Unclear on the Concept?

Grieve, George
August 2007
TechDecisions;Aug2007, Vol. 9 Issue 8, p12
The article discusses the benefits of a proof of concept (POC), a verification step required for any carrier acquiring an important piece of computer software. One the common carrier objections to performing a POC is high costs. Common objectives for a POC are the verification of a set of function points and the verification of the system's ability to integrate with various legacy applications.


Related Articles

  • A NEW SCRIPT LANGUAGE APPLICABLE TO SYMBOLIC EXECUTION SYSTEMS. Koutsikas, C.; Malevris, N. // International Journal of Computers & Applications (Acta Press);2006, Vol. 28 Issue 1, p1 

    The problem of test data generation in software testing is well referenced. Of the various methods used in the literature, symbolic execution appears to be a promising approach, it can be used either for software verification or to facilitate the automated test data generation process. A number...

  • Audit raw, not `cooked,' data. Lanza, Richard B. // Internal Auditor;Dec97, Vol. 54 Issue 6, p23 

    Talks about importance of file auditing softwares in enhancing the reliability of reports and recommending valid auditing. Computer system components of auditing reports; Information on verification methods that enhances reliability of reports; Examples differentiating the verification methods.

  • A Logical Theory of Interfaces and Objects. Alencar, Paulo S. C.; Cowan, Donald D.; Lucena, Carlos J. P. // IEEE Transactions on Software Engineering;Jun2002, Vol. 28 Issue 6, p548 

    This paper motivates and describes a logic-based approach to specifying and reasoning about interfaces and objects that focuses on separation of concerns issues. The approach is based on the Abstract Design View (ADV), a software design model for object-oriented systems. The model was originally...

  • Fighting livelock in the GNU i-protocol: a case study in explicit-state model checking. Yifei Dong; Xiaoqun Du; Holzmann, Gerard J.; Smolka, Scott A. // International Journal on Software Tools for Technology Transfer;Aug2003, Vol. 4 Issue 4, p505 

    The i-protocol, an optimized sliding-window protocol for GNU uucp, first came to our attention in 1995 when we used the Concurrency Factory's local model checker to detect, locate, and correct a non-trivial livelock in version 1.04 of the protocol. Since then, we have conducted a systematic...

  • Higher-Level Languages, or More Hardware for SLD? Andrews, Jason // Electronic News;04/30/2001, Vol. 47 Issue 18, p28 

    Discusses the application of hardware-based verification and system-level design (SLD). Objective of SLD languages; Use of hardware in addressing design verification problems; Benefits of SLD and hardware-based verifications.

  • Semantically Extended Data Flow Diagrams: A Formal Specification Tool. France, Robert B. // IEEE Transactions on Software Engineering;Apr92, Vol. 18 Issue 4, p329 

    The popularity of the Data Flow Diagram (DFD) specification tool in industry seems to stems from its use of intuitively defined concepts and notation. The use of such concepts and notation gives flexibility to the tool and most often results in intuitively appealing specifications. The...

  • Embedded Instrumentation Systems Architecture. Visnevski, Nikita A. // ITEA Journal of Test & Evaluation;Mar2009, Vol. 30 Issue 1, p99 

    The objective of the Embedded Instrumentation Systems Architecture (EISA) initiative is to develop a comprehensive methodology for large-scale, nonintrusive, flexible data collection for test and evaluation needs. These needs include system-level developmental, operational, and continuous test...

  • Communications Market Proposals EDA Community. Leef, Serge A. // Electronic News;09/18/2000, Vol. 46 Issue 38, p36 

    Focuses on the need to deploy hardware/software co-verification in designing and implementing embedded computer systems. Problem with wireless telephony and networking; Factors that drive the adoption of co-verification; Significance of hardware/software co-verification.

  • Keeping control over data preparation.  // Accountancy;Feb1971, Vol. 82 Issue 930, p78 

    This article features the Cybercom system benefecial for accountants who wish to prepare computer input for their source data. The Cybercom system transfers source data directly on the magnetic tape for processing, without using punched cards or punched paper tape. The system employs two...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics