sss ssss rrrrrrrrrrr ssss ss rrrr rrrr sssss s rrrr rrrr ssssss rrrr rrrr ssssssss rrrr rrrr ssssss rrrrrrrrr s ssssss rrrr rrrr ss sssss rrrr rrrr sss sssss rrrr rrrr s sssssss rrrrr rrrrr +===================================================+ +======= Quality Techniques Newsletter =======+ +======= August 2004 =======+ +===================================================+ QUALITY TECHNIQUES NEWSLETTER (QTN) is E-mailed monthly to subscribers worldwide to support the Software Research, Inc. (SR), eValid, and TestWorks user communities and to other interested parties to provide information of general use to the worldwide internet and software quality and testing community. Permission to copy and/or re-distribute is granted, and secondary circulation is encouraged, provided that the entire QTN document/file is kept intact and this complete copyright notice appears in all copies. Information on how to subscribe or unsubscribe is at the end of this issue. (c) Copyright 2004 by Software Research, Inc. ======================================================================== Contents of This Issue o eValid: Recent News and Updates o International Workshop on Web Site Evolution (WSE 2004) o International Journal Web Services Research (JWSR) o 4th International Conference on Quality Software (QSIC 2004) o First International Workshop on Combining and Balancing Techniques for Engineering Service Quality o eValid: A Quick Summary o Practice and Experience in Applied Enterprise Information Assurance and Computer Security o The Montreal Conference on e-Technologies o QTN Article Submittal, Subscription Information ======================================================================== eValid: Latest News & Updates eValid is the premier WebSite Quality Testing & Analysis Suite. eValid solutions help organizations maintain e-Business presence, improve WebSite quality and performance, reduce down time, prevent customer loss, and control your costs. eValid's Web Analysis and Testing Suite is comprehensive, yet scalable and easy to use, and applies to a wide range of web applications. Built entirely inside an IE-compatible browser, realistic viewer experience results are 100% guaranteed. New Dashboard Status Displays ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ As web pages grow in complexity it becomes more and more important to have precise control of the eValid recording mode. Knowing the kind of object you are recording is crucial to achieving a reliable, repeatable, adaptable and robust test recording. To help achieve the best possible recordings the eValid Recording Mode Dashboard has been modified to show the current settings of important recording options. See: http://www.soft.com/eValid/Products/Documentation.40/GUI/dashboard.html#Record Now you can see, in one location, the current states of absolute and Element MouseOver recording, and of Left and Right Click recording in absolute mode. In addition, the dashboard shows you when you are recording in Application Mode. Page Tuning Monitoring Expanded ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ In addition to the CoreMetrics TopPage Monitor1 previously announced, we have added monitoring displays that analyze two other popular WebSites in the same way. The new reports are the Keynote TopPage Monitor1 and Gomez TopPage Monitor1. In all three monitoring activities the results available are hourly, 24 x 7 measurements for last mile timing of top top page download performance. For accuracy, the results are repeated in a script that performs the download 10 times [after clearing the initial cache contents and running with "Never Use" cache each time]. Each report shows the results of measurements every hour for the last 24 hours in this format: o Time. The hour (00, 01, ..., 23) during which the script was run. o Test Summary. The standard eValid Test Summary Report generated by the run. o Event Log. The HTML version of the complete eValid Event Log for the run. o Performance Chart. The performance chart shows the results of the sequence of downloads. Each "stack chart" in the display itemizes the complete download behavior for the page. See all the data for yourself at: http://www.soft.com/eValid/Customers/USA/K/Keynote/Monitor1/summary.html http://www.soft.com/eValid/Customers/USA/G/Gomez/Monitor1/summary.html http://www.soft.com/eValid/Customers/USA/C/Coremetrics/Monitor1/summary.html New 3D-SiteMap Update Introduces New Capabilities ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ The 3D-SiteMap portrays page-to-page dependency information that the eValid site analysis process obtains by systematically scanning a WebSite and then analyzing the dependencies between all of the pages it viewed. A new release of the eValid 3D-SiteMap display engine is now available. The new additions to the 3D-SiteMap engine include: o A capability to limit the displayed dependencies to an adjustable depth for children and/or parents of a chosen root node. o An option to show only the "immediate family" of a chosen root (base) URL. You can see a complete working example along with the updated 3D- SiteMap Summary Documentation at: http://www.soft.com/eValid/Products/Documentation.40/Mapping/3Dsitemap.html Command Line Switches and Error Codes Expanded ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ To support expanded