...has long been suggested to be software engineering. Software Engineering Research Methodology (SERM) can be known as an approach that mixed a galaxy of new concepts and emerging information technologies and then express this mixture in an innovative artefact in order to do some academic knowledge to basic research field and prompt the further research in the relevant fields. There need to construct a paradigm that can completely describes research using SERM approaches. A SERM framework based on this paradigm is presented to allow developmental research to be performed using a stringent methodology. Software Engineering as Research Research can be described as a scientific approach rather than one of the several different ways of promoting building and understanding of new knowledge. Moreover, scientific research is defined as a process of systemic inquiry conducted with the protection of a theoretical infrastructure. Research and evaluation, which is similar to research, can be distinguished by using theory as the fundamental. As Mertens argues that evaluation is associated with the acquiring of information for decision making in a given environment, however, research, which means a wider field, is more typically connected with contributing new knowledge that can be used in the relative fields Can software engineering be research? According to the definitions from Sir Karl Popper (1980) and Blake (1978), whether or not something is research depends on the nature of the...
Words: 846 - Pages: 4
...only through the hardware devices but also some great softwares. Nobody's PC and tablet can run well without the necessary software, but there' re a number of software users don't want to buy the full licensed softwares. In order to have a accurate percentage of software piracy rate, BSA (business software alliance) made a research about it. The result of the piracy rate research made the researchers shocked. On the BSA's piracy study on 2011, total worldwide software piracy rate is up to 42% (Business Software Alliance, 2011) . Software piracy has become an increasing global problem to businesses and software developers in the world during the past two decades (Shin, Gopal, Sanders, & Whinston, 2004). The software industry suffers billions dollar losses because of software piracy (Bass, 2011). There' s no denying that U.S. is generally considered as the world leader in the software industry, but America' s illegal software market is worth 9 billion dollars in 2011, which is the top 1 economy in commercial value of pirated PC software (BSA, 2011). The problem of piracy diminishes revenues and lessens investment in research and development, threatening the long term benefit of the software industry. According to the Software and Information Industry Association, the worldwide revenue of business-based PC applications was $21.6 billion in 1999, but global revenue losses due to piracy in the business application software market were calculated at $12 billion (Shin, Gopal, Sanders...
Words: 1039 - Pages: 5
...can draft out and analyze structures we want to construct. The first CAD software consisted of using a light pen to draw lines on a computer screen. We use CAD to make virtual 3D models of buildings or different components. CAD software has become advanced to where anyone at home with a computer can download the software and create designs of their own instead of the software only being available to engineers or scientists. With the addition of 3D printing, people can now take their 3D designs on CAD and turn them into an actual product. At this rate, there are endless possibilities in which CAD can evolve. With the advances we have made in developing the CAD software, it seems possible to create an online store with CAD. There are times where consumers have trouble finding the product they want exactly how they want it. With an online store that is CAD-based, consumers can design their desired product from home down to the last detail such as the material it’s made from to the size they would like. There could even be a feature that lets them know how much their product will cost as they’re creating it. Once completed, the consumer can submit their design to a manufacture where the product can be physically created or even 3D printed. From there, the product can be delivered to or picked up by the consumer. Now the consumer has the desired product they were looking for. In addition to the CAD software, many materials now, such as plane and car parts, are being manufactured...
Words: 606 - Pages: 3
...¿ES EL MOMENTO PARA EL CÓDIGO ABIERTO? A fines de la década de 1990, cuando el volumen de transacciones de E*Trade Financial se multiplicó, la empresa de servicios financieros en línea manejó este crecimiento al incrementar su capacidad en forma de servidores grandes de Sun Microsystems que ejecutaban Sun Solaris, la versión de Unix patentada por Sun. Para el otoño de 2001 el mercado accionarios tenía poca actividad, y los volúmenes de transacciones – lo mismo que el flujo efectivo de E*Trade – se derrumbaron estrepitosamente. La empresa decidió cambiar Linux ejecutándose en servidores IBM x355 basados en procesadores Intel de bajo costo para controlar los costos. Las pruebas preliminares que ejecutaron en Linux aplicaciones de autenticación, servicios de cotización, servicios de productos financieros y servicios de transacciones financieras de E*Trade mostraron que cada servidor con sistema operativo Linux podía manejar alrededor de 180 usuarios al mismo tiempo, en comparación con los 300 a 400 usuarios simultáneos en uno de los servidores de Sun 4500 de E*Trade. Con más de 180 usuarios se degradaba el rendimiento, pero con 180 más rápido que el servidor de Sun. El costo de un servidor Sun 4500 era de aproximadamente 250,000 dólares. Aun cuando cada computadora con Linux podía manejar sólo 180 usuarios a la vez, únicamente costaba 4,000 dólares. E*Trade tan sólo necesitaba comprar dos computadoras con Linux por un costo total de 8,000 dólares para suministrar las...
