Survey Indicates Y2000 Timelines Are Slipping

Cutter Consortium, Cutter Consortium

Requirements-Driven Automated Testing

Larry Boldt

Studies have shown that 53% of software defects are attributed to poorly defined requirements. Therefore, from a process improvement perspective, it is imperative that project managers establish a more effective and efficient way of defining and tracking business requirements. At the same time, project managers must have a process that allows requirements to drive the automated testing cycle.


US Leads in Software Fix/Repair Activities

Cutter Consortium, Cutter Consortium
US LEADS WORLD BY 21% IN SOFTWARE FIX/REPAIR ACTIVITIES 9 March 1999 by Cutter Consortium

According to a new study, software fix/repair activity occupies US organizations at a level that is 21% higher than non-US organizations.


Application Integration

Jim Highsmith
APPLICATION INTEGRATION 9 March 1999 by Jim Highsmith

There is an IBM e-commerce TV commercial in which a young programmer is sitting at a screen developing a flashy graphic and the veteran businessman is remarking on how great it would be to have the system integrate orderi


Application Integration

Jim Highsmith
APPLICATION INTEGRATION 9 March 1999 by Jim Highsmith

There is an IBM e-commerce TV commercial in which a young programmer is sitting at a screen developing a flashy graphic and the veteran businessman is remarking on how great it would be to have the system integrate orderi


US Leads in Software Fix/Repair Activities

Cutter Consortium, Cutter Consortium
US LEADS WORLD BY 21% IN SOFTWARE FIX/REPAIR ACTIVITIES 9 March 1999 by Cutter Consortium

According to a new study, software fix/repair activity occupies US organizations at a level that is 21% higher than non-US organizations.


From Outsourcing to Alliance Management

Jim Highsmith
FROM OUTSOURCING TO ALLIANCE MANAGEMENT by Jim Highsmith

The e-business frenzy has lead to some interesting company market valuations. Consider the following examples.


From Outsourcing to Alliance Management

Jim Highsmith
FROM OUTSOURCING TO ALLIANCE MANAGEMENT by Jim Highsmith

The e-business frenzy has lead to some interesting company market valuations. Consider the following examples.


April 1999 Application Development Strategies

USING RISK MANAGEMENT AS A COMPETITIVE ASSET by Jim Highsmith

"Nobody suspected that by the end of that long day, every minute would matter," writes Jon Krakauer in Into Thin Air, his best-selling (50 weeks on the New York Times bestseller's list) account of the 1996 Mt.


Processing the Spoken Word: New Developments in Corporate Applications of Speech Recognition Technology

Curt Hall
PROCESSING THE SPOKEN WORD: NEW DEVELOPMENTS IN CORPORATE APPLICATIONS OF SPEECH RECOGNITION TECHNOLOGY bu Curt Hall

Recent developments in speech recognition and natural language processing (NLP) have made the application of speech recognition technology much more attractive for corporate applications.


If Software Development IS a War, Who Is the Enemy?

Karl Wiegers

Several recent experiences have left me concerned that the field of software development feels more like a war zone than a stimulating and challenging way to earn a living. One magazine editor I spoke with used several military metaphors, including describing a project manager who "snatched defeat from the jaws of victory." A thoughtful essay I read pondered whether software development was more like warfare or the culture of a monastery. I've even used terms like "in the heat of battle" during my seminar presentations.


If Software Development IS a War, Who Is the Enemy?

Karl Wiegers

Several recent experiences have left me concerned that the field of software development feels more like a war zone than a stimulating and challenging way to earn a living. One magazine editor I spoke with used several military metaphors, including describing a project manager who "snatched defeat from the jaws of victory." A thoughtful essay I read pondered whether software development was more like warfare or the culture of a monastery. I've even used terms like "in the heat of battle" during my seminar presentations.


Who Is the Enemy?

Karl Wiegers

Who Is the Enemy?

Karl Wiegers

Data Warehousing Technology Gaining Ground

Cutter Consortium, Cutter Consortium
DATA WAREHOUSING TECHNOLOGY QUICKLY GAINING GROUND 2 March 1999 by Cutter Consortium

The data from a recent study on data warehousing, conducted by Curt Hall and published by Cutter Information Corp., shows that companies have entered the "second round" of technology adoption and are


Data Warehousing Technology Gaining Ground

Cutter Consortium, Cutter Consortium
DATA WAREHOUSING TECHNOLOGY QUICKLY GAINING GROUND 2 March 1999 by Cutter Consortium

The data from a recent study on data warehousing, conducted by Curt Hall and published by Cutter Information Corp., shows that companies have entered the "second round" of technology adoption and are