764,007 research outputs found

    Set-Based Concurrent Engineering Model for Automotive Electronic/Software Systems Development

    Get PDF
    Organised by: Cranfield UniversityThis paper is presenting a proposal of a novel approach to automotive electronic/software systems development. It is based on the combination of Set-Based Concurrent Engineering, a Toyota approach to product development, with the standard V-Model of software development. Automotive industry currently faces the problem of growing complexity of electronic/software systems. This issue is especially visible at the level of integration of these systems which is difficult and error-prone. The presented conceptual proposal is to establish better processes that could handle the electronic/software systems design and development in a more integrated and consistent manner.Mori Seiki – The Machine Tool Compan

    Game on! a report on the interactive leisure software subsector in London

    Full text link
    There is a paucity of good quality data on the UK video games industry. Information such as value-added, investment on R&D, average annual expenditure on training and the value of video games in terms of exports, for example, is thin or incomplete. This is a serious problem. If we are to improve the competitiveness of the UK games development sector then we must have better quality information. Games developers will then be able to benchmark their business activities against industry averages. Overseas investors will also then be better informed about the benefits of investing in the UK leisure software sector. This Report confirms the lacunae in our knowledge that exists about the video games industry. For example, the Office of National Statistics still does not have a specific code to identify interactive leisure software businesses. Yet the Report also shines a light on the video games industry in the UK in general and in London in particular

    Patent Scope and Innovation in the Software Industry

    Get PDF
    Software patents have received a great deal of attention in the academic literature. Unfortunately, most of that attention has been devoted to the problem of whether software is or should be patentable subject matter. With roughly eighty thousand software patents already issued, and the Federal Circuit endorsing patentability without qualification, those questions are for the history books. The more pressing questions now concern the scope to be accorded software patents. In this Article, we examine the implications of some traditional patent law doctrines for innovation in the software industry. We argue that patent law needs some refinement if it is to promote rather than impede the growth of this new market, which is characterized by rapid sequential innovation, reuse and re-combination of components, and strong network effects that privilege interoperable components and products

    An intelligent framework and prototype for autonomous maintenance planning in the rail industry

    Get PDF
    This paper details the development of the AUTONOM project, a project that aims to provide an enterprise system tailored to the planning needs of the rail industry. AUTONOM extends research in novel sensing, scheduling, and decision-making strategies customised for the automated planning of maintenance activities within the rail industry. This paper sets out a framework and software prototype and details the current progress of the project. In the continuation of the AUTONOM project it is anticipated that the combination of techniques brought together in this work will be capable of addressing a wider range of problem types, offered by Network rail and organisations in different industries

    Dependency Mapping Software for Jira, Project Management Tool

    Get PDF
    Efficiently managing a software development project is extremely important in industry and is often overlooked by the software developers on a project. Pieces of development work are identified by developers and are then handed off to project managers, who are left to organize this information. Project managers must organize this to set expectations for the client, and ensure the project stays on track and on budget. The main block in this process are dependency chains between tasks. Dependency chains can cause a project to take much longer than anticipated or result in the under utilization of developers on a project. While project managers do have access to project management tools, few have capabilities to effectively visualize dependencies. The goal of this research was to interact with a project management tool\u27s API, pull down dependency information for a project, and build out possible timelines for a set of tasks. We visualize this problem with a directed graph, where each node is a task and edges in the graph indicate dependencies. The relationships between this problem and more well-known problems in graph theory are used to inform the development of the algorithms. Two algorithms are explored to handle the problem and are then run under different conditions. Analysis of the results provide insight to what structures of dependency chains can be handled by the algorithms. The resulting software could be used to save companies both time and money when planning software development projects

    The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities

    Get PDF
    In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been recently investigated. As proxy for the full range of software security skills, we considered the problem of assessing the severity of software vulnerabilities by means of a structured analysis methodology widely used in industry (i.e. the Common Vulnerability Scoring System (\CVSS) v3), and designed a study to compare how accurately individuals with background in information technology but different professional experience and education in cyber security are able to assess the severity of software vulnerabilities. Our results provide some structural insights into the complex relationship between education or experience of assessors and the quality of their assessments. In particular we find that individual characteristics matter more than professional experience or formal education; apparently it is the \emph{combination} of skills that one owns (including the actual knowledge of the system under study), rather than the specialization or the years of experience, to influence more the assessment quality. Similarly, we find that the overall advantage given by professional expertise significantly depends on the composition of the individual security skills as well as on the available information.Comment: Presented at the Workshop on the Economics of Information Security (WEIS 2018), Innsbruck, Austria, June 201

    Software Production, Human Capital and Endogenous Growth: Theoretical Analysis and Empirical Evidence from India

    Get PDF
    Propelled by the rise of a vibrant software industry the Indian economy has demonstrated rapid growth since the 1990s. A novel three-sector endogenous growth model that encapsulates the salient features of an information technology oriented economy is developed. The dynamic optimization problem leads to a balanced growth path equilibrium characterized by output, physical capital, software assets, human capital and consumption growing at a uniform rate. Major implications of the model are reflected in empirical evidence from the growth trajectories of Indian states. The human capital production apparatus has a significant impact on economic growth. This has critical policy implications.endogenous growth, India, information technology, human capital, software
    • …
    corecore