IT-BASED RISKS in ADVERGAME CAMPAIGNS a Focus on Fairness and Privacy UNRESTRICTED VERSION

Total Page:16

File Type:pdf, Size:1020Kb

IT-BASED RISKS in ADVERGAME CAMPAIGNS a Focus on Fairness and Privacy UNRESTRICTED VERSION IT-BASED RISKS IN ADVERGAME CAMPAIGNS A focus on fairness and privacy UNRESTRICTED VERSION R.E.J. de Groot SCHOOL OF MANAGEMENT AND GOVERNANCE INFORMATION SYSTEMS & CHANGE MANAGEMENT (ISCM) FACULTY OF ELECTRICAL ENGINEERING, MATHEMATICS & COMPUTER SCIENCE INFORMATION SYSTEMS (IS) SUPERVISORS Dr. A.J.B.M. Wijnhoven (ISCM) Dr. P.A.T. van Eck (IS) DOCUMENT VERSION Final Restricted (e-version) 30-08-2012 IT-based Risks in Advergame Campaigns UNRESTRICTED VERSION Important: This version of this thesis is unrestricted and does not contain confidential chapters. The full version of this thesis is not available to the general public. 2 Master Thesis Jogchem de Groot IT-based Risks in Advergame Campaigns A focus on fairness and privacy Amsterdam, August 30 2012 Author Jogchem de Groot Programme Business Information Technology (MSc), School of Management and Governance, University of Twente Student number 0047376 E-mail [email protected] Graduation committee Fons Wijnhoven Department School of Management and Governance, University of Twente E-mail [email protected] Pascal van Eck Department Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente E-mail [email protected] 3 IT-based Risks in Advergame Campaigns 4 Management summary Purpose The last few years have seen a rise in the use of advergames, games designed around a brand or product that are specifically created to communicate advertising messages. The combination of a brand with the fun and entertainment from playing a game results in outstanding performance with regard to brand memory, persuasion and visitor retention. However, due to their interactive, technological and data-oriented nature they have a risk profile different from other advertising methods, as they are also exposed to IT-based risks. The purpose of this study is to investigate what and how IT-based risks affect advergames, what their prevalence is, and to design a control to mitigate some of these risks. Results Four key areas of IT-based risk have been identified for advergames: security, where threats can target the brand owner's assets or visitors; fairness, where cheating can harm a brand's reputation and undermine the fun perceived by players, the key catalyst of advergame success. privacy, where threats are concerned with the loss of privacy sensitive data of players; and quality of experience risks, which can frustrate players and undermine fun as well. A model for fairness and privacy threats that is operationalized for the technological context of advergames, consisting of detailed descriptions of eighteen different threats that are categorized according to what part of an advergame's architecture they target has been developed. This model enables advergame developers to understand these threats and to assess their own advergames. This model has been used to perform a risk assessment of sixteen existing advergame campaigns and the results indicate overall high vulnerability for fairness threats, with medium to low impact and medium to high overall risk. The results indicate a serious and structural problem with fairness risks in advergames which significantly reduces the reliability and predictability of advergames as advertising instrument. An effective solution to mitigate fairness risks has been designed that supports the detection of almost all forms of cheating, and that can be integrated in existing or new advergames with relatively low effort. Recommendations For brand-owners: 1. Include risk factors in the evaluation of whether the choice for an advergame is appropriate. 2. Consider the risk track record of an advergame company before selecting one. 3. Include risk management requirements in contracts negotiated with advergame creators. But always monitor and maintain an active position within the process, it is after all your brand at stake! 4. Allocate a realistic budget and time-frame on top of the basic advergame budget to assess and mitigate the risks for an advergame campaign. For advergame creators: 1. Present a realistic view about risks to the client and include risk-management (costs) in proposals. Do not accept a project to create an advergame without a budget for risk management, it is after all also your reputation as an advergame creator at stake! 2. Make the advergame creation process risk aware: involve risk evaluation and communication at every stage of the advergame creation process. 3. Implement the proposed solution in new and existing advergames. Do not rely on your own anti- cheating controls and do not rely on anti-reverse engineering techniques as they are unlikely to be effective. 4. Perform a vulnerability assessment of both client-side and server-side code before going live. For the client-side code the threat model developed as part of this research should be used. 5. During live time, continuously monitor the campaign for incidents and respond appropriately. 5 IT-based Risks in Advergame Campaigns 6 Table of Contents Acknowledgements.............................................................................................................................9 Chapter 1: Introduction......................................................................................................................11 1.1 Advergames..............................................................................................................................11 1.1.1 Advergame classification.................................................................................................12 1.1.2 Advergame creation.........................................................................................................12 1.1.3 Advergame technology.....................................................................................................13 1.2 Advergame motivation & theory.............................................................................................15 1.3 Problem description & rationale..............................................................................................17 1.4 Conceptual model....................................................................................................................18 1.5 Research approach...................................................................................................................19 1.5.1 Research structure & scope..............................................................................................20 1.5.2 Methodology....................................................................................................................21 1.5.3 Impact and relevance........................................................................................................22 1.6 Structure of report....................................................................................................................22 Chapter 2: Advergame risks..............................................................................................................23 2.1 IT-risk fundamentals................................................................................................................23 2.2 Security....................................................................................................................................24 2.3 Fairness....................................................................................................................................25 2.4 Privacy.....................................................................................................................................27 2.5 Quality of experience...............................................................................................................29 2.6 Conclusion...............................................................................................................................30 Chapter 3: Methodology, data collection and analysis......................................................................31 3.1 Threat theory development methodology (stage I)..................................................................31 3.2 Risk assessment methodology (stage II)..................................................................................32 3.2.1 Scale.................................................................................................................................33 3.2.2 Operationalization............................................................................................................33 3.2.3 Research process..............................................................................................................35 3.2.4 Limitations.......................................................................................................................36 3.3 Solution development methodology (stage III).......................................................................37 3.4 Data requirements and collection............................................................................................37 3.5 Analysis technique: reverse engineering..................................................................................38 Chapter 4: Analytical results (stage I)...............................................................................................41 4.1 Advergame architectures & fairness implications...................................................................41 4.2 Reverse engineering.................................................................................................................43
Recommended publications
  • Mozilla Firefox Lower Version Free Download Firefox Release Notes
    mozilla firefox lower version free download Firefox Release Notes. Release Notes tell you what’s new in Firefox. As always, we welcome your feedback. You can also file a bug in Bugzilla or see the system requirements of this release. Download Firefox — English (US) Your system may not meet the requirements for Firefox, but you can try one of these versions: Download Firefox — English (US) Download Firefox Download Firefox Download Firefox Download Firefox Download Firefox Download Firefox Download Firefox Download Firefox Firefox for Android Firefox for iOS. December 1, 2014. We'd also like to extend a special thank you to all of the new Mozillians who contributed to this release of Firefox! Default search engine changed to Yandex for Belarusian, Kazakh, and Russian locales. Improved search bar (en-US only) Firefox Hello real-time communication client. Easily switch themes/personas directly in the Customizing mode. Wikipedia search now uses HTTPS for secure searching (en-US only) Recover from a locked Firefox process in the "Firefox is already running" dialog on Windows. Fixed. CSS transitions start correctly when started at the same time as changes to display, position, overflow, and similar properties. Fullscreen video on Mac disables display sleep, and dimming, during playback. Various Yosemite visual fixes (see bug 1040250) Changed. Proprietary window.crypto properties/functions re-enabled (to be removed in Firefox 35) Firefox signed by Apple OS X version 2 signature. Developer. WebIDE: Create, edit, and test a new Web application from your browser. Highlight all nodes that match a given selector in the Style Editor and the Inspector's Rules panel.
    [Show full text]
  • Brief Intro to Firebug Firebug at a Glance
    Brief Intro to Firebug Firebug at a glance • One of the most popular web debugging tool with a collec6on of powerful tools to edit, debug and monitor HTML, CSS and JavaScript, etc. • Many rich features: • Inspect, Log, Profile • Debug, Analyze, Layout How to install • Get firebug: • Open Firefox, and go to hp://geirebug.com/ • Click Install Firebug, and follow the instruc6ons • Ways to launch Firebug • F12, or Firebug Buon • Right click an element on the page and inspect it with Firebug Firebug Panels • Console: An interac6ve JavaScript Console • HTML: HTML View • CSS: CSS View • Script: JavaScript Debugger • DOM: A list of DOM proper6es (defaults to window object) • Net: HTTP traffic monitoring • Cookies: Cookie View Tasks for HTML Panel • Open twiLer.com and log in with your account. Ac6vate Firebug. • Tasks with HTML Panel • 1. Which <div> tag corresponds to the navigaon bar at the top of the page? • 2. Change the text “Messages” in the navigaon bar to “Tweets” • 3. Find out which <div> tag corresponds to the dashboard which is the le` column of the page. Can you change the width of the dashboard to 200px? • 4. Try to figure out the URL of your profile picture at the top le` corner of the home page, and use this URL to open this picture in a new tab. • 5. Change your name next to your profile picture to something else, and change the text colour to blue. Inspect HTTP Traffic • Open twiLer.com and log in with your account. Ac6vate Firebug. • Tasks with Net Panel • 1. Which request takes the longest 6me to load? • 2.
