R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.
|
|
- Meredith Walton
- 5 years ago
- Views:
Transcription
1 R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E C T I O N S , ,
2 PRODUCT BACKLOG A sorted and prioritized list of user stories as currently perceived. User stories values is determined according to value, cost, knowledge, and risk) the high-value items appear at the top of the product backlog Product backlog vs. Sprint backlog
3 PRODUCT BACKLOG On new-product development the product backlog items initially are features required to meet the product owner s vision. For ongoing product development, the product backlog might also contain new features, changes to existing features, defects needing repair, technical improvements, and so on.
4 PRODUCT BACKLOG ITEMS (PBI) Are a placeholder for business value. Avoid detailing a user story ahead of time. Later and through a series of conversations among the stakeholders, product owner, and development team, refining them into a collection of smaller, more detailed PBIs user stories.
5 GROOMING Includes three principal activities: creating and refining (adding details to) PBIs estimating PBIs prioritizing PBIs. PBIs near the top of the backlog: small in size, and very detailed so that they can be worked on in a near-term sprint. PBIs towards the bottom of the backlog, larger in size, and less detailed.
6 SPRINT PLANNING AND BACKLOG During sprint planning, the product owner and development team agree on a sprint goal that defines what the upcoming sprint is supposed to achieve. Using this goal, the development team reviews the product backlog and determines the high priority items that the team can realistically accomplish in the upcoming sprint while working at a sustainable pace a pace at which the development team can comfortably work for an extended period of time. spring planning (4-8 hours) Break each user story into a set of tasks.
7 TECHNICAL DEBT A trade off between: Rapid delivery and delayed commitment Increased time to delivery and product failure. Ward Cunningham: inventor of wiki and one of the Agile Manifesto signers.
8 USER STORIES Indicate the estimated size. Includes an estimate for the effort to implement the user story. Assign user story points to each card, a relative indication of how long it will take a pair of programmers to implement the story. The team then knows that if it currently takes them on average 2.5 hours per point; Indicate the priority. can easily maintain a stack of prioritized requirements by moving the cards around in the stack as appropriate. Can use a scale of one to ten with one being the highest priority. Other prioritization approaches are possible priorities of High/Medium/Low Optionally include a unique identifier. You need to maintain some sort of traceability between the user story and other artifacts, in particular acceptance tests.
9 TYPES OF NON-FUNCTIONAL REQUIREMENTS As a user I want the system to have % uptime.
10 NON-FUNCTIONAL REQUIREMENTS Quantifiable format is essential The system should be easy to use by medical staff and should be organized in such a way that user errors are minimized. VS. Medical staff shall be able to use all the system functions after four hours of training. After this training, the average number of errors made by experienced users shall not exceed two per hour of system use.
11 STUDENT PORTFOLIO: NON-FUNCTINOAL REQS Security The system shall require users to register using university s The system shall verify the user is a final year student via the university student database The system shall require users to create a password of medium to high strength The system shall require users to update their passwords every 30 days Speed The system shall retrieve and display portfolio summary in less than 0.5 second Paging, run multiple queries Quantify response time The system shall respond to search queries in less than 0.3 seconds Search : Tokenize description
12 NON-FUNCTIONAL REQUIREMENTS
13 NON-FUNCTIONAL REQUIREMENTS Non-functional requirements These are constraints on the services or functions offered by the system. They include timing constraints, constraints on the development process, and constraints imposed by standards. Non-functional requirements often apply to the system as a whole, rather than individual system features or services. In reality, the distinction between different types of requirement is not as clear-cut as these simple definitions suggest. A user requirement concerned with security, such as a statement limiting access to authorized users, may appear to be a nonfunctional requirement. However, when developed in more detail, this requirement may generate other requirements that are clearly functional, such as the need to include user authentication facilities in the system.
