Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Mar 2010

    SCA: Bringing Modern SOA Programming to Tuxedo

    Oracle Tuxedo is one of the original SOA platforms. Everything in Tuxedo is a service and invoked as a service. Tuxedo also provides industry leading performance, scalability, and reliability. What Tuxedo has lacked is a simple programming model that lends itself to rapid development and easy reuse of services. By...

    Provided By Oracle

  • White Papers // Mar 2010

    Setup, Tuning, Workload Performance Guide for Sybase Adaptive Server Enterprise (ASE) on Sun Storage 7000 Systems

    This paper describes how to configure the Sybase Adaptive Server Enterprise (ASE) database server to use Oracle's Sun Storage 7000 Unified Storage Systems (release 2008.Q4) as a storage unit. Sun Storage 7000 systems allow storage architects to control data placement to minimize storage system costs and meet Service Level Agreements...

    Provided By Oracle

  • White Papers // May 2010

    How to Move an Oracle Solaris Container

    This white paper instructs users, system administrators, and developers who have experience with Oracle Solaris 10 on proper use of new features which allow an Oracle Solaris 10 container to be moved from one computer to another. The paper starts with a brief discussion of the need for such functionality...

    Provided By Oracle

  • White Papers // Apr 2010

    Oracle Sun SPARC Enterprise T5440 Server Architecture

    Data centers have increasingly become the areas of focus for organizations needing to maximize their IT services flexibility, performance, and overall Return On Investment (ROI). Most organizations are also fully aware of their need to minimize their exposure to reliability and serviceability issues. Choosing the right server architecture and deployment...

    Provided By Oracle

  • White Papers // May 2010

    Oracle SQL Developer Migration

    Migrating from one database to another is often a high-risk, expensive, and time-consuming process. However, Oracle provides products that reduce the time, risk, and financial barriers involved in migrating non-Oracle databases to the Oracle platform. Oracle SQL Developer provides an integrated migration tool for migrating Microsoft SQL Server, Sybase, MySQL,...

    Provided By Oracle

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Apr 2009

    Microsoft SharePoint: Understanding and Addressing the Information Security Challenges

    The RSA enVision platform enables IT security professionals and compliance officers to bring SharePoint within the scope of their compliance mechanisms. RSA enVision log management collects logs from RSA Data Loss Prevention and correlates SharePoint server activity to the enterprise security context. The RSA enVision platform identifies anomalies and vulnerabilities...

    Provided By RSA Security

  • White Papers // Apr 2010

    Combining Static Analysis and Test Generation for C Program Debugging

    This paper presents the authors' ongoing work on a tool prototype called SANTE (StaticANalysis and TEsting), implementing a combination of static analysis and structural program testing for detection of run-time errors in C programs. First, a static analysis tool (Frama-C) is called to generate alarms when it cannot ensure the...

    Provided By INRIA

  • White Papers // Jun 2011

    Why3: Shepherd Your Herd of Provers

    Why3 is the next generation of the Why software verification platform. Why3 clearly separates the purely logical specification part from generation of verification conditions for programs. This paper focuses on the former part. Why3 comes with a new enhanced language of logical specification. It features a rich library of proof...

    Provided By INRIA

  • White Papers // Aug 2009

    jYang : A YANG Parser in Java

    The NETCONF configuration protocol of the IETF Network Working Group provides mechanisms to manipulate the configuration of network devices. YANG is the language currently under consideration within the IETF to specify the data models to be used in NETCONF. This paper describes the design and development of a syntax and...

    Provided By INRIA

  • White Papers // Aug 2009

    Winning Strategies for Wireless Data

    The numerous success stories being reported across the world have emphatically proven 3G to be an ideal solution for operators seeking to launch profitable, broadband data services. The tremendous capabilities of 3G mobile broadband have inspired operators to innovate exciting new applications/services and to launch new business models that provide...

    Provided By QUALCOMM

  • White Papers // Jul 2009

    3G Applications and Services in Emerging Markets

    Emerging markets are of great interest to the entire wireless ecosystem. They provide tremendous opportunities for product and service growth while substantially improving the quality of life for residents. At the same time, they pose significant business model and technology challenges. This paper discusses how operators utilize innovative business models...

    Provided By QUALCOMM

  • White Papers // Feb 2011

    Litmus: Running Tests Against Hardware

    Shared memory multiprocessors typically expose subtle, poorly understood and poorly specified relaxed-memory semantics to programmers. To understand them, and to develop formal models to use in program verification, the authors find it essential to take an empirical approach, testing what results parallel programs can actually produce when executed on the...

    Provided By INRIA

  • White Papers // Aug 2011

    Model-Checking Secure Information Flow for Multi-Threaded Programs

    This paper describes a practical exercise in using the self-composition approach to model check secure information flow for multithreaded programs. Concretely, the authors show how eager trace invariance, proposed by Roscoe, and observational determinism, in the version of Terauchi, can be characterised as temporal logic formulae and encoded in the...

