Search Results (25 titles)

Searched over 21.6 Million titles in 1.63 seconds

Federated Media Type
 
1999 (X) Fine Arts (X) CrossTalk Journal Collection (X) Government (X)

       
1
|
2
Records: 1 - 20 of 25 - Pages: 
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, November 2007; Volume 20, Issue 11 : Working as a Team: Working as a Team

By: Lieutenant Colonelnanette Patton, Allan Shechet, Jennifer Tucker, Hile Rutledge, Kasey Thompson, Tim Border, Margaret Kulpa, Dr. Richard D. Stutzke, Grace A. Lewis, Edwin Morris, Dr. Dennis B. Smith, Soumya Simanta, Lutz Wrage

Description: This article discusses conventional roles and responsibilities of the project sponsor and gives strategies project managers can employ to facilitate project success; this article approaches the role of motivation and emotion in maximizing team performance and presents an actionable and accessible approach for shaping both motivation and emotion; this article teaches how managers can build better, more efficient teams and successfully navigate the toughest project environments in tandem by reading a set of human gauges; Kulpa describes the People Capability Maturity Model and its necessity in addressing the need to integrate effective people practices with process and technology; this article describes two types of decision-making methods: voting and multi-criterion; this article outlines a set of common misconceptions about Service Oriented Architectures and suggests ways to more effectively address critical issues that potential users, developers, and acquisition officers may have....

Table of Contents: Working as a Team: Wisdom for Building the Project Manager/Project Sponsor Relationship: Partnership for Project Success; by LTC Nanette Patton and Allan Shechet. This article discusses conventional roles and responsibilities of the project sponsor and gives strategies project managers can employ to facilitate project success -- Shaping Motivation and Emotion in Technology Teams; by Jennifer Tucker and Hile Rutledge. This article approaches the role of motivation and emotion in maximizing team performance and presents an actionable and accessible approach for shaping both motivation and emotion -- The Gauge That Pays: Project Navigation and Team Building; by Kasey Thompson and Tim Border. This article teaches how managers can build better, more efficient teams and successfully navigate the toughest project environments in tandem by reading a set of human gauges -- Software Engineering Technology: Why Should I Use the People CMM?; by Margaret Kulpa. Kulpa describes the People Capability Maturity Model and its necessity in addressing the need to integrate effective people practices with process and technology -- Too...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, September 1999; Volume 12, Issue 9 : Providing a Common Platform for Building Interoperable Systems: Providing a Common Platform for Building Interoperable Systems

By: Pamela Engert, Julie Surer, Lieutenant Colonel Lucie M. J. Robillard, Dr. H. Rebecca Callison, John Maurer, Edward A. Addy, Dr. William H. Dashiell, Alka Jarvis, Dr. Vern J. Crandall, Cindy Snow, Dr. Richard Bechtold, Sherrie Chubin, Dr. Thomas I. Mcvittie, Robert B. Miller

Description: A foundation for building interoperable command and control systems; using DII COE to improve the effectiveness of systems performing real-time C2 missions; extending V&V from an individual application system to a product line of systems; a basic year 2000 test model with lessons learned; lack of quality controls in the design and coding stages has led to many of today's software problems; a fictional account of a contractor trying to avoid a software capability evaluation; an abstract on the overview of the DII COE kernel changes....

Table of Contents: DII COE: Introduction to the Defense Information Infrastructure (DII) Common Operating Environment (COE); by Pamela Engert and Julie Surer. A foundation for building interoperable command and control systems -- Extending the DII COE for Real-Time; by Lt. Col. Lucie M.J. Robillard, Dr. H. Rebecca Callison, John Maurer. Using DII COE to improve the effectiveness of systems performing real-time C2 missions -- Software Engineering Technology: Performing Verification and Validation in Architecture-Based Software Engineering; by Edward A. Addy. Extending V&V from an individual application system to a product line of systems -- A Y2K Integration Test Model; by Dr. William H. Dashiell. A basic year 2000 test model with lessons learned -- Open Forum: Who is to Blame for the Y2K and Similar Bugs?; by Alka Jarvis, Dr. Vern J. Crandall and Cindy Snow. Lack of quality controls in the design and coding stages has led to many of today's software problems -- The Five Stages of Denial; by Dr. Richard Bechtold. A fictional account of a contractor trying to avoid a software capability evaluation -- Web Addition: Overview of the DII ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, September 2007; Volume 20, Issue 9 : Service-Oriented Architectures: Service-Oriented Architectures

By: Karen Mercedes Goertzel, Grace A. Lewis, Dr. Dennis B. Smith, Michael S. Russell, Mitch Chan, John Michelsen, Nataraj Nagaratnam, Anthony Nadalin, Janet Mostow, Sridhar Muppidi

Description: This article both describes the content of Special Publication 800-95 and highlights its critical omissions in terms of measures needed to produce Web service software that is in and of itself secure; this article outlines four pillars to Service-Oriented Architecture (SOA) success and proposes how a Department of Defense organization can develop and implement an effective strategy for SOA implementation; this article emphasizes the need to implement services in a way that reflects the warfighter’s needs and expectations; this article describes how an SOA was successfully applied to re-use data and applications previously deployed in single-user, single-computer configurations; this article outlines several key strategies for leading the way to a true net-centric approach to SOA life-cycle quality and testing; merely securing the perimeter with firewalls or routers is not sufficient for a flexible business. Security remains one of the biggest challenges given the complexity of a Service Oriented Architecture (SOA)-based environment due to loose coupling of services and applications and their possible operations across t...

Table of Contents: Service-Oriented Architectures: The Security of Web Services as Software; by Karen Mercedes Goertzel. This article both describes the content of Special Publication 800-95 and highlights its critical omissions in terms of measures needed to produce Web service software that is in and of itself secure -- Four Pillars of Service-Oriented Architecture; by Grace A. Lewis and Dr. Dennis B. Smith. This article outlines four pillars to Service-Oriented Architecture (SOA) success and proposes how a Department of Defense organization can develop and implement an effective strategy for SOA implementation -- Defining Services Using the Warfighter’s Language; by Michael S. Russell. This article emphasizes the need to implement services in a way that reflects the warfighter’s needs and expectations -- Applying a Service-Oriented Architecture to Operational Flight Program Development; by Mitch Chan. This article describes how an SOA was successfully applied to re-use data and applications previously deployed in single-user, single-computer configurations -- Open Forum: For Net-Centric Operations, the Future Is Federated; by Joh...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, March 2007; Volume 20, Issue 3 : Software Security: Software Security

By: Robert A. Martin, James W. Moore, Robert C. Seacord, Kevin Sloan, Mike Ormerod, Idongesit Mkpong Ruffin, Dr. David A. Umphress, Kwok H. Cheng, Mel Crocker

Description: This article describes the ongoing creation of the Common Weakness Enumeration dictionary of software security weaknesses to serve as a unifying language of discourse and as a measuring stick for comparing tools and services of the industry; this article discusses the details of the current efforts created by the International Organization for Standardization/International Electrotechnical Commission and Computer Emergency Readiness Team to develop software security standards; this article describes how Common Criteria can be used as a framework for genesis of further assurance methods and shows how its philosophies have been adapted into a variety of pragmatic assurance techniques not just for single vendor solutions but for complete systems, sub-systems, network technologies, security architectures, and even managed service provisions; the authors explain how a blend of software security and software development is needed in practice, using three categories of tools to create such a blend: threat modeling, risk analysis, and security assessment and testing; this article reinforces the integrating of security activitie...