Words: 1058 - Pages: 5
...Bangladesh is one of these emerging new centers. Software is one of the most talked about but unexploited industries in Bangladesh. Last two decades have seen lot of initiatives, both in public and private sector, to stimulate growth in this sector. Although some successes have been achieved, Bangladesh lags far behind other South Asian countries like India and Sri Lanka in terms of employment and revenue generation in the software industry. The existence of a strong and vibrant Software & ITES Industry is necessary for attaining growth as this is the one very important forces which can drive other sectors in achieving their objectives through efficiency, accountability, and transparency. In addition to generating significant number of employment for educated youths, this sector can add important value to the country by making other sectors viable, productive, and efficient. Problem Statement Today’s business environment, technological factors etc requires business to perform effectively to sustain in the competiveness. Outsourcing is a strategy to improve automation, standardization ,development of product, making a global presence. Though Bangladesh has a great potential in developing software and outsourcing they lag behind to acquire a potential place in the international market. The present study will examine why local software firm of Bangladesh lags behind in utilizing opportunities of outsourcing. Research Objectives The following purposes will be...
Words: 592 - Pages: 3
...Chapter 3 RESEARCH METHODOLOGY AND SYSTEM DESIGN This chapter discusses the research methods, respondents of the study, data gathering techniques, software development tools, and statistical treatment of data used in the development for the completion of the proposed study. Research Methods The reviewed literatures and studies gave the researchers ideas and information on how to proceed with the development of the system to benefit the target users. Through extensive research and the gathering of data, the researchers acquired knowledge and information that will be the basis of the study. The research will be conducted at the New Era University during the final term of 1st semester to 2nd Semester of Academic Year 2012-2013. Research Design Research, is a systematic, rigorous investigation of a situation or problem in order to generate new knowledge or validate existing knowledge. Constructive Research. This is mainly done by many in order to find new/alternative solutions to any particular crisis or problems. Constructive research is the construction, based on the existing knowledge used in novel ways with adding a few missing links. A construction, be it theoretical or a practical one, when it differs profoundly from anything previously existing, constitutes a new reality against which preexisting one can be examined and understood, so it has an undeniable epistemological value according to Dodig-Crnkovic & Gordana (2009). Experimental Research. An experiment...
Words: 1689 - Pages: 7
...benefit from reading it, including: At this time, I have just written in mid-2015, three Grind was published. finished my first year as an assistant professor • undergraduates who might be interested in pursuing a Ph.D., • current Ph.D. students who are seeking guidance or inspiration, of computer science, so these notes reflect my current opinions as a new faculty member. To download a version without these notes, visit • professors who want to better understand Ph.D. students, • employers who hire and manage people with Ph.D. degrees, • professionals working in any creative or competitive field where self-driven initiative is crucial, • and educated adults (or precocious kids) who are curious about how academic research is produced. The Ph.D. Grind differs from existing Ph.D.-related writings due to its unique format, timeliness, and tone: Format – The Ph.D. Grind is a memoir for a general educated audience, not a “how-to guide” for current Ph.D. students. Although Ph.D. students...
Words: 37567 - Pages: 151
...7 Siete tendencias que cambiarán la Inteligencia de negocio tal y como la conocemos Índice Introducción Tendencia nº 1: Self-Service BI (Inteligencia de negocio de autoservicio) Tendencia nº 2: La BI se vuelve móvil Tendencia nº 3: Prestaciones colaborativas y sociales Tendencia nº 4: Inteligencia de negocio en la nube Tendencia nº 5: El código abierto toma el poder Tendencia nº 6: Big Data Tendencia nº 7: Percepción en tiempo real Conclusión Más información 3 4 5 6 7 8 9 10 11 11 Introducción Tras años de relativa estabilidad, el mundo de la Inteligencia de negocio está experimentando un cambio radical. Las antiguas reglas básicas ya no son aplicables, y las empresas no pueden dar por hecho que las estrategias de BI del pasado continúan siendo viables. Consideremos estos cambios fundamentales: • Las empresas se gestionan de forma diferente. En lugar de confiar en el instinto, las empresas actuales dan más importancia al procesamiento de números y a medir objetivamente el rendimiento. • Los usuarios consumen la información de forma diferente. La mayoría de las personas llevan años utilizando aplicaciones basadas en la Web para interactuar con sus datos personales y gestionarlos. Estas aplicaciones “concebidas para el consumidor” se basan en una experiencia intuitiva y altamente interactiva y en una capacidad de respuesta prácticamente instantánea. • Expectativas más exigentes. Las aplicaciones como MapQuest, Gmail y Facebook y las soluciones más especializadas...
