Building Agents

Dorothy Rhodes
BUILDING AGENTS by Dorothy Singleton Rhodes

Imagine a Notes-based sales application that detects when a new sale has been registered in your sales-tracking database by an account representative.


Building Agents

Dorothy Rhodes
BUILDING AGENTS by Dorothy Singleton Rhodes

Imagine a Notes-based sales application that detects when a new sale has been registered in your sales-tracking database by an account representative.


WebBase: An Intranet Application Development System

Shuichiro Tokumaru
WEBBASE: AN INTRANET APPLICATION DEVELOPMENT SYSTEM by Shuichiro Yamamoto and Koji Tokumaru INTRODUCTION

The expanding Internet environment has made the World Wide Web more popular.


WebBase: An Intranet Application Development System

Shuichiro Tokumaru
WEBBASE: AN INTRANET APPLICATION DEVELOPMENT SYSTEM by Shuichiro Yamamoto and Koji Tokumaru INTRODUCTION

The expanding Internet environment has made the World Wide Web more popular.


Book Review: No More Teams! Mastering the Dynamics of Creative Collaboration

Ed Yourdon
BOOK REVIEW NO MORE TEAMS! MASTERING THE DYNAMICS OF CREATIVE COLLABORATION by Michael Schrage (New York: Currency Doubleday, 1995)

Book Review: No More Teams! Mastering the Dynamics of Creative Collaboration

Ed Yourdon
BOOK REVIEW NO MORE TEAMS! MASTERING THE DYNAMICS OF CREATIVE COLLABORATION by Michael Schrage (New York: Currency Doubleday, 1995)

Cost Estimation of OO Projects

Philip Henderson-sellers
COST ESTIMATION OF OO PROJECTS by Philip Haynes and Brian Henderson-Sellers INTRODUCTION

Software cost estimation continues to be a poorly understood and mysterious art, primarily due to a lack of empirical observations.


Assessing an Organization's Estimating Capabilities

Robert Park
ASSESSING AN ORGANIZATION'S ESTIMATING CAPABILITIES by Robert E. Park

Last month we examined criteria for assessing the credibility of individual software cost and schedule estimates.


Assessing an Organization's Estimating Capabilities

Robert Park
ASSESSING AN ORGANIZATION'S ESTIMATING CAPABILITIES by Robert E. Park

Last month we examined criteria for assessing the credibility of individual software cost and schedule estimates.


Business Process: Crossing the Chasm?

Stowe Boyd
Business Process: Crossing the Chasm? by Stowe Boyd

I have had the pleasure of meeting Geoff Moore, author of the best-selling and enormously influential Crossing the Chasm, several times in the past few years.


Process Rework: Theories into Practice

Stowe Boyd
Process Rework: Theories into Practice by Stowe Boyd

This month, I am concluding our four-part series, taking an imaginary consulting firm -- Ultra-Consulting -- through a multistep procedure intended to yield a comprehensive, coherent, and complete business process strategy.


Measuring Project Progress by "Earned Value"

Gary Gack
Measuring Project Progress by "Earned Value" Gary Gack, Information Technology Effectiveness, Inc.

Many organizations today are undertaking large software deployment projects (building or purchasing) as a result of major reengineering initiatives. And many of these efforts are running aground on the project management rocks.


Process Vectors and Patterns

Stowe Boyd
Process Vectors and Patterns by Stowe Boyd

In the past two issues, I have presented the stages of a process-centered strategic plan for information technology, using a four-phase approach:

1. Process Positioning


Protecting Your Information Infrastructure

Richard Pethia, Thomas A Longstaff, Moira West Brown
PROTECTING YOUR INFORMATION INFRASTRUCTURE by Richard Pethia, Thomas A.

Protecting Your Information Infrastructure

Richard Pethia, Thomas A Longstaff, Moira West Brown
PROTECTING YOUR INFORMATION INFRASTRUCTURE by Richard Pethia, Thomas A.

Software Development Issues in Computer Security

Charles Pfleeger
SOFTWARE DEVELOPMENT ISSUES IN COMPUTER SECURITY by Charles P. Pfleeger

Computer security applications require programs of high quality.


Software Development Issues in Computer Security

Charles Pfleeger
SOFTWARE DEVELOPMENT ISSUES IN COMPUTER SECURITY by Charles P. Pfleeger

Computer security applications require programs of high quality.


Risk-Free Access Into the Global Information Infrastructure via Anonymous Remailers

Paul Marlow
RISK-FREE ACCESS INTO THE GLOBAL INFORMATION INFRASTRUCTURE VIA ANONYMOUS REMAILERS by Paul A. Strassman and William Marlow

Copyright 1996 by Science Applications International Corporation. All rights reserved.