use of eValid in monitoring applications and other unattended operational roles, we have added a number of new exit codes. The complete Playback Error Codes documentation gives all of the details. See http://www.soft.com/eValid/Products/Documentation.40/Technical/error.codes.html Of special note is the addition of error/exit codes for the new eV.Manager batch-mode to automatically repeat application of an test suite a fixed number of times in immediate succession. See the eV.Manager Command Line Switches description at: http://www.soft.com/eValid/Products/Documentation.40/Technical/interface.html#eV.Manager KB40 Full-WebSite Scan Data Available ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ We have completed detailed site analysis scans of the KB40 WebSites as part of our program of providing complete documentation about WebSite performance and quality. Each scan is accompanied with 14 separate eValid reports, including 3D-SiteMaps of the top portion of each WebSite. See: http://www.soft.com/eValid/Promotion/PublicScans/KB40.html The 40 WebSites scans showed a ~30:1 variation in achieved download speed, even when using a high-speed dedicated DSL connection. See also the Top-Page Benchmark Comparisons and the KB40 Backup Data at: http://www.soft.com/eValid/Benchmarks/OnePage/comparison.html http://www.soft.com/eValid/Benchmarks/OnePage/summary.html Script Catalog Offered ^^^^^^^^^^^^^^^^^^^^^^ To help new and experienced users alike we have put together a Script Catalog that shows typical eValid scripts in "ready to play" mode. To facilitate better understanding all scripts shown are reformatted and commented so that you can get a sense of what eValid scripts look like and how they work. The initial list of scripts includes those derived from the eValid "cookbook" script instructions plus those used in for self-training AUTOPLAY scripts. See: http://www.soft.com/eValid/Products/Support/Scripts/catalog.html> eValid users may click: Help > Documentation > User Manual and then navigate to the script catalog by clicking: Basics > Interface > Scripts Product Download Location, Details ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Here is the URL for downloading eValid if you want to start [or re- start] your evaluation: http://www.soft.com/eValid/Products/Download.40/down.evalid.40.phtml?status=FORM Contact Us With Your Questions ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ We welcome your questions about eValid and its applications. We promise a response to every question in one business day if you use the WebSite request form: http://www.soft.com/eValid/Information/info.request.html ======================================================================== International Workshop on Web Site Evolution (WSE 2004). http://www.websiteevolution.org/2004 WSE Program Details Invited Address: "Web Application Testing Beyond Tactics" Hung Quoc Nguyen (author of "Testing Applications on the Web" and "Testing Computer Software") Technical Session 1: Harry M. Sneed & Stephan H. Sneed, "Testing a Web Application" Paolo Tonella and Filippo Ricca, "A 2-Layer Model for the White-Box Testing of Web Applications Siddhartha Bedi and Pat Schroeder, "Observations on the Implementation and Testing of Scripted Web Applications" Technical Session 2: Scott Tilley, Damiano Distante, Shihong Huang, "Web Site Evolution via Transaction Reengineering" Holger M. Kienle, Daniel German, and Hausi M, "Web Site Reverse Engineering" Scott Barber, "Creating Effective Load Models for Performance Testing with Incomplete Empirical Data" Technical Session 3: Manpreet Sagoo, Miriam Capretz, Jagath Samarabandu, "PAWA: A Program Analysis Tool for Web Based Intranet Applications" G.A. Di Lucca, A. R. Fasolino, M. Mastroianni, an d P. Tramontana, "Identifying Cross Site Scripting Vulnerabilities in Web Applications" Invited Address and Panel: Hung Quoc Nguyen, "Web Application Testing Beyond Tactics" Cem Kaner, Scott Tilley, Harry M. Sneed, Peter Zimmerer, Panel: "Research Challenges in Testing Web Applications" ======================================================================== International Journal Web Services Research (JWSR) Official publication of the Information Resources Management Association Volume 1, Issue 4, October - December 2004 Editor-In-Chief: Liang-Jie Zhang, IBM, USA <http://www.idea-group.com> PREFACE "First Wave of Web Services Adoption in Research" Kwei-Jay Lin, University of California, Irvine, USA Janming Ho, Institute of Information Science, Academia Sinica, Taiwan Liang-Jie Zhang, IBM T. J. Watson Research Center, USA The interest and the demand for the Web services technology and the service-oriented architecture (SOA) are currently at an all-time high. By all measures, the Web services technology is marching in full force in the computer software industry. Four of the distinguished papers on Web services from EEE 2004 and the fifth one from a regular submission pool have been selected to appear in this issue of International Journal on Web Services Research. The papers cover important issues on: developing Web services, matching Web services, admitting Web services, replicating Web services, fine-tuning Web services, and composing Web services. Indeed, these papers have covered most of the major system engineering issues in using the Web service technology. PAPER