To What Extent Could We Detect Field Defects? an Empirical

Total Page:16

File Type:pdf, Size:1020Kb

To What Extent Could We Detect Field Defects? an Empirical View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Institutional Knowledge at Singapore Management University Singapore Management University Institutional Knowledge at Singapore Management University Research Collection School Of Information Systems School of Information Systems 9-2012 To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools Ferdian THUNG Singapore Management University, [email protected] Lucia Lucia Singapore Management University, [email protected] David LO Singapore Management University, [email protected] Lingxiao JIANG Singapore Management University, [email protected] Premkumar DEVANBU University of California, Davis See next page for additional authors DOI: https://doi.org/10.1145/2351676.2351685 Follow this and additional works at: https://ink.library.smu.edu.sg/sis_research Part of the Software Engineering Commons Citation THUNG, Ferdian; Lucia, Lucia; LO, David; JIANG, Lingxiao; DEVANBU, Premkumar; and RAHMAN, Foyzur. To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools. (2012). ASE 2012: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering: September 3-7, 2012, Essen, Germany. 50-59. Research Collection School Of Information Systems. Available at: https://ink.library.smu.edu.sg/sis_research/1591 This Conference Proceeding Article is brought to you for free and open access by the School of Information Systems at Institutional Knowledge at Singapore Management University. It has been accepted for inclusion in Research Collection School Of Information Systems by an authorized administrator of Institutional Knowledge at Singapore Management University. For more information, please email [email protected]. Author Ferdian THUNG, Lucia Lucia, David LO, Lingxiao JIANG, Premkumar DEVANBU, and Foyzur RAHMAN This conference proceeding article is available at Institutional Knowledge at Singapore Management University: https://ink.library.smu.edu.sg/sis_research/1591 To What Extent Could We Detect Field Defects? An Empirical Study of False Negatives in Static Bug Finding Tools Ferdian Thung1, Lucia1,DavidLo1, Lingxiao Jiang1, Foyzur Rahman2, and Premkumar T. Devanbu2, 1Singapore Management University, Singapore 2University of California, Davis {ferdianthung,lucia.2009,davidlo,lxjiang}@smu.edu.sg, {mfrahman,ptdevanbu}@ucdavis.edu ABSTRACT estimated that bugs cost the US economy billions of dollars Software defects can cause much loss. Static bug-finding annually [48]. Bugs are not merely economically harmful; tools are believed to help detect and remove defects. These they can also harm life & property when mission critical sys- tools are designed to find programming errors; but, do they tems malfunction. Clearly, techniques that can detect and in fact help prevent actual defects that occur in the field reduce bugs would be very beneficial. To achieve this goal, and reported by users? If these tools had been used, would many static analysis tools have been proposed to find bugs. they have detected these field defects, and generated warn- Static bug finding tools, such as FindBugs [28], JLint [5], ings that would direct programmers to fix them? To answer and PMD [14], have been shown to be helpful in detecting these questions, we perform an empirical study that investi- many bugs, even in mature software [8]. It is thus reason- gates the effectiveness of state-of-the-art static bug finding able to believe that such tools are a useful adjunct to other tools on hundreds of reported and fixed defects extracted bug finding techniques such as testing and inspection. from three open source programs: Lucene, Rhino, and As- Although static bug finding tools are effective in some set- pectJ. Our study addresses the question: To what extent tings, it is unclear whether the warnings that they generate could field defects be found and detected by state-of-the-art are really useful. Two issues are particularly important to static bug-finding tools? Different from past studies that are be addressed: First, many warnings need to correspond to concerned with the numbers of false positives produced by actual defects that would be experienced and reported by such tools, we address an orthogonal issue on the numbers users. Second, many actual defects should be captured by of false negatives. We find that although many field defects the generated warnings. For the first issue, there have been could be detected by static bug finding tools, a substantial a number of studies showing that the numbers of false warn- proportion of defects could not be flagged. We also analyze ings (or false positives) are too many, and some have pro- the types of tool warnings that are more effective in finding posed techniques to prioritize warnings [23–25, 44]. While field defects and characterize the types of missed defects. the first issue has received much