SlideShare a Scribd company logo
Human Factors in Product Data Management Lakshmanan Lakshmanan M6603 – Human Factors Methods
Life Cycle of a Product
Why PDM? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why PDM? ,[object Object],[object Object],[object Object]
Industry Problems Suppliers & Customers ,[object Object],[object Object],[object Object],[object Object],[object Object],Designer Designer Designer Test Engineering Production Control Purchasing Sales Manager Design  & Engineering Manufacturing
What is PDM? ,[object Object],[object Object],[object Object]
What is PDM? ,[object Object],[object Object],Application of Usability Methods is a powerful way to improve efficiency of PDM systems
HF Methods for PDM ,[object Object]
HF Methods for PDM ,[object Object],[object Object]
HF Methods for PDM - 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HF Methods for PDM - 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HF Methods for PDM - 3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HF Methods for PDM - 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HF Methods for PDM - 5 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HF Methods for PDM - 6 ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],HF Methods for PDM - 7
Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],Questions?

More Related Content

What's hot

Usability Evaluation of Teletext
Usability Evaluation of TeletextUsability Evaluation of Teletext
Usability Evaluation of TeletextYOGESH TADWALKAR
 
Smas Hits May 11, 2009 Sensex Down 193 Points On Profit Booking
Smas Hits May 11, 2009 Sensex Down 193 Points On Profit BookingSmas Hits May 11, 2009 Sensex Down 193 Points On Profit Booking
Smas Hits May 11, 2009 Sensex Down 193 Points On Profit Booking
Jagannadham Thunuguntla
 
PRD Template for Product Managers
PRD Template for Product ManagersPRD Template for Product Managers
PRD Template for Product Managers
Ujjwal Trivedi
 
Usability engineering Usability testing
Usability engineering Usability testingUsability engineering Usability testing
Usability engineering Usability testing
REHMAT ULLAH
 
Design For Strangers
Design For StrangersDesign For Strangers
Design For Strangerstest99
 
What I Learned In Pr Writing
What I Learned In Pr WritingWhat I Learned In Pr Writing
What I Learned In Pr Writingcwhitin4
 
Designfo#{1} #{2}trangers
Designfo#{1} #{2}trangersDesignfo#{1} #{2}trangers
Designfo#{1} #{2}trangersguest0437b8
 
Designfor Strangers
Designfor StrangersDesignfor Strangers
Designfor Strangersguest08cd22
 
Defining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORSDefining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORS
Paul W. Johnson
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
Alan Dix
 
What is usability
What is usabilityWhat is usability
What is usability
Martin Puškáč
 
SMART Requirements
SMART RequirementsSMART Requirements
SMART Requirements
Harmony Brenner, ISTQB (CTFL)
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng Overview
Ian Sommerville
 
Mit3033 software architecture
Mit3033  software architectureMit3033  software architecture
Mit3033 software architecture
smumbahelp
 
Design rules and usability requirements
Design rules and usability requirementsDesign rules and usability requirements
Design rules and usability requirements
Andres Baravalle
 

What's hot (15)

Usability Evaluation of Teletext
Usability Evaluation of TeletextUsability Evaluation of Teletext
Usability Evaluation of Teletext
 
Smas Hits May 11, 2009 Sensex Down 193 Points On Profit Booking
Smas Hits May 11, 2009 Sensex Down 193 Points On Profit BookingSmas Hits May 11, 2009 Sensex Down 193 Points On Profit Booking
Smas Hits May 11, 2009 Sensex Down 193 Points On Profit Booking
 
PRD Template for Product Managers
PRD Template for Product ManagersPRD Template for Product Managers
PRD Template for Product Managers
 
Usability engineering Usability testing
Usability engineering Usability testingUsability engineering Usability testing
Usability engineering Usability testing
 
Design For Strangers
Design For StrangersDesign For Strangers
Design For Strangers
 
What I Learned In Pr Writing
What I Learned In Pr WritingWhat I Learned In Pr Writing
What I Learned In Pr Writing
 
Designfo#{1} #{2}trangers
Designfo#{1} #{2}trangersDesignfo#{1} #{2}trangers
Designfo#{1} #{2}trangers
 
