Lotus Software

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 42 of 50 - About 500 Essays
  • Improved Essays

    Personal Business Model Key Resources I am very interested in Mathematics, Physics, and Logic. These interests make me very logical, precise, and thoughtful, which are useful skills in my line of work. I work in Software Development; therefore, I am obviously also interested in Computer Science. Being a female with these interests makes me relatively unique in my field. Currently, I am the only female on the entire development staff in my company. Sometimes, I view this as a challenge to my…

    • 1640 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    M4d1 Unit 1 Case Study

    • 556 Words
    • 3 Pages

    M4D1 I. Why do you think it is much more expensive to fix a security vulnerability late in the software life cycle, compared to early? It is almost always more costly to redo or rework something than to do it correctly in the first place. Years ago when I got my first Solaris system administration job, the Navy had the view that any job the Navy did not have official schools for could be learned via OJT (on the job training). So for my first year, I learned everything I could about…

    • 556 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Prima Donna Case Study

    • 720 Words
    • 3 Pages

    6 PERSONALITY ISSUES OF THE SOFTWARE TEAM Now let’s consider some of the issues that could arise in the team that developing software projects. I tried to describe most common problems that concern individuals and that can be resolved by implying described leadership styles. Part of the problems concerns more or less traditional issues as interpersonal relationships and personality characteristics. Though, I also observe relatively new issue that arose dramatically in the last 20 years with…

    • 720 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    What is Open Source? Much of the software created in today’s world is created by a company who then has total control over modifying, distributing, monetizing, and granting rights for it. This means that users who purchase the software cannot modify it, share it, and may not actually own it. On the other hand, Open Source software has its code available on the internet for anyone to inspect, copy, modify, and distribute. This makes it cheaper than closed source software, more secure, free to…

    • 1144 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Case Study Infosys

    • 861 Words
    • 4 Pages

    Established in 1981by Mr N.R Narayana Murthy and six engineers in Pune, over the years has catalyzed some of the major changes that have led India emergence as a global destination for software service talent. Infosys has emerged into leading multinational corporation that provides business consulting, information technology, software engineering and outsourcing services. Infosys is also…

    • 861 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Poka Yoke Case Study

    • 844 Words
    • 4 Pages

    A frame work for assesing poka-yoke device According to this article the framework assesses the processes of the design, operation and maintenance of poka-yoke devices. The framework includes a scoring system; background in both lean production and human factors is required to apply the framework. (https://www.sciencedirect.com/science/article/pii/S0278612512000313) Enabling Poka-Yoke Workflows with the AristaFlow BPM Suite This tool gives idea into the AristaFlow BPM Suite – a next generation…

    • 844 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Proposed Hybrid System and its Control Strategy The simulation results of the PV/WT/PEMFC/battery hybrid system using ANN and fuzzy logic are discussed in this section. Simulation results are obtained by developing a detailed MATLAB/Simulink software package, as shown in Figure 8.5. Fig. 8.5 - Hybrid power system simulation model The specifications of the renewable power sources used are given in Table 8.1 PV Sharp’s (NU-180) at (1kW/m2, 25o C) Wind turbine Maximum power (Pm) 180 (W) Peak…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    caused the Ariane 5 was a design error, namely of an Operand Error. The report says, “The exception was detected, but inappropriately handled because the view had been taken that software should be considered correct until it is shown to be at fault” (Lions, 1996). This view manifested itself in the use of extant software from Ariane 4 that was used for Ariane 5 because, to simplify, it worked well for Ariane 4 despite this previous flight having a different flight pattern and other design…

    • 489 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Chapter : 5 Aspect-oriented Secure Software Modeling Object Oriented Programming (OOP) [1] uses encapsulation and abstraction through class that captures both functionality and behavior and internal structure. In the software system development, besides the basic functionality, there are another concerns as synchronization, distribution, logging, error handling, security management, etc. If each one of these concerns are processed independently from the remaining part of the system, the…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    One of the disadvantages of AI is the high cost. In the creating an artificial intelligence requires enormous expenses as they are very multifarious machines and so its repair and maintenances. They have software programs which require numerous progressions to provide the needs of the changes in the environment and also the need for the machines to be smarter day by day. In the case of rigorous breakdowns, the procedure to recuperate lost codes and re-instating the system could require huge time…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Page 1 39 40 41 42 43 44 45 46 50