14 TYPES OF NON-FUNCTIONAL REQUIREMENTS
15 SYSTEM DEPENDABILITY Dependability covers the related systems attributes of reliability, availability and security. These are all inter-dependent. For many computer-based systems, the most important system property is the dependability of the system. The dependability of a system reflects the user s degree of trust in that system. It reflects the extent of the user s confidence that it will operate as users expect and that it will not fail in normal use. C H A P T E R 11 S E C U R I T Y A N D D E P E N D A B I L I T Y 15
16 PRINCIPAL PROPERTIES Availability The probability that the system will be up and running and able to deliver useful services to users. Reliability The probability that the system will correctly deliver services as expected by users. Safety A judgment of how likely it is that the system will cause damage to people or its environment. Security A judgment of how likely it is that the system can resist accidental or deliberate intrusions. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 16
17 DEPENDABILITY ECONOMICS Dependability costs tend to increase exponentially as increasing levels of dependability are required. There are two reasons for this The use of more expensive development techniques and hardware that are required to achieve the higher levels of dependability. The increased testing and system validation that is required to convince the system client and regulators that the required levels of dependability have been achieved. C H A P T E R 11 S E C U R I T Y A N D D E P E N D A B I L I T Y 17
18 AVAILABILITY Measure of the fraction of the time that the system is available for use. Takes repair and restart time into account Availability of means software is available for 998 out of 1000 time units. Relevant for non-stop, continuously running systems telephone switching systems, railway signalling systems. C H A P T E R 12 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 18
19 AVAILABILITY SPECIFICATION Availability Explanation 0.9 The system is available for 90% of the time. This means that, in a 24-hour period (1,440 minutes), the system will be unavailable for 144 minutes In a 24-hour period, the system is unavailable for 14.4 minutes The system is unavailable for 84 seconds in a 24-hour period The system is unavailable for 8.4 seconds in a 24-hour period. Roughly, one minute per week. C H A P T E R 12 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 19
20 AVAILABILITY AND RELIABILITY Reliability The probability of failure-free system operation over a specified time in a given environment for a given purpose Availability The probability that a system, at a point in time, will be operational and able to deliver the requested services Both of these attributes can be expressed quantitatively e.g. availability of means that the system is up and running for 99.9% of the time. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 20
21 FAILURE TERMINOLOGY Term Human error or mistake System fault System error System failure Description Human behavior that results in the introduction of faults into a system. For example, in the wilderness weather system, a programmer might decide that the way to compute the time for the next transmission is to add 1 hour to the current time. This works except when the transmission time is between and midnight (midnight is in the 24-hour clock). A characteristic of a software system that can lead to a system error. The fault is the inclusion of the code to add 1 hour to the time of the last transmission, without a check if the time is greater than or equal to An erroneous system state that can lead to system behavior that is unexpected by system users. The value of transmission time is set incorrectly (to 24.XX rather than 00.XX) when the faulty code is executed. An event that occurs at some point in time when the system does not deliver a service as expected by its users. No weather data is transmitted because the time is invalid. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 21
22 FAULTS AND FAILURES Failures are a usually a result of system errors that are derived from faults in the system However, faults do not necessarily result in system errors The erroneous system state resulting from the fault may be transient and corrected before an error arises. The faulty code may never be executed. Errors do not necessarily lead to system failures The error can be corrected by built-in error detection and recovery The failure can be protected against by built-in protection facilities. These may, for example, protect system resources from system errors C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 22
23 PERCEPTIONS OF RELIABILITY The formal definition of reliability does not always reflect the user s perception of a system s reliability The assumptions that are made about the environment where a system will be used may be incorrect Usage of a system in an office environment is likely to be quite different from usage of the same system in a university environment The consequences of system failures affects the perception of reliability Unreliable windscreen wipers in a car may be irrelevant in a dry climate Failures that have serious consequences (such as an engine breakdown in a car) are given greater weight by users than failures that are inconvenient C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 23
24 RELIABILITY METRICS Reliability metrics are units of measurement of system reliability. System reliability is measured by counting the number of operational failures and, where appropriate, relating these to the demands made on the system and the time that the system has been operational. A long-term measurement programme is required to assess the reliability of critical systems. Metrics Probability of failure on demand Rate of occurrence of failures/mean time to failure Availability C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 24
25 PROBABILITY OF FAILURE ON DEMAND (POFOD) This is the probability that the system will fail when a service request is made. Useful when demands for service are intermittent and relatively infrequent. Appropriate for protection systems where services are demanded occasionally and where there are serious consequence if the service is not delivered. Relevant for many safety-critical systems with exception management components Emergency shutdown system in a chemical plant. C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 25
26 RATE OF FAULT OCCURRENCE (ROCOF) Reflects the rate of occurrence of failure in the system. ROCOF of means 2 failures are likely in each 1000 operational time units e.g. 2 failures per 1000 hours of operation. Relevant for systems where the system has to process a large number of similar requests in a short time Credit card processing system, airline booking system. Reciprocal of ROCOF is Mean time to Failure (MTTF) Relevant for systems with long transactions i.e. where system processing takes a long time (e.g. CAD systems). MTTF should be longer than expected transaction length. C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 26