    Provided By INRIA

  • White Papers // Jan 2012

    Reducing Behavioural to Structural Properties of Programs With Procedures

    There is an intimate link between program structure and behaviour. Exploiting this link to phrase program correctness problems in terms of the structural properties of a program graph rather than in terms of its unfoldings is a useful strategy for making analyses more tractable. The present paper presents a characterisation...

    Provided By INRIA

  • White Papers // Apr 2012

    Programming With Permissions: An Introduction to HaMLet

    The authors present the design of HaMLet, a programming language in the ML tradition, which places strong emphasis on the control of aliasing and access to mutable memory. A balance between simplicity and expressiveness is achieved by marrying a static discipline of permissions and a dynamic mechanism of adoption and...

    Provided By INRIA

  • White Papers // Feb 2012

    A Unified Treatment of Syntax With Binders

    Atoms and de Bruijn indices are two well-known representation techniques for data structures that involve names and binders. However, using either technique, it is all too easy to make a programming error that causes one name to be used where another was intended. The authors propose an abstract interface to...

    Provided By INRIA

  • White Papers // Jan 2012

    A Step-Indexed Kripke Model of Hidden State

    Frame and anti-frame rules have been proposed as proof rules for modular reasoning about programs. Frame rules allow one to hide irrelevant parts of the state during verification, whereas the anti-frame rule allows one to hide local state from the context. The authors discuss the semantic foundations of frame and...

    Provided By INRIA

  • White Papers // Jan 2011

    Views, Program Transformations, and the Evolutivity Problem in a Functional Language

    The authors report on an experience to support multiple views of programs to solve the tyranny of the dominant decomposition in a functional setting. They consider two possible architectures in Haskell for the classical example of the expression problem. They show how the Haskell Refactorer can be used to transform...

    Provided By INRIA

  • White Papers // Feb 2012

    A Non-Local Method for Robustness Analysis of Floating Point Programs

    Robustness is a standard correctness property which intuitively means that if the input to the program changes less than a fixed small amount then the output changes only slightly. This notion is useful in the analysis of rounding error for floating point programs because it helps to establish bounds on...

    Provided By INRIA

  • White Papers // Jul 2009

    I-JVM: A Java Virtual Machine for Component Isolation in OSGi

    The OSGi framework is a Java-based, centralized, component oriented platform. It is being widely adopted as an execution environment for the development of extensible applications. However, current Java Virtual Machines are unable to isolate components from each other. For instance, a malicious component can freeze the complete platform by allocating...

    Provided By INRIA

  • White Papers // Apr 2011

    MoScript: A DSL for Querying and Manipulating Model Repositories

    Megamodels has been proposed as a mechanism to describe large number of modelling and non-modelling artefacts (models, transformations, source code, binary files, etc.) and their complex interrelations, typically required in any non-trivial development project. Despite its growing acceptance, there is a lack of adequate tool support to search, inspect, manipulate,...

    Provided By INRIA

  • White Papers // Sep 2009

    Supporting Incremental Change in Large System Models

    When reengineering large systems, software developers would like to assess and compare the impact of multiple change scenarios without actually performing these changes. A change can be effected by applying a tool to the source code, or by a manual refactoring. In addition, tools run over a model are costly...

    Provided By INRIA

  • White Papers // Jun 2011

    Two Basic Correctness Properties for ATL Transformations: Executability and Coverage

    Model transformations play a cornerstone role with the emergence of Model Driven Engineering (MDE), where models are transformed from higher to lower levels of abstraction. In consequence, the quality of the whole transformation process strongly depends on the quality of the model transformations. However, even though there is a wide...

    Provided By INRIA

  • White Papers // Oct 2009

    A Declarative Language for Dynamic Multimedia Interaction Systems

    Universal timed concurrent constraint programming (utcc) is a declarative model for concurrency tied to logic. It aims at specifying mobile reactive systems, i.e., systems that continuously interact with the environment and may change their communication structure. In this paper, the authors argue for utcc as a declarative model for dynamic...

    Provided By INRIA

  • White Papers // Jan 2011

    Model Driven Mutation Applied to Adaptative Systems Testing

    Dynamically Adaptive Systems modify their behavior and structure in response to changes in their surrounding environment and according to an adaptation logic. Critical systems increasingly incorporate dynamic adaptation capabilities; examples include disaster relief and space exploration systems. In this paper, the authors focus on mutation testing of the adaptation logic....

    Provided By INRIA

  • White Papers // Apr 2009

    Automatic Model Generation Strategies for Model Transformation Testing

    Testing model transformations requires input models which are graphs of inter-connected objects that must conform to a meta-model and meta-constraints from heterogeneous sources such as well-formedness rules, transformation preconditions, and test strategies. Manually specifying such models is tedious since models must simultaneously conform to several meta-constraints. The authors propose automatic...

