software company
Recently Published Documents


TOTAL DOCUMENTS

204
(FIVE YEARS 49)

H-INDEX

13
(FIVE YEARS 2)

2022 ◽  
pp. 1-28
Author(s):  
Richard S. Segall

This chapter first provides an overview with examples of what neural networks (NN), machine learning (ML), and artificial intelligence (AI) are and their applications in biomedical and business situations. The characteristics of 29 types of neural networks are provided including their distinctive graphical illustrations. A survey of current open-source software (OSS) for neural networks, neural network software available for free trail download for limited time use, and open-source software (OSS) for machine learning (ML) are provided. Characteristics of artificial intelligence (AI) technologies for machine learning available as open source are discussed. Illustrations of applications of neural networks, machine learning, and artificial intelligence are presented as used in the daily operations of a large internationally-based software company for optimal configuration of their Helix Data Capacity system.


2021 ◽  
Vol 16 (2) ◽  
pp. 247-260
Author(s):  
Enzus Tinianus

Competition in the business world causes business actors to sometimes resort to various ways to conduct unfair business competition, resulting in losses for other business actors. In the virtual world (information technology for example) this action is often found. So it is necessary to study how the prohibition of monopolistic practices and unfair business competition against businesses in the field of information technology. This research is a normative legal research, the main data of which is obtained through library research. Based on the results of the research, it is known that the form of market monopoly and unfair business competition in information technology law can be in the form of vertical integration, discrimination of business actors, taking of domain names, and other actions that can harm business competitors. The Tying Arrangement in the Microsoft case is a form of unfair business competition, in which the giant software company Microsoft is accused of violating the antitrust law by taking Tying Arrangements by linking the windows product (the tying product) with the internet explorer browser product (the tied product). The Tying Arrangement was allegedly carried out in order to win a monopoly in the internet browser product market.


2021 ◽  
Author(s):  
◽  
Gabrielle Appleton

<p>Business process outsourcing of IT solutions is a common and well embedded practice in many businesses. There has been much research into the aspects of the relationships between businesses and their BPO IT partners that make these relationships successful. Very little research has, however, been undertaken at the lower level of relationships between the specialist professional groups within the BPO IT firms, and how these relationships are affected by the roles each group plays. This paper explores these ideas using qualitative research methods within a current BPO IT firm to expose the key issues. Analysis of these themes is provided, and a model of roles and relationships for the professional groups that operate within such firms is proposed that combines the key attributes of the roles, the key relationships involved and the role each group plays within those relationships. Finally, recommendations are made as to the improvement of current practices to align behaviours with the proposed model.</p>


2021 ◽  
Author(s):  
◽  
Gabrielle Appleton

<p>Business process outsourcing of IT solutions is a common and well embedded practice in many businesses. There has been much research into the aspects of the relationships between businesses and their BPO IT partners that make these relationships successful. Very little research has, however, been undertaken at the lower level of relationships between the specialist professional groups within the BPO IT firms, and how these relationships are affected by the roles each group plays. This paper explores these ideas using qualitative research methods within a current BPO IT firm to expose the key issues. Analysis of these themes is provided, and a model of roles and relationships for the professional groups that operate within such firms is proposed that combines the key attributes of the roles, the key relationships involved and the role each group plays within those relationships. Finally, recommendations are made as to the improvement of current practices to align behaviours with the proposed model.</p>


2021 ◽  
Vol 1208 (1) ◽  
pp. 012003
Author(s):  
Dušan Kovačević

Abstract One short review on the preferable concept in Structural Analysis education by use of finite element method (FEM) software is given. It is generally accepted that good “educationally aided” FEM software includes a pre-processor with intuitive graphically user interface that enable simple and efficient geometrical modelling of structural topology, powerful solverprocessor with sophisticated numerical modelling possibilities, post-processor with various types of analysis results presentation, as well as benefit of fast, easy training and satisfaction of use. Hungarian software company “InterCAD” developed FEM software AxsVM® that satisfies mentioned conditions and much more performances in professional and scientific area. Therefore AxisVM® is embedded in a curriculum of subject “FEM Modelling in Structural Analysis” on Department of Civil Engineering and Geodesy, Faculty of Technical Sciences, University in Novi Sad, Serbia.