27 SECURITY The security of a system is a system property that reflects the system s ability to protect itself from accidental or deliberate external attack. Security is essential as most systems are networked so that external access to the system through the Internet is possible. Security is an essential pre-requisite for availability, reliability and safety. C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 27
28 SECURITY TERMINOLOGY Term Asset Exposure Vulnerability Attack Threats Control Definition Something of value which has to be protected. The asset may be the software system itself or data used by that system. Possible loss or harm to a computing system. This can be loss or damage to data, or can be a loss of time and effort if recovery is necessary after a security breach. A weakness in a computer-based system that may be exploited to cause loss or harm. An exploitation of a system s vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. Circumstances that have potential to cause loss or harm. You can think of these as a system vulnerability that is subjected to an attack. A protective measure that reduces a system s vulnerability. Encryption is an example of a control that reduces a vulnerability of a weak access control system C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 28
29 SECURITY RISK ASSESSMENT Asset identification Identify the key system assets (or services) that have to be protected. Asset value assessment Estimate the value of the identified assets. Exposure assessment Assess the potential losses associated with each asset. Threat identification Identify the most probable threats to the system assets C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 29
30 SECURITY REQUIREMENTS Patient information must be downloaded at the start of a clinic session to a secure area on the system client that is used by clinical staff. Patient information must not be maintained on system clients after a clinic session has finished. A log on a separate computer from the database server must be maintained of all changes made to the system database. C H A P T E R 1 4 S E C U R I T Y E N G I N E E R I N G 30
31 THREAT CLASSES Threats to the confidentiality of the system and its data Can disclose information to people or programs that do not have authorization to access that information. leaks Threats to the integrity of the system and its data Can damage or corrupt the software or its data. Defacement - record manipulation Threats to the availability of the system and its data Can restrict access to the system and data for authorized users. Denial of service attacks C H A P T E R 1 1 S E C U R I T Y A N D D E P E N D A B I L I T Y 31
32 SECURITY REQUIREMENTS A password checker shall be made available and shall be run daily. Weak passwords shall be reported to system administrators. Access to the system shall only be allowed by approved client computers. All client computers shall have a single, approved web browser installed by system administrators. C H A P T E R 1 4 S E C U R I T Y E N G I N E E R I N G 32
33 TYPES OF SECURITY REQUIREMENT Identification requirements. Authentication requirements. Authorisation requirements. Immunity requirements. Integrity requirements. Intrusion detection requirements. Privacy requirements. Security auditing requirements. System maintenance security requirements. C H A P T E R 1 2 D E P E N D A B I L I T Y A N D S E C U R I T Y S P E C I F I C A T I O N 33
Forecasting without Fear
Forecasting without Fear How to keep the business informed and keep your cool NY SPIN December 15, 2015 Drivers, Challenges why you have to forecast, and why it s not easy what you forecast Refinement
More informationDependable Systems. ! Dependability Attributes. Dr. Peter Tröger. Sources:
Dependable Systems! Dependability Attributes Dr. Peter Tröger! Sources:! J.C. Laprie. Dependability: Basic Concepts and Terminology Eusgeld, Irene et al.: Dependability Metrics. 4909. Springer Publishing,
More informationCoordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.
Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation
More informationIntegrated Electricity Demand and Price Forecasting
Integrated Electricity Demand and Price Forecasting Create and Evaluate Forecasting Models The many interrelated factors which influence demand for electricity cannot be directly modeled by closed-form
More information1 Introduction. Station Type No. Synoptic/GTS 17 Principal 172 Ordinary 546 Precipitation
Use of Automatic Weather Stations in Ethiopia Dula Shanko National Meteorological Agency(NMA), Addis Ababa, Ethiopia Phone: +251116639662, Mob +251911208024 Fax +251116625292, Email: Du_shanko@yahoo.com
More informationWeather Company Energy and Power Products
Service Weather Company Energy and Power Products This Service (SD) describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationAttack Graph Modeling and Generation
Attack Graph Modeling and Generation Ratnesh Kumar, Professor, IEEE Fellow Electrical and Computer Engineering, Iowa State University PhD Students: Mariam Ibrahim German Jordanian University Attack Graph:
More informationEBS IT Meeting July 2016
EBS IT Meeting 18 19 July 2016 Conference Call Details Conference call: UK Numbers Tel: 0808 238 9819 or Tel: 0207 950 1251 Participant code: 4834 7876... Join online meeting https://meet.nationalgrid.com/antonio.delcastillozas/hq507d31
More informationSoftware Reliability.... Yes sometimes the system fails...
Software Reliability... Yes sometimes the system fails... Motivations Software is an essential component of many safety-critical systems These systems depend on the reliable operation of software components
More informationEnabling Success in Enterprise Asset Management: Case Study for Developing and Integrating GIS with CMMS for a Large WWTP
Enabling Success in Enterprise Asset Management: Case Study for Developing and Integrating GIS with CMMS for a Large WWTP Allison Blake, P.E. 1*, Matthew Jalbert, P.E. 2, Julia J. Hunt, P.E. 2, Mazen Kawasmi,
More informationCopernicus Overview. Major Emergency Management Conference Athlone 2017
Copernicus Overview Major Emergency Management Conference Athlone 2017 Copernicus is a European programme implemented by the European Commission. The services address six thematic areas: land, marine,
More informationThe Weather Information Value Chain
The Weather Information Value Chain Jeffrey K. Lazo Societal Impacts Program National Center for Atmospheric Research Boulder CO April 27 2016 HIWeather Exeter, England Outline Shout out on WMO/USAID/World
More informationInformation Security in the Age of Quantum Technologies
www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes
More informationStatistical Reliability Modeling of Field Failures Works!
