service is not delivered. Relevant for many safety-critical systems with exception management components Emergency shutdown system in a chemical plant. C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 25

26 RATE OF FAULT OCCURRENCE (ROCOF) Reflects the rate of occurrence of failure in the system. ROCOF of means 2 failures are likely in each 1000 operational time units e.g. 2 failures per 1000 hours of operation. Relevant for systems where the system has to process a large number of similar requests in a short time Credit card processing system, airline booking system. Reciprocal of ROCOF is Mean time to Failure (MTTF) Relevant for systems with long transactions i.e. where system processing takes a long time (e.g. CAD systems). MTTF should be longer than expected transaction length. C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 26

27 SECURITY The security of a system is a system property that reflects the system s ability to protect itself from accidental or deliberate external attack. Security is essential as most systems are networked so that external access to the system through the Internet is possible. Security is an essential pre-requisite for availability, reliability and safety. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 27

28 SECURITY TERMINOLOGY Term Asset Exposure Vulnerability Attack Threats Control Definition Something of value which has to be protected. The asset may be the software system itself or data used by that system. Possible loss or harm to a computing system. This can be loss or damage to data, or can be a loss of time and effort if recovery is necessary after a security breach. A weakness in a computer-based system that may be exploited to cause loss or harm. An exploitation of a system s vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. Circumstances that have potential to cause loss or harm. You can think of these as a system vulnerability that is subjected to an attack. A protective measure that reduces a system s vulnerability. Encryption is an example of a control that reduces a vulnerability of a weak access control system C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 28

29 SECURITY RISK ASSESSMENT Asset identification Identify the key system assets (or services) that have to be protected. Asset value assessment Estimate the value of the identified assets. Exposure assessment Assess the potential losses associated with each asset. Threat identification Identify the most probable threats to the system assets C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 29

30 SECURITY REQUIREMENTS Patient information must be downloaded at the start of a clinic session to a secure area on the system client that is used by clinical staff. Patient information must not be maintained on system clients after a clinic session has finished. A log on a separate computer from the database server must be maintained of all changes made to the system database. C H A P T E R 1 4 S E C U R I T Y E N G I N E E R I N G 30

31 THREAT CLASSES Threats to the confidentiality of the system and its data Can disclose information to people or programs that do not have authorization to access that information. leaks Threats to the integrity of the system and its data Can damage or corrupt the software or its data. Defacement - record manipulation Threats to the availability of the system and its data Can restrict access to the system and data for authorized users. Denial of service attacks C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 31

32 SECURITY REQUIREMENTS A password checker shall be made available and shall be run daily. Weak passwords shall be reported to system administrators. Access to the system shall only be allowed by approved client computers. All client computers shall have a single, approved web browser installed by system administrators. C H A P T E R 1 4 S E C U R I T Y E N G I N E E R I N G 32

33 TYPES OF SECURITY REQUIREMENT Identification requirements. Authentication requirements. Authorisation requirements. Immunity requirements. Integrity requirements. Intrusion detection requirements. Privacy requirements. Security auditing requirements. System maintenance security requirements. C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 33

Forecasting without Fear

Forecasting without Fear Forecasting without Fear How to keep the business informed and keep your cool NY SPIN December 15, 2015 Drivers, Challenges why you have to forecast, and why it s not easy what you forecast Refinement

More information

Dependable Systems. ! Dependability Attributes. Dr. Peter Tröger. Sources:

Dependable Systems. ! Dependability Attributes. Dr. Peter Tröger. Sources: Dependable Systems! Dependability Attributes Dr. Peter Tröger! Sources:! J.C. Laprie. Dependability: Basic Concepts and Terminology Eusgeld, Irene et al.: Dependability Metrics. 4909. Springer Publishing,

More information

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1. Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation

More information

Integrated Electricity Demand and Price Forecasting

Integrated Electricity Demand and Price Forecasting Integrated Electricity Demand and Price Forecasting Create and Evaluate Forecasting Models The many interrelated factors which influence demand for electricity cannot be directly modeled by closed-form

More information

1 Introduction. Station Type No. Synoptic/GTS 17 Principal 172 Ordinary 546 Precipitation

1 Introduction. Station Type No. Synoptic/GTS 17 Principal 172 Ordinary 546 Precipitation Use of Automatic Weather Stations in Ethiopia Dula Shanko National Meteorological Agency(NMA), Addis Ababa, Ethiopia Phone: +251116639662, Mob +251911208024 Fax +251116625292, Email: Du_shanko@yahoo.com