Table of Contents: Software Security: Being Explicit About Security Weaknesses; by Robert A. Martin. This article describes the ongoing creation of the Common Weakness Enumeration dictionary of software security weaknesses to serve as a unifying language of discourse and as a measuring stick for comparing tools and services of the industry -- Secure Coding Standards; by James W. Moore and Robert C. Seacord. This article discusses the details of the current efforts created by the International Organization for Standardization/International Electrotechnical Commission and Computer Emergency Readiness Team to develop software security standards -- How a Variety of Information Assurance Methods Delivers Software Security in the United Kingdom; by Kevin Sloan and Mike Ormerod. This article describes how Common Criteria can be used as a framework for genesis of further assurance methods and shows how its philosophies have been adapted into a variety of pragmatic assurance techniques not just for single vendor solutions but for complete systems, sub-systems, network technologies, security architectures, and even managed service provisions ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, November 2005; Volume 18, Issue 11 : Design : Architecture Processes Methods: Design : Architecture -- Processes -- Methods

By: Michael S. Russell, Neeraj Sangal, Frank Waldman, Ilya Lipkin, Dr. A. Kris Huber, Dr. Hans Peter Hoffmann, Arlene F. Minkiewicz, Jeffrey Voas

Description: This author proposes using a repeatable, matrix-based approach to select the architecture products required to support a larger systems engineering effort, to define the content of each product, and to identify each product’s customer; this new approach using inter-module dependencies to specify and manage software architecture is simple, intuitive, and appears to scale better than currently used directed graph representations; these authors relate their experience utilizing the Unified Modeling Language for design and automatic code generation, including general issues encountered and practical solutions; this article describes a Unified Modeling Language 2.0-based process that can be used to capture requirements and specify architecture, and uses model execution as a means for requirements verification and validation; here is an overview of the causes of security vulnerabilities in software, and how to assess what impact security constraints will have on your commercial off-the-shelf-based software projects; this author explores the interoperability problems created by defective commercial off-the-shelf software compo...

Table of Contents: Design: Selecting Architecture Products for a Systems Development Program; by Michael S. Russell. This author proposes using a repeatable, matrix-based approach to select the architecture products required to support a larger systems engineering effort, to define the content of each product, and to identify each product’s customer -- Dependency Models to Manage Software Architecture; by Neeraj Sangal and Frank Waldman. This new approach using inter-module dependencies to specify and manage software architecture is simple, intuitive, and appears to scale better than currently used directed graph representations -- UML Design and Auto-Generated Code: Issues and Practical Solutions; by Ilya Lipkin and Dr. A. Kris Huber. These authors relate their experience utilizing the Unified Modeling Language for design and automatic code generation, including general issues encountered and practical solutions -- UML 2.0-Based Systems Engineering Using a Model-Driven Development Approach; by Dr. Hans-Peter Hoffmann. This article describes a Unified Modeling Language 2.0-based process that can be used to capture requirements and s...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, October 2005; Volume 18, Issue 10 : Software Security: Software Security

By: Gary M. Mcgraw; Nancy R. Mead; Samuel T. Redwine Jr.; Ronda R. Henning; Dr. Linda Ibrahim; Dr. Steven Hofmeyr; Dr. W. Scott Harrison; Dr. Nadine Hanebutte; Dr. Paul W. Oman; Dr. Jim Alves Foss; Alec Main; Dr. Chia Tien Dan Lo; Dr. Witawas Srisa An; Dr. J. Morris Chang; Zaid Dwaikat

Description: The Build Security In Software Assurance Initiative promotes less vulnerable software with security built in from the start; this article presents an initiative to assemble the knowledge to acquire, develop, and sustain secure software with functionality; the 16 practices presented in this article help establish a safety and security capability, identify and manage risks, and assure product safety and security throughout the life cycle; this author discusses how an intrusion prevention system can fill the need for new technology defenses to protect against new information attack technologies; with the Multiple Independent Levels of Security safety architecture, guards act to filter and enforce information flow, allowing large systems to have partitions small enough to verify; application security is rising up to protect from the inside out by implementing defensive techniques into top-level applications and data; this article examines Java security models, describing security issues in garbage collection (GC), metrics used to predict program behaviors, and their relations. Heap memory attacks are introduced and classifi...

Table of Contents: Policies, News, and Updates: Engineering Security Into the Software Development Life Cycle; by Gary M. McGraw and Nancy R. Mead. The Build Security In Software Assurance Initiative promotes less vulnerable software with security built in from the start -- Creating a Software Assurance Body of Knowledge; by Samuel T. Redwine, Jr. This article presents an initiative to assemble the knowledge to acquire, develop, and sustain secure software with functionality -- Software Security: Designing for Disaster: Building Survivable Information Systems; by Ronda R. Henning. Designing survivability measures into an information system from the start allows continued operations through failure scenarios -- Sixteen Standards-Based Practices for Safety and Security; by Dr. Linda Ibrahim. The 16 practices presented in this article help establish a safety and security capability, identify and manage risks, and assure product safety and security throughout the life cycle -- The Information Technology Security Arms Race; by Dr. Steven Hofmeyr. This author discusses how an intrusion prevention system can fill the need for new technolog...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, September 2004; Volume 17, Issue 9 : The Software Edge : Enabling the Warfighter: The Software Edge : Enabling the Warfighter

By: Susan Weaver, Marcus Urioste, Dr. Yun Tung Lau, Dr. Doron Drusinsky, Dr. J. L. Fobes, Stephen J. Mellor, Douglas A. Ebert, David Schaar

Description: The F/A-18 aircraft platform's return to the Persian Gulf region has provided the opportunity to examine the U.S. Navy's success at providing capability growth through software upgrades versus hardware changes; the Tactical Tomahawk Weapon Control system is a next-generation system for planning and controlling Tomahawk cruise missile flight in a world of fast-changing targets; this article presents an architecture modeling approach for formulating service-oriented architectures such as those being developed on the global information grid; here is a formal method based on executable specifications as a way to ensure that an implementation is consistent with its specifications, including the ability to conduct automated computer-aided verification; the Executable and Translatable Unified Modeling Language lets developers formally test models to reduce defect rates from early execution of target-independent application models; senior managers rely on regular updates from their staff so they know what is going on, but how effective are these reports? Here is a set of questions that will help managers determine whether or no...