Statistical Reliability Modeling of Field Failures Works! David Trindade, Ph.D. Distinguished Principal Engineer Sun Microsystems, Inc. Quality & Productivity Research Conference 1 Photo by Dave Trindade
More informationIS YOUR BUSINESS PREPARED FOR A POWER OUTAGE?
IS YOUR BUSINESS PREPARED FOR A POWER OUTAGE? Keeping your power on is our business Whether your business is large, small or somewhere in between, we understand that a power outage presents special challenges
More informationFault Tolerance. Dealing with Faults
Fault Tolerance Real-time computing systems must be fault-tolerant: they must be able to continue operating despite the failure of a limited subset of their hardware or software. They must also allow graceful
More informationPortal for ArcGIS: An Introduction. Catherine Hynes and Derek Law
Portal for ArcGIS: An Introduction Catherine Hynes and Derek Law Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options and groups Portal for ArcGIS
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationArmy Installation Geospatial Information and Services (IGI&S) Program Overview
Army Installation Geospatial Information and Services (IGI&S) Program Overview Joshua Delmonico Geospatial Information Officer OACSIM IGI&S Program 703-602-2851 Joshua.Delmonico@hqda.army.mil 1of 11 221400
More informationThis introduction is intended for compliance officers at Protection Seller and Broker-Advisor firms
weatherxchange - a platform which facilitates index-based weather risk transfer This introduction is intended for compliance officers at Protection Seller and Broker-Advisor firms Introduction Launched
More informationLeveraging Web GIS: An Introduction to the ArcGIS portal
Leveraging Web GIS: An Introduction to the ArcGIS portal Derek Law Product Management DLaw@esri.com Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options
More informationGeo-enabling a Transactional Real Estate Management System A case study from the Minnesota Dept. of Transportation
Geo-enabling a Transactional Real Estate Management System A case study from the Minnesota Dept. of Transportation Michael Terner Executive Vice President Co-author and Project Manager Andy Buck Overview
More informationJob Description. 1) To provide a range of meteorological services, including a forecaster consultancy service.
Job Description Job Title: Department: Division: Location: Grade: Responsible to: Trainee Meteorological Forecaster Department of Infrastructure Ports Division Isle of Man Airport Trainee Met Officer Senior
More informationWeatherHub2 Quick Start Guide
WeatherHub2 Quick Start Guide Table of Contents 1 Introduction... 1 2 Packing List... 1 3 Connections... 1 4 IP Addressing... 2 5 Browser Access... 3 6 System Info... 3 7 Weather Station Settings... 4
More informationOFFSHORE. Advanced Weather Technology
Contents 3 Advanced Weather Technology 5 Working Safely, While Limiting Downtime 6 Understanding the Weather Forecast Begins at the Tender Stage 7 Reducing Time and Costs on Projects is a Priority Across
More informationIntroduction to Portal for ArcGIS. Hao LEE November 12, 2015
Introduction to Portal for ArcGIS Hao LEE November 12, 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration options Portal for ArcGIS + ArcGIS for
More informationChap 4. Software Reliability
Chap 4. Software Reliability 4.2 Reliability Growth 1. Introduction 2. Reliability Growth Models 3. The Basic Execution Model 4. Calendar Time Computation 5. Reliability Demonstration Testing 1. Introduction
More informationSteve Pietersen Office Telephone No
Steve Pietersen Steve.Pieterson@durban.gov.za Office Telephone No. 031 311 8655 Overview Why geography matters The power of GIS EWS GIS water stats EWS GIS sanitation stats How to build a GIS system EWS
More informationThe purpose of this report is to recommend a Geographic Information System (GIS) Strategy for the Town of Richmond Hill.