More information

Weather Company Energy and Power Products

Weather Company Energy and Power Products Service Weather Company Energy and Power Products This Service (SD) describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

Attack Graph Modeling and Generation

Attack Graph Modeling and Generation Attack Graph Modeling and Generation Ratnesh Kumar, Professor, IEEE Fellow Electrical and Computer Engineering, Iowa State University PhD Students: Mariam Ibrahim German Jordanian University Attack Graph:

More information

EBS IT Meeting July 2016

EBS IT Meeting July 2016 EBS IT Meeting 18 19 July 2016 Conference Call Details Conference call: UK Numbers Tel: 0808 238 9819 or Tel: 0207 950 1251 Participant code: 4834 7876... Join online meeting https://meet.nationalgrid.com/antonio.delcastillozas/hq507d31

More information

Software Reliability.... Yes sometimes the system fails...

Software Reliability.... Yes sometimes the system fails... Software Reliability... Yes sometimes the system fails... Motivations Software is an essential component of many safety-critical systems These systems depend on the reliable operation of software components

More information

Enabling Success in Enterprise Asset Management: Case Study for Developing and Integrating GIS with CMMS for a Large WWTP

Enabling Success in Enterprise Asset Management: Case Study for Developing and Integrating GIS with CMMS for a Large WWTP Enabling Success in Enterprise Asset Management: Case Study for Developing and Integrating GIS with CMMS for a Large WWTP Allison Blake, P.E. 1*, Matthew Jalbert, P.E. 2, Julia J. Hunt, P.E. 2, Mazen Kawasmi,

More information

Copernicus Overview. Major Emergency Management Conference Athlone 2017

Copernicus Overview. Major Emergency Management Conference Athlone 2017 Copernicus Overview Major Emergency Management Conference Athlone 2017 Copernicus is a European programme implemented by the European Commission. The services address six thematic areas: land, marine,

More information

The Weather Information Value Chain

The Weather Information Value Chain The Weather Information Value Chain Jeffrey K. Lazo Societal Impacts Program National Center for Atmospheric Research Boulder CO April 27 2016 HIWeather Exeter, England Outline Shout out on WMO/USAID/World

More information

Information Security in the Age of Quantum Technologies

Information Security in the Age of Quantum Technologies www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes

More information

Statistical Reliability Modeling of Field Failures Works!

Statistical Reliability Modeling of Field Failures Works! Statistical Reliability Modeling of Field Failures Works! David Trindade, Ph.D. Distinguished Principal Engineer Sun Microsystems, Inc. Quality & Productivity Research Conference 1 Photo by Dave Trindade

More information

IS YOUR BUSINESS PREPARED FOR A POWER OUTAGE?

IS YOUR BUSINESS PREPARED FOR A POWER OUTAGE? IS YOUR BUSINESS PREPARED FOR A POWER OUTAGE? Keeping your power on is our business Whether your business is large, small or somewhere in between, we understand that a power outage presents special challenges

More information

Fault Tolerance. Dealing with Faults

Fault Tolerance. Dealing with Faults Fault Tolerance Real-time computing systems must be fault-tolerant: they must be able to continue operating despite the failure of a limited subset of their hardware or software. They must also allow graceful

More information

Portal for ArcGIS: An Introduction. Catherine Hynes and Derek Law

Portal for ArcGIS: An Introduction. Catherine Hynes and Derek Law Portal for ArcGIS: An Introduction Catherine Hynes and Derek Law Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options and groups Portal for ArcGIS

More information

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

Army Installation Geospatial Information and Services (IGI&S) Program Overview

Army Installation Geospatial Information and Services (IGI&S) Program Overview Army Installation Geospatial Information and Services (IGI&S) Program Overview Joshua Delmonico Geospatial Information Officer OACSIM IGI&S Program 703-602-2851 Joshua.Delmonico@hqda.army.mil 1of 11 221400

More information

This introduction is intended for compliance officers at Protection Seller and Broker-Advisor firms

This introduction is intended for compliance officers at Protection Seller and Broker-Advisor firms weatherxchange - a platform which facilitates index-based weather risk transfer This introduction is intended for compliance officers at Protection Seller and Broker-Advisor firms Introduction Launched

More information

Leveraging Web GIS: An Introduction to the ArcGIS portal

Leveraging Web GIS: An Introduction to the ArcGIS portal Leveraging Web GIS: An Introduction to the ArcGIS portal Derek Law Product Management DLaw@esri.com Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options

More information

Geo-enabling a Transactional Real Estate Management System A case study from the Minnesota Dept. of Transportation

Geo-enabling a Transactional Real Estate Management System A case study from the Minnesota Dept. of Transportation Geo-enabling a Transactional Real Estate Management System A case study from the Minnesota Dept. of Transportation Michael Terner Executive Vice President Co-author and Project Manager Andy Buck Overview

More information

Job Description. 1) To provide a range of meteorological services, including a forecaster consultancy service.