ONE: "Model-Driven Web Service Development" Roy Grenmo, SINTEF, Norway David Skogan, SINTEF, Norway Ida Solheim, SINTEF, Norway Jon Oldevik, SINTEF, Norway Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of Web service technologies. Contemporary Web services are described in the Web Service Description Language (WSDL). However, WSDL documents can be difficult to understand for service developers. This article recommends a model-driven process for Web service development combining the graphical modeling language UML with WSDL. The Unified Modeling Language (UML) is developed by Object Management Group. In the process, Web service descriptions (in WDSL) are converted to UML; their UML models are integrated to form composite Web services; and then the new Web service descriptions are exported. The main contribution of this article is a "pure UML" modeling strategy supported by implementation of two-way conversion rules between the UML models and the WSDL documents. PAPER TWO: "Matchmaking for Business Processes Based on Choreographies" Andreas Wombacher, Integrated Publication & Info. Systems Institute, Germany Peter Fankhauser, Integrated Publication & Info. Systems Institute, Germany Bendick Mahleko, Integrated Publication & Info. Systems Institute, Germany Erich Neuhold, Integrated Publication & Info. Systems Institute, Germany Web services have a potential to enhance B2B e-commerce over the Internet by allowing companies and organizations to publish their business processes on service directories where potential trading partners can find them. This can give rise to new business paradigms based on ad-hoc trading relations as companies, particularly small to medium scale, can cheaply and flexibly enter into fruitful contracts, for example through subcontracting from big companies by simply publishing their business processes and the services they offer. More business process support by the Web service infrastructure is however needed before such a paradigm change can materialize. A service for searching and matchmaking of business processes does not yet exist in the current infrastructure. We believe that such a service is needed and will enable companies and organizations to be able to establish ad-hoc business relations without relying on manually negotiated interorganizational workflows. This article gives a formal semantics to business process matchmaking based on finite state automata extended by logical expressions associated to states. To obtain a copy of the entire article, click on the link below: http://www.idea-group.com/articles/details.asp?id PAPER THREE: "The Design of QoS Broker Algorithms for QoS-Capable Web Services" Tao Yu, University of California, Irvine, USA Kwei-Jay Lin, University of California, Irvine, USA QoS (quality of service) support in Web services is an important issue since it ensures service usability and utility for each client and, in addition, improves server utilization. In this article, we present a QoS-capable Web service architecture, QCWS, by introducing a QoS broker module between service clients and providers (servers). The functions of the QoS broker module include tracking QoS information about servers, making selection decisions for clients, and negotiating with servers to get QoS agreements. The authors study two resource allocation algorithms (HQ and RQ) used by QoS brokers acting as the front-end of servers. The goals of the algorithms are to maximize the server resource usage while minimizing the QoS instability for each client. The first algorithm, HQ, assigns a homogeneous service level to all clients on the system and adjusts the service level according to the number of active clients. The second algorithm, RQ, assigns different service levels to clients according to their needs. Both algorithms try to minimize the resource reallocations for existing clients. The QoS performance and instability trade-offs are studied by simulation. PAPER FOUR: "A Preliminary Study of Suppressing Redundant Nested Invocations from a Web Service with Active Replication" Chen-Liang Fang, Jin-Wen Institute of Technology, Taiwan & National Taiwan University of Science and Technology, Taiwan Deron Liang, National Taiwan University of Science & Technology, Taiwan & National Taiwan Ocean University, Keelung, Taiwan Chyouhwa Chen, National Taiwan University of Science & Technology, Taiwan PuSan Lin, National Taiwan Ocean University, Keelung, Taiwan Zwass (1996) suggested that middleware and message service is one of the five fundamental technologies used to realize electronic commerce (EC). The Simple Object Access Protocol (SOAP) is recognized as a more promising middleware for EC applications among other leading candidates such as CORBA. We notice that the fault- tolerance issue is somewhat neglected in the current standard, that is, SOAP 1.1. The authors therefore found a fault tolerant Web service called fault-tolerant SOAP or FT-SOAP through which Web services can be built with higher resilience to failure. Active replication is a common approach to building highly available and reliable distributed software applications. The redundant nested invocation (RNI) problem arises when servers in a replicated group issue nested invocations to other server groups in response to a client invocation. In this work, the authors find a