    [Show full text]
  • Gaming Cover Front
    Gaming A Technology Forecast Implications for Community & Technical Colleges in the State of Texas Authored by: Jim Brodie Brazell Program Manager for Research Programs for Emerging Technologies Nicholas Kim IC² Institute Program Director Honoria Starbuck, PhD. Eliza Evans, Ph.D. Michael Bettersworth, M.A. Digital Games: A Technology Forecast Authored by: Jim Brodie Brazell Nicholas Kim Honoria Starbuck, PhD. Program Manager for Research, IC² Institute Eliza Evans, Ph.D. Contributors: Melinda Jackson Aaron Thibault Laurel Donoho Research Assistants: Jordan Rex Matthew Weise Programs for Emerging Technologies, Program Director Michael Bettersworth, M.A. DIGITAL GAME FORECAST >> February 2004 i 3801 Campus Drive Waco, Texas 76705 Main: 254.867.3995 Fax: 254.867.3393 www.tstc.edu © February 2004. All rights reserved. The TSTC logo and the TSTC logo star are trademarks of Texas State Technical College. © Copyright IC2 Institute, February 2004. All rights reserved. The IC2 Institute logo is a trademark of The IC2 Institute at The Uinversity of Texas at Austin. This research was funded by the Carl D. Perkins Vocational and Technical Act of 1998 as administered by the Texas Higher Education Coordinating Board. ii DIGITAL GAME FORECAST >> February 2004 Table of Contents List of Tables ............................................................................................................................................. v List of Figures ..........................................................................................................................................
    [Show full text]
  • Flash Player and Linux
    Flash Player and Linux Ed Costello Engineering Manager Adobe Flash Player Tinic Uro Sr. Software Engineer Adobe Flash Player 2007 Adobe Systems Incorporated. All Rights Reserved. Overview . History and Evolution of Flash Player . Flash Player 9 and Linux . On the Horizon 2 2007 Adobe Systems Incorporated. All Rights Reserved. Flash on the Web: Yesterday 3 2006 Adobe Systems Incorporated. All Rights Reserved. Flash on the Web: Today 4 2006 Adobe Systems Incorporated. All Rights Reserved. A Brief History of Flash Player Flash Flash Flash Flash Linux Player 5 Player 6 Player 7 Player 9 Feb 2001 Dec 2002 May 2004 Jan 2007 Win/ Flash Flash Flash Flash Flash Flash Flash Mac Player 3 Player 4 Player 5 Player 6 Player 7 Player 8 Player 9 Sep 1998 Jun 1999 Aug 2000 Mar 2002 Sep 2003 Aug 2005 Jun 2006 … Vector Animation Interactivity “RIAs” Developers Expressive Performance & Video & Standards Simple Actions, ActionScript Components, ActionScript Filters, ActionScript 3.0, Movie Clips, 1.0 Video (H.263) 2.0 Blend Modes, New virtual Motion Tween, (ECMAScript High-!delity machine MP3 ed. 3), text, Streaming Video (ON2) video 5 2007 Adobe Systems Incorporated. All Rights Reserved. Widest Reach . Ubiquitous, cross-platform, rich media and rich internet application runtime . Installed on 98% of internet- connected desktops1 . Consistently reaches 80% penetration within 12 months of release2 . Flash Player 9 reached 80%+ penetration in <9 months . YUM-savvy updater to support rapid/consistent Linux penetration 1. Source: Millward-Brown September 2006. Mature Market data. 2. Source: NPD plug-in penetration study 6 2007 Adobe Systems Incorporated. All Rights Reserved.