attention, the second is- sue has received less. Many papers on bug detection tools just report the number of defects that they can detect. It Categories and Subject Descriptors is unclear how many defects are missed by these bug de- D.2.5 [Testing and Debugging]: Debugging aids/Testing tection tools. While the first issue is concerned with false tools positives, the second focuses on false negatives. We argue that both issues deserve equal attention as both have impact General Terms on the quality of software systems. If false positives are not satisfactorily addressed, this would make bug finding tools Experimentation, Measurement, Reliability unusable. If false negatives are not satisfactorily addressed, the impact of these tools on software quality would be min- Keywords imal. On mission critical systems, false negatives may even Static bug-finding tools, field defects, false negatives deserve more attention. Thus, there is a need to investigate the false negative rates of such tools on actual field defects. 1. INTRODUCTION Our study tries to fill this research gap by answering the following research question, and we use the term “bug” and Bugs are prevalent in many software systems. The Na- “defect” interchangeably both of which refer to errors or tional Institute of Standards and Technology (NIST) has flaws in a software: To what extent could state-of-the-art static bug finding tools detect field defects? Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are To investigate this research question, we make use of abun- not made or distributed for profit or commercial advantage and that copies dant data available in bug-tracking systems and software bear this notice and the full citation on the first page. To copy otherwise, to repositories. Bug-tracking systems, such as Bugzilla or JIRA, republish, to post on servers or to redistribute to lists, requires prior specific record descriptions of bugs that are actually experienced and permission and/or a fee. ASE ’12, September 3–7, 2012, Essen, Germany reported by users. Software repositories contain information Copyright 12 ACM 978-1-4503-1204-2/12/09 ...$15.00. on what code elements get changed, removed, or added at different periods of time. Such information can be linked to- pabilities of the tools, such tools may still suffer from false gether to track bugs and when and how they get fixed. JIRA negatives with respect to all kinds of defects. has the capability to link a bug report with the changed code In this study, we analyze several static bug finding tools that fixes the bug. Also, many techniques have been em- that make use of warning patterns for bug detection. These ployed to link bug reports in Bugzilla to their corresponding tools are lightweight and can scale to large programs. On the SVN/CVS code changes [19,51]. These data sources provide downside, these tools do not consider the specifications of a us descriptions of actual field defects and their treatments. system, and may miss defects due to specification violations. Based on the descriptions, we are able to infer root causes Other bug finding tools also use dynamic analysis tech- of defects (i.e., the faulty lines of code) from the bug treat- niques, such as dynamic slicing [50], dynamic instrumenta- ments. To ensure accurate identification of faulty lines of tion [38], directed random testing [12, 21, 45], and invariant code, we perform several iterations of manual inspections detection [11, 20]. Such tools often explore particular parts to identify lines of code that are responsible for the defects. of a program and produce no or few false positives. How- Then, we are able to compare the identified root causes with ever, they seldom cover all parts of a program; they are thus the lines of code flagged by static bug finding tools, and to expected to have false negatives. analyze the proportion of defects that are missed or captured There are also studies on bug prediction with data mining by the tools. and machine learning techniques, which may have both false In this work, we perform an exploratory study with three positives and negatives. For example, Sliwerski et al. [46] an- state-of-the-art static bug finding tools, FindBugs, PMD, alyze code change patterns that may cause defects. Ostrand and Jlint, on three reasonably large open source Java pro- et al. [40] use a regression model to predict defects. Nagap- grams, Lucene, Rhino, and AspectJ. Lucene, Rhino, and pan et al. [36] apply principal component analysis on the AspectJ have 58, 35, and 9 committers respectively1.We code complexity metrics of commercial software to predict use bugs reported in JIRA for Lucene version 2.9, and the failure-prone components. Kim et al. [33] predict potential iBugs dataset provided by Dallmeier and Zimmermann [19] faults from bug reports and fix histories. for Rhino and AspectJ. Our manual analysis identifies 200 real-life defects that we can unambiguously locate faulty 2.2 FindBugs lines of code.