Job Description. 1) To provide a range of meteorological services, including a forecaster consultancy service. Job Description Job Title: Department: Division: Location: Grade: Responsible to: Trainee Meteorological Forecaster Department of Infrastructure Ports Division Isle of Man Airport Trainee Met Officer Senior

More information

WeatherHub2 Quick Start Guide

WeatherHub2 Quick Start Guide WeatherHub2 Quick Start Guide Table of Contents 1 Introduction... 1 2 Packing List... 1 3 Connections... 1 4 IP Addressing... 2 5 Browser Access... 3 6 System Info... 3 7 Weather Station Settings... 4

More information

OFFSHORE. Advanced Weather Technology

OFFSHORE. Advanced Weather Technology Contents 3 Advanced Weather Technology 5 Working Safely, While Limiting Downtime 6 Understanding the Weather Forecast Begins at the Tender Stage 7 Reducing Time and Costs on Projects is a Priority Across

More information

Introduction to Portal for ArcGIS. Hao LEE November 12, 2015

Introduction to Portal for ArcGIS. Hao LEE November 12, 2015 Introduction to Portal for ArcGIS Hao LEE November 12, 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration options Portal for ArcGIS + ArcGIS for

More information

Chap 4. Software Reliability

Chap 4. Software Reliability Chap 4. Software Reliability 4.2 Reliability Growth 1. Introduction 2. Reliability Growth Models 3. The Basic Execution Model 4. Calendar Time Computation 5. Reliability Demonstration Testing 1. Introduction

More information

Steve Pietersen Office Telephone No

Steve Pietersen Office Telephone No Steve Pietersen Steve.Pieterson@durban.gov.za Office Telephone No. 031 311 8655 Overview Why geography matters The power of GIS EWS GIS water stats EWS GIS sanitation stats How to build a GIS system EWS

More information

The purpose of this report is to recommend a Geographic Information System (GIS) Strategy for the Town of Richmond Hill.

The purpose of this report is to recommend a Geographic Information System (GIS) Strategy for the Town of Richmond Hill. Staff Report for Committee of the Whole Meeting Department: Division: Subject: Office of the Chief Administrative Officer Strategic Initiatives SRCAO.18.12 GIS Strategy Purpose: The purpose of this report

More information

Weather Company Data for Advanced Analytics

Weather Company Data for Advanced Analytics Service Description Weather Company Data for Advanced Analytics This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users

More information

Overview of Control System Design

Overview of Control System Design Overview of Control System Design General Requirements 1. Safety. It is imperative that industrial plants operate safely so as to promote the well-being of people and equipment within the plant and in

More information

Introduction to Portal for ArcGIS

Introduction to Portal for ArcGIS Introduction to Portal for ArcGIS Derek Law Product Management March 10 th, 2015 Esri Developer Summit 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration

More information

CHAPTER 22 GEOGRAPHIC INFORMATION SYSTEMS

CHAPTER 22 GEOGRAPHIC INFORMATION SYSTEMS CHAPTER 22 GEOGRAPHIC INFORMATION SYSTEMS PURPOSE: This chapter establishes the administration and use of to improve the quality and accessibility of Department s spatial information and support graphical

More information

SPR Satisfaction Survey BC Surgical Patient Registry (SPR) Satisfaction Survey 2012

SPR Satisfaction Survey BC Surgical Patient Registry (SPR) Satisfaction Survey 2012 BC Surgical Patient Registry (SPR) Satisfaction Survey 2012 July 16, 2012 Table of Contents BACKGROUND...1 RESULTS...2 1. Demographics... 2 2. Usage of the SPR... 3 3. Access to the SPR... 6 4. Value of

More information

PUB NLH 185 Island Interconnected System Supply Issues and Power Outages Page 1 of 9

PUB NLH 185 Island Interconnected System Supply Issues and Power Outages Page 1 of 9 PUB NLH 1 Page 1 of 1 Q. Provide Hydro s list of outage cause codes and indicate how troublemen are managed and trained to properly use the codes. Explain the method used to report outage causes. A. Hydro

More information

Developing a Community Geographical Information System (GIS) in Rural India

Developing a Community Geographical Information System (GIS) in Rural India Developing a Community Geographical Information System (GIS) in Rural India Before rushing off and describing the unique challenges of developing a small scale GIS system India I better first describe

