Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defining and Deploying Software Processes

Buy
I gravitated into the process world several years ago after performing
almost all roles in the software engineering environment — both as a
programmer and in various management positions. That environment
covered both the commercial software development world and the government
contracting software development world. I kept getting back to
a process focus after personally witnessing complete disasters with socalled
process-rich environments and alternatively process-sparse environments.
I often ran into “process people” who lost sight of the fact that
processes were there to support the organization — not the other way
around! Frustrations at all levels have been enormous for software engineering
personnel.

I was in the trenches and in software management during the U.S.
government’s push for making Department of Defense (DoD) software
contractors conform to standards like MIL-Std-1679, DoD-Std-2167, and,
later, DoD-Std-2167A. The government’s zeal in getting pesky contractors
in line during that period resulted in vast documentation standards requirements
throughout the development life cycle — even when those deliverables
were illogical at various times in the life cycle. Companies were
unsuccessfully trying to force a real-world development life cycle onto a
waterfall-based model from the government. The government openly
advocated tailoring the imposed model, but when you did just that,
government employees suspected you of trying to get away with something,
and thus effective tailoring was not done. I was there and I know
what really went on to try to conform. The government related document
production to project progress regardless of document quality. Repeatability
translated into creating a standard set of documents with standard
formats. Software contractors ended up in the document business rather
than the software business to a large extent. The government alleged to
just describe “what” had to be done but the same government had all
kinds of “how-tos” included as well — including defining low-level
document formats via Data Item Descriptions (DIDs) for just about everything.
Woe betide anyone who deviated from any government DID —
even if it made sense! The cost of government-imposed “process” was
enormous with questionable value, in my opinion.
(HTML tags aren't allowed.)

Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)

MCSA/MCSE 70-291 Exam Cram, Second Edition is the #1 quick-study guide to passing the MCSA/MCSE 70-291 exam. This book covers all exam objectives, including how to maintain a DHCP server, manage name resolution with DNS, secure networks using IPSec, troubleshoot network and Internet connectivity, and monitor network...

iMovie HD and iDVD 5 for Mac OS X
iMovie HD and iDVD 5 for Mac OS X

Bestselling author Jeff Carlson is back with a fully updated revision of the  iMovie Visual QuickStart Guide. Completely overhauled for iMovie HD and iDVD 5, this book uses step-by-step instructions and loads of illustrations to get readers up to speed quickly in the process of making movies with iMovie and creating Hollywood-quality...


One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work

Turn your one simple idea into millions―without lifting a finger!

“Ever heard of Teddy Ruxpin or Lazer Tag? Both have Stephen Key’s mark on them. He is the Yoda or ‘renting’ ideas for serious passive income. From how-to to war stories, this is a great book.”
―Tim Ferriss, author
...

IT Problem Management
IT Problem Management

The complete "best practices" guide to IT problem resolution!

No matter how professional your IT organization, if you can't resolve problems quickly and effectively, you'll lose your stakeholders' confidence—and fail. Nowadays, help desk s aren't enough: companies want true service centers capable of delivering complex,...

Calvinize: Signature Techniques of Photoshop Artist Calvin Hollywood
Calvinize: Signature Techniques of Photoshop Artist Calvin Hollywood

Calvin Hollywood is a photo artist from Heidelberg, Germany who combines photography and image editing in a most imaginative way. His personal style is characterized by the hyper sharpness, high contrasts, and almost painted look of his photos (http://www.calvinhollywood-blog.com/portfolio/). Digital editing plays an important role in his...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy