Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

School of Computer & Information Science

2012

Articles 1 - 11 of 11

Full-Text Articles in Computer Sciences

Software Requirements As Executable Code, Karen Eileen Wasielewski Morand Dec 2012

Software Requirements As Executable Code, Karen Eileen Wasielewski Morand

Regis University Student Publications (comprehensive collection)

This project analyzed the effectiveness of using Story Testing frameworks to create an application directly from user specifications. It did this by taking an example business application with "traditional" specifications and rewriting those specifications in three different Story Testing Frameworks - Cucumber, FitNesse, and JBehave. Analysis of results drew the following conclusions: 1) Story Testing can help prove a project's completeness, 2) Specifications are still too technical, 3) Implementation is not overly complex, and 4) Story Testing is worth it. It proposed future research around evaluating natural languages and seeking more user-friendly ways of writing specifications in a natural language.


Data Integration: A Case Study In The Financial Services Industry, Louis Epie Dec 2012

Data Integration: A Case Study In The Financial Services Industry, Louis Epie

Regis University Student Publications (comprehensive collection)

Current economic conditions result in banks participating in multiple mergers and acquisitions. This results in banks inheriting silo and heterogeneous systems. For banks to remain competitive, they must create a strategy to integrate data from these acquired systems in a dynamic, efficient, and consumable manner. This research considers a case study of a large financial services company that has successfully integrated data from different sources. In addition this research investigates endeavors that experts in the field have undertaken to develop architectures that address the problems with data integration and appropriate solutions.


A Guide To Documenting Software Design For Maximum Software Portability For Software Defined Radios, Joseph Snively Dec 2012

A Guide To Documenting Software Design For Maximum Software Portability For Software Defined Radios, Joseph Snively

Regis University Student Publications (comprehensive collection)

The use of software defined communications systems is growing incredibly fast. The field of software engineering as a discipline has not adequately addressed the subject of software portability which makes large and costly software development efforts less ready to port to future platforms. By understanding the causes of portability problems, they can either be avoided altogether in development or very well documented so that they are easier to overcome in future efforts. Literature, case studies, and surveys are used to collect opinions and information about large software programs where portability is a desirable characteristic in order to best establish the …


Simplified Single Source Xml Model: For Student-Centered Educational Content Management, Tamara K. Taylor Nov 2012

Simplified Single Source Xml Model: For Student-Centered Educational Content Management, Tamara K. Taylor

Regis University Student Publications (comprehensive collection)

This study investigates XML as a single source, recommending solutions and defining future needs for educators to manage student-centered educational content for diverse user preferences and multi-modal delivery. This research proposes a simplified XML single source model for educational course content management and XSL transformation of course material into multi-modal display/output that enables student-centered learning. The reviewed literature exposed four problem areas related to content management in which an XML single source might be a solution. Reviewed and synthesized literature related to XML into a cubed relationship with opposing the sides of the cube (content management/single source, corporate goals/educational goals …


Extended Bridge Software Design Pattern, Andrew J. Haigh Nov 2012

Extended Bridge Software Design Pattern, Andrew J. Haigh

Regis University Student Publications (comprehensive collection)

Software engineers are taught that they should separate form and function. This allows a user interface or front-end to be designed and implemented independently of the engine or back-end. Using an abstracted interface class provides the opportunity to develop different user interfaces for the same back-end, as each new user interface will all be derived from this agreed upon abstracted interface. Using the Bridge pattern allows the user to also decouple the abstraction from its implementation, providing additional flexibility as they developed multiple user interfaces. However, user interfaces are typically designed as a single unit, the renderer, even the Bridge …


Introduction Of Key Performance Indicators To The Dynamics Of Planned Change: A Modern Study, Tommy Wells Oct 2012

Introduction Of Key Performance Indicators To The Dynamics Of Planned Change: A Modern Study, Tommy Wells

Regis University Student Publications (comprehensive collection)