    [Show full text]
  • Actionscript 3.0 from the Ground up Tour
    Adobe Presents Colin Moock’s ActionScript 3.0 From the Ground Up Tour Materials provided by O’Reilly Media, Inc. Welcome Key Learning Welcome to the ActionScript 3.0: From the Ground Up Tour! In collaboration with Colin Moock, FITC Design and Technology The following table lists some of today’s most important concepts. Events, O’Reilly, and participating academic institutions around the world, Adobe is thrilled to bring you this world-class day of training. Following the tradition of Flex Camp (http://flex.org/camp/) and the onAIR bus tour (http://onair.adobe.com/), this Concept Example lecture is an important part of Adobe’s ongoing initiative to bring knowledge to the development community. Classes are blueprints for objects. class VirtualPet { At Adobe, we understand that a tool is only useful when you know how to use it. And we’re committed to helping you gain that knowledge. So sit back, get ready for a high-paced day of learning, and most of all have fun! } Objects (or instances) are the things in a program, new VirtualPet() Links and Resources such as a number, a car, a button, a point in time The entire set of notes for today’s lecture are available at: Some classes are built into ActionScript, others are MovieClip, TextField, Sound, String custom-made. http://moock.org/lectures/groundUpAS3 A package contains a class so its name doesn’t package zoo { The code for the virtual zoo application can be obtained at: conflict with other names. class VirtualPet { http://moock.org/eas3/examples/moock_eas3_examples/virtualzoo_final } For a prose version of today’s lecture in book form, see Colin Moock’s Essential ActionScript 3.0 (O’Reilly, 2007).
    [Show full text]
  • Empirical Studies of Javascript-‐ Based Web Applicaxon
    Empirical Studies of JavaScript- based Web Applica8on Reliability Karthik Pa@abiraman1 Frolin Ocariza1 Kar.k Bajaj1 Ali Mesbah1 Benjamin Zorn2 1 University of Bri.sh Columbia (UBC), 2MicrosoE Research (MSR) Web 2.0 Applicaons Copyright: Karthik Paabiraman, 2014 Web 2.0 Applicaon: Amazon.com Menu Amazon’s Third party Search bar Web 2.0 applicaons allow rich UI funconality within a single web page own ad gadget ad Func8on Copyright: Karthik Paabiraman, 2014 Modern Web Applicaons: JavaScript • JavaScript: Implementaon of ECMAScript standard – Client-Side JavaScript: used to develop web apps • Executes in client’s browser – send AJAX messages • Responsible for web applicaon’s core func.onality • Not easy to write code in – has many “evil” features 4 Copyright: Karthik Paabiraman, 2014 JavaScript: History Brief History of JavaScript (Source: TomBarker.com) JavaScript (JS) had to “look like Java” only less so, be Java’s dumb kid brother or boy-hostage sidekick. Plus, I had to be done in ten days or something worse than JS would have happened – Brendan Eich (Inventor of JavaScript) Copyright: Karthik Paabiraman, 2014 • • 10000 20000 30000 40000 50000 60000 70000 80000 90000 Thousands of lines of code, oEen > 10,000 97 of the 0 Google YouTube Yahoo Baidu QQ MSN Amazon JavaScript: Prevalence Sina WordPress Alexa Ebay LinkedIn Bing MicrosoE Yandex 163 top 100 websites use JavaScript Copyright: Karthik Paabiraman, 2014 mail.ru PayPal FC2 Flickr IMDb Lines of code Apple Livedoor BBC Sohu go.com Soso Youku AOL CNN MediaFire ESPN MySpace MegaUpload Mozilla 4shared Adobe About LiveJournal Tumblr goDaddy CNET YieldManager Sogou Zedo Ifeng Pirate Bay ImageShack Weather NY Times Nelix JavaScript: “good” or “Evil” ? Vs Eval Calls (Source: Richards et al.