Staff Report for Committee of the Whole Meeting Department: Division: Subject: Office of the Chief Administrative Officer Strategic Initiatives SRCAO.18.12 GIS Strategy Purpose: The purpose of this report
More informationWeather Company Data for Advanced Analytics
Service Description Weather Company Data for Advanced Analytics This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users
More informationOverview of Control System Design
Overview of Control System Design General Requirements 1. Safety. It is imperative that industrial plants operate safely so as to promote the well-being of people and equipment within the plant and in
More informationIntroduction to Portal for ArcGIS
Introduction to Portal for ArcGIS Derek Law Product Management March 10 th, 2015 Esri Developer Summit 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration
More informationCHAPTER 22 GEOGRAPHIC INFORMATION SYSTEMS
CHAPTER 22 GEOGRAPHIC INFORMATION SYSTEMS PURPOSE: This chapter establishes the administration and use of to improve the quality and accessibility of Department s spatial information and support graphical
More informationSPR Satisfaction Survey BC Surgical Patient Registry (SPR) Satisfaction Survey 2012
BC Surgical Patient Registry (SPR) Satisfaction Survey 2012 July 16, 2012 Table of Contents BACKGROUND...1 RESULTS...2 1. Demographics... 2 2. Usage of the SPR... 3 3. Access to the SPR... 6 4. Value of
More informationPUB NLH 185 Island Interconnected System Supply Issues and Power Outages Page 1 of 9
PUB NLH 1 Page 1 of 1 Q. Provide Hydro s list of outage cause codes and indicate how troublemen are managed and trained to properly use the codes. Explain the method used to report outage causes. A. Hydro
More informationDeveloping a Community Geographical Information System (GIS) in Rural India
Developing a Community Geographical Information System (GIS) in Rural India Before rushing off and describing the unique challenges of developing a small scale GIS system India I better first describe
More informationOregon Department of Transportation. Geographic Information Systems Strategic Plan
Oregon Department of Transportation Geographic Information Systems Strategic Plan Adopted May, 2000 By the GIS Steering Committee Last printed 10/2/2012 4:20:00 PM Page Geographic Information Systems Strategic
More informationThe science behind these computers originates in
A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge
More informationGIS Geographic Information Systems
GIS Geographic Information Systems Connecting your Community Ruekert Mielke WAUKESHA WHO WE ARE DATE ESTABLISHED 1946 SERVING LOCAL PEOPLE. SOLVING LOCAL PROBLEMS. TYPE OF ORGANIZATION Ruekert & Mielke,
More informationIMPLEMENTING GOVERNMENT-WIDE ENTERPRISE GIS; THE FEDERATED MODEL
IMPLEMENTING GOVERNMENT-WIDE ENTERPRISE GIS; THE FEDERATED MODEL James E. Mitchell, Ph. D. IT GIS Manager Louisiana Department of Transportation and Development presented at the ESRI International Users
More informationManagement of Geological Information for Mining Sector Development and Investment Attraction Examples from Uganda and Tanzania
Mineral Wealth Conference 2016 Kampala / Uganda Management of Geological Information for Mining Sector Development and Investment Attraction Examples from Uganda and Tanzania Andreas Barth 1, Andreas Knobloch
More informationBusiness Case: UV Facility Backup Generator
Business Case: UV Facility Backup Generator Eric Brainich December 13, 2010 Background The Portland Water Bureau is currently working on the design for a new Ultra Violet (UV) Treatment Facility and the
More informationOPERATING MANUAL. EIB-Kombisensor AS 315 N
EIB-Kombisensor AS 315 N OPERATING MANUAL EIB-Kombisensor AS 315 N 1 Contents Page 3 1. Description 4 1.1 Automated Operations 1.1.1 Sun System 1.1.2 Half-Light System 5 1.1.3 Wind System 1.1.4 Rain System
More informationTECHNICAL MANUAL 820 LX / 910 LX / 1300 LX
TECHNICAL MANUAL 820 LX / 910 LX / 1300 LX LANCER reserves the right to modify, constantly its documentation for its improvement. The values of adjustments indicated in the displays of this manual are
More informationNon-observable failure progression
Non-observable failure progression 1 Age based maintenance policies We consider a situation where we are not able to observe failure progression, or where it is impractical to observe failure progression:
More informationClock Synchronization Procedure
Clock Synchronization Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 10.10.6 Issue Date: June 19, 2013 Revision Date: June 19, 2013 Approved by: Title: Ted Harvey Director, Technology
More informationComputer Science, Informatik 4 Communication and Distributed Systems. Simulation. Discrete-Event System Simulation. Dr.
Simulation Discrete-Event System Simulation Chapter 9 Verification and Validation of Simulation Models Purpose & Overview The goal of the validation process is: To produce a model that represents true
More informationGIS Capability Maturity Assessment: How is Your Organization Doing?
GIS Capability Maturity Assessment: How is Your Organization Doing? Presented by: Bill Johnstone Principal Consultant Spatial Vision Group November 8, 2018 1. Motivation for Capability Maturity Models
More informationCommon Cause Failure (CCF)
Common Cause Failure (CCF) 건국대학교컴퓨터공학과 UC Lab. 정혁준 & 박경식 amitajung@naver.com, kyeongsik@konkuk.ac.kr Contents Common Cause Failure (CCF) Types of CCF Examples Reducing CCF Common Cause Failure (CCF) Definition
More informationDo we have a quorum?