Designfor Strangers
Designfor StrangersDesignfor Strangers
Designfor Strangers
 
Defining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORSDefining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORS
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
 
What is usability
What is usabilityWhat is usability
What is usability
 
SMART Requirements
SMART RequirementsSMART Requirements
SMART Requirements
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng Overview
 
Mit3033 software architecture
Mit3033  software architectureMit3033  software architecture
Mit3033 software architecture
 
Design rules and usability requirements
Design rules and usability requirementsDesign rules and usability requirements
Design rules and usability requirements
 

Similar to Human Factors In Groupware Applications

James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
David Julian
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
RobinsonObura
 
Plm rev5 innovation 2012
Plm rev5 innovation 2012Plm rev5 innovation 2012
Plm rev5 innovation 2012
David G Sherburne
 
Intelligent Document Processing in Healthcare. Choosing the Right Solutions.
Intelligent Document Processing in Healthcare. Choosing the Right Solutions.Intelligent Document Processing in Healthcare. Choosing the Right Solutions.
Intelligent Document Processing in Healthcare. Choosing the Right Solutions.
Provectus
 
Ui Design And Usability For Everybody
Ui Design And Usability For EverybodyUi Design And Usability For Everybody
Ui Design And Usability For EverybodyEmpatika
 
Feasible
FeasibleFeasible
Feasible
anasamirah
 
spm1.ppt
spm1.pptspm1.ppt
spm1.ppt
Vinoth Kumar
 
Standards Based Approach to User Interface Development
Standards Based Approach to User Interface DevelopmentStandards Based Approach to User Interface Development
Standards Based Approach to User Interface Development
Sameer Chavan
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
kamal
 
Game plan wkshp1
Game plan wkshp1Game plan wkshp1
Game plan wkshp1
Pankaj Gupta
 
SE.pdf
SE.pdfSE.pdf
SE.pdf
BdBangladesh
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
LPK Any Komputer
 
GEBSReporting-Case_Study_Healthcare_Company - Copy
GEBSReporting-Case_Study_Healthcare_Company - CopyGEBSReporting-Case_Study_Healthcare_Company - Copy
GEBSReporting-Case_Study_Healthcare_Company - CopyMikael Hylen
 
SE notes 2.pdf
SE notes 2.pdfSE notes 2.pdf
SE notes 2.pdf
KanwalAmern
 
Harmony = you can develop IT. This overview describes features, & shows how ...
Harmony =  you can develop IT. This overview describes features, & shows how ...Harmony =  you can develop IT. This overview describes features, & shows how ...
Harmony = you can develop IT. This overview describes features, & shows how ...
112Motion
 
Feasible
FeasibleFeasible
Feasible
Sayan Mandal
 
[2015/2016] Software systems engineering PRINCIPLES
[2015/2016] Software systems engineering PRINCIPLES[2015/2016] Software systems engineering PRINCIPLES
[2015/2016] Software systems engineering PRINCIPLES
Ivano Malavolta
 
RELM Overview
RELM OverviewRELM Overview
RELM Overview
IBM Rational software
 

Similar to Human Factors In Groupware Applications (20)

James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Plm rev5 innovation 2012
Plm rev5 innovation 2012Plm rev5 innovation 2012
Plm rev5 innovation 2012
 
Intelligent Document Processing in Healthcare. Choosing the Right Solutions.
Intelligent Document Processing in Healthcare. Choosing the Right Solutions.Intelligent Document Processing in Healthcare. Choosing the Right Solutions.
Intelligent Document Processing in Healthcare. Choosing the Right Solutions.
 