Table of Contents: The Software Edge: Software Wars; by Susan Weaver. The F/A-18 aircraft platform's return to the Persian Gulf region has provided the opportunity to examine the U.S. Navy's success at providing capability growth through software upgrades versus hardware changes -- Tomahawk Cruise Missile Control: Providing the Right Tools to the Warfighter; by Marcus Urioste. The Tactical Tomahawk Weapon Control system is a next-generation system for planning and controlling Tomahawk cruise missile flight in a world of fast-changing targets -- Service-Oriented Architecture and the C4ISR Framework; by Dr. Yun-Tung Lau. This article presents an architecture modeling approach for formulating service-oriented architectures such as those being developed on the global information grid -- Software Engineering Technology: Executable Specifications: Language and Applications; by Dr. Doron Drusinsky and Dr. J.L. Fobes. Here is a formal method based on executable specifications as a way to ensure that an implementation is consistent with its specifications, including the ability to conduct automated computer-aided verification -- Executable a...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, June 2004; Volume 17, Issue 6 : Assessments and Certifications: Assessments and Certifications

By: Robert Vickroy, Lauren Heinz, Dr. Linda Ibrahim, Joan Weszka, Scott A. Hissam, Dr. Curtis Cook, Shreenivasarao Prabhakararao, Martin Main, Mike Durham, Dr. Margaret Burnett, Dr. Gregg Rothermel, Don O'Neill, Dr. Yuri Chernak

Description: Based on his experience as a quality system appraiser, this author walks through the steps to acquiring ISO 9000 certification, including where and how to start, time, cost, and before-and-after expectations; this article uses advice from early adopters and model experts to help debunk several myths that may cause concern about upgrading from the Capability Maturity Model for Software to the CMM Integration model; these authors describe approaches taken at the Federal Aviation Administration and at Lockheed Martin to assure process improvement meets comprehensive needs across each company; this article introduces predictable assembly as it combines advances in software component technology and software architecture to automate many engineering activities in constructing predictable component-based systems; these authors describe their work in developing software engineering devices for spreadsheet developers, one of the largest classes of end-user programmers; as the debate over who pays for cybersecurity continues, this author proposes that vendors, users, and government must forge a shared vision spanning realistic as...

Table of Contents: Assessments and Certifications: Why Be Assessed to the Most Prevalent Standard in Use Today?; by Robert Vickroy. Based on his experience as a quality system appraiser, this author walks through the steps to acquiring ISO 9000 certification, including where and how to start, time, cost, and before-and-after expectations -- CMMI Myths and Realities; by Lauren Heinz. This article uses advice from early adopters and model experts to help debunk several myths that may cause concern about upgrading from the Capability Maturity Model for Software to the CMM Integration model -- There Is More to Process Improvement Than Just CMM; by Dr. Linda Ibrahim and Joan Weszka. These authors describe approaches taken at the Federal Aviation Administration and at Lockheed Martin to assure process improvement meets comprehensive needs across each company -- Software Engineering Technology: Predictable Assembly From Certifiable Components; by Scott A. Hissam. This article introduces predictable assembly as it combines advances in software component technology and software architecture to automate many engineering activities in construc...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, October 2003; Volume 16, Issue 10 : Information Sharing: Information Sharing

By: John Wunder, Dr. Will Tracz, Peter Winter, Richard L. Conn, Captain Greg Lindsey, Kevin Berk, Neil Potter, Mary Sakry, Kent Petersson, Tobias Persson, Dr. Bo I. Sanden, Don O'Neill, Kelly L. Smith

Description: Learn how to design an information architecture that provides the right information, in the right format, to the right person, at the right time, all through a secure access; the National System for Geospatial Intelligence has met the challenge to integrate disparate information sources and provide a common user view into imagery data; this article uses a real-world example of collaboration between people and smart devices in a teaching environment that is adaptable The Defense Repair Information Logistics System is a specialized Web-based application to collect, store, and retrieve Air Force depot and field maintenance data that especially benefits data entry personnel; this article discusses strategies you can use to make documentation work for you, including examples of project and process documentation; these authors discuss how they used four design patterns to construct a radar system that can withstand the replacement of hardware and operating system software, and is adaptable to different requirements....

Table of Contents: Information Sharing: An Information Architecture Strategy; by John Wunder and Dr. Will Tracz. Learn how to design an information architecture that provides the right information, in the right format, to the right person, at the right time, all through a secure access -- Warfighter's Access to Geospatial Intelligence; by Peter Winter. The National System for Geospatial Intelligence has met the challenge to integrate disparate information sources and provide a common user view into imagery data -- Effective Collaboration: People Augmented by Technology; by Richard L. Conn. This article uses a real-world example of collaboration between people and smart devices in a teaching environment that is adaptable to the global community -- Serialized Maintenance Data Collection Using DRILS; by Capt. Greg Lindsey and Kevin Berk. The Defense Repair Information Logistics System is a specialized Web-based application to collect, store, and retrieve Air Force depot and field maintenance data that especially benefits data entry personnel -- Best Practices: The Documentation Diet; by Neil Potter and Mary Sakry. This article discusse...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, March 2003; Volume 16, Issue 3 : The Case of Quality Software: The Case of Quality Software

By: David N. Card, Dr. Kenneth D. Shere, Gary E. Mogyorodi, Don O'Neill, Dr. Randall W. Jensen, Ingmar Ogren, Gary E. Mogyorodi

Description: This article presents two simple approaches to measuring and modeling software quality across the project life cycle so that it can be made visible to management. Both approaches include developing a life-cycle defect profile; although largely ignored by the government, Lean Six Sigma offers many benefits to system acquisition that this author says should not be ignored, including a bottom-line focus and requirements critical to customers; here is an overview of the requirements-based testing process aimed at project managers, development managers, developers, test managers, and test practitioners who want to apply it in their organizations; using defined measurements, this article shows how an organization with solid parameters for software inspection return on investment can derive its own return-on-investment metric; using his own experience, this author shows how he was able to improve programmer productivity and reduce defects in a large software organization using pair programming techniques; this article discusses how a simplified version of the Unified Modeling Language component diagram can connect the three JT...