Words: 4821 - Pages: 20
...of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly moving to new challenges...
Words: 15250 - Pages: 61
...Green Computing Research Project – Part 1 CIS 517 – IT Project Management Green Computing Research Project Computer science educators are uniquely positioned to promote greater awareness of Green Computing, using the academic setting to encourage environmentally conscious use of technology. This paper reports on practical techniques that can engage faculty and students, enabling Green Computing to be integrated into the classroom and research laboratory. Analysis and empirical evaluation of each reported technique is given, comparing the efficacy of each in terms of energy, environmental and financial cost savings. These results are provided as technological and economic evidence for the benefits of “Going Green,” and to promote education in Green Computing in the classroom, department and research lab (Shen, W, 2005). We Are Big, Inc. is an international firm with over 100,000 employees in different countries. The goal of the project is to find environment friendly energy resources to reduce cost and increase energy efficiency. Green Computing Research Project has been authorized on January 24, 2013 as the date of authorization. Project Name: Green Computing Research Project Date of Authorization: January 24, 2013 Project Manager: Hatem Numan 1-320-761-8787 Hatem@wearebig.com Project Start date: January 24, 2013 Project End: July 24, 2013 Project budget: $500,000 Project Objectives: The objectiveof the project is to preparea detailed...
Words: 714 - Pages: 3
...Module 1 Several Key Points BUSN 7278 Data Analysis Professor Bassell Page |1 The process for data preparation and analysis. The value of marketing research is its ability to provide accurate decision-making information to the user. To accomplish this, the data must be converted into usable information or knowledge. After collecting data through the appropriate method, the task becomes one of ensuring that the data provides meaning and value. Data preparation is the first part of the process of transforming data into useful knowledge. This process involves several steps: (1) data validation, (2) editing and coding, (3) data entry, (4) error detection, and (5) data tabulation. Data analysis follows data preparation and facilitates proper interpretation of the findings. Validation, editing, and coding of survey data. Data validation attempts to determine whether surveys, interviews, or observations were conducted correctly and are free from fraud. In recontacting selected respondents, the researcher asks whether the interview (1) was falsified, (2) was conducted with a qualified respondent, (3) took place in the proper procedural setting, (4) was completed correctly and accurately, and (5) was accomplished in a courteous manner. The editing process involves scanning of interviews or questionnaire responses to determine whether the proper questions were asked, the answers were recorded according to the instructions given, and the screening questions...
Words: 1341 - Pages: 6
...Virtualizaci´n de Redes en la Nube o Neftal´ Hern´ndez, Lesther Ruiz, Pedro Alicea ı a March 2, 2013 Abstract El siguiente documento nos explica que es virtualizaci´n, el aiso lamiento y para que se usan, para luego explicar que relaci´n tiene con o la virtualizaci´n de red, sus ventajas o y desventajas, algunos ejemplos de modelos de virtualizaci´n de redes y o ejemplos en las nubes. Este tema es muy importante para el futuro de la tecnolog´ gracias a ´l, el desarrollo ıa, e de la virtualizaci´n ha ido incremeno tando e implementadose en varios sistemas y compa˜´ de todo el mundo nıas dando ´nfasis a la seguridad y la prie vacidad de los consumidores. Gracias a las ultimas tecnolog´ la virtual´ ıas, izaci´n de redes permite a peque˜as o n compa˜´ competir y coexistir utinıas lizando recursos que que s´lo grandes o compa˜ias ten´ acceso y a un bajo n ıan costo. Palabras claves: Virtualizaci´n de redes y computaci´n, Nube o o y Aislamiento cando primeramente qu´ es Virtuale izaci´n, Aislamiento y para que siro ven. Ademas, argumentamos sobre la Virtualizaci´n de Redes en la Nube o y como se relacionan. Tambi´n exe plicaremos resumidamente que es la Computaci´n en Nube y para que o se usa. En este art´ ıculo incluiremos y definiremos que es Virtualizaci´n de Redes, ventajas y desveno tajas e incluiremos algunos aspectos econ´micos al igual que las Aro quitecturas Virtuales m´s usadas en a la Nube. Seg´n nuesto art´ u ıculo y las referencias encontradas podemos decir que la Virtualizaci´n...