More information

Oregon Department of Transportation. Geographic Information Systems Strategic Plan

Oregon Department of Transportation. Geographic Information Systems Strategic Plan Oregon Department of Transportation Geographic Information Systems Strategic Plan Adopted May, 2000 By the GIS Steering Committee Last printed 10/2/2012 4:20:00 PM Page Geographic Information Systems Strategic

More information

The science behind these computers originates in

The science behind these computers originates in A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge

More information

GIS Geographic Information Systems

GIS Geographic Information Systems GIS Geographic Information Systems Connecting your Community Ruekert Mielke WAUKESHA WHO WE ARE DATE ESTABLISHED 1946 SERVING LOCAL PEOPLE. SOLVING LOCAL PROBLEMS. TYPE OF ORGANIZATION Ruekert & Mielke,

More information

IMPLEMENTING GOVERNMENT-WIDE ENTERPRISE GIS; THE FEDERATED MODEL

IMPLEMENTING GOVERNMENT-WIDE ENTERPRISE GIS; THE FEDERATED MODEL IMPLEMENTING GOVERNMENT-WIDE ENTERPRISE GIS; THE FEDERATED MODEL James E. Mitchell, Ph. D. IT GIS Manager Louisiana Department of Transportation and Development presented at the ESRI International Users

More information

Management of Geological Information for Mining Sector Development and Investment Attraction Examples from Uganda and Tanzania

Management of Geological Information for Mining Sector Development and Investment Attraction Examples from Uganda and Tanzania Mineral Wealth Conference 2016 Kampala / Uganda Management of Geological Information for Mining Sector Development and Investment Attraction Examples from Uganda and Tanzania Andreas Barth 1, Andreas Knobloch

More information

Business Case: UV Facility Backup Generator

Business Case: UV Facility Backup Generator Business Case: UV Facility Backup Generator Eric Brainich December 13, 2010 Background The Portland Water Bureau is currently working on the design for a new Ultra Violet (UV) Treatment Facility and the

More information

OPERATING MANUAL. EIB-Kombisensor AS 315 N

OPERATING MANUAL. EIB-Kombisensor AS 315 N EIB-Kombisensor AS 315 N OPERATING MANUAL EIB-Kombisensor AS 315 N 1 Contents Page 3 1. Description 4 1.1 Automated Operations 1.1.1 Sun System 1.1.2 Half-Light System 5 1.1.3 Wind System 1.1.4 Rain System

More information

TECHNICAL MANUAL 820 LX / 910 LX / 1300 LX

TECHNICAL MANUAL 820 LX / 910 LX / 1300 LX TECHNICAL MANUAL 820 LX / 910 LX / 1300 LX LANCER reserves the right to modify, constantly its documentation for its improvement. The values of adjustments indicated in the displays of this manual are

More information

Non-observable failure progression

Non-observable failure progression Non-observable failure progression 1 Age based maintenance policies We consider a situation where we are not able to observe failure progression, or where it is impractical to observe failure progression:

More information

Clock Synchronization Procedure

Clock Synchronization Procedure Clock Synchronization Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 10.10.6 Issue Date: June 19, 2013 Revision Date: June 19, 2013 Approved by: Title: Ted Harvey Director, Technology

More information

Computer Science, Informatik 4 Communication and Distributed Systems. Simulation. Discrete-Event System Simulation. Dr.

Computer Science, Informatik 4 Communication and Distributed Systems. Simulation. Discrete-Event System Simulation. Dr. Simulation Discrete-Event System Simulation Chapter 9 Verification and Validation of Simulation Models Purpose & Overview The goal of the validation process is: To produce a model that represents true

More information

GIS Capability Maturity Assessment: How is Your Organization Doing?

GIS Capability Maturity Assessment: How is Your Organization Doing? GIS Capability Maturity Assessment: How is Your Organization Doing? Presented by: Bill Johnstone Principal Consultant Spatial Vision Group November 8, 2018 1. Motivation for Capability Maturity Models

More information

Common Cause Failure (CCF)

Common Cause Failure (CCF) Common Cause Failure (CCF) 건국대학교컴퓨터공학과 UC Lab. 정혁준 & 박경식 amitajung@naver.com, kyeongsik@konkuk.ac.kr Contents Common Cause Failure (CCF) Types of CCF Examples Reducing CCF Common Cause Failure (CCF) Definition

More information

Do we have a quorum?