Author(s):  
Dr. Shetia C. Butler Lamar ◽  
Michelle Kuralt ◽  
Carolyn Zidor-Guerrier

Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information technology solutions comes the potential for companies to become more vulnerable to possible security incidents with their increased reliance upon third-party vendors for software solutions. This paper seeks to explore the software company SolarWinds and analyze its 2020 security breach. This paper will discuss how the SolarWinds breach occurred, how IT Security Professionals perceived it, and the vulnerabilities within the SolarWinds system before the breach. It will also analyze and evaluate the lessons learned from the SolarWinds breach and explore security measures implemented after the attack


2021 ◽  
Author(s):  
Willie Lawrence ◽  
Eiji Adachi

During the evolution of a database schema, some schema-changing operations (e.g., the “ALTER TABLE” command) require the underlying database management system to lock tables until the opera-tion is finished. We call these schema-changing operations blocking operations. During the execution of blocking operations, a soft-ware application may behave abnormally, varying from a slow page loading to an error caused by a web request taking too long to return. Despite their potential negative impact on important qual-ity attributes, blocking operations have not yet been empirically investigated in the context of software evolution. To fill this gap, we conducted a large industrial case study in the context of a Brazilian software company. We analyzed 1,499 atomic schema-changing operations from a period of 6 years to explore which blocking operations the developers frequently performed during the evolution of the database schema of a target system. The intention behind this case study is better understanding the problem in its original context to outline strategies to correct or mitigate it in the future. Our results show that blocking operations were very common, though not all of them seemed to cause observable downtime periods. We also present some mitigating strategies already in use by the devel-opment team of the target system to cope with blocking operation during software evolution, avoiding their negative impact.


2021 ◽  
Vol 1 ◽  
pp. 1451-1460
Author(s):  
Dag Bergsjö ◽  
Amer Catic

AbstractThis paper deals with the story and experiences of setting up a new start-up company with the ambition to scale using a software-based product. The paper is written by researchers for researchers interested in doing the same thing. The paper concludes that it can be very beneficial for research as the startup-can be seen as a data collection machine, but to set up a start-up company, comes with unforeseen problems along the way. A few of them involves: Do not rely on rational arguments (only), when marketing your product. Expect long lead-times. Work with multiple threads and secure funding early to ensure that you can finance your startup. Finally, you need to be committed, and you have to have a strategy to manage both your research and your commercial activities.


2021 ◽  
Author(s):  
Z. Stojanov

Software maintenance has been recognized as the most demanding and costly phase in the software life cycle. Software maintenance tasks, although require a more complex set of skills and knowledge, are far less interesting to software engineers than software development tasks. In addition, insight into the scholarly literature revealed that the knowledge basis on software maintenance is significantly less than the knowledge base on software development. Due to the obvious constraints of small software companies, they do not have time, people, and other resources for assessing and improving their software maintenance practice. This paper presents the author’s reflections on experience in assessing and improving software maintenance practice in an indigenous micro software company.


2021 ◽  
Vol 11 (15) ◽  
pp. 6820
Author(s):  
Marta Cecilia Camacho ◽  
Francisco Álvarez ◽  
César Collazos ◽  
Paul Leger ◽  
Julián Dario Bermúdez ◽  
...  

SPL scoping is the activity for bounding Software Product Lines (SPL), gathering heterogeneous knowledge from diverse sources. For achieving an agreement among different stakeholders, a commonalty scope must be understood and committed to. However, gathering this knowledge from stakeholders with individual interests is a complex task. This paper reports the experience of scoping the SPL of a small Colombian software company, applying and evaluating a collaborative method called CoMeS-SPL. The company was looking to develop a set of products from a product previously developed with great potential to be adapted and sold to different customers. From a collaborative relationship university–enterprise model, the research groups that developed CoMeS-SPL proposed to use it answering to the company needs for defining an organization-suitable reuse scope around its platform called CORA. Both parties joined in the scoping co-production of the first SPL of the company. This method implied that the company would perform new tasks and involve other roles different for those who are used to defining the scope of a single product. The company actors considered that they obtained a useful scope and perceived the collaboration as valuable because they shared different knowledge and perspectives. The researchers were able to provide feedback on their proposed model, identifying successes and aspects to improve. The experience allowed strengthening the ties of cooperation with the company, and new projects and consultancies are being carried out.


Sign in / Sign up

Export Citation Format

Share Document