Figure 7: Throughput chart for fictitious software.

Back to Article