Recommended publications
  • The Origins of Severe Software Defects on Evolving Information Systems: a Double Case Study
    Unicentre CH-1015 Lausanne http://serval.unil.ch Year : 2019 THE ORIGINS OF SEVERE SOFTWARE DEFECTS ON EVOLVING INFORMATION SYSTEMS: A DOUBLE CASE STUDY Hillah Nico Hillah Nico, 2019, THE ORIGINS OF SEVERE SOFTWARE DEFECTS ON EVOLVING INFORMATION SYSTEMS: A DOUBLE CASE STUDY Originally published at : Thesis, University of Lausanne Posted at the University of Lausanne Open Archive http://serval.unil.ch Document URN : urn:nbn:ch:serval-BIB_A02DBD5A439B3 Droits d’auteur L'Université de Lausanne attire expressément l'attention des utilisateurs sur le fait que tous les documents publiés dans l'Archive SERVAL sont protégés par le droit d'auteur, conformément à la loi fédérale sur le droit d'auteur et les droits voisins (LDA). A ce titre, il est indispensable d'obtenir le consentement préalable de l'auteur et/ou de l’éditeur avant toute utilisation d'une oeuvre ou d'une partie d'une oeuvre ne relevant pas d'une utilisation à des fins personnelles au sens de la LDA (art. 19, al. 1 lettre a). A défaut, tout contrevenant s'expose aux sanctions prévues par cette loi. Nous déclinons toute responsabilité en la matière. Copyright The University of Lausanne expressly draws the attention of users to the fact that all documents published in the SERVAL Archive are protected by copyright in accordance with federal law on copyright and similar rights (LDA). Accordingly it is indispensable to obtain prior consent from the author and/or publisher before any use of a work or part of a work for purposes other than personal use within the meaning of LDA (art.
    [Show full text]
  • Marcia Knous: My Name Is Marcia Knous
    Olivia Ryan: Can you just state your name? Marcia Knous: My name is Marcia Knous. OR: Just give us your general background. How did you come to work at Mozilla and what do you do for Mozilla now? MK: Basically, I started with Mozilla back in the Netscape days. I started working with Mozilla.org shortly after AOL acquired Netscape which I believe was in like the ’99- 2000 timeframe. I started working at Netscape and then in one capacity in HR shortly after I moved working with Mitchell as part of my shared responsibility, I worked for Mozilla.org and sustaining engineering to sustain the communicator legacy code so I supported them administratively. That’s basically what I did for Mozilla. I did a lot of I guess what you kind of call of blue activities where we have a process whereby people get access to our CVS repository so I was the gatekeeper for all the CVS forms and handle all the bugs that were related to CVS requests, that kind of thing. Right now at Mozilla, I do quality assurance and I run both our domestic online store as well as our international store where we sell all of our Mozilla gear. Tom Scheinfeldt: Are you working generally alone in small groups? In large groups? How do you relate to other people working on the project? MK: Well, it’s a rather interesting project. My capacity as a QA person, we basically relate with the community quite a bit because we have a very small internal QA organization.
    [Show full text]
  • Mozillamessaging.Com Site Redesign Site Map — Version 3.0 — September 22, 2008
    Mozillamessaging.com Site Redesign Site Map — Version 3.0 — September 22, 2008 While this document can be printed at 8.5” x 11” it may be hard to read and is intended to be printed at 11” x 17”. Mozillamessaging.com Site Redesign Version 3.0 Other Systems and Features 03 05 Mozilla Messaging Languages http://www.mozillamessaging.com/en-US/features.html http://www.mozillamessaging.com/en-US/all.html Thunderbird 02 Release Notes 04 Download Page 18 (Overview) http://www.mozillamessaging.com/ http://www.mozillamessaging.com/en-US/releasenotes/ http://www.mozillamessaging.com/en-US/download.html ?? URL TBD en-US/thunderbird Secure Email TBD http://www.mozillamessaging.com/en-US/email.html All Add-Ons https://addons.mozilla.org/en-US/thunderbird/ Supported Servers TBD http://www.mozillamessaging.com/en-US/servers Recommended https://addons.mozilla.org/en-US/thunderbird/recommended Add-Ons Popular https://addons.mozilla.org/en-US/ https://addons.mozilla.org/en-US/thunderbird/browse/type:1/cat:all?sort=popular thunderbird/ FAQ Themes http://www.mozilla.org/support/thunderbird/faq https://addons.mozilla.org/en-US/thunderbird/browse/type:2 Tips & Tricks Dictionaries http://www.mozilla.org/support/thunderbird/tips https://addons.mozilla.org/en-US/thunderbird/browse/type:3 Keyboard Shortcuts http://www.mozilla.org/support/thunderbird/keyboard Mouse Shortcuts Add-Ons Support 06 http://www.mozilla.org/support/thunderbird/mouse https://addons.mozilla.org/en-US/thunderbird/ (Overview) http://www.mozillamessaging.com/ Menu References Bugzilla en-US/support http://www.mozilla.org/support/thunderbird/menu https://bugzilla.mozilla.org/ Editing Config.