Do we have a quorum? Do we have a quorum? Quorum Systems Given a set U of servers, U = n: A quorum system is a set Q 2 U such that Q 1, Q 2 Q : Q 1 Q 2 Each Q in Q is a quorum How quorum systems work: A read/write shared register

More information

CLIMATE CHANGE ADAPTATION BY MEANS OF PUBLIC PRIVATE PARTNERSHIP TO ESTABLISH EARLY WARNING SYSTEM

CLIMATE CHANGE ADAPTATION BY MEANS OF PUBLIC PRIVATE PARTNERSHIP TO ESTABLISH EARLY WARNING SYSTEM CLIMATE CHANGE ADAPTATION BY MEANS OF PUBLIC PRIVATE PARTNERSHIP TO ESTABLISH EARLY WARNING SYSTEM By: Dr Mamadou Lamine BAH, National Director Direction Nationale de la Meteorologie (DNM), Guinea President,

More information

GIS FOR MAZOWSZE REGION - GENERAL OUTLINE

GIS FOR MAZOWSZE REGION - GENERAL OUTLINE GIS FOR MAZOWSZE REGION - GENERAL OUTLINE S. Bialousz 1), K Mączewski 2), E. Janczar 2), K. Osinska-Skotak 1) 1) Warsaw University of Technology, Warsaw, Poland 2) Office of the Surveyor of the Mazowieckie

More information

Derogation Criteria for the Requirements for Generators Network Code

Derogation Criteria for the Requirements for Generators Network Code Derogation Criteria for the Requirements for Generators Network Code Decision Paper Reference: CER/17/084 Date Published: 13/04/2017 Closing Date: 0 Executive Summary Commission Regulation (EU) 2016/631

More information

Portal for ArcGIS: An Introduction

Portal for ArcGIS: An Introduction Portal for ArcGIS: An Introduction Derek Law Esri Product Management Esri UC 2014 Technical Workshop Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration

More information

Continuous Performance Testing Shopware Developer Conference. Kore Nordmann 08. June 2013

Continuous Performance Testing Shopware Developer Conference. Kore Nordmann 08. June 2013 Continuous Performance Testing Shopware Developer Conference Kore Nordmann (@koredn) 08. June 2013 About Me Kore Nordmann @koredn Co-founder of Helping people to create high quality web applications. http://qafoo.com

More information

Larry R. Glass, Ph.D., M.P.H. Xerox Corporation

Larry R. Glass, Ph.D., M.P.H. Xerox Corporation REACH COMPLIANCE LSS Project Registration Of Chemicals Evaluation Authorization & Restriction Larry R. Glass, Ph.D., M.P.H. Xerox Corporation Overview of REACH Regulation European Regulation Signed into

More information

Key Words: Lifetime Data Analysis (LDA), Probability Density Function (PDF), Goodness of fit methods, Chi-square method.

Key Words: Lifetime Data Analysis (LDA), Probability Density Function (PDF), Goodness of fit methods, Chi-square method. Reliability prediction based on lifetime data analysis methodology: The pump case study Abstract: The business case aims to demonstrate the lifetime data analysis methodology application from the historical

More information

WordPress and CRM. Match Made In Heaven... or Hell?

WordPress and CRM. Match Made In Heaven... or Hell? WordPress and CRM Match Made In Heaven... or Hell? Who Am I? Colin Pizarek Product Manager, NeonCRM Board Member, Ridgeville Foundation Alumnus, Idealware Disclaimer: I m opinionated. Moving data from

More information

Ministry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009

Ministry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009 Ministry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009 John Hill, Health Analytics Branch Health System Information

More information

Considering Security Aspects in Safety Environment. Dipl.-Ing. Evzudin Ugljesa

Considering Security Aspects in Safety Environment. Dipl.-Ing. Evzudin Ugljesa Considering Security spects in Safety Environment Dipl.-ng. Evzudin Ugljesa Overview ntroduction Definitions of safety relevant parameters Description of the oo4-architecture Calculation of the FD-Value

More information

SYMBIOSIS CENTRE FOR DISTANCE LEARNING (SCDL) Subject: production and operations management

SYMBIOSIS CENTRE FOR DISTANCE LEARNING (SCDL) Subject: production and operations management Sample Questions: Section I: Subjective Questions 1. What are the inputs required to plan a master production schedule? 2. What are the different operations schedule types based on time and applications?

More information

Predicting Long-Term Telemetry Behavior for Lunar Orbiting, Deep Space, Planetary and Earth Orbiting Satellites

Predicting Long-Term Telemetry Behavior for Lunar Orbiting, Deep Space, Planetary and Earth Orbiting Satellites Predicting Long-Term Telemetry Behavior for Lunar Orbiting, Deep Space, Planetary and Earth Orbiting Satellites Item Type text; Proceedings Authors Losik, Len Publisher International Foundation for Telemetering

More information

The Vaisala AUTOSONDE AS41 OPERATIONAL EFFICIENCY AND RELIABILITY TO A TOTALLY NEW LEVEL.

