The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to a study released this July by Juniper Research, more than half the world's largest companies are now researching blockchain technologies with the goal of integrating them into their products. Projects are already under way that will disrupt the management of health care records, property titles, supply chains, and even our online identities. But before we remount the entire digital ecosystem...
Key Performance Indicators (KPIs) are used to inspect the performance and progress of businesses. This study introduces a new, integrated approach to manage KPIs in the context of decentralized information efficiently and to address the visual and managerial gaps existing in companies. The proposed Business Indicator Management (BIM) system is essential for any businesses to meet their needs in terms...
The aim of this paper is to show the strengths and the weakness of process mining tools in post-delivery validation. This is illustrated on two use-cases from a real-world system. We also indicate what type of research has to be done to make process mining tools more usable for validation purposes.
Career perspectives are known to motivate software engineers. However, so far, career perspectives have been mostly studied within traditional software development companies. In our work we take a complementary approach and study career paths of open source developers, focusing on their advancement through the code review hierarchy, from developers to reviewers and further to core reviewers.To gain...
Selecting, developing and deploying a document management system for engineering use involves the ability to follow an engineering revision process, integrate easily with engineering and corporate applications (custom or Commercial Off the Shelf (COTS)), uniting disparate on-premise and cloud systems, and integrating existing and evolved business processes and applications.
This research aims to determine the use of information and communication technologies in the management of internal communication in service sector companies in Ecuador. Secondary information was available in the official database of the Instituto Nacional de Estadística y Censos (INEC) [1], and the data is 2014. The present work corresponds to non-experimental cross-sectional research because the...
The software engineering industry should be the laboratory of much, perhaps most, of the empirical software engineering research. Not only would this create a more realistic context and higher external validity of the empirical research, it would also ease the result transfer and make the results more convincing for the industry. Unfortunately, this is currently not the case. About 90% of software...
This paper describes an industrial case study using Atlassian JIRA® and third party plugins for requirements management in the field of transit systems. The solution presented shows efficiency in supporting the management of requirements, traceability and the systems engineering processes globally. After a short description of the technologies in action and a brief overview of the process we targeted,...
There is a vast growth of generated event data being collected and stored by organizations. Within the field of Process Mining, this data has been used to discover, analyze and enhance processes from different domains. For this purpose there are hundreds of techniques available in different tools. These techniques are mostly focused on single processes. On the other hand, there are several proposals...
Computer Aided Design (CAD) packages are normally bought off-the-shelf for a wide range of engineering disciplines. However, a single system cannot possibly meet requirements of different users as these packages are normally provided with basic primitives but no blocks for quick generations. A case study carried out at a power enterprise in Zimbabwe revealed delays in attending to faults and installations...
This exploratory empirical paper investigates annual time delays between vulnerability disclosure notifications and acknowledgments by means of network analysis. These delays are approached through a potential clustering effect of vulnerabilities across software vendors. The analysis is based on a projection from bipartite vendor-vulnerability structures to one-mode vendor-vendor networks, while the...
Curricula of the Universities and especially of the Universities of Applied Sciences should be, in the best case, developed in such way, that graduates' knowledge should reflect contemporary requirements of the industry, without to losing the assertion of universality as the central perspective of the higher education. This awareness is often identified, but in the real case, the organization of the...
This paper describes the implementation of a manufacturing monitoring system using RFID, wireless, and plug-and-play technologies. The system gathered information about time and work in process (WIP), enabling process waste identification, production according to takt time, activity balance, and production capacity assessment. The method comprises the development of an RFID reader, a middleware, a...
As technology moves from being an enabler to become the lifeblood of businesses in the digital era, so does the data used to support the implementation of these technological shifts. In order for the data to be an asset and not a liability, it is primordial to ensure that the data captured and maintained over time is accurate, traceable, reliable and current. However, very often, in order to complete...
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough...
A software retrofit can address problems of business-critical systems that are no longer maintainable. This seven-step approach revises software while daily operations are going on. The goal is to reestablish a system that you can extend and maintain with state-of-the-art development and operations technologies.
The data mining on web is difficult for online analytic processing (OLAP) with BIG DATA. The data mining is made simple by approximating the databases of BIG DATA for knowledge discovery process particularly MapReducing. The approximate information is fuzzy rather than probability. In this paper, fuzzy web data mining is discussed for BIG DATA for association rules. The query processing is discussed...
[Context]: The numerous challenges that can hinder software companies from gathering their own data have motivated over the past 15 years research on the use of cross-company (CC) datasets for software effort prediction. Part of this research focused on Web effort prediction, given the large increase worldwide in the development of Web applications. Some of these studies indicate that it may be possible...
Considering the fact that the current metrology management system is becoming a necessity, new software concepts are being developed in order to full fill the requirements of responsible technical persons for an alternative to existing ones. There's a necessity for an actual ERP model required by the world class competition, globalization, the modern business environment and nevertheless the availability...
Agile Software Development have become very important over the years for organizations of the modern world, however, software development itself is a very complex process. There are so many factors that affect project success or failure. This paper is a systematic review on the critical success factors of agile software development projects. We classified fourteen critical factors into three categories...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.