Table of Contents: Quality Software: Managing Software Quality With Defects; by David N. Card. This article presents two simple approaches to measuring and modeling software quality across the project life cycle so that it can be made visible to management. Both approaches include developing a life-cycle defect profile -- Lean Six Sigma: How Does It Affect the Government?; by Dr. Kenneth D. Shere. Although largely ignored by the government, Lean Six Sigma offers many benefits to system acquisition that this author says should not be ignored, including a bottom-line focus and requirements critical to customers -- What Is Requirements-Based Testing?; by Gary E. Mogyorodi. Here is an overview of the requirements-based testing process aimed at project managers, development managers, developers, test managers, and test practitioners who want to apply it in their organizations -- Determining Return on Investment Using Software Inspections; by Don O'Neill. Using defined measurements, this article shows how an organization with solid parameters for software inspection return on investment can derive its own return-on-investment metric -- Be...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, May 2002; Volume 15, Issue 5 : Forging the Future of Defense through Technology: Forging the Future of Defense Through Technology

By: Dr. Richard Turner, Dr. Barry Boehm, Dr. Daniel Port, Apurva Jain, Dr. Victor Basili, Kevin J. Fitzgerald, Dr. Linda H. Rosenberg, Randall W. Rice, Dr. Rayford B. Vaughn Jr., Ambareen Sira, Dr. David A. Dampier, Dr. Wilfred J. Hansen

Description: This article presents the results of one study to measure the degree to which best practice adoption is used in existing defense acquisitions; when the spiral model and MBASE are combined with the Experience Factory, the result is the unified Center for Empirically Based Software Engineering method; to protect against cyberattacks, the DoD needs secure information management systems for increasingly sensitive shared data, while also protecting critical infrastructures; this article paints the entire picture of software quality assurance, including safety, reliability, independent verification and validation, and metrics; this article examines trouble spots in capture/playback test automation tools in an effort to mitigate the risks of tool abandonment; readers learn how to better apply measures or metrics to reliably depict the assurance associated with a specific hardware and software architecture; these workshops recommend a number of steps to aid in Department of Defense acquisitions....

Table of Contents: Best Practices: A Study of Best Practice Adoption by Defense Acquisition Programs; by Dr. Richard Turner. This article presents the results of one study to measure the degree to which best practice adoption is used in existing defense acquisitions -- Achieving CMMI Level 5 Improvements with MBASE and the CeBASE Method; by Dr. Barry Boehm, Dr. Daniel Port, Apurva Jain, and Dr. Victor Basili. When the spiral model and MBASE are combined with the Experience Factory, the result is the unified Center for Empirically Based Software Engineering method -- Software Engineering Technology: U.S. Defense Department Requirements for Information Security; by Kevin J. Fitzgerald. To protect against cyberattacks, the DoD needs secure information management systems for increasingly sensitive shared data, while also protecting critical infrastructures -- What is Software Quality Assurance?; by Dr. Linda H. Rosenberg. This article paints the entire picture of software quality assurance, including safety, reliability, independent verification and validation, and metrics -- Surviving the Top 10 Challenges of Software Test Automation; ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, November 2001; Volume 14, Issue 11 : Distributed Software Development: Distributed Software Development

By: Paul E. Mcmahon, Dr. Douglas C. Schmidt, Dr. Richard E. Schantz, Michael W. Masters, Dr. Joseph K. Cross, David C. Sharp, Lou P. Dipalma, Dr. Thomas J. Croak, Dr. Lon D. Gowen, Hillel Glazer

Description: This article provides an overview of key issues and challenges managers and project engineers face when using distributed development efforts to overcome a shrinking engineering workforce; this article describes how adaptive and reflective middleware systems are being developed to bridge the gap between military application programs and the underlying operating systems and communication software, thus providing reusable services critical to network-centric combat systems; need help choosing and fine tuning a Common Object Request Broker Architecture (CORBA) Object Request Broker? This article looks at 10 software architecture variability dimensions that cause different behaviors in CORBA; a three-month study by MITRE assessing the state of the practice in staffing levels for maintaining a computer-networking infrastructure (CNI) showed that typical CNIs have a 1:42 ratio of support staff to users; this article suggests a new approach to bridge the gap between the Capability Maturity Model® and Extreme Programming that achieves process discipline without sacrificing the speed of development....

Table of Contents: Distributed Software Development: Distributed Development: Insights, Challenges, and Solutions; by Paul E. McMahon. This article provides an overview of key issues and challenges managers and project engineers face when using distributed development efforts to overcome a shrinking engineering workforce -- Toward Adaptive and Reflective Middleware for Network-Centric Combat Systems; by Dr. Douglas C. Schmidt, Dr. Richard E. Schantz, Michael W. Masters, Dr. Joseph K. Cross, David C. Sharp, and Lou P. DiPalma. This article describes how adaptive and reflective middleware systems are being developed to bridge the gap between military application programs and the underlying operating systems and communication software, thus providing reusable services critical to network-centric combat systems -- Factors to Consider When Selecting CORBA Implementations; by Dr. Thomas J. Croak. Need help choosing and fine tuning a Common Object Request Broker Architecture (CORBA) Object Request Broker? This article looks at 10 software architecture variability dimensions that cause different behaviors in CORBA -- Software Engineering Te...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, October 2001; Volume 14, Issue 10 : Open and Common Software Systems: Open and Common Software Systems

By: Judy Kerner, Doug Gardner, Dr. Gregory Frazier, Lieutenant Colonel Lucie M. J. Robillard, Dr. H. Rebecca Callison, Marilynn B. Goo, John Maurer, Ingmar Ögren

Description: Here is what you need to know to begin understanding Joint Technical Architecture in system development, including compliance and achieving system interoperability; this article describes how the four basic principles of the Common Operating Environment (COE) are addressed in its development process as it responds to past successes and evolving open frameworks; for those new to Defense Information Infrastructure (DII), here is an overview of its prominent features and how to use its common operating environment to build a computing system with reusable software components; this article describes products, processes, tools, and techniques that have been developed to meet the integrators' needs for Defense Information Infrastructure Common Operating Environment-compliant real-time systems; this article is an introduction to dominant battlefield awareness (DBA), and how it is used to define a ""Build DBA"" mission, including how abilities are connected to mission completion....