mechanism to perform auto-suppression of redundant nested invocation in an active replication FT-SOAP system. The authors' approach ensures the portability requirement of a middleware, especially for FT-SOAP. The current design of the suppression mechanism itself does not consider the fault-tolerance issue. In other words, it suffers from the single-point of failure. Furthermore, the preliminary performance results indicates significant performance penalty due to inefficient SOAP invocations. More comprehensive experiments are needed to further investigate the feasibility of the current approach in the context of system performance. PAPER FIVE: "A Semi-Automatic Approach to Composite Web Services Discovery, Description and Invocation" Qianhui Liang, University of Florida, USA Lakshmi N. Chakarapani, University of Florida, USA Stanley Y. W. Su, University of Florida, USA Raman N. Chikkamagalur, University of Florida, USA Herman Lam, University of Florida, USA With the popularity of the Web services technology, more and more software systems' functionalities become available by being published and registered as Web services. Registered Web services need to be dynamically combined to form "composite services" when individual "simple services" fail to meet service requesters' complex service needs. In this article, the authors use a semi- automatic approach to composite Web services discovery, description and invocation. They present an intelligent registry with constraint matching capabilities to support composite service discovery and description. It provides a user interface to interactively compose a service request. It then uses a semi-automatic mechanism and a search algorithm to construct a composite service template that satisfies the request. The operations of the template are bound to registered service operations by constraint matching subsequently. The resulting composite service is specified in the Web Services Flow Language. A composite service processor is designed to execute composite services by invoking the component service operations of various service providers. ======================================================================== 4th International Conference on Quality Software QSIC 2004 http://qsic2004.tu-bs.de/ The 4th International Conference on Quality Software with a special focus on information systems, will take place 8-9 September, 2004, in Braunschweig, Germany We are looking forward to a fine program with keynote speeches from David Harel and Arne Solvberg, among others. Hans-Dieter Ehrich Program Co-Chair ======================================================================== First International Workshop on Combining and Balancing Techniques for Engineering Service Quality http://www.iese.fraunhofer.de/Events/COMBAT2004 September 27, 2004, Erfurt, Germany In conjunction with Net.ObjectDays 2004 http://www.netobjectdays.org/ MOTIVATION Over the last decades, numerous quality assurance techniques have been proposed, building a broad spectrum from various kinds of software inspections (peer reviews, walkthrough, desk checking) over testing approaches (structural testing, specification-based testing, boundary value testing, etc.) to formal methods (model checking, formal notations). All these quality techniques are quite different in the way they are applied in the software development cycle but they have the same overall goal: producing high quality software products. Thus, the different techniques could be perceived as a portfolio of available approaches that serve the same goal and thus can be combined into an integrated quality strategy to create the desired quality of a product. Even though single quality assurance techniques are well understood and have proven to be beneficial as individual techniques, the application of these techniques in combination has rarely been addressed. Currently, quality assurance techniques are often planned and applied in isolation without taking into account potential synergies and relationships with other quality assurance techniques. Moreover, the techniques are often planned and applied without taking into account the organizational restrictions and the domain context. If such factors are not considered, quality assurance gets unnecessarily expensive due to inefficient planning and usage of the techniques. Service-orientation is a recent development paradigm in software engineering. Developing such systems implies that the services are the driving part of the engineering process; i.e. the required services need to be analyzed and specified, system components need to be defined that realize certain services and these components are integrated in a service-oriented system architecture and implemented accordingly. Services should, therefore, be also the driving factor for quality assurance. The striking question is how to combine and balance quality assurance techniques in such a way that high quality of single services and high quality of the complete system can be achieved in a most efficient way. SCOPE AND OBJECTIVES The aim of the workshop is to establish a forum for practitioners and researchers to exchange experiences and discussing research approaches on how to combine and balance different quality assurance techniques in order to minimize costs and effort. The workshop will provide an opportunity