Do we have a quorum? Quorum Systems Given a set U of servers, U = n: A quorum system is a set Q 2 U such that Q 1, Q 2 Q : Q 1 Q 2 Each Q in Q is a quorum How quorum systems work: A read/write shared register
More informationCLIMATE CHANGE ADAPTATION BY MEANS OF PUBLIC PRIVATE PARTNERSHIP TO ESTABLISH EARLY WARNING SYSTEM
CLIMATE CHANGE ADAPTATION BY MEANS OF PUBLIC PRIVATE PARTNERSHIP TO ESTABLISH EARLY WARNING SYSTEM By: Dr Mamadou Lamine BAH, National Director Direction Nationale de la Meteorologie (DNM), Guinea President,
More informationGIS FOR MAZOWSZE REGION - GENERAL OUTLINE
GIS FOR MAZOWSZE REGION - GENERAL OUTLINE S. Bialousz 1), K Mączewski 2), E. Janczar 2), K. Osinska-Skotak 1) 1) Warsaw University of Technology, Warsaw, Poland 2) Office of the Surveyor of the Mazowieckie
More informationDerogation Criteria for the Requirements for Generators Network Code
Derogation Criteria for the Requirements for Generators Network Code Decision Paper Reference: CER/17/084 Date Published: 13/04/2017 Closing Date: 0 Executive Summary Commission Regulation (EU) 2016/631
More informationPortal for ArcGIS: An Introduction
Portal for ArcGIS: An Introduction Derek Law Esri Product Management Esri UC 2014 Technical Workshop Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration
More informationContinuous Performance Testing Shopware Developer Conference. Kore Nordmann 08. June 2013
Continuous Performance Testing Shopware Developer Conference Kore Nordmann (@koredn) 08. June 2013 About Me Kore Nordmann @koredn Co-founder of Helping people to create high quality web applications. http://qafoo.com
More informationLarry R. Glass, Ph.D., M.P.H. Xerox Corporation
REACH COMPLIANCE LSS Project Registration Of Chemicals Evaluation Authorization & Restriction Larry R. Glass, Ph.D., M.P.H. Xerox Corporation Overview of REACH Regulation European Regulation Signed into
More informationKey Words: Lifetime Data Analysis (LDA), Probability Density Function (PDF), Goodness of fit methods, Chi-square method.
Reliability prediction based on lifetime data analysis methodology: The pump case study Abstract: The business case aims to demonstrate the lifetime data analysis methodology application from the historical
More informationWordPress and CRM. Match Made In Heaven... or Hell?
WordPress and CRM Match Made In Heaven... or Hell? Who Am I? Colin Pizarek Product Manager, NeonCRM Board Member, Ridgeville Foundation Alumnus, Idealware Disclaimer: I m opinionated. Moving data from
More informationMinistry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009
Ministry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009 John Hill, Health Analytics Branch Health System Information
More informationConsidering Security Aspects in Safety Environment. Dipl.-Ing. Evzudin Ugljesa
Considering Security spects in Safety Environment Dipl.-ng. Evzudin Ugljesa Overview ntroduction Definitions of safety relevant parameters Description of the oo4-architecture Calculation of the FD-Value
More informationSYMBIOSIS CENTRE FOR DISTANCE LEARNING (SCDL) Subject: production and operations management
Sample Questions: Section I: Subjective Questions 1. What are the inputs required to plan a master production schedule? 2. What are the different operations schedule types based on time and applications?
More informationPredicting Long-Term Telemetry Behavior for Lunar Orbiting, Deep Space, Planetary and Earth Orbiting Satellites
Predicting Long-Term Telemetry Behavior for Lunar Orbiting, Deep Space, Planetary and Earth Orbiting Satellites Item Type text; Proceedings Authors Losik, Len Publisher International Foundation for Telemetering
More informationThe Vaisala AUTOSONDE AS41 OPERATIONAL EFFICIENCY AND RELIABILITY TO A TOTALLY NEW LEVEL.
