World Library  


 
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, October 2...

By: Kase Johnstun, Editor

Description: This issue of CrossTalk provides an in-depth look at the implementation and development of safety-critical software systems. It also explores how these systems will likely face unplanned challenges during long-term development, requiring developers to build flexibility into their approaches.

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, December ...

By: Capers Jones; Lloyd Huff; George Novak; Dr. Yun Tung Lau; Stephen Torri; Derek Sanders; Dr. Drew Hamilton; Gordon Evans; Alison A. Frost; Michael J. Campo

Description: Capers Jones discusses the need of every company to evaluate and consider best practices for maintenance and to avoid common worst practices; this article describes some of the revolutionary conclusions and products of an analysis of the sustainment for the F-35 and provides a look forward to performance-based sustainment of software for the multinational F-35 fleet; this article presents a set of reference metrics for measuring the quality of services in Se...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, December ...

By: Richard Turner, Barry Boehm, Tim Perkins, Roald Peterson, Larry Smith, Esther Derby, Johanna Rothman, Walt Lipke, Dennis Linscomb

Description: The agilists have it right in valuing individuals and interactions over processes and tools, say these authors. They cite people factors as the most critical success factors in software development and management; this article highlights the basic principles of measures and metrics as the key tools to understanding the behaviors, successes, and failures of programs and projects. A checklist is provided to help you develop a metrics program, and define and us...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, June 1999...

By: Captain Thomas Augustine, Charles Schroeder, Don Scott Lucero, Carol Dekkers, Mary Bradley, A. Todd Steadman, Elizabeth K. Bailey Clark, James A. Forbes, Emanuel R. Baker, Donald W. Hutcheson, Gregory T. Daich, Donald Przebowski, J. Michael Brower

Description: Poorly contrived measurements can make for poor decisions; a tool with the flexibility to support an effective, tailored measurement process; how people issues can cripple a measurement program or lead to its resounding success; implementing the necessary software process improvements required to achieve Level 2; an initial characterization of Department of Defense mission-critical software maintenance; putting out critical fires before they start; enhance d...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, January 2...

By: Elizabeth Starrett; Elizabeth Starrett; Dr. Lyle N. Long; Lulu He; Dr. Jeffrey C. Carver; Dr. Rayford B. Vaughn; Dr. Nancy R. Mead; Dr. Dan Shoemaker; Jeffrey A. Ingalsbe; Maj Christopher Bohn; Ph. D.; Roger Stewart; Lew Priven; Dr. Robert B. K. Dewar; Dr. Edmond Schonberg

Description: Meet CrossTalk’s 2008 co-sponsors; here is a list of CrossTalk’s article reviewers; long describes the need for more dedicated software engineering educational programs and professional software engineering certification programs in the United States; this article describes an experiment conducted in a graduate-level requirements engineering course to provide students a real world experience in requirements validation; this article discusses the results of a...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, February ...

By: Lieutenant Colonel Thomas M. Schorsch, Dr. David A. Cook, Dennis Ludwig, Richard Riehle, François Coallier, Dr. Paolo Donzelli, Elizabeth Starrett

Description: This article discusses the needs and forces that have shaped the evolution of programming languages, and the various evolutionary paths of current languages; after some real-world examples of how programming languages were chosen, this author provides some decision-making parameters that could be formalized into a decision table to aid in the programming language selection process; this article explains that the true intent behind abrogating the military's A...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, September...

By: Kase Johnstun, Editor

Description: Simply stated, absent secure and resilient software at the core of our cyber defenses, the nation’s critical infrastructure is at risk. Everything we do as a nation—from national defense to re-energizing the economy—depends on secure information technology systems and networks

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, October 2...

By: John Wunder, Dr. Will Tracz, Peter Winter, Richard L. Conn, Captain Greg Lindsey, Kevin Berk, Neil Potter, Mary Sakry, Kent Petersson, Tobias Persson, Dr. Bo I. Sanden, Don O'Neill, Kelly L. Smith

Description: Learn how to design an information architecture that provides the right information, in the right format, to the right person, at the right time, all through a secure access; the National System for Geospatial Intelligence has met the challenge to integrate disparate information sources and provide a common user view into imagery data; this article uses a real-world example of collaboration between people and smart devices in a teaching environment that is a...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, November ...

By: Michael S. Russell, Neeraj Sangal, Frank Waldman, Ilya Lipkin, Dr. A. Kris Huber, Dr. Hans Peter Hoffmann, Arlene F. Minkiewicz, Jeffrey Voas

Description: This author proposes using a repeatable, matrix-based approach to select the architecture products required to support a larger systems engineering effort, to define the content of each product, and to identify each product’s customer; this new approach using inter-module dependencies to specify and manage software architecture is simple, intuitive, and appears to scale better than currently used directed graph representations; these authors relate their exp...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, January-F...

By: Kase Johnstun, Editor

Description: I’ve heard the many arguments made in defense of agility versus process. This issue of CrossTalk will explore the virtues of both, also discussing the transformation and incorporation of process with other concepts, ideas, and process improvement efforts.

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, June 2006...

By: Capers Jones; Alan C. Jost; Timothy K. Perkins; Quentin W. Fleming; Joel M. Koppelman; Walt Lipke; Timothy G. Olson; Paul Kimmerly

Description: Applying a careful program of risk analysis and risk abatement can lower the effects of the technical and social issues that handicap projects and lower the probability of major software disasters; the failure to communicate is the root problem of more program failures than we allow ourselves to believe. This article uses the famous line from the movie Cool Hand Luke, “What we’ve got here is ... failure to communicate,” to illustrate communication failures a...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, July 2008...