    [Show full text]
  • Optimizing Actionscript Bytecode Using LLVM
    Optimizing ActionScript Bytecode using Replace with LLVM a graphic White Master 5.5” Tall & 4.3” Wide 10/2/2009 Scott Petersen Adobe Systems, Inc. Copyright 2009 Adobe Systems Incorporated. All rights reserved. Adobe confidential. 1 ActionScript 3 . Adobe Flash/AIR app development language . EcmaScript based – “JavaScript with classes and types” . var x; // implicitly a variant – JS style . var x:int; // x is an int! . var x:*; // explicitly a variant . ActionScript Bytecode (ABC) reminiscent of JVM bytecode . Verified . Stack oriented . Object oriented ® Copyright 2009 Adobe Systems Incorporated. All rights reserved. Adobe confidential. 2 ActionScript 3 . JIT compiler + interpreter + garbage collector + basic support library in around 1.5M uncompressed, 600k compressed for x86 . Open Source Tamarin Project http://www.mozilla.org/projects/tamarin . Straightforward AS3 compiler . Effectively non-optimizing ® Copyright 2009 Adobe Systems Incorporated. All rights reserved. Adobe confidential. 3 ActionScript 3 Performance . Performance for AS => AS3 compiler + Tamarin JIT . Roughly 1.2% of native optimized C (Scimark2 numeric benchmark) . Performance for C => C/LLVM based frontend (Alchemy) + Tamarin JIT . Roughly 30% of native optimized C (Scimark2 numeric benchmark) . Performance for Java => javac + JRE 6 . Roughly 60% of native optimized C (Scimark2 numeric benchmark) ® Copyright 2009 Adobe Systems Incorporated. All rights reserved. Adobe confidential. 4 ActionScript 3 Performance . C code running on the Tamarin JIT is >20x faster than AS3! . Why is C code so fast on Tamarin? . Why is AS3 code so slow on Tamarin? . Alchemy generated code . Avoids some known performance pitfalls in Tamarin . AS3 has a variant type – boxing and unboxing is expensive – Alchemy avoids this . AS3 often does many object allocations, taxing the GC – Alchemy uses a single “ram” object with fast access opcodes .
    [Show full text]
  • Serious Games Advergaming, Edugaming, Training and More
    Serious games Advergaming, edugaming, training and more Project manager Laurent Michaud [email protected] M83708 – June 2008 Author Julian Alvarez, PhD Science of Communication and Information Contributor Laurent Michaud, Head of the digital leisure division Copyright IDATE 2008, BP 4167, 34092 Montpellier Cedex 5, France Tous droits réservés – Toute reproduction, stockage All rights reserved. None of the contents of this ou diffusion, même partiel et par tous moyens, y publication may be reproduced, stored in a retrieval compris électroniques, ne peut être effectué sans system or transmitted in any form, including accord écrit préalable de l'IDATE. electronically, without the prior written permission of IDATE. ISBN 978-2-84822-169-4 Executive Summary Serious Games Advergaming, edugaming, training and more This study outlines the characteristics, uses and different genres of serious game. It examines the challenges involved in the design, development and distribution of various types of titles, while analysing the outlook for the industry and its growth drivers. 600 million to one billion potential Defining serious gaming Areas addressed users worldwide. There is a huge variety of ways to classify Today, serious games are employed in a At the end of 2007, the global video serious gaming. However, accepting the wide variety of sectors. game industry was worth 30 billion ambiguities and possible challenges in- Defence: one of the most important USD. At the same time, the serious herent in this, this study defines serious areas in terms of client investment and gaming market was estimated to be gaming as follows: orders. Serious games are also used by worth between 1.5 and 10+ billion The purpose of a serious game is to armies in Europe, though less widely than USD.
    [Show full text]
  • Game Testing Evolves Solving Quality Issues in a Fast-Growing Industry
    Game testing evolves Solving quality issues in a fast-growing industry Bringing a new video game to market costs millions of dollars and takes many months of planning, developing, and testing resources. Testing plays one of the most crucial roles in the development of new video games. Testers put games through the paces while still in development and when finished, to ensure that gamers have a good experience. Game testers conduct QA to find mistakes, bugs and other problems that could annoy or turn off the gaming community if they are not fixed. Proper test management solutions like Polarion QATM software can improve the quality of gaming software exponentially while providing the benefits of instant communication and complete traceability between all artifacts. A white paper issued by: Siemens PLM Software www.siemens.com/polarion White paper | Game testing evolves Contents Executive summary ............................................................3 The challenge ....................................................................4 Solution .............................................................................5 Conclusion .........................................................................7 A white paper issued by: Siemens PLM Software 2 White paper | Game testing evolves Executive summary The global gaming industry has enjoyed phenomenal growth The role of a game tester and continues to be one of the fastest evolving industries. Video game testers play a crucial role in the development of However, it has also paid a price for its success – the produc- new games. Game testers put games through the paces while tion cost of game design and publication has increased expo- they are still in development to ensure that gamers have a nentially, leaving gaming companies with little room for error. good experience. They also conduct video game QA by finding mistakes, bugs and other problems that could annoy or turn Most small-to medium-size gaming companies are forced to off the gaming community if they are not addressed.