The Vaisala AUTOSONDE AS41 OPERATIONAL EFFICIENCY AND RELIABILITY TO A TOTALLY NEW LEVEL. Weather Data Benefit For Society The four most important things about weather prediction are quality, reliability,
More informationEnhancing Weather Information with Probability Forecasts. An Information Statement of the American Meteorological Society
Enhancing Weather Information with Probability Forecasts An Information Statement of the American Meteorological Society (Adopted by AMS Council on 12 May 2008) Bull. Amer. Meteor. Soc., 89 Summary This
More informationTerms and conditions for non-commercial end-use 1. General
Terms and conditions for non-commercial end-use 1. General 1.1. Lantmäteriet provides the licensed geodata products Nedladdning uttag (Download once) and Nedladdning abonnemang (Download subscription)
More informationExtreme Weather and Risks to Infrastructure. Heather Auld & Neil Comer Risk Sciences International
Extreme Weather and Risks to Infrastructure Heather Auld & Neil Comer Risk Sciences International The Science is Valid and the Evidence grows Stronger AGREE Climate Change Disagree More Intense Rainfall
More informationGIS Geographical Information Systems. GIS Management
GIS Geographical Information Systems GIS Management Difficulties on establishing a GIS Funding GIS Determining Project Standards Data Gathering Map Development Recruiting GIS Professionals Educating Staff
More informationVaisala AviMet Automated Weather Observing System
Vaisala AviMet Automated Weather Observing System Solutions to meet your challenges Our mission: to help you operate succesfully Safe, economical, reliable and flexible operation of your airport is ensured
More informationSCHOOL EMERGENCY MANAGEMENT PLAN FOR NATURAL DISASTERS
SCHOOL EMERGENCY MANAGEMENT PLAN FOR NATURAL DISASTERS MANAGING EMERGENCIES EFFECTIVELY Keith Thomas, Loss Prevention & Risk Manager LEADERSHIP, ADVOCACY AND SERVICE FOR MANITOBA S PUBLIC SCHOOL BOARDS
More informationELE 491 Senior Design Project Proposal
ELE 491 Senior Design Project Proposal These slides are loosely based on the book Design for Electrical and Computer Engineers by Ford and Coulston. I have used the sources referenced in the book freely
More informationChapter X: Radiation Safety Audit Program
Chapter X: Radiation Safety Audit Program Policy All laboratories using radioactive material shall be reviewed as required by the Illinois Emergency Management Agency (IEMA), Division of Nuclear Safety
More informationProceedings, 2012 International Snow Science Workshop, Anchorage, Alaska
NATIONAL DATABASE FOR MITIGATIVE MEASURES AGAINST RAPID GRAVITY MASS FLOWS AND ROCK FALLS Árni Jónsson 1*, Egil Syre 1,2,Kristine Helene Hetland Ekseth 1, Helge C. Smebye 1, Eivind M. Paulsen 1, 1 Norwegian
More informationVERSION 3.0 MARKS & SPENCER NOVEMBER 2015 ECP MINUMUM STANDARDS REACH. Registration, Evaluation and Authorisation of Chemicals
VERSION 3.0 MARKS & SPENCER NOVEMBER 2015 ECP MINUMUM STANDARDS REACH Registration, Evaluation and Authorisation of Chemicals VERSION 3 NOVEMBER 2015 ENVIRONMENTAL & CHEMICAL POLICY FOR TEXTILE PROCESSING
More informationJOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # GIS Coordinator AD Grid Level 6(c) # 420
COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # GIS Coordinator AD Grid Level 6(c) # 420 NOC CODE: 2255 STANDARD HOURS: 35 hours/week (non-management) JOB TITLE
More informationHazard Communication
Hazard Communication For Company: Address: LC-1009 Rev. 06/16 Page 1 Hazard Communication Program Ref: OSHA 1910.1200 Approved by: Title: Ranking Official's Signature Date: Hazard Communication Coordinator
More informationComprehensive Winter Maintenance Management System BORRMA-web MDSS inside to increase Road Safety and Traffic Flow
Thorsten Cypra 1 Comprehensive Winter Maintenance Management System BORRMA-web MDSS inside to increase Road Safety and Traffic Flow American Public Works Association (APWA) Monday, 04/14/2008 3:30 4:30
More informationCore Courses for Students Who Enrolled Prior to Fall 2018
Biostatistics and Applied Data Analysis Students must take one of the following two sequences: Sequence 1 Biostatistics and Data Analysis I (PHP 2507) This course, the first in a year long, two-course
More informationCIMA Dates and Prices Online Classroom Live September August 2016
CIMA Dates and Prices Online Classroom Live September 2015 - August 2016 This document provides detail of the programmes that are being offered for the Objective Tests and Integrated Case Study Exams from
More informationIBIDEN Group Green Procurement Guidelines. (Version 6)
IBIDEN Group Green Procurement Guidelines (Version 6) October 1, 2017 [Table of Contents] 1. Introduction P3 2. IBIDEN Group s Basic Policy for the Environment P4 3. Objective of the Guideline P5 4. Definitions
More informationSUPPORTS SUSTAINABLE GROWTH
DDSS BBUUN NDDLLEE G E O S P AT I A L G O V E R N A N C E P A C K A G E SUPPORTS SUSTAINABLE GROWTH www.digitalglobe.com BRISBANE, AUSTRALIA WORLDVIEW-3 30 CM International Civil Government Programs US
More informationNATO Headquarters The Situation Center GIS experience.