Table of Contents: Open and Common Software Systems: Joint Technical Architecture: Impact on Department of Defense Programs; by Judy Kerner. Here is what you need to know to begin understanding Joint Technical Architecture in system development, including compliance and achieving system interoperability -- The DII COE: Basic Priciples and Future Challenges; by Doug Gardner. This article describes how the four basic principles of the Common Operating Environment (COE) are addressed in its development process as it responds to past successes and evolving open frameworks -- The DII COE: An Enterprise Framework; by Dr. Gregory Frazier. For those new to Defense Information Infrastructure (DII), here is an overview of its prominent features and how to use its common operating environment to build a computing system with reusable software components -- DII COE for Real Time: Becoming Reality; by Lt. Col. Lucie M.J. Robillard, Dr. H. Rebecca Callison, Marilynn B. Goo, and John Maurer. This article describes products, processes, tools, and techniques that have been developed to meet the integrators' needs for Defense Information Infrastructu...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, December 2007; Volume 20, Issue 12 : Software Sustainment: Software Sustainment

By: Capers Jones; Lloyd Huff; George Novak; Dr. Yun Tung Lau; Stephen Torri; Derek Sanders; Dr. Drew Hamilton; Gordon Evans; Alison A. Frost; Michael J. Campo

Description: Capers Jones discusses the need of every company to evaluate and consider best practices for maintenance and to avoid common worst practices; this article describes some of the revolutionary conclusions and products of an analysis of the sustainment for the F-35 and provides a look forward to performance-based sustainment of software for the multinational F-35 fleet; this article presents a set of reference metrics for measuring the quality of services in Service-Oriented Architectures; this article describes the three major techniques of Java obfuscation used in present state-of-the-art tools; this article provides samplings of derived defect measures with steps on how to create them....

Table of Contents: Software Sustainment: Geriatric Issues of Aging Software; by Capers Jones. Capers Jones discusses the need of every company to evaluate and consider best practices for maintenance and to avoid common worst practices -- Performance-Based Software Sustainment for the F-35 Lightning II; by Lloyd Huff and George Novak. This article describes some of the revolutionary conclusions and products of an analysis of the sustainment for the F-35 and provides a look forward to performance-based sustainment of software for the multinational F-35 fleet -- Reference Metrics for Service-Oriented Architectures; by Dr. Yun-Tung Lau. This article presents a set of reference metrics for measuring the quality of services in Service-Oriented Architectures -- Software Engineering Technology: A Primer on Java Obfuscation; by Stephen Torri, Derek Sanders, Dr. Drew Hamilton, and Gordon Evans. This article describes the three major techniques of Java obfuscation used in present state-of-the-art tools -- Advancing Defect Containment to Quantitative Defect Management; by Alison A. Frost and Michael J. Campo. This article provides samplings of ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, February 2006; Volume 19, Issue 2 : A New Twist on Today's Technology: A New Twist on Today's Technology

By: Dr. John A. Hamilton Jr., Dr. Kelvin Nilsen, Dr. Alistair Cockburn, Roy K. Clemmons, Dr. Randall W. Jensen, Lawrence H. Putnam Sr., William Roetzheim

Description: This article discusses how to leverage the mandated Department of Defense Architecture Framework (DoDAF) architectures for the basis of information assurance architecture rather than undertake a costly independent information assurance effort; this article evaluates the benefits of a proposed specification for safety-critical Java in terms of reliable, available, maintainable, and safe (RAMS) principles over alternative approaches based on C, C++, traditional Java, or Real-Time Specification for Java; use the model in this article to track projects by reporting on different team strategies in the same format and by creating a spreadsheet of estimates and plans that is easily updated using automated tools; this article provides an introduction to the Use Case Points method that employs a project’s use cases to produce a reasonable estimate of a project’s complexity and required man-hours; this article compares the approach taken by three widely used models for software cost and schedule estimation. Each of the models is compared to a common framework of first-, second-, and third-order models to maintain consistency in t...

Table of Contents: A NewTwist on Today’s Technology: DoDAF-Based Information Assurance Architectures; by Dr. John A. Hamilton Jr. This article discusses how to leverage the mandated Department of Defense Architecture Framework (DoDAF) architectures for the basis of information assurance architecture rather than undertake a costly independent information assurance effort -- Applying RAMS Principles to the Development of a Safety-Critical Java Specification; by Dr. Kelvin Nilsen. This article evaluates the benefits of a proposed specification for safety-critical Java in terms of reliable, available, maintainable, and safe (RAMS) principles over alternative approaches based on C, C++, traditional Java, or Real-Time Specification for Java -- A Governance Model for Incremental, Concurrent, or Agile Projects; by Dr. Alistair Cockburn. Use the model in this article to track projects by reporting on different team strategies in the same format and by creating a spreadsheet of estimates and plans that is easily updated using automated tools -- Project Estimation With Use Case Points; by Roy K. Clemmons. This article provides an introduction ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 2003; Volume 16, Issue 8 : Network-Centric Architecture: Network-Centric Architecture

By: Michael Acton, Dr. Malcolm Morrison, Dr. Joel Sherrill, Ron O'Guin, Deborah A. Butler, Eric Z. Maass, Bradley C. Logan, Gregory T. Daich

Description: This article defines high availability and offers approaches for producing maintainable, highly available Web applications to serve the warfighter, including an architecture that designs away all single points of failure; to support the U.S. Army's Future Combat Systems program, a versatile, modular fire control software architecture is being developed that is capable of satisfying the flexibility and rapid mission reconfiguration requirements of this future combat vision; this author breaks down the daunting move to enterprise engineering into a series of basic techniques of enterprise application development, which is exemplified in this article of lessons learned from the U.S. Air Force's Global Combat Support System enterprise; this article discusses the benefits of basing platforms and systems on the Strategic Architecture Reference Model: a communication and information architecture framework based upon commercial and government interface standards, including its use, contents, and structure; this article explains how to minimize test combinations using a new spreadsheet tool that can be used immediately on softwa...