    [Show full text]
  • A First Look at Firefox OS Security
    A First Look at Firefox OS Security Daniel DeFreez∗, Bhargava Shastryy, Hao Chen∗, Jean-Pierre Seiferty ∗University of California, Davis fdcdefreez, [email protected] ySecurity in Telecommunications, Technische Universitat¨ Berlin fbshastry, [email protected] Abstract—With Firefox OS, Mozilla is making a serious push the abuse of vulnerable applications. All privileged appli- for an HTML5-based mobile platform. In order to assuage cations have a default Content Security Policy applied and security concerns over providing hardware access to web ap- are reviewed for conformance to security guidelines prior to plications, Mozilla has introduced a number of mechanisms that being distributed through the official Firefox Market. The make the security landscape of Firefox OS distinct from both Content Security Policy almost categorically prevents Cross- the desktop web and other mobile operating systems. From an Site Scripting (XSS) via JavaScript injection, and code re- application security perspective, the two most significant of these mechanisms are the the introduction of a default Content Security view should pick up any misuse of permissions or obvious Policy and code review in the market. This paper describes how security errors. This paper asks whether these mechanisms lightweight static analysis can augment these mechanisms to find are sufficient to prevent developers from making trivially vulnerabilities which have otherwise been missed. We provide preventable security blunders. We find that they are not. The examples of privileged applications in the market that contain most prevalent attack vector, without a doubt, is HTML in- vulnerabilities that can be automatically detected. jection, and .innerHTML1 is the culprit.
    [Show full text]
  • Imagem Digitalizada
    UNIVERSIDADE DE SÃO PAULO Instituto de Ciências Matemáticas e de Computação ISSN 0103-2569 Uma Introdução ao Bugzilla Leonardo Jorge Quemello Alexandre Michetti Manduca Renata P. M. Fortes Nº 253 RELATÓRIOS TÉCNICOS São Carlos — SP Fev./2005 SYSNO Jªxx aiº/%% DATA l _ [ [CMC — SEAB .) Uma Introdução ao Bugzilla Leonardo Jorge Quemello, AlexandreMichetti Manduca, Renata P. M. Fortes [leonardo, michetti) ©grad.icmc.usp.br , renata©icmc.usp.br Universidade de São Paulo Instituto de Ciências Matemáticas e de Computação São Carlos — SP, Brasil. CP: 668 CEP: 13560-970 São Carlos -SP - fevereiro de 2005 Índice 1- INTRODUÇÃO....................................................................................................3 2 — APRESENTAÇÃO DE BUGZILLA.......... 3 - OBJETIVO E RECURSOS DE BUGZILLA......................................................4 4 — VIS ÃO GERAL DO FUNCIONAMENTO DE BUGZILLA.............................5 4.1 — Produtos e Componentes................................................. 4.2 — Contas de usuário.............................................................................................5 4.3 — Níveis de usuário e permissões........................................................................5 4.4 — Ações...................................... 4.5 — Bugs................................................................................................................. 4.6 — Versões e Milestones....... 4.7 — Grupos.......................................................... 4.7 — Ciclo de vida dos bugs e funcionamento
    [Show full text]
  • An Empirical Analysis of the Bug-Fixing Process in Open Source
