Agile Requirements

Ken Orr
BACKGROUND

In the past few decades, information technology has become increasingly important to enterprises of every size around the world. IT has literally changed the way the world works. And in the 21st century, not only must organizations continue to reengineer their businesses, they have to do so at breakneck speed.


Agile Requirements

Ken Orr

The "agile software movement" has reached a point where more and more organizations around the world are beginning to use, or at least experiment with, many of the major ideas involved in agile development.


Improve Your Chances of Becoming Agile: Part I

Wayne Bailey
  Improve Your Chances of Becoming Agile series:Part I Part II

Improve Your Chances of Becoming Agile: Part II

Wayne Bailey
  Improve Your Chances of Becoming Agile series: Part IPart II

Internet2: Coming Soon to Your Job

Tim Lister, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

IT Industry

Assertion #101

The technologies being developed today as part of Internet2 will create new opportunities and change the way business is done to an even greater extent than the circa-1990s Internet.


Internet2: Coming Soon to Your Job

Tim Lister, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

IT Industry

Assertion #101

The technologies being developed today as part of Internet2 will create new opportunities and change the way business is done to an even greater extent than the circa-1990s Internet.


The IT Burnout Phenomenon (Part I)

Ed Yourdon
  The IT Burnout Phenomenon: Part 1

The IT Burnout Phenomenon (Part I)

Ed Yourdon
  The IT Burnout Phenomenon: Part 1

Microsoft and Security

Paul Harmon

In the aftermath of September 11, 2001, everyone has become more conscious of security issues. At the same time, everyone has become more fearful. The US government, for example, is issuing regular announcements of terrorist threats. And, among the many threats that have been described in detail, in the press and government briefings, are the threats of attacks on computing systems.