for exchanging views, experiences, and lessons learned, and advancing ideas on topics dealing with the planning of a combined use of different quality assurance techniques and the definition of quality engineering strategies that take into account all relevant factors (domain and market constraints, organizational restrictions, quality needs). Topics of interest include, but are not limited to: - Implications of the domain on the perception of quality aspects - Planning and preparation of quality assurance activities in order to reduce effort and cost for quality assurance; i.e. how can the different techniques be balanced in an optimized way? - Relationships between quality aspects and quality assurance techniques, i.e. which quality assurance techniques should be used to address which quality aspects? - Experiences on organizational factors that influence the effectiveness and efficiency of quality assurance activities - Challenges of existing quality assurance techniques (especially testing and inspections) in the context of service.ti -2 -oriented systems - Lessons learned in applying quality assurance in different domains - Benefits and drawbacks of applying certain quality assurance techniques in different domains - Approaches to minimize the effort for quality assurance activities - Experiences on synergies between different quality assurance techniques - Comparing the costs and benefits of applying quality assurance techniques - Quality strategies that integrate/combine different quality assurance technique WORKSHOP ORGANIZERS * Christian Denger, Fraunhofer IESE, Germany * Ronny Kolb, Fraunhofer IESE, Germany * Dirk Muthig, Fraunhofer IESE, Germany ======================================================================== eValid: A Quick Summary http://www.e-valid.com eValid technology incorporates virtually every quality and testing functionality in a full-featured browser. Here is a summary of the main eValid benefits and advantages. o InBrowser(tm) Technology. All the test functions are built into the eValid browser. eValid offers total accuracy and natural access to "all things web." If you can browse it, you can test it. And, eValid's unique capabilities are used by a growing number of firms as the basis for their active services monitoring offerings. o Mapping and Site Analysis. The built-in WebSite spider travels through your website and applies a variety of checks and filters to every accessible page. All done entirely from the users' perspective -- from a browser -- just as your users will see your website. o Functional Testing, Regression Testing. Easy to use GUI based record and playback with full spectrum of validation functions. The eV.Manager component provides complete, natural test suite management. o LoadTest Server Loading. Multiple eValid's play back multiple independent user sessions -- unparalleled accuracy and efficiency. Plus: No Virtual Users! Single and multiple machine usages with consolidated reporting. o Performance Tuning Services. Outsourcing your server loading activity can surely save your budget and might even save your neck! Realistic scenarios, applied from multiple driver machines, impose totally realistic -- no virtual users! -- loads on your server. o Web Services Testing/Validation. eValid tests of web services start begin by analyzing the WSDL file and creating a custom HTML testbed page for the candidate service. Special data generation and analysis commands thoroughly test the web service and automatically identify a range of failures. o Desktop, Enterprise Products. eValid test and analysis engines are delivered at moderate costs for desktop use, and at very competitive prices for use throughout your enterprise. o HealthCheck Subscription. For websites up to 1000 pages, eValid HealthCheck services provide basic detailed analyses of smaller websites in a very economical, very efficient way. o eValidation Managed Service. Being introduced soon. the eValidation Managed WebSite Quality Service offers comprehensive user-oriented detailed quality analysis for any size website, including those with 10,000 or more pages. Resellers, Consultants, Contractors, OEMers Take Note We have an active program for product and service resellers. We'd like to hear from you if you are interested in joining the growing eValid "quality website" delivery team. We also provide OEM solutions for internal and/or external monitoring, custom-faced testing browsers, and a range of other possibilities. Let us hear from you! ======================================================================== Practice and Experience in Applied Enterprise Information Assurance and Computer Security Editors Professors Merrill Warkentin, Rayford B. Vaughn, Mississippi State University This book will bring together leading authoritative authors to address arguably our most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs. It will bridge the gap between theory and practice, between academia and industry, and between computer science and MIS. Its chapters will provide an integrated, holistic perspective on this complex set of challenges, combined with practical experiences of leading figures in industry and the military. Some of the chapters will provide rigorous research results, while others will be in-depth reports from the field, weaved into a practical collection of articles that will be valuable to scholars and students of IA and Computer Security, as well as to leaders of all organizations interested in creating and promoting secure environments for their employees, customers, and constituents. All chapters will be rigorously (blind) reviewed and carefully edited. Chapters in this compendium may include, but are not limited, to the following topics. 