    An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps Pamela Bhattacharya Liudmila Ulanova Iulian Neamtiu Sai Charan Koduru Department of Computer Science and Engineering University of California, Riverside, CA, USA Email:fpamelab,lulan001,neamtiu,[email protected] Abstract—Smartphone platforms and applications (apps) empirical studies and provide a quantitative basis for im- have gained tremendous popularity recently. Due to the novelty proving the quality of open-source Android apps. To this of the smartphone platform and tools, and the low barrier to end, in this paper, we perform an in-depth empirical study entry for app distribution, apps are prone to errors, which affects user experience and requires frequent bug fixes. An on bugs in the Android Platform project and 24 widely-used essential step towards correcting this situation is understanding open-source Android apps from diverse categories such as the nature of the bugs and bug-fixing processes associated with communication, tools, media and productivity (Section II). smartphone platforms and apps. However, prior empirical bug Our analysis has three main thrusts—we chose these thrusts studies have focused mostly on desktop and server applications. to provide a good breadth–depth balance for our study. Therefore, in this paper, we perform an in-depth empirical study on bugs in the Google Android smartphone platform First, we define several metrics to understand the quality and 24 widely-used open-source Android apps from diverse of bug reports, and analyze the bug-fix process: bug-fix time, categories such as communication, tools, and media. Our bug categories, bug priority, status and the engagement of analysis has three main thrusts.
    [Show full text]
  • Eclipse BIRT 2.5 Release Review May 27, 2009
    Eclipse BIRT 2.5 Release Review May 27, 2009 Eclipse BIRT PMC Confidential | Date | Other Information, if necessary © 2002 IBM Corporation Introduction: BIRT 2.5 Release Review BIRT 2.5 is targeted for availability June 24, 2009 Based on Eclipse Platform 3.5 Part of Galileo Simultaneous Release Major Milestone History 1.0, Jun 2005; 1.0.1, Jul 2005 2.0, Jan 2006; 2.0.1, Feb 2006 2.1, Jun 2006; 2.1.1 Sep, 2006; 2.1.2, Feb 2007; 2.1.3, Jul 2007 2.2, Jun 2007; 2.2.1 Oct 2007; 2.2.2, Feb 2008 2.3, Jun 2008; 2.3.1 Sep, 2008; 2.3.2, Feb 2009 Release alignment “Major” release designation determined by feature set Summer releases will be aligned with Eclipse release train Eclipse Foundation, Inc. | © 2009 by Actuate Corporation and made available under the EPL v1.0 2 Features: BIRT 2.5 Requirements Process Requirements gathered from multiple sources: Enhancement requests already entered in Bugzilla Discussions in BIRT newsgroup Innovation/experience from within the BIRT project team Requirements captured in Bugzilla Community encouraged to enter all enhancements into Bugzilla for planning and tracking BIRT 2.5 Plan developed and published on Eclipse.org Eclipse Foundation, Inc. | © 2009 by Actuate Corporation and made available under the EPL v1.0 3 Features: Summary of BIRT 2.5 Objectives & Themes Integrate and provide BIRT as part of the Galileo Simultaneous Release Tested with and integrates components from Galileo release Support use of BIRT in a wide range of Eclipse 3.5 applications Ensures BIRT technology is easily accessible to Eclipse 3.5 community Specific additional features can be grouped into broad categories Report Layout (e.g.