Ui Design And Usability For Everybody
Ui Design And Usability For EverybodyUi Design And Usability For Everybody
Ui Design And Usability For Everybody
 
Feasible
FeasibleFeasible
Feasible
 
spm1.ppt
spm1.pptspm1.ppt
spm1.ppt
 
Standards Based Approach to User Interface Development
Standards Based Approach to User Interface DevelopmentStandards Based Approach to User Interface Development
Standards Based Approach to User Interface Development
 
Cnpm bkdn
Cnpm bkdnCnpm bkdn
Cnpm bkdn
 
Kate Resume-7Page
Kate Resume-7PageKate Resume-7Page
Kate Resume-7Page
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
Game plan wkshp1
Game plan wkshp1Game plan wkshp1
Game plan wkshp1
 
SE.pdf
SE.pdfSE.pdf
SE.pdf
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
GEBSReporting-Case_Study_Healthcare_Company - Copy
GEBSReporting-Case_Study_Healthcare_Company - CopyGEBSReporting-Case_Study_Healthcare_Company - Copy
GEBSReporting-Case_Study_Healthcare_Company - Copy
 
SE notes 2.pdf
SE notes 2.pdfSE notes 2.pdf
SE notes 2.pdf
 
Harmony = you can develop IT. This overview describes features, & shows how ...
Harmony =  you can develop IT. This overview describes features, & shows how ...Harmony =  you can develop IT. This overview describes features, & shows how ...
Harmony = you can develop IT. This overview describes features, & shows how ...
 
Feasible
FeasibleFeasible
Feasible
 
[2015/2016] Software systems engineering PRINCIPLES
[2015/2016] Software systems engineering PRINCIPLES[2015/2016] Software systems engineering PRINCIPLES
[2015/2016] Software systems engineering PRINCIPLES
 
RELM Overview
RELM OverviewRELM Overview
RELM Overview
 

More from ESS

Affective Interaction
Affective Interaction Affective Interaction
Affective Interaction
ESS
 
Critical Decision Method (Cdm)
Critical Decision Method (Cdm) Critical Decision Method (Cdm)
Critical Decision Method (Cdm)
ESS
 
Functional Capacity Evaluation
Functional Capacity EvaluationFunctional Capacity Evaluation
Functional Capacity Evaluation
ESS
 
Cognitive Task Analysis Of Teams Team Cta 25648
Cognitive Task Analysis Of Teams Team Cta 25648Cognitive Task Analysis Of Teams Team Cta 25648
Cognitive Task Analysis Of Teams Team Cta 25648
ESS
 
Method For Measuring Tsa
Method For Measuring TsaMethod For Measuring Tsa
Method For Measuring Tsa
ESS
 
Measurement Of Mental Workload
Measurement Of Mental WorkloadMeasurement Of Mental Workload
Measurement Of Mental Workload
ESS
 
Exploratory Sequential Data Analysis2
Exploratory Sequential Data Analysis2Exploratory Sequential Data Analysis2
Exploratory Sequential Data Analysis2
ESS
 
Exploratory Sequential Data Analysis
 Exploratory Sequential Data Analysis Exploratory Sequential Data Analysis
Exploratory Sequential Data Analysis
ESS
 

More from ESS (8)

Affective Interaction
Affective Interaction Affective Interaction
Affective Interaction
 
Critical Decision Method (Cdm)
Critical Decision Method (Cdm) Critical Decision Method (Cdm)
Critical Decision Method (Cdm)
 
Functional Capacity Evaluation
Functional Capacity EvaluationFunctional Capacity Evaluation
Functional Capacity Evaluation
 
Cognitive Task Analysis Of Teams Team Cta 25648
Cognitive Task Analysis Of Teams Team Cta 25648Cognitive Task Analysis Of Teams Team Cta 25648
Cognitive Task Analysis Of Teams Team Cta 25648
 
Method For Measuring Tsa
Method For Measuring TsaMethod For Measuring Tsa
Method For Measuring Tsa
 
Measurement Of Mental Workload
Measurement Of Mental WorkloadMeasurement Of Mental Workload
Measurement Of Mental Workload
 
Exploratory Sequential Data Analysis2
Exploratory Sequential Data Analysis2Exploratory Sequential Data Analysis2
Exploratory Sequential Data Analysis2
 
Exploratory Sequential Data Analysis
 Exploratory Sequential Data Analysis Exploratory Sequential Data Analysis
Exploratory Sequential Data Analysis
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Human Factors In Groupware Applications

  • 1. Human Factors in Product Data Management Lakshmanan Lakshmanan M6603 – Human Factors Methods
  • 2. Life Cycle of a Product
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.