By: Robert Lentz, the Honorable John G. Grimes, Thomas E. Anderson, the Dod Globalization Task Force Staff, the Dod Globalization Task Force Staff, Marianne Bailey, Anthony Bargar, George Bieber, Eustace D. King

Description: This article introduces the reader to the newly created Office of the Deputy Assistant Secretary of Defense for Information and Identity Assurance; this article describes recent strategic accomplishments of the President’s U.S. Committee on National Security Systems; see how the DoD Chief Information Officer has approached portfolio management for Information Assurance within the Global Information Grid; the DoD is working to develop solutions to manage risk...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Dr. Gerald M. Weinberg, Dr. Bill Curtis, Dr. William E. Hefley, Sally A. Miller, Virginia Slavin, Paul Kimmerly, Kasey Thompson, Juris Kelley, Diana Mekelburg

Description: This article explains how large systems-development projects fail when people destroy communication and control within an organization, either intentionally or not. The author also reveals where and when project managers can intervene with countermeasures; in the seven years since its release, the People Capability Maturity Model has become a road map for implementing practices that continually improve the capabilities of an organization's work force. if you...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, May 2006;...

By: Dr. Barry Boehm, Jo Ann Lane, Arlene F. Minkiewicz, Dr. Dylan Mcnamee, Cdr. Scott Heller, Dave Huff, Paul J. Solomon, Paul E. Mcmahon

Description: This article summarizes characteristics of 21st century software-intensive systems of systems and indicates some of the major problems associated with using the traditional acquisition processes on them, while introducing new acquisition development processes to address 21st century software-intensive systems of systems; this article provides guidelines to decision makers performing high-level analysis of system of systems costs in order to pursue the most a...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, October 2...

By: Rick Hefner, Ron Knode, Mary Schanken, Julia Allen, Christopher Alberts, Sandi Behrens, Barbara Laswell, William Wilson, Richard C. Linger, Robert J. Ellison, Thomas A. Longstaff, Nancy R. Mead, Moira West Brown, Shawn Hernan, Nancy Lee Hutchin, David B. Putman

Description: How the security community is applying the Systems Security Engineering Capability Maturity Model to help solve today's security issues; an emerging approach and activity set for establishing and maintaining network security; here is a systematic means to assess and improve system survivability for risk reduction; be prepared and proactive in detecting and responding to computer security incidents; despite the desire for more secure products, security often ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, September...

By: Robert C. Bamford, William J. Deibler, II, Karl E. Wiegers, Margaret Kulpa, Lewis Gray, Steve Neuendorf, Dave Zubrow, Randall W. Rice

Description: A method to choose the most appropriate software model for your organization; a plan of attack when your organization encounters symptoms of these process improvement killers; a candid look at common misconceptions concerning process improvement; how software process improvement coaches differ from sponsors, champions, and change agents; a fresh look at the often misunderstood practice of process improvement; meaningful metrics collection with specific busin...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 19...

By: Lieutenant Colonel Scott B. Dufaud, Thomas V. Ashton, George H. Wedberg, Captain Brian Hermann, Jim Russell, David B. Putman, Aaron B. Binkley, Stephen R. Schach, Elizabeth C. L. Starrett, Maj. Art Huber, Lieutenant Colonel Jay G. Santee

Description: Why the year 2000 problem could seriously threaten our nation's security--but only if we let it; how to officially certify that your year 2000 fixes have been successful; real-world lessons on how metrics can help improve processes, communication, and teamwork; metrics to determine when software products should move to their next major phase; increase savings and quality by aDing statistical controls to automated test programs; the coupling dependency metric...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, March 200...

By: Alan S. Koch, Carol A. Grojean, Ray Trechter, Iraj Hirmanpour, David Tuma, David R. Webb, Chris A. Rickets, Watts S. Humphrey

Description: If you are just beginning a Capability Maturity Model Integration initiative, the Team Software Process can help you to bootstrap your process definition activities and train your engineers to be capable and productive at defining the processes they use; the cost to train a Microsoft development team in the Team Software Process was more than paid for after the very first project the newly organized team ran; these authors provide a look at the rewards and c...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, October 2...

By: Gary M. Mcgraw; Nancy R. Mead; Samuel T. Redwine Jr.; Ronda R. Henning; Dr. Linda Ibrahim; Dr. Steven Hofmeyr; Dr. W. Scott Harrison; Dr. Nadine Hanebutte; Dr. Paul W. Oman; Dr. Jim Alves Foss; Alec Main; Dr. Chia Tien Dan Lo; Dr. Witawas Srisa An; Dr. J. Morris Chang; Zaid Dwaikat

Description: The Build Security In Software Assurance Initiative promotes less vulnerable software with security built in from the start; this article presents an initiative to assemble the knowledge to acquire, develop, and sustain secure software with functionality; the 16 practices presented in this article help establish a safety and security capability, identify and manage risks, and assure product safety and security throughout the life cycle; this author discusses...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: Watts S. Humphrey, Dr. Alistair Cockburn, Gerald M. Weinberg, Gary A. Petersen, Jamie Hohman, Dr. Hossein Saiedian, Paul Kimmerly, Dr. Linda Ibrahim

Description: We have yet to build an acceptable foundation of proven and generally followed principles in the field of software engineering. To begin developing this foundation, we need a process revolution; the best-known writers in the software field have been advocating the same four recommendations written in the “Agile Manifesto” for decades. While many in the field continue to ignore their recommendations, others are re-discovering their sage advice; though there h...

Read More
 
1
|
2
|
3
Records: 1 - 20 of 45 - Pages: 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Fair are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.