Words: 2159 - Pages: 9
...TOPIC: THE RESEARCH PROCESS – RESEARCH TOOLS When attempting to find resolution to accounting issues, a key component of the research process is being aware of and utilizing research tools. Research tools may consist of many types of media, resources, and viewpoints. Because accounting is ever evolving, it is imperative to know where to go to remain informed of relevant changes and clarifications. The AICPA & PCAOB websites can be good places to start. There are links to white papers, exposure drafts, articles, accounting and auditing standards, and areas of interest like XBRL. Additionally, the Big 4 accounting firms publish guidance, interpretations, and literature in their public online libraries. There is also accounting research software, one of which is called “Accounting Research Manager, the ultimate research tool.”1 This software provides updated information from FASB, AICPA, the FASB’s EITF (Emerging Issues Task Force), IASB, and industry-specific guidance.1 Also, IASPlus.com and IFRS.com are useful research tool websites when exploring current events and international accounting. EDGAR (Electronic Data Gathering, Analysis, and Retrieval) is an online, publicly accessible tool best used when researching US SEC registrants and their filings. Lastly, any search engine, such as Google, can be helpful when navigating the rough waters of online research. As graduate students, we find that professors can be a wonderful resource. They are passionate about their particular...
Words: 436 - Pages: 2
...COMM 150 Introduction to Information Literacy and Research| This course syllabus is a contract between you and Bryant & Stratton College. It represents the minimum expected learning outcomes for this course. Your instructor will also provide a supplemental syllabus describing the approach to the course, instructional methods, tracking calendar, assignments, assessments and grading scheme, plus guidelines for your success. | Semester Credit Hours: 3|Instructional Hours: 4|Term: Fall 2012| Proficiency Available: Yes|Prerequisite(s):None|Co-requisite(s):|Date of Last Revision: 7/2012| COURSE CATALOG DESCRIPTION:Students study the evolution of information and the impact of technology on research, and learn how to access, evaluate, synthesize and communicate research findings. The research process and papers required of each student include inquiry into each student’s chosen career field along with assignments on how changes in technology have impacted the communication process in the career field.| LEARNING OUTCOMESBryant & Stratton College seeks to develop lifelong learning competencies in all students through the development of information literacy skills that assist students to formulate essential questions, research and apply the answers, and communicate the results within the dynamic communities of college, career, and life.Course Outcomes: Upon completion of this course, students will be able to:1. Examine the history of information, and identify the evolution of technology...
Words: 691 - Pages: 3
...Study:…...……………………………………………………………..3 1.2. Problem Statement/Identification:………………………………………………………....5 1.3. Research Question:………………………………………………………………………...6 1.4. Objectives of the Study:…………………………………………………………………...6 1.5. Scope of the Study:……………………………………………………………………......6 1.6. Limitations of the Study:………………………………………………………………….7 2. RESEARCH METHODOLOGY…………………………………………………………….7 2.1. Research Design:.…………………………………………………………………………7 2.2. Population:.……………………………………………………………………………….7 2.3. Sample Size & Sampling Technique:.…………………………………………………....8 2.4. Instrument Development;.………………………………………………………………..8 2.5. Data collection:.………………………………………………………………………….8 2.6. Data Analysis:…………………………………………………………………………...9 References 1. INTRODUCTION Increasing globalization, making organizations to be diversified in their work force and setting work force diversification as one of the key success factors that are available for any organization (Holtzman, 2011). Importance of diversification making such a impact on organizations that organization are now formally making diversity as one of their strategies to accomplish their goals (Black Enterprise , 2001). And it is also noted that most diversification success are enhancing through having work force with different experiences, knowledge, races, education and cultures (Friedman & Amoo, 2002). Therefore, the purpose of this research is to identify the relationship between work force diversification and employee performance and to study factors...
Words: 1918 - Pages: 8