Table of Contents: Network-Centric Architecture: Designing Highly Available Web-Based Software Systems; by Michael Acton. This article defines high availability and offers approaches for producing maintainable, highly available Web applications to serve the warfighter, including an architecture that designs away all single points of failure -- A Fire Control Architecture for Future Combat Systems; by Dr. Malcolm Morrison, Dr. Joel Sherrill, Ron O'Guin, and Deborah A. Butler. To support the U.S. Army's Future Combat Systems program, a versatile, modular fire control software architecture is being developed that is capable of satisfying the flexibility and rapid mission reconfiguration requirements of this future combat vision -- Enterprise Engineering: U.S. Air Force Combat Support Integration; by Eric Z. Maass. This author breaks down the daunting move to enterprise engineering into a series of basic techniques of enterprise application development, which is exemplified in this article of lessons learned from the U.S. Air Force's Global Combat Support System enterprise -- Technical Reference Model for Network-Centric Operations; by ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, June 2005; Volume 18, Issue 6 : Reality Computing: Reality Computing

By: Colonel Kenneth L. Alford Ph. D., Terry Bollinger, Lynn Sanderfer, Rich Mccabe, Mike Polen, David Herron, David Garmus, Dr. Babak Makkinejad, Paul Kimmerly, Gregory D. Burke, William H. Howard, Walt Lipke

Description: This author outlines how personal digital assistants (PDAs) are used in the military, future uses, procurement considerations, developing PDA resource material, and more; here are seven defensive strategies to reduce the risk from hardcore spyware invading your home and small business systems; this article addresses the Unified Modeling Language and its purpose, constructs, and application to defense software development applications; this author describes some typical pitfalls of object-oriented development and recommends a number of architectural practices that will help programs avoid or mitigate these dangers; here is how three different organizations used a combination of quantitative measures and qualitative values to identify their best practices, then used these results to improve their performance; this author recommends ways to capture and record specific issues that are encountered and resolved during software development to build a knowledge base; drawing on personal experience, this author relates how his recovery from a spinal cord injury follows process improvement in an unhealthy organization as it moves...

Table of Contents: Reality Computing: Handheld Computing; by Col. Kenneth L. Alford, Ph.D. This author outlines how personal digital assistants (PDAs) are used in the military, future uses, procurement considerations, developing PDA resource material, and more -- How to Secure Windows PCs and Laptops; by Terry Bollinger. Here are seven defensive strategies to reduce the risk from hardcore spyware invading your home and small business systems -- How and Why to Use the Unified Modeling Language; by Lynn Sanderfer. This article addresses the Unified Modeling Language and its purpose, constructs, and application to defense software development applications -- Effective Practices for Object-Oriented System Software Architecting; by Rich McCabe and Mike Polen. This author describes some typical pitfalls of object-oriented development and recommends a number of architectural practices that will help programs avoid or mitigate these dangers -- Best Practices: Identifying Your Organization's Best Practices; by David Herron and David Garmus. Here is how three different organizations used a combination of quantitative measures and qualitative ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, November 2003; Volume 16, Issue 11 : Development of Real-Time Software: Development of Real-Time Software

By: Dennis Ludwig; Brian Dobbing; Alan Burns; Andy German; Timothy J. Budden; Dr. John A. Hamilton Jr.; Col. Kevin J. Greaney; Gordon Evans; Dan W. Christenson; Lynn Silver; Walt Lipke

Description: This article provides a thorough walkthrough of considerations real-time programmers make regarding hardware, operating system, and programming language options; developers using this profile for real-time and high integrity systems can establish high confidence levels in concurrency properties and requirements within international standards early in the development life cycle; here is a definition of static code analysis, reviews of some of the tools, and lessons learned from a pioneer in this field, The United Kingdom Ministry of Defense; this article describes how the demands of DO-178B certification can be achieved with commercial off-the-shelf modules if the vendor is a willing partner who understands the value, importance, and professionalism that is expected under this type of grueling development and verification process; this article describes the process developed by the U.S. Missile Defense Agency and Auburn University to evaluate the potential vulnerabilities in shared simulation software as a means of risk mitigation; these authors introduce a new developmental architecture that maintains the strengths of t...

Table of Contents: Development of Real-Time Software: An Introduction to Real-Time Programming; by Dennis Ludwig. This article provides a thorough walkthrough of considerations real-time programmers make regarding hardware, operating system, and programming language options -- The Ravenscar Profile for Real-Time and High Integrity Systems; by Brian Dobbing and Alan Burns. Developers using this profile for real-time and high integrity systems can establish high confidence levels in concurrency properties and requirements within international standards early in the development life cycle -- Software Static Code Analysis Lessons Learned; by Andy German. Here is a definition of static code analysis, reviews of some of the tools, and lessons learned from a pioneer in this field, The United Kingdom Ministry of Defense -- Decision Point: Will Using a COTS Component Help or Hinder Your DO-178B Certification Effort?; by Timothy J. Budden. This article describes how the demands of DO-178B certification can be achieved with commercial off-the-shelf modules if the vendor is a willing partner who understands the value, importance, and profession...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, June 2003; Volume 16, Issue 6 : Commercial and Military Applications Meet: Commercial and Military Applications Meet

By: Elizabeth Starrett; William J. Mcdermott; Dr. David A. Maluf; Yuri Gawdiak; Peter B. Tran; Steve Callaghan; Hugo Fruehauf; Dr. James A. Forbes; Maj. Kurt Bodiford; Dr. Emanuel R. Baker; James E. Bagley; 2nd Lieutenant James Caldwell; Dr. Kevin R. Slocum; Lieutenant Colonel John R. Surdu; 2nd Lieutenant Jeffrey Sullivan; 2nd Lieutenant Marek Rudak; 2nd Lieutenant Nathan Colvin; Cadet Christopher Gates

Description: In this interview, Program Manager John Schneider discusses how civilian and military air traffic requirements are blending throughout global airspace in a new Global Air Traffic Management system; a simulation of Atlanta's Hartsfield International Airport on NASA's Virtual National Airspace Simulation prototype identified air transportation safety improvements by identifying precursors to component failure; two key contributors to global positioning system encryption technology describe how the Selective Availability Anti-Spoofing Module enables direct acquisition of the P(Y) code for added military and civilian capability; the study in this article shows that a lack of sharing and replication of best practices across product offices hindered deployment of software-intensive systems; this article looks at several new technologies to upgrade inventory management and tracking systems in a pilot study at the Jet Propulsion Laboratory in California; this author explains the technique of steganography and the art of hiding messages in its inadvertent layer along with its vulnerabilities should the message be discovered; thi...