    Provided By INRIA

  • White Papers // Jan 2009

    Barriers to Systematic Model Transformation Testing

    Model Driven Engineering (MDE) techniques support extensive use of models in order to manage the increasing complexity of software systems. Appropriate abstractions of software system elements can ease reasoning and understanding and thus limit the risk of errors in large systems. Automatic model transformations play a critical role in MDE...

    Provided By INRIA

  • White Papers // Jan 2009

    Testing Model Transformations: A Case for Test Generation From Input Domain Models

    Model transformations can automate critical tasks in model-driven development. Thorough validation techniques are required to ensure their correctness. In this paper, the authors focus on testing model transformations. In particular, they present an approach for systematic selection of input test data. This approach is based on a key characteristic of...

    Provided By INRIA

  • White Papers // Dec 2009

    SoC/SoPC Development Using MDD and MARTE Profile

    This paper presents a new methodology to develop SoC/SoPC applications. This methodology is based on UML and MDD and capitalizes the achievements of "Electronic System Level" community by taking into account the new MARTE profile dedicated to real-time embedded systems. In the MOPCOM SoC/SoPC research project, a tooling has been...

    Provided By INRIA

  • White Papers // Mar 2009

    AjMutator: A Tool for the Mutation Analysis of AspectJ Pointcut Descriptors

    Aspect-oriented programming introduces new challenges for software testing. In particular the Point-Cut Descriptor (PCD) requires particular attention from testers. The PCD describes the set of joinpoints where the advices are woven. In this paper, the authors present a tool, AjMutator, for the mutation analysis of PCDs. AjMutator implements several mutation...

    Provided By INRIA

  • White Papers // May 2009

    From a Domain Analysis to the Specification and Detection of Code and Design Smells

    Code and design smells are recurring design problems in software systems that must be identified to avoid their possible negative consequences on development and maintenance. Consequently, several smell detection approaches and tools have been proposed in the literature. However, so far, they allow the detection of predefined smells but the...

    Provided By INRIA

  • White Papers // May 2009

    DECOR: A Method for the Specification and Detection of Code and Design Smells

    Code and design smells are poor solutions to recurring implementation and design problems. They may hinder the evolution of a system by making it hard for software engineers to carry out changes. The authors propose three contributions to the research field related to code and design smells: DECOR, a method...

    Provided By INRIA

  • White Papers // Mar 2009

    Unifying Runtime Adaptation and Design Evolution

    The increasing need for continuously available software systems has raised two key-issues: self-adaptation and design evolution. The former one requires software systems to monitor their execution platform and automatically adapt their configuration and/or architecture to adjust their quality of service (optimization, fault-handling). The later one requires new design decisions to...

    Provided By INRIA

  • White Papers // Jul 2009

    Weaving Variability Into Domain Metamodels

    A Domain-Specific Modeling Language (DSMLs) describes the concepts and their relationships of a particular domain, in a metamodel. Using a DSML, it is possible to describe a wide range of different models. These models often share a common base and vary on some parts. Current approaches tend to distinguish the...

    Provided By INRIA

  • White Papers // Jul 2009

    Inquiring the Usage of Aspect-Oriented Programming: An Empirical Study

    Back in 2001, the MIT announced aspect-oriented programming as a key technology in the next 10 years. Nowadays, 8 years later, AOP is not widely adopted. Several reasons can explain this distrust in front of AOP, and one of them is the lack of robust tools for analysis, testing and...

    Provided By INRIA

  • White Papers // Apr 2009

    A Framework for Testing Model Composition Engines

    Model composition helps designers managing complexities by modeling different system views separately, and later compose them into an integrated model. In the past years, researchers have focused on the definition of model composition approaches (operators) and the tools supporting them (model composition engines). Testing model composition engines is hard. It...

    Provided By INRIA

  • White Papers // Jul 2010

    Active Operations on Collections

    Collections are omnipresent within models: collections of references can represent relations between objects, and collections of values can represent object attributes. Consequently, manipulating models often consists of performing operations on collections. For example, transformations create target collections from given source collections. Similarly, constraint evaluations perform computation on collections. Recent research...

    Provided By INRIA

  • White Papers // Jul 2010

    Linking Data and Presentations: From Mapping to Active Transformations

    Modern GUI toolkits, and especially RIA ones, propose the concept of binding to dynamically link domain data and their presentations. Bindings are very simple to use for predefined graphical components. However, they remain dependent on the GUI platform, are not as expressive as transformation languages, and require specific coding when...

    Provided By INRIA

  • White Papers // Jul 2010

    Using Model Driven Engineering Technologies for Building Authoring Applications

    Building authoring applications is a tedious and complex task that requires a high programming e ort. Document technologies, especially XML based ones, can help in reducing such an e ort by providing common bases for manipulating documents. Still, the overall task consists mainly of writing the application's source code. Model...

    Provided By INRIA