    [Show full text]
  • The Bugzilla Guide - 2.22.7 Release
    The Bugzilla Guide - 2.22.7 Release The Bugzilla Team The Bugzilla Guide - 2.22.7 Release by The Bugzilla Team Published 2009-02-02 This is the documentation for Bugzilla, a bug-tracking system from mozilla.org. Bugzilla is an enterprise-class piece of software that tracks millions of bugs and issues for hundreds of organizations around the world. The most current version of this document can always be found on the Bugzilla Documentation Page (http://www.bugzilla.org/documentation.html). Table of Contents 1. About This Guide......................................................................................................................................................1 1.1. Copyright Information....................................................................................................................................1 1.2. Disclaimer......................................................................................................................................................1 1.3. New Versions..................................................................................................................................................1 1.4. Credits............................................................................................................................................................2 1.5. Document Conventions..................................................................................................................................2 2. Installing Bugzilla.....................................................................................................................................................4
    [Show full text]
  • Mozilla Development Roadmap
    mozilla development roadmap Brendan Eich, David Hyatt table of contents • introduction • milestone schedule • about ownership... • a new • current release • what all this does not roadmap status mean • discussion • how you can help • application architecture • summary • project • to-do list rationale management introduction Welcome to the Mozilla development roadmap. This is the third major roadmap revision, with a notable recent change to the status of the integrated Mozilla application suite, since the original roadmap that set Mozilla on a new course for standards compliance, modularity, and portability in 1998. The previous roadmap documented milestones and rules of development through Mozilla 1.3, and contains links to older roadmaps. Most of this document reflects the new application architecture proposal made last year. The effort resulting from that proposal has finally borne fruit, or to mix metaphors, hatched new application creatures: Firefox and Thunderbird. The new, significant roadmap update hoped for early in 2004 has been postponed. See Brendan's roadmap blog for thoughts that may feed into it. An interim roadmap update focused on the "aviary 1.0" 1 From www.mozilla.org/roadmap.html 4 August 2004 releases of Firefox 1.0 and Thunderbird 1.0, and the 1.8 milestone that will follow, is coming soon. We have come a long way. We have achieved a Mozilla 1.0 milestone that satisfies the criteria put forth in the Mozilla 1.0 manifesto, giving the community and the wider world a high-quality release, and a stable branch for conservative development and derivative product releases. See the Mozilla Hall of Fame for a list of Mozilla-based projects and products that benefited from 1.0.
    [Show full text]
  • Reduction of Redundant Rules in Association Rule Mining-Based Bug Assignment 1. Introduction an Essential Aspect of Software
    International Journal of Reliability, Quality and Safety Engineering Vol. 24, No. 6 (2017) 1740005 (14 pages) c World Scientific Publishing Company DOI: 10.1142/S0218539317400058 Reduction of Redundant Rules in Association Rule Mining-Based Bug Assignment ,§ †,¶ Meera Sharma∗ , Abhishek Tandon , ‡, ‡, Madhu Kumari and V. B. Singh ∗∗ ∗Swami Shrddhanand College University of Delhi, Delhi, India † SSCBS, University of Delhi, Delhi, India ‡ Delhi College of Arts and Commerce University of Delhi, Delhi, India § [email protected][email protected] [email protected] ∗∗[email protected] Received 15 March 2017 Revised 5 July 2017 use and distribution is strictly not permitted, except for Open Accessarticles. - Accepted 22 August 2017 Eng. 2017.24. Downloaded from www.worldscientific.com Re Published 19 September 2017 Bug triaging is a process to decide what to do with newly coming bug reports. In this paper, we have mined association rules for the prediction of bug assignee of a newly reported bug using diff erent bug attributes, namely, severity, priority, component and operating system. To deal with the problem of large data sets, we have taken subsets of data set by dividing the large data set using K- means clustering algorithm. We have used an Apriori algorithm in MATLAB to generate Int. J. Rel. Qual. Saf. 07/13/18. on DELHI OF association rules. We have extracted the association rules for top 5 assignees in each cluster. The proposed method has been empirically validated on 14,696 bug reports of Mozilla open source software project, namely, Seamonkey, Firefox and Bugzilla. In our approach, we observe that taking on these attributes (severity, priority, component and operating system) as antecedents, essential rules are more than redundant rules, whereas in [M.