Table of Contents: Commercial and Military Applications Meet: Upgrading Global Air Traffic Management; by Elizabeth Starrett. In this interview, Program Manager John Schneider discusses how civilian and military air traffic requirements are blending throughout global airspace in a new Global Air Traffic Management system -- Airport Simulations Using Distributed Computational Resources; by William J. McDermott, Dr. David A. Maluf, Yuri Gawdiak, and Peter B. Tran. A simulation of Atlanta's Hartsfield International Airport on NASA's Virtual National Airspace Simulation prototype identified air transportation safety improvements by identifying precursors to component failure -- SAASM and Direct P(Y) Signal Acquisition; by Steve Callaghan and Hugo Fruehauf. Two key contributors to global positioning system encryption technology describe how the Selective Availability Anti-Spoofing Module enables direct acquisition of the P(Y) code for added military and civilian capability -- Improving Information Management Software System Deployment Practices; by Dr. James A. Forbes, Maj. Kurt Bodiford, and Dr. Emanuel R. Baker. The study in this artic...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, September 2001; Volume 14, Issue 9 : Avionics Modernization: Avionics Modernization

By: Pamela Bowers, Dr. Paolo Donzelli, Roberto Marozza, George Romanski, Richard Conn, Stephen Traub, Steven Chung, Paul Solomon

Description: In this CrossTalk interview, Jon Ogg, director of Engineering and Technical Management Directorate, talks about the agency's plans for designing avionics systems that preclude their obsolescence; David G. ""Butch"" Ardis, technical adviser for avionics systems architecture, talks to CrossTalk about developing and implementing avionics road maps; here is a look at how different software development approaches and techniques, usually applied in isolation, can be selected, customized, and combined to better meet organizational needs; while the guidance on airborne software certification is mature, the issues with software reuse, military avionics certification, ground-based software, and object-oriented technology are still evolving. This article looks at how these challenges affect the safety critical community; this article presents insight into Lockheed Martin's modernization of the C-130 airlifter family from a largely mechanical aircraft to a software intensive system; the Northrop Grumman team shares its experience with successful project management that focuses on requirements, selecting the most effective software ...

Table of Contents: Avionics Modernization: The Air Force Develops an Initiative to Manage Change in Avionics Systems; by Pamela Bowers. In this CrossTalk interview, Jon Ogg, director of Engineering and Technical Management Directorate, talks about the agency's plans for designing avionics systems that preclude their obsolescence -- Integrated Road Maps Route the Migration to Avionics Open Systems; by Pamela Bowers. David G. ""Butch"" Ardis, technical adviser for avionics systems architecture, talks to CrossTalk about developing and implementing avionics road maps -- Customizing the Software Process to Support Avionics Systems Enhancements; by Dr. Paolo Donzelli and Roberto Marozza. Here is a look at how different software development approaches and techniques, usually applied in isolation, can be selected, customized, and combined to better meet organizational needs -- The Challenges of Software Certification; by George Romanski. While the guidance on airborne software certification is mature, the issues with software reuse, military avionics certification, ground-based software, and object-oriented technology are still evolving. Th...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, July 2006; Volume 19, Issue 7 : Net-Centricity: Net-Centricity

By: John G. Grimes, Gen. James E. Cartwright, Ltg Keith B. Alexander, Lieutenant Gen. Charles E. Croom Jr., Lieutenant Gen. Robert M. Shea, Anthony J. Simon, Dr. Troy Meink, Dr. Paul W. Richmond, Curtis L. Blais, Dr. Niki C. Goerger, Idongesit Mkpong Ruffin, Dr. John A. Hamilton Jr., Dr. Martin C. Carlisle, Ellen Walker

Description: This article explains why information is one of our greatest sources of power and emphasizes the need to deliver it in a timely and concise manner; the author describes the necessity of building a net-centric, collaborative approach to face any threat America may face; the author defines Information Assurance as a key enabler of the Global Information Grid and outlines the Department of Defense’s strategic objectives for secure, enterprise-wide information sharing; this article describes how service-oriented architectures will make information available faster, at reduced costs, and to more users; this article looks at the Command, Control, Communications, and Computer accomplishments of 2005 and looks to continue the positive efforts in 2006; the author discusses the Department of Defense’s approach to net-centricity, emphasizing how data will be posted and accessed; this article details the foundation of U.S. and coalition net-centric operations, describing the three major communications systems; these authors discuss the process used to develop the Mobility Common Operational Picture for warfighters to maneuver effec...

Table of Contents: Net-Centricity: From the DoD CIO: The Net-Centric Information Enterprise; by John G. Grimes. This article explains why information is one of our greatest sources of power and emphasizes the need to deliver it in a timely and concise manner -- Information Sharing Is a Strategic Imperative; by Gen. James E. Cartwright. The author describes the necessity of building a net-centric, collaborative approach to face any threat America may face -- Secure From the Start: Designing and Implementing an Assured National Security Enterprise; by LTG Keith B. Alexander. The author defines Information Assurance as a key enabler of the Global Information Grid and outlines the Department of Defense’s strategic objectives for secure, enterprise-wide information sharing -- Service-Oriented Architectures in Net-Centric Operations; by Lt. Gen. Charles E. Croom, Jr. This article describes how service-oriented architectures will make information available faster, at reduced costs, and to more users -- The Team: Creating the Enabling Capability to Conduct Net-Centric Operations; by Lt. Gen. Robert M. Shea. This article looks at the Command...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 2005; Volume 18, Issue 8 : Systems : Fielding Capabilities: Systems : Fielding Capabilities

By: John D. Holcomb, Michael Hoehn, Chris D. Moore, W. Mark Vanfleet, R. William Beckwith, Dr. Ben Calloni, Jahn A. Luke, Dr. Carol Taylor, Gordon Uchenick, Arlene F. Minkiewicz, Paul J. Solomon, Bill Ravensberg

Description: These authors discuss how the 76th Software Maintenance Group successfully develops software for the Department of Defense using two key elements: high fidelity test environments and collaboration; here is how the 402nd Software Maintenance Group successfully partnered with Northrop Grumman Corporation to maintain the complex E-8C Joint Surveillance Tactical Airborne Radar Systems software; These authors propose that the Multiple Independent Levels of Security architecture is a solution to meet the needs for critical information assurance systems that deliver the strongest degree of security and safety; This author explains how a successful implementation of a commercial off-the-shelf-intensive software system can save programs money — if you have the right solution and understand the potential risks involved; Performance-Based Earned Value is a set of principles and guidelines that specify the most effective measures of cost, schedule, and product quality performance, which is distinguished by its focus on customer requirements; if you want to be No. 1 in your golf game or in your business, this author shows how effect...