The Vaisala AUTOSONDE AS41 OPERATIONAL EFFICIENCY AND RELIABILITY TO A TOTALLY NEW LEVEL. The Vaisala AUTOSONDE AS41 OPERATIONAL EFFICIENCY AND RELIABILITY TO A TOTALLY NEW LEVEL. Weather Data Benefit For Society The four most important things about weather prediction are quality, reliability,

More information

Enhancing Weather Information with Probability Forecasts. An Information Statement of the American Meteorological Society

Enhancing Weather Information with Probability Forecasts. An Information Statement of the American Meteorological Society Enhancing Weather Information with Probability Forecasts An Information Statement of the American Meteorological Society (Adopted by AMS Council on 12 May 2008) Bull. Amer. Meteor. Soc., 89 Summary This

More information

Terms and conditions for non-commercial end-use 1. General

Terms and conditions for non-commercial end-use 1. General Terms and conditions for non-commercial end-use 1. General 1.1. Lantmäteriet provides the licensed geodata products Nedladdning uttag (Download once) and Nedladdning abonnemang (Download subscription)

More information

Extreme Weather and Risks to Infrastructure. Heather Auld & Neil Comer Risk Sciences International

Extreme Weather and Risks to Infrastructure. Heather Auld & Neil Comer Risk Sciences International Extreme Weather and Risks to Infrastructure Heather Auld & Neil Comer Risk Sciences International The Science is Valid and the Evidence grows Stronger AGREE Climate Change Disagree More Intense Rainfall

More information

GIS Geographical Information Systems. GIS Management

GIS Geographical Information Systems. GIS Management GIS Geographical Information Systems GIS Management Difficulties on establishing a GIS Funding GIS Determining Project Standards Data Gathering Map Development Recruiting GIS Professionals Educating Staff

More information

Vaisala AviMet Automated Weather Observing System

Vaisala AviMet Automated Weather Observing System Vaisala AviMet Automated Weather Observing System Solutions to meet your challenges Our mission: to help you operate succesfully Safe, economical, reliable and flexible operation of your airport is ensured

More information

SCHOOL EMERGENCY MANAGEMENT PLAN FOR NATURAL DISASTERS

SCHOOL EMERGENCY MANAGEMENT PLAN FOR NATURAL DISASTERS SCHOOL EMERGENCY MANAGEMENT PLAN FOR NATURAL DISASTERS MANAGING EMERGENCIES EFFECTIVELY Keith Thomas, Loss Prevention & Risk Manager LEADERSHIP, ADVOCACY AND SERVICE FOR MANITOBA S PUBLIC SCHOOL BOARDS

More information

ELE 491 Senior Design Project Proposal

ELE 491 Senior Design Project Proposal ELE 491 Senior Design Project Proposal These slides are loosely based on the book Design for Electrical and Computer Engineers by Ford and Coulston. I have used the sources referenced in the book freely

More information

Chapter X: Radiation Safety Audit Program

Chapter X: Radiation Safety Audit Program Chapter X: Radiation Safety Audit Program Policy All laboratories using radioactive material shall be reviewed as required by the Illinois Emergency Management Agency (IEMA), Division of Nuclear Safety

More information

Proceedings, 2012 International Snow Science Workshop, Anchorage, Alaska

Proceedings, 2012 International Snow Science Workshop, Anchorage, Alaska NATIONAL DATABASE FOR MITIGATIVE MEASURES AGAINST RAPID GRAVITY MASS FLOWS AND ROCK FALLS Árni Jónsson 1*, Egil Syre 1,2,Kristine Helene Hetland Ekseth 1, Helge C. Smebye 1, Eivind M. Paulsen 1, 1 Norwegian

More information

VERSION 3.0 MARKS & SPENCER NOVEMBER 2015 ECP MINUMUM STANDARDS REACH. Registration, Evaluation and Authorisation of Chemicals

VERSION 3.0 MARKS & SPENCER NOVEMBER 2015 ECP MINUMUM STANDARDS REACH. Registration, Evaluation and Authorisation of Chemicals VERSION 3.0 MARKS & SPENCER NOVEMBER 2015 ECP MINUMUM STANDARDS REACH Registration, Evaluation and Authorisation of Chemicals VERSION 3 NOVEMBER 2015 ENVIRONMENTAL & CHEMICAL POLICY FOR TEXTILE PROCESSING

