%PDF-1.6
%
1138 0 obj
<>/Metadata 1154 0 R/Outlines 116 0 R/Pages 1131 0 R/StructTreeRoot 121 0 R/Type/Catalog>>
endobj
1154 0 obj
<>stream
SASGF
Microsoft® Word 2013
When a company uses an automated production system for reporting, there is always a risk of having recurring errors due to issues with reports being submitted incorrectly. One way to reduce these errors is to use a code-checking program that assesses several aspects of a program before it is scheduled, including its compatibility with the production environment, inclusion of comments, and notification of security risks. In this paper, I discuss some of the methods that can be included in a code-checking program, as well as some methods for implementing these techniques. The first and most important is simulating a run in an automated production environment. We then look at analyzing the volume and completeness of comments in the code being tested. Also, we review methods to handle warnings and other non-critical issues that could be identified. Finally, we look at methods of checking for risky fields being used, including personal or financial Information, which need to have a limited distribution. <br/><br/>Thomas Hirsch, Magellan Health
Session 2798
en
jeff.foxx@sas.com
When a company uses an automated production system for reporting, there is always a risk of having recurring errors due to issues with reports being submitted incorrectly. One way to reduce these errors is to use a code-checking program that assesses several aspects of a program before it is scheduled, including its compatibility with the production environment, inclusion of comments, and notification of security risks. In this paper, I discuss some of the methods that can be included in a code-checking program, as well as some methods for implementing these techniques. The first and most important is simulating a run in an automated production environment. We then look at analyzing the volume and completeness of comments in the code being tested. Also, we review methods to handle warnings and other non-critical issues that could be identified. Finally, we look at methods of checking for risky fields being used, including personal or financial Information, which need to have a limited distribution. <br/><br/>Thomas Hirsch, Magellan Health
Microsoft® Word 2013
2018-03-20T22:34:30.000-06:00
2018-03-20T22:34:30.000-06:00
2018-04-03T15:47:13.670-04:00
75683f4b09e07c3de057670438f951798b7a8d6d
886880
application/pdf
2018-04-03T15:47:13.531-04:00
Thomas Hirsch
SAS GF ePresentation
How a Code-Checking Algorithm Can Prevent Errors
thirdparty
support:sgf-papers
year:2018
software:BASE
support:sgf-papers/session-type/e-poster
support:sgf-papers/topic/programming/general-programming
support:customer-roles/analyst
endstream
endobj
116 0 obj
<>
endobj
1131 0 obj
<>
endobj
121 0 obj
<>
endobj
122 0 obj
<>
endobj
123 0 obj
<>
endobj
124 0 obj
<>
endobj
125 0 obj
<>1121 0 R 1122 0 R 1123 0 R 1124 0 R 1125 0 R 1126 0 R 1127 0 R 1128 0 R 1129 0 R 1130 0 R]/P 690 0 R/Pg 7 0 R/S/Link>>
endobj
126 0 obj
<>689 0 R]/P 127 0 R/Pg 31 0 R/S/Link>>
endobj
127 0 obj
<>
endobj
31 0 obj
<>/MediaBox[0 0 612 792]/Parent 1134 0 R/Resources<>/Font<>/ProcSet[/PDF/Text]>>/Rotate 0/StructParents 13/Tabs/S/Type/Page>>
endobj
32 0 obj
<>stream
HWko8+0VDcgmmDJc`:}/)CZy_o__t~SuQT<=nY-hX^:Gt
(A">}Ohop|eH>0hP^Ą;0|E96}t?Px1#_vGbEacRl26 ې9Nl\MTzLFlX,IK^Iv.Ȯm4UtbFjG%Ae7n\K Xβ=NKƉO^/桒Udu祳Eb`꾋,~O49(cΑ9h0ZmӾm;YHouP6zvd2[UybF1`@9ĻKXDU@xrCؔ3HJ8st_tP֝,7TvYCcn0|J~0Aԃ+n_+AVw*];n Rl5U@ƌks9O3'st+`v<5>C"yiD8b)f!dI:\ fӫ0GonngM3(QEٜ`tufQ_3Hf"66v0Z+}9}J:E<*gT.wqrVU8Ecdtjwۈfpk85n: ?P0a^<0V?8p9 cĒȃn6w[ߟ27VG,D}J\
aRͳ]Zj a\e#inz[g