NATO Headquarters The Situation Center GIS experience. Abstract Recently, the dynamic capability of responding to a major world crisis with comprehensive in-depth information has become a crucial aspect
More informationHow Power is Restored After a Severe Storm. Presented by Stacy Shaw, Safety Director & Nolan Hartzler, GIS Mapping Technician
How Power is Restored After a Severe Storm Presented by Stacy Shaw, Safety Director & Nolan Hartzler, GIS Mapping Technician Hurricanes, ice storms, tornadoes One inch of ice on a single span of electric
More informationDigital Mapping License Agreement
City of Des Moines, Iowa GIS Division, Information Technology Department Digital Mapping License Agreement PURPOSE AND NATURE OF THE AGREEMENT This Digital Mapping License Agreement ("Agreement") is executed
More informationGEOLOGY 100 Planet Earth Spring Semester, 2007
GEOLOGY 100 Planet Earth Spring Semester, 2007 Instructor: Michael A. Stewart, 250 Natural History Building Phone: 244-5025 Email: stewart1@uiuc.edu Office hours: Friday 1:00-2:30 pm by appointment Discussion
More informationNorthrop Grumman Concept Paper
Northrop Grumman Concept Paper A Comprehensive Geospatial Web-based Solution for NWS Impact-based Decision Support Services Glenn Higgins April 10, 2014 Northrop Grumman Corporation Information Systems
More informationHow GIS can be used for improvement of literacy and CE programmes
How GIS can be used for improvement of literacy and CE programmes Training Workshop for Myanmar Literacy Resource Center (MLRC) ( Yangon, Myanmar, 11 20 October 2000 ) Presented by U THEIN HTUT GEOCOMP
More informationStrategic Planning of Tuvalu Meteorological Service
WMO Regional Seminar on Enhancing Service Delivery by National Meteorological & Hydrological Services (NMHSs( NMHSs) ) in RA V Kuala Lumpur, Malaysia, 2 6 April 2007 Strategic Planning of Tuvalu Meteorological
More informationSnow Cover. Snow Plowing and Removal Services Best Practices Guide. l
Snow Cover Snow Plowing and Removal Services Best Practices Guide 2015 2016 www.hortica.com l 800.851.7740 During a recent trip to upstate NY, Hortica Loss Control representatives met with several insureds
More informationNetwork Analysis with ArcGIS Online. Deelesh Mandloi Dmitry Kudinov
Deelesh Mandloi Dmitry Kudinov Introductions Who are we? - Network Analyst Product Engineers Who are you? - Network Analyst users? - ArcGIS Online users? - Trying to figure out what is ArcGIS Online? Slides
More informationLightcloud Application
Controlling Your Lightcloud System Lightcloud Application Lightcloud Application Navigating the Application Devices Device Settings Organize Control Energy Scenes Schedules Demand Response Power Up State
More informationKEELE UNIVERSITY SNOW AND SEVERE WEATHER MANAGEMENT PLAN
1.0 Introduction 1.1 It is recognised that severe weather conditions, particularly snow and ice, can make it difficult for people to travel. However, as a residential campus, even during severe weather
More informationBusiness Continuity Planning (BCP)
Business Continuity Planning (BCP) Eric Holdeman, Principal Why Have a Business Continuity Plan? } Bad things happen unexpectedly and pre-event planning is part of disaster preparedness } Your community
More informationGIS TECHNICIAN I GIS TECHNICIAN II
GIS TECHNICIAN I GIS TECHNICIAN II CITY OF ROSEVILLE DEFINITION To perform a variety of technical office and field work duties related to the creation and maintenance of maps, tables, graphs and other
More informationThe Road to Improving your GIS Data. An ebook by Geo-Comm, Inc.
The Road to Improving your GIS Data An ebook by Geo-Comm, Inc. An individual observes another person that appears to be in need of emergency assistance and makes the decision to place a call to 9-1-1.
More informationSection 2. Indiana Geographic Information Council: Strategic Plan
Section 2. Indiana Geographic Information Council: Strategic Plan Introduction A geographic information system (GIS) is an automated tool that allows the collection, modification, storage, analysis, and
More informationEMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others
EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others Lorenzo De Simone, GIS Expert/ EMMA Project Manager 2014 GIS Workshop,
More informationSocial Vulnerability Index. Susan L. Cutter Department of Geography, University of South Carolina
Social Vulnerability Index Susan L. Cutter Department of Geography, University of South Carolina scutter@sc.edu Great Lakes and St. Lawrence Cities Initiative Webinar December 3, 2014 Vulnerability The
More informationThe Application of 3D Web GIS In Land Administration - 3D Building Model System
The Application of 3D Web GIS In Land Administration - 3D Building Model System Hui-Wen Chen *, Wen-Yuan Ku *, Lan-Kun Chung *, Tien-Yin Chou *, Li-Min Yi2 ** * Feng Chia University, Taiwan, ** Land Department
More informationHSQE Briefing November 2017
HSQE Briefing November 2017 Our Safety Vision: Our vision of preventing harm to all is at the centre of our Safety Strategy and is synonymous with our commitment to resourcing and working safely. We believe
More informationGIS for the Beginner on a Budget
GIS for the Beginner on a Budget Andre C. Bally, RLA, GIS Coordinator, Harris County Public Infrastructure Department Engineering Division This presentation, GIS for Beginners on a Budget. will briefly
More information