More information

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # GIS Coordinator AD Grid Level 6(c) # 420

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # GIS Coordinator AD Grid Level 6(c) # 420 COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # GIS Coordinator AD Grid Level 6(c) # 420 NOC CODE: 2255 STANDARD HOURS: 35 hours/week (non-management) JOB TITLE

More information

Hazard Communication

Hazard Communication Hazard Communication For Company: Address: LC-1009 Rev. 06/16 Page 1 Hazard Communication Program Ref: OSHA 1910.1200 Approved by: Title: Ranking Official's Signature Date: Hazard Communication Coordinator

More information

Comprehensive Winter Maintenance Management System BORRMA-web MDSS inside to increase Road Safety and Traffic Flow

Comprehensive Winter Maintenance Management System BORRMA-web MDSS inside to increase Road Safety and Traffic Flow Thorsten Cypra 1 Comprehensive Winter Maintenance Management System BORRMA-web MDSS inside to increase Road Safety and Traffic Flow American Public Works Association (APWA) Monday, 04/14/2008 3:30 4:30

More information

Core Courses for Students Who Enrolled Prior to Fall 2018

Core Courses for Students Who Enrolled Prior to Fall 2018 Biostatistics and Applied Data Analysis Students must take one of the following two sequences: Sequence 1 Biostatistics and Data Analysis I (PHP 2507) This course, the first in a year long, two-course

More information

CIMA Dates and Prices Online Classroom Live September August 2016

CIMA Dates and Prices Online Classroom Live September August 2016 CIMA Dates and Prices Online Classroom Live September 2015 - August 2016 This document provides detail of the programmes that are being offered for the Objective Tests and Integrated Case Study Exams from

More information

IBIDEN Group Green Procurement Guidelines. (Version 6)

IBIDEN Group Green Procurement Guidelines. (Version 6) IBIDEN Group Green Procurement Guidelines (Version 6) October 1, 2017 [Table of Contents] 1. Introduction P3 2. IBIDEN Group s Basic Policy for the Environment P4 3. Objective of the Guideline P5 4. Definitions

More information

SUPPORTS SUSTAINABLE GROWTH

SUPPORTS SUSTAINABLE GROWTH DDSS BBUUN NDDLLEE G E O S P AT I A L G O V E R N A N C E P A C K A G E SUPPORTS SUSTAINABLE GROWTH www.digitalglobe.com BRISBANE, AUSTRALIA WORLDVIEW-3 30 CM International Civil Government Programs US

More information

NATO Headquarters The Situation Center GIS experience.

NATO Headquarters The Situation Center GIS experience. NATO Headquarters The Situation Center GIS experience. Abstract Recently, the dynamic capability of responding to a major world crisis with comprehensive in-depth information has become a crucial aspect

More information

How Power is Restored After a Severe Storm. Presented by Stacy Shaw, Safety Director & Nolan Hartzler, GIS Mapping Technician

How Power is Restored After a Severe Storm. Presented by Stacy Shaw, Safety Director & Nolan Hartzler, GIS Mapping Technician How Power is Restored After a Severe Storm Presented by Stacy Shaw, Safety Director & Nolan Hartzler, GIS Mapping Technician Hurricanes, ice storms, tornadoes One inch of ice on a single span of electric

More information

Digital Mapping License Agreement

Digital Mapping License Agreement City of Des Moines, Iowa GIS Division, Information Technology Department Digital Mapping License Agreement PURPOSE AND NATURE OF THE AGREEMENT This Digital Mapping License Agreement ("Agreement") is executed

More information

GEOLOGY 100 Planet Earth Spring Semester, 2007

GEOLOGY 100 Planet Earth Spring Semester, 2007 GEOLOGY 100 Planet Earth Spring Semester, 2007 Instructor: Michael A. Stewart, 250 Natural History Building Phone: 244-5025 Email: stewart1@uiuc.edu Office hours: Friday 1:00-2:30 pm by appointment Discussion

More information

Northrop Grumman Concept Paper

Northrop Grumman Concept Paper Northrop Grumman Concept Paper A Comprehensive Geospatial Web-based Solution for NWS Impact-based Decision Support Services Glenn Higgins April 10, 2014 Northrop Grumman Corporation Information Systems

More information

How GIS can be used for improvement of literacy and CE programmes

How GIS can be used for improvement of literacy and CE programmes How GIS can be used for improvement of literacy and CE programmes Training Workshop for Myanmar Literacy Resource Center (MLRC) ( Yangon, Myanmar, 11 20 October 2000 ) Presented by U THEIN HTUT GEOCOMP