A private High Technology firm whose headquarters are located in the Midwest has just completed several upgrades to replace an in-house legacy application system in which the primary use was to track defects of the firm's custom made software. The firm's implementation of a third party's software suite to replace the in-house legacy application was studied using a case study method, which implemented key performance indicators to the change theory called "The Dynamics of Planned Change" introduced by Lippitt, Watson, and Westley. The key performance indicators were introduced as a way to determine if the firm's actions could be validated …


Transitioning From Relational To Nosql: A Case Study, John Mcphillips Aug 2012

Transitioning From Relational To Nosql: A Case Study, John Mcphillips

Regis University Student Publications (comprehensive collection)

Data storage requirements have increased dramatically in recent years due to the explosion in data volumes brought about by the Web 2.0 era. Changing priorities for database system requirements has seen NoSQL databases emerge as an alternative to relational database systems that have dominated this market for over 40 years. Web-enabled, always on applications mean availability of the database system is critically important as any downtime can translate in to unrecoverable financial loss. Cost is also hugely important in this era where credit is difficult to obtain and organizations look to get the maximum from their IT infrastructure from the …


Knowledge Management Across Cultural Boundaries: Global Organizational Knowledge-Sharing, Jeffrey Harling Aug 2012

Knowledge Management Across Cultural Boundaries: Global Organizational Knowledge-Sharing, Jeffrey Harling

Regis University Student Publications (comprehensive collection)

The practice of knowledge management is becoming pervasive in the modern business world. Yet, as the corporate world globalizes at an alarming rate, the process of how knowledge is captured and shared does not address the cultural nuances of those new participants spread across nearly every global region. Academically, knowledge management itself does rely on three primary pillars for success; those being process, technology, and culture. However, the culture aspect in the formal knowledge programs is more closely aligned with influencing users to share knowledge that they would otherwise hold close as an asset of their gained expertise. While this …


Peoplesoft Enterprise Change Assistant's Efficiencies, Eric Tijerina May 2012

Peoplesoft Enterprise Change Assistant's Efficiencies, Eric Tijerina

Regis University Student Publications (comprehensive collection)

This document examines the efficiencies of the PeopleSoft Enterprise Change Assistant (ECA) in performing upgrades to the PeopleSoft Enterprise software applications. The ECA tool increases quality of upgrades through the reduction of manual steps and, in doing so, limits risk of manual errors. The PeopleSoft Enterprise software upgrade process is a complicated and time-consuming process. Because the PeopleSoft applications are business critical systems, the upgrade of the PeopleSoft applications needs to be performed in a careful and timely manner. The PeopleSoft Enterprise Change Assistant was developed to automate many of the processes involved in the upgrade. It provides a means …


Mobile Technology Update To Delone And Mclean Model Of Information Success, Jason Ryberg Apr 2012

Mobile Technology Update To Delone And Mclean Model Of Information Success, Jason Ryberg

Regis University Student Publications (comprehensive collection)

Senior managers are challenged to measure the success of their IT systems when justifying technology investments needed to meet the organization"â„¢s mission. Due to increasing implementation of mobile technology, enterprise adoption of smartphones is no exception. Traditionally, the DeLone and McLean Information Systems (IS) Success Model has been proven as a valid framework for measuring IS success. However, it has not been updated to address the success variables related to mobile technology. Many studies on mobile technology have reviewed mobile success, but none have attempted theoretical assimilation. This thesis attempts to correct this situation by examining the DeLone and McLean …


Development Of Database And Software Modules To Identify Case Relationships Using Unstructured Data, Alberto D. Lombardo Jan 2012

Development Of Database And Software Modules To Identify Case Relationships Using Unstructured Data, Alberto D. Lombardo

Regis University Student Publications (comprehensive collection)

In this study, I intend to show how text based unstructured data, such as word processor documents and e-mails, can be systematically parsed for instances of data classes. Data classes can be any data type that can be fully described using the defined syntax of regular expressions. Examples of data classes can include SHA1, or MD5 hash values, Internet Protocol (IP) addresses, or any other data type whose format is well defined. Furthermore, possible correlations between datasets may be identified by grouping instances of equal or similar values within a data class. This approach of utilizing regular expressions to define …