SlideShare ist ein Scribd-Unternehmen logo
1 von 10
UNICOM PurifyPlus
Robert J. Stewart IV
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 1
Safe Harbor Statement
Safe Harbor
In the course of our presentation, executive officers and other key employees of the company may discuss matters that are
deemed to be forward-looking statements under the law. While we always do our best to give accurate and balanced
presentations of the subject matter, actual views may differ from management’s view. Additional information about the subject
matter and project may be obtained via the internet.
Copyright Notice
Project UNICOM PurifyPlus (the Publication and associated materials) is a proprietary product of UNICOM Systems, Inc. The
Publication has been provided pursuant to Confidentiality Agreement containing restrictions on their use. The Publication and
associated materials contain valuable proprietary information of UNICOM Systems, Inc. and are protected by the United States
Federal and non-United States copyright laws. The Publication and associated materials may not be reproduced, copied,
changed, stored, disclosed to third parties, and distributed in any form or media (including but not limited to copies on
magnetic or electronic media) without expressed prior written permission of UNICOM Systems, Inc., 15535 San Fernando Blvd.,
Suite 310, Mission Hills, CA 91345 United States of America (818) 838-0606.
Project UNICOM PurifyPlus
© Copyright 2016 UNICOM Systems, Inc. All rights reserved. No part of this Publication may be reproduced in any form or by
electronic means, including the use of information storage and retrieval systems, without the express written consent and
authorization of UNICOM Global, Inc.
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 2
Table of Contents
 What is PurifyPlus?
 Key elements of PurifyPlus
 Understanding the language
 Competitors
 Value analysis
 Summary
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 3
What is PurifyPlus?
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved
 Software/Application
 Lines of code
 Processor
 Developers/Testers
4
Key Elements
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved
Purify
• Basic/Most Common
• Runtime error detector. Finds Bugs
Quantify
• Application profiling
• Highlights bottlenecks in performance
PureCoverage
• Source Code analysis
• Avoids shipping untested code
5
Purify Finding BugsQuantify scouting for
bottlenecks
PureCoverage reviewing
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved
Windows, Office,
Internet explorer
Photoshop,
Illustrator, Adobe
Premier
Mozilla Firefox
Parts of OS X, Parts
of iPod
GradesProgramming
6
Competitors
Insure++ Zoom Code
Analyst
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved
Vtune
Performance
analyzer
Parallel Studio
7
Value Analysis
• Sources code down to line level
• C, C++, .NET
• UNIXSpecs
• Reduces cost: Recalls, lost
customers
• Increase time to market
• Decrease time constraints
Value
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 8
Summary
 Three Key aspects
 Purify
 Quantify
 PureCoverage
 C, C++, .NET
 Market need
 Benefits
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 9
Thank You
©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 10

Weitere ähnliche Inhalte

Ähnlich wie UNICOM PurifyPlus

Data Migration Approach to SAP ISU CRM ECC.pdf
Data Migration Approach to SAP ISU CRM ECC.pdfData Migration Approach to SAP ISU CRM ECC.pdf
Data Migration Approach to SAP ISU CRM ECC.pdfssuser97273c
 
Business Process Model and Notation,BPMN2.0(Beta1)
Business Process Model and Notation,BPMN2.0(Beta1)Business Process Model and Notation,BPMN2.0(Beta1)
Business Process Model and Notation,BPMN2.0(Beta1)BPC流程社区
 
EWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdf
EWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdfEWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdf
EWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdfEqunix Business Solutions
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open SourceJody Garnett
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskSource Code Control Limited
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskProtecode
 
Midp Wirelessapps Wp
Midp Wirelessapps WpMidp Wirelessapps Wp
Midp Wirelessapps Wpguest14b56f
 
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?Jennifer O'Neill
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suitejeff cheng
 
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...Black Duck by Synopsys
 
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...South Tyrol Free Software Conference
 
composer-he-getting-started-rev-n
composer-he-getting-started-rev-ncomposer-he-getting-started-rev-n
composer-he-getting-started-rev-nNicholas Purdy
 
Introduction to the advanced search functionality of Joinup
Introduction to the advanced search functionality of JoinupIntroduction to the advanced search functionality of Joinup
Introduction to the advanced search functionality of JoinupEuropean Commission
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open SourceJody Garnett
 
OMG DDS Security Specification - 4th revised submission document
OMG DDS Security Specification - 4th revised submission documentOMG DDS Security Specification - 4th revised submission document
OMG DDS Security Specification - 4th revised submission documentGerardo Pardo-Castellote
 
Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...
Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...
Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...Shane Coughlan
 
OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINALOpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINALSource Code Control Limited
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GISJoanne Cook
 

Ähnlich wie UNICOM PurifyPlus (20)

Data Migration Approach to SAP ISU CRM ECC.pdf
Data Migration Approach to SAP ISU CRM ECC.pdfData Migration Approach to SAP ISU CRM ECC.pdf
Data Migration Approach to SAP ISU CRM ECC.pdf
 
Business Process Model and Notation,BPMN2.0(Beta1)
Business Process Model and Notation,BPMN2.0(Beta1)Business Process Model and Notation,BPMN2.0(Beta1)
Business Process Model and Notation,BPMN2.0(Beta1)
 
EWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdf
EWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdfEWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdf
EWTT22_ Apakah Open Source Cocok digunakan dalam Korporasi_.pdf
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Midp Wirelessapps Wp
Midp Wirelessapps WpMidp Wirelessapps Wp
Midp Wirelessapps Wp
 
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
 
08-01-09
08-01-0908-01-09
08-01-09
 
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
 
composer-he-getting-started-rev-n
composer-he-getting-started-rev-ncomposer-he-getting-started-rev-n
composer-he-getting-started-rev-n
 
Pwx 90 cdc_guide_for_luw
Pwx 90 cdc_guide_for_luwPwx 90 cdc_guide_for_luw
Pwx 90 cdc_guide_for_luw
 
Introduction to the advanced search functionality of Joinup
Introduction to the advanced search functionality of JoinupIntroduction to the advanced search functionality of Joinup
Introduction to the advanced search functionality of Joinup
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 
OMG DDS Security Specification - 4th revised submission document
OMG DDS Security Specification - 4th revised submission documentOMG DDS Security Specification - 4th revised submission document
OMG DDS Security Specification - 4th revised submission document
 
Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...
Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...
Using SW360 for OSS Compliance Management Process - A Toshiba Case Study for ...
 
OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINALOpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 

UNICOM PurifyPlus

  • 1. UNICOM PurifyPlus Robert J. Stewart IV ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 1
  • 2. Safe Harbor Statement Safe Harbor In the course of our presentation, executive officers and other key employees of the company may discuss matters that are deemed to be forward-looking statements under the law. While we always do our best to give accurate and balanced presentations of the subject matter, actual views may differ from management’s view. Additional information about the subject matter and project may be obtained via the internet. Copyright Notice Project UNICOM PurifyPlus (the Publication and associated materials) is a proprietary product of UNICOM Systems, Inc. The Publication has been provided pursuant to Confidentiality Agreement containing restrictions on their use. The Publication and associated materials contain valuable proprietary information of UNICOM Systems, Inc. and are protected by the United States Federal and non-United States copyright laws. The Publication and associated materials may not be reproduced, copied, changed, stored, disclosed to third parties, and distributed in any form or media (including but not limited to copies on magnetic or electronic media) without expressed prior written permission of UNICOM Systems, Inc., 15535 San Fernando Blvd., Suite 310, Mission Hills, CA 91345 United States of America (818) 838-0606. Project UNICOM PurifyPlus © Copyright 2016 UNICOM Systems, Inc. All rights reserved. No part of this Publication may be reproduced in any form or by electronic means, including the use of information storage and retrieval systems, without the express written consent and authorization of UNICOM Global, Inc. ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 2
  • 3. Table of Contents  What is PurifyPlus?  Key elements of PurifyPlus  Understanding the language  Competitors  Value analysis  Summary ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 3
  • 4. What is PurifyPlus? ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved  Software/Application  Lines of code  Processor  Developers/Testers 4
  • 5. Key Elements ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved Purify • Basic/Most Common • Runtime error detector. Finds Bugs Quantify • Application profiling • Highlights bottlenecks in performance PureCoverage • Source Code analysis • Avoids shipping untested code 5 Purify Finding BugsQuantify scouting for bottlenecks PureCoverage reviewing
  • 6. ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved Windows, Office, Internet explorer Photoshop, Illustrator, Adobe Premier Mozilla Firefox Parts of OS X, Parts of iPod GradesProgramming 6
  • 7. Competitors Insure++ Zoom Code Analyst ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved Vtune Performance analyzer Parallel Studio 7
  • 8. Value Analysis • Sources code down to line level • C, C++, .NET • UNIXSpecs • Reduces cost: Recalls, lost customers • Increase time to market • Decrease time constraints Value ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 8
  • 9. Summary  Three Key aspects  Purify  Quantify  PureCoverage  C, C++, .NET  Market need  Benefits ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 9
  • 10. Thank You ©Copyright 2016 UNICOM Systems, Inc. All Rights Reserved 10