More information

Strategic Planning of Tuvalu Meteorological Service

Strategic Planning of Tuvalu Meteorological Service WMO Regional Seminar on Enhancing Service Delivery by National Meteorological & Hydrological Services (NMHSs( NMHSs) ) in RA V Kuala Lumpur, Malaysia, 2 6 April 2007 Strategic Planning of Tuvalu Meteorological

More information

Snow Cover. Snow Plowing and Removal Services Best Practices Guide. l

Snow Cover. Snow Plowing and Removal Services Best Practices Guide.  l Snow Cover Snow Plowing and Removal Services Best Practices Guide 2015 2016 www.hortica.com l 800.851.7740 During a recent trip to upstate NY, Hortica Loss Control representatives met with several insureds

More information

Network Analysis with ArcGIS Online. Deelesh Mandloi Dmitry Kudinov

Network Analysis with ArcGIS Online. Deelesh Mandloi Dmitry Kudinov Deelesh Mandloi Dmitry Kudinov Introductions Who are we? - Network Analyst Product Engineers Who are you? - Network Analyst users? - ArcGIS Online users? - Trying to figure out what is ArcGIS Online? Slides

More information

Lightcloud Application

Lightcloud Application Controlling Your Lightcloud System Lightcloud Application Lightcloud Application Navigating the Application Devices Device Settings Organize Control Energy Scenes Schedules Demand Response Power Up State

More information

KEELE UNIVERSITY SNOW AND SEVERE WEATHER MANAGEMENT PLAN

KEELE UNIVERSITY SNOW AND SEVERE WEATHER MANAGEMENT PLAN 1.0 Introduction 1.1 It is recognised that severe weather conditions, particularly snow and ice, can make it difficult for people to travel. However, as a residential campus, even during severe weather

More information

Business Continuity Planning (BCP)

Business Continuity Planning (BCP) Business Continuity Planning (BCP) Eric Holdeman, Principal Why Have a Business Continuity Plan? } Bad things happen unexpectedly and pre-event planning is part of disaster preparedness } Your community

More information

GIS TECHNICIAN I GIS TECHNICIAN II

GIS TECHNICIAN I GIS TECHNICIAN II GIS TECHNICIAN I GIS TECHNICIAN II CITY OF ROSEVILLE DEFINITION To perform a variety of technical office and field work duties related to the creation and maintenance of maps, tables, graphs and other

More information

The Road to Improving your GIS Data. An ebook by Geo-Comm, Inc.

The Road to Improving your GIS Data. An ebook by Geo-Comm, Inc. The Road to Improving your GIS Data An ebook by Geo-Comm, Inc. An individual observes another person that appears to be in need of emergency assistance and makes the decision to place a call to 9-1-1.

More information

Section 2. Indiana Geographic Information Council: Strategic Plan

Section 2. Indiana Geographic Information Council: Strategic Plan Section 2. Indiana Geographic Information Council: Strategic Plan Introduction A geographic information system (GIS) is an automated tool that allows the collection, modification, storage, analysis, and

More information

EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others

EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others Lorenzo De Simone, GIS Expert/ EMMA Project Manager 2014 GIS Workshop,

More information

Social Vulnerability Index. Susan L. Cutter Department of Geography, University of South Carolina

Social Vulnerability Index. Susan L. Cutter Department of Geography, University of South Carolina Social Vulnerability Index Susan L. Cutter Department of Geography, University of South Carolina scutter@sc.edu Great Lakes and St. Lawrence Cities Initiative Webinar December 3, 2014 Vulnerability The

More information

The Application of 3D Web GIS In Land Administration - 3D Building Model System

The Application of 3D Web GIS In Land Administration - 3D Building Model System The Application of 3D Web GIS In Land Administration - 3D Building Model System Hui-Wen Chen *, Wen-Yuan Ku *, Lan-Kun Chung *, Tien-Yin Chou *, Li-Min Yi2 ** * Feng Chia University, Taiwan, ** Land Department

More information

HSQE Briefing November 2017

HSQE Briefing November 2017 HSQE Briefing November 2017 Our Safety Vision: Our vision of preventing harm to all is at the centre of our Safety Strategy and is synonymous with our commitment to resourcing and working safely. We believe

More information

GIS for the Beginner on a Budget

GIS for the Beginner on a Budget GIS for the Beginner on a Budget Andre C. Bally, RLA, GIS Coordinator, Harris County Public Infrastructure Department Engineering Division This presentation, GIS for Beginners on a Budget. will briefly

More information