1. Proactive Computer System Security Management 2. Intrusion Detection Systems 3. Firewall Overview 4. Firewall Deployment 5. The DMZ/IPN 6. Security Engineering 7. Trusted Products and Assurance 8. The Application of Computing Forensics 9. The Law (Enforcement and Employment), including Sarbanes-Oxley and new legislation 10. Emerging User Authentication Methods, including Biometrics 11. Database Security 12. eCommerce Security 13. Software Security 14. Office Automation Security (procedures and practices) 15. The Wireless problem 16. Corporate Security Policy and Implementation 17. Centralized and Decentralized Computer Security Management Infrastructure 18. Leakage points in a Corporate environment 19. Hostile and Malicious Code 20. Vulnerability/Risk Assessments 21. Future Considerations Contact: Prof. Rayford B. Vaughn Department of Computer Science and Engineering Center for Computer Security Research (CCSR) PO Box 9637 Mississippi State University Mississippi State, MS 39762 [+1] (662) 325-7450 voice [+1] (662) 325-8997 fax ======================================================================== The Montreal Conference on e-Technologies (www.latece.uqam.ca/mcetech2005/) January 20th-21st, 2005, Montrial, Quibec, Canada The internet pervades much of the activities of modern societies and has become the preferred medium for the delivery of information and services. All kinds of applications, ranging from eBusiness, to eEducation or eGovernment, raise some of the same issues: the need for an open, yet secure, flexible, yet high-performance, and inter- operable, yet customizable infrastructure. The technologies of the day provide much of the software plumbing required to make it all work, but little of the software and methodological tools needed to build complex, end to end, inter-organizational applications, i.e. the sort of domain-independent, semantic middleware for the internet! This conference aims at bringing together researchers and practitioners interested in exploring the many facets of the problem. Original and inter-disciplinary approaches to these problems are highly encouraged. The conference also includes an industrial track, providing a forum for industrial researchers to present problems and case studies of the uses of Internet technologies in their business. Conference co-chairs: Rachida Dssouli, CIISE (Concordia Institute for Information Systems Engineering, www.ciise.concordia.ca), dssouli@ece.concordia.ca Hafedh Mili, LATECE (Laboratory for Technologies of eCommerce, www.latece.uqam.ca), hafedh.mili@uqam.ca Conference web site: www.latece.uqam.ca/mcetech2005/ Instructions to authors: www.latece.uqam.ca/mcetech2005/instructions-authors.html ======================================================================== ------------>>> QTN ARTICLE SUBMITTAL POLICY <<<------------ ======================================================================== QTN is E-mailed around the middle of each month to over 10,000 subscribers worldwide. To have your event listed in an upcoming issue E-mail a complete description and full details of your Call for Papers or Call for Participation at <http://www.soft.com/News/QTN-Online/subscribe.html> QTN's submittal policy is: o Submission deadlines indicated in "Calls for Papers" should provide at least a 1-month lead time from the QTN issue date. For example, submission deadlines for "Calls for Papers" in the March issue of QTN On-Line should be for April and beyond. o Length of submitted non-calendar items should not exceed 350 lines (about four pages). Longer articles are OK but may be serialized. o Length of submitted calendar items should not exceed 60 lines. o Publication of submitted items is determined by Software Research, Inc., and may be edited for style and content as necessary. DISCLAIMER: Articles and items appearing in QTN represent the opinions of their authors or submitters; QTN disclaims any responsibility for their content. TRADEMARKS: eValid, HealthCheck, eValidation, TestWorks, STW, STW/Regression, STW/Coverage, STW/Advisor, TCAT, and the SR, eValid, and TestWorks logo are trademarks or registered trademarks of Software Research, Inc. All other systems are either trademarks or registered trademarks of their respective companies. ======================================================================== -------->>> QTN SUBSCRIPTION INFORMATION <<<-------- ======================================================================== To SUBSCRIBE to QTN, to UNSUBSCRIBE a current subscription, to CHANGE an address (an UNSUBSCRIBE and a SUBSCRIBE combined) please use the convenient Subscribe/Unsubscribe facility at: <http://www.soft.com/News/QTN-Online/subscribe.html>. QUALITY TECHNIQUES NEWSLETTER Software Research, Inc. 1663 Mission Street, Suite 400 San Francisco, CA 94103 USA Phone: +1 (415) 861-2800 Toll Free: +1 (800) 942-SOFT (USA Only) FAX: +1 (415) 861-9801 Web: <http://www.soft.com/News/QTN-Online>