Table of Contents: Systems: Fielding Capabilities: Key Elements in Fielding Capabilities; by John D. Holcomb and Michael Hoehn. These authors discuss how the 76th Software Maintenance Group successfully develops software for the Department of Defense using two key elements: high fidelity test environments and collaboration -- Delivering Capabilities Through Partnerships; by Chris D. Moore. Here is how the 402nd Software Maintenance Group successfully partnered with Northrop Grumman Corporation to maintain the complex E-8C Joint Surveillance Tactical Airborne Radar Systems software -- MILS: Architecture for High Assurance Embedded Computing; by W. Mark Vanfleet, R. William Beckwith, Dr. Ben Calloni, Jahn A. Luke, Dr. Carol Taylor, and Gordon Uchenick. These authors propose that the Multiple Independent Levels of Security architecture is a solution to meet the needs for critical information assurance systems that deliver the strongest degree of security and safety -- Software Engineering Technology: Six Steps to a Successful COTS Implementation; by Arlene F. Minkiewicz. This author explains how a successful implementation of a commerc...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 2004; Volume 17, Issue 4 : Acquisition the Quest for the Best Value: Acquisition -- The Quest for the Best Value

By: Lisa Pracchia, Dr. Richard Turner, Robert W. Ferguson, John S. Willison, Michael S. Russell, Michael J. Hillelsohn, D. B. Robi

Description: This article outlines the Department of Defense's implementation guidance for section 804 of the National Defense Authorization Act for Fiscal Year 2003, including one approach taken by the Naval Air Systems Command's software acquisition and process improvement program; this author proposes that a methodical approach to gathering and analyzing data about best practices can help build tools to select practices that are appropriate for a particular project; to provide management visibility into project uncertainty, this author presents a risk metric that can be applied early and throughout the project; this article identifies some components of an effective approach to software development and provides the Army's Maneuver Control System as an example that is leading the way to a more agile force; this article proposes a methodology for applying decision analysis to support component reuse assessment; here are several techniques that can be used during project analysis to assure that all stakeholders reach a common level of understanding on the meaning of the requirements; this article describes an enterprise architecture...

Table of Contents: Acquisition: Improving the DoD Software Acquisition Processes; by Lisa Pracchia. This article outlines the Department of Defense's implementation guidance for section 804 of the National Defense Authorization Act for Fiscal Year 2003, including one approach taken by the Naval Air Systems Command's software acquisition and process improvement program -- Why We Need Empirical Information on Best Practices; by Dr. Richard Turner. This author proposes that a methodical approach to gathering and analyzing data about best practices can help build tools to select practices that are appropriate for a particular project -- A Project Risk Metric; by Robert W. Ferguson. To provide management visibility into project uncertainty, this author presents a risk metric that can be applied early and throughout the project -- Software Engineering Technology: Agile Software Development for an Agile Force; by John S. Willison. This article identifies some components of an effective approach to software development and provides the Army's Maneuver Control System as an example that is leading the way to a more agile force -- Applying Dec...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, December 2002; Volume 15, Issue 12 : Year of the Engineer and Scientist: Year of the Engineer and Scientist

By: Tech. Sgt. Carl Norman, Leif E. Peterson, Lieutenant Colonel Barry L. Shoop, Lieutenant Colonel Kenneth L. Alford, Jeffrey L. Dutton, Maj. Brian G. Hermann, Dr. Richard C. Shirkey, Melanie Gouveia, Grady Booch, David B. Putman

Description: Air Force leaders declare 2002 as the Year of the Engineer and Scientist in an attempt to battle a shortage of engineers and scientists to develop future weaponry; the AFMC's senior leadership emphasizes initiatives to recruit, retain, and develop highly skilled engineers and scientists to continue its crucial technology leadership; the new officer career path described in this article will provide a core population of officers who possess specialized expertise to integrate decision making with technology; this article proposes that a successful Capability Maturity Model Integration depends on a company's culture and the ability of its leaders to adopt new behaviors and beliefs; this article explains the Software Professional Development Program, and tells how you can get an inexpensive, state-of-the-art software engineering education right away; here is an explanation of two weather-tactical decision aids that can help commanders select the optimum weapon system to use in various weather conditions; this author takes a stand that while developing quality software is difficult, the rewards are in its ability to change t...

Table of Contents: Year of the Engineer and Scientist: Command Leaders Say YES to Engineers, Scientists; by Tech. Sgt. Carl Norman. Air Force leaders declare 2002 as the Year of the Engineer and Scientist in an attempt to battle a shortage of engineers and scientists to develop future weaponry -- Air Force Materiel Command Engineers and Scientists; by Leif E. Peterson. The AFMC's senior leadership emphasizes initiatives to recruit, retain, and develop highly skilled engineers and scientists to continue its crucial technology leadership -- Army Transformation: Uniformed Army Scientists and Engineers; by Lt. Col. Barry L. Shoop and Lt. Col. Kenneth L. Alford. The new officer career path described in this article will provide a core population of officers who possess specialized expertise to integrate decision making with technology -- Best Practices: A CMMI Case Study: Process Engineering vs. Culture and Leadership; by Jeffrey L. Dutton. This article proposes that a successful Capability Maturity Model Integration depends on a company's culture and the ability of its leaders to adopt new behaviors and beliefs -- Software Engineering T...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 2001; Volume 14, Issue 8 : Software Around the World: Software Around the World

By: Frederick I. Moxley, Lucien Simon, Elbert J. Wells, Chellam Embar, Alastair James, Aldo Liso, Kurt D. Welker, Toshihiro Komiyama, Toshihiko Sunazuka, Shinji Koyama, Al Florence

Description: The structural foundation laid by this architectural approach allows information sharing among diverse C3 systems--the key to successful joint military operations; this author sheds some light on the status of India's software industry after participating in a technology tour; the majority of Australia's software development organizations are small- to medium-sized businesses that need education and training to understand that best practices bring increased returns; this article proposes changing the number-of-comments parameter of the Coleman-Oman model, as well as the evaluation of the parameter; after nearly a decade of successful application, the practical use of the Maintainability Index in determining software maintainability remains strong; these authors explain how to compose specific Software Process assessment and Improvement (SPAIM) methods adapted to an assessed organization by selecting and customizing technologies included in SPAIM libraries; this article examines the obstacles one company encountered in trying to gain Software Capability Maturity Model® Level 4 vs. Level 3....

Table of Contents: Software Around the World: A Foundation for Coalition Interoperability Using NATO's C3 Technical Architecture; by Dr. Frederick I. Moxley, Lucien Simon, and Elbert J. Wells. The structural foundation laid by this architectural approach allows information sharing among diverse C3 systems--the key to successful joint military operations -- The State of Software Development in India; by Chellam Embar. This author sheds some light on the status of India's software industry after participating in a technology tour -- Can Australia Improve Its Software Processes?; by Alastair James. The majority of Australia's software development organizations are small- to medium-sized businesses that need education and training to understand that best practices bring increased returns -- Software Engineering Technology: Software Maintainability Metrics Model: An Improvement in the Coleman-Oman Model; by Aldo Liso. This article proposes changing the number-of-comments parameter of the Coleman-Oman model, as well as the evaluation of the parameter -- The Software Maintainability Index Revisited; by Kurt D. Welker. After nearly a decade...

Read More
       
1
|
2
Records: 1 - 20 of 25 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.