    [Show full text]
  • Inside the Video Game Industry
    Inside the Video Game Industry GameDevelopersTalkAbout theBusinessofPlay Judd Ethan Ruggill, Ken S. McAllister, Randy Nichols, and Ryan Kaufman Downloaded by [Pennsylvania State University] at 11:09 14 September 2017 First published by Routledge Th ird Avenue, New York, NY and by Routledge Park Square, Milton Park, Abingdon, Oxon OX RN Routledge is an imprint of the Taylor & Francis Group, an Informa business © Taylor & Francis Th e right of Judd Ethan Ruggill, Ken S. McAllister, Randy Nichols, and Ryan Kaufman to be identifi ed as authors of this work has been asserted by them in accordance with sections and of the Copyright, Designs and Patents Act . All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Trademark notice : Product or corporate names may be trademarks or registered trademarks, and are used only for identifi cation and explanation without intent to infringe. Library of Congress Cataloging in Publication Data Names: Ruggill, Judd Ethan, editor. | McAllister, Ken S., – editor. | Nichols, Randall K., editor. | Kaufman, Ryan, editor. Title: Inside the video game industry : game developers talk about the business of play / edited by Judd Ethan Ruggill, Ken S. McAllister, Randy Nichols, and Ryan Kaufman. Description: New York : Routledge is an imprint of the Taylor & Francis Group, an Informa Business, [] | Includes index. Identifi ers: LCCN | ISBN (hardback) | ISBN (pbk.) | ISBN (ebk) Subjects: LCSH: Video games industry.
    [Show full text]
  • Tion Thomas EA Graphics Lunch Presentation
    Tion Thomas EA Graphics Lunch Presentation Software Engineering Intern Central Technology Group – Apt Purdue University – MS ‘09 Mentor: Anand Kelkar Manager: Fazeel Gareeboo EA Company Overview Founded in 1982 Largest 3rd party game publisher in the world Net revenue of $3.67 billion in FY 2008 #1 mobile game publisher (acquired JAMDAT) Multi-Platform philosophy Has/owns development studios all over the globe: Bioware/Pandemic (Bioshock, Mercenaries) Criterion (Burnout, Black) Digital Illusions (Battlefield series) Tiburon (Madden) Valve (Half-Life) Crytek (Crysis) EA Company Overview cont… 4 Major Brands/Divisions: EA Sports (FIFA, Madden, NBA, NFL, Tiger Woods, NASCAR) EA Sports Freestyle (NBA Street, NFL Street, FIFA Street, SSX) EA (Medal of Honor, C&C, Need For Speed, SIMS, Spore, Dead Space) POGO (Casual web based games) Currently has 4 entries on the top selling franchises of all time list: #3 - Sims (100 million) #5 - Need For Speed (80 million) #7 – Madden (70 million) #9 - FIFA (65 million) EA Is Unique Sheer size breaks the traditional game developer paradigm Bound by multi-platform technology Long history with titles on almost every console that ever existed Most studios have annual cycles that cannot be broken Both developer and publisher with ownership in many huge studios Origin Of Tiburon Founded by 3 programmers in Longwood, FL First title was MechWarrior for SNES First Madden title was Madden 96 for Genesis, SNES Acquired by EA in 1998 How Tiburon Got Madden Originally, EA contracted Visual
    [Show full text]
  • Development Production Line the Short Story
    Development Production Line The Short Story Jene Jasper Copyright © 2007-2018 freedumbytes.dev.net (Free Dumb Bytes) Published 3 July 2018 4.0-beta Edition While every precaution has been taken in the preparation of this installation manual, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To get an idea of the Development Production Line take a look at the following Application Integration overview and Maven vs SonarQube Quality Assurance reports comparison. 1. Operating System ......................................................................................................... 1 1.1. Windows ........................................................................................................... 1 1.1.1. Resources ................................................................................................ 1 1.1.2. Desktop .................................................................................................. 1 1.1.3. Explorer .................................................................................................. 1 1.1.4. Windows 7 Start Menu ................................................................................ 2 1.1.5. Task Manager replacement ........................................................................... 3 1.1.6. Resource Monitor .....................................................................................
    [Show full text]