    [Show full text]
  • Firefox OS Web Apps for Science
    Firefox OS Web Apps for Science Raniere Silva and Frédéric Wang Mozilla MathML Project June 10, 2014 Abstract In this document, we describe recent work made by the Mozilla MathML team to help publishing scientific content using Web technologies. We focus on the Firefox OS platform currently being developed by Mozilla that provides a good framework to create mathematical user interfaces on mobile devices. Contents 1 The Web Platform 3 1.1 Overview ............................................... 3 1.2 Basic HTML5 Features ........................................ 3 1.3 Styling of Mathematics ........................................ 4 1.4 TeXZilla ................................................ 4 1.5 Advanced HTML5 Features ..................................... 5 2 Firefox OS 6 2.1 Overview ............................................... 6 2.2 Math Suite .............................................. 6 2.3 Math Cheat Sheet .......................................... 7 2.4 TeXZilla App ............................................. 7 2.5 DynAlgebra .............................................. 8 A The Web Platform 12 A.1 1-mathml-in-html ........................................... 12 A.2 2-mathml-in-svg ........................................... 12 A.3 3-mathml-javascript ......................................... 12 A.4 4-mathml-fonts ............................................ 13 A.5 5-canvas ................................................ 15 A.6 6-mathml-in-webgl .......................................... 15 A.7 7-web-component ..........................................
    [Show full text]
  • Escuela Técnica Superior De Ingenieros Industriales Y De Telecomunicación
    ESCUELA TÉCNICA SUPERIOR DE INGENIEROS INDUSTRIALES Y DE TELECOMUNICACIÓN Titulación: INGENIERO TÉCNICO EN INFORMÁTICA DE GESTIÓN Título del proyecto: DEFINICIÓN, DESARROLLO E IMPLANTACIÓN DE UN SISTEMA DE GESTIÓN DEL CONOCIMIENTO Y SU INTEGRACIÓN CON LA PLATAFORMA DE SOPORTE DE SEGUNDO NIVEL (2LS) DE OPENBRAVO Xabier Merino Zabaleta Tutor: Jesús Villadangos Pamplona, 1 Julio de 2011 ÍNDICE 1.- RESUMEN 2.- ¿QUÉ ES UN MÓDULO DE CONOCIMIENTOS? 21.- DEFINICIÓN 2.2.- ASPECTOS IMPORTANTES 2.3.- OBJETIVOS 2.4.- EL PASADO DE LAS BASES DE CONOCIMIENTO 2.5.- EL PRESENTE DE LAS BASES DE CONOCIMIENTO 3.- ¿QUÉ TENEMOS? 3.1.- SERVICIO DE SOPORTE EN OPENBRAVO 3.2.- ACTUAL BASE DE CONOCIMIENTO DE OPENBRAVO 4.- ¿QUÉ NECESITAMOS? 4.1.- NECESIDADES DEL EQUIPO DE SOPORTE 4.2.- CONCLUSIÓN 4.3.- ESTUDIO DE APLICACIONES 4.3.1.- MANTIS 4.3.2.- BUGZILLA 4.3.3.- OTRS 4.3.4.- REQUEST TRACKER 4.3.5.- FOOTPRINTS 5.- CONCLUSIÓN 5.1.- ELECCIÓN DE LA HERRAMIENTA 5.2.- BASE DE CONOCIMIENTO DE FOOTPRINTS 4.3.- LÍNEAS FUTURAS 6.- GLOSARIO 6.1.- ENTERPRISE RESOURCE PLANNING (ERP) 6.2.- POINT OF SALES 6.3.- SOPORTE TÉCNICO 6.4.- GESTOR DE INCIDENCIAS 6.5.- BUSSINES PARTNER 6.6.- ACUERDO DE NIVEL DE SERVICIO (SLA) 6.7.- WORKAROUND 6.8.- EQUIPO QA (QUALITY ASSURANCE) 6.9.- PARCHE 6.10.- VERSION O MAINTENANCE PACK 6.11.- BUG TRACKING 7.- BIBLIOGRAFIA Y REFERENCIAS 7.1.- BIBLIOGRAFÍA 7.2.- REFERENCIAS 1.- RESUMEN El Proyecto Fin de Carrera que se presenta tiene como objeto la implantación de una Base de Conocimientos en el equipo de Soporte de la empresa Openbravo con el fin de ayudar a transferir el conocimiento y la experiencia de los diferentes miembros del equipo entre si.
    [Show full text]