Building Agents
Imagine a Notes-based sales application that detects when a new sale has been registered in your sales-tracking database by an account representative.
Building Agents
Imagine a Notes-based sales application that detects when a new sale has been registered in your sales-tracking database by an account representative.
WebBase: An Intranet Application Development System
The expanding Internet environment has made the World Wide Web more popular.
WebBase: An Intranet Application Development System
The expanding Internet environment has made the World Wide Web more popular.
Book Review: No More Teams! Mastering the Dynamics of Creative Collaboration
Book Review: No More Teams! Mastering the Dynamics of Creative Collaboration
July 1996 Application Development Strategies
Cost Estimation of OO Projects
Software cost estimation continues to be a poorly understood and mysterious art, primarily due to a lack of empirical observations.
Assessing an Organization's Estimating Capabilities
Last month we examined criteria for assessing the credibility of individual software cost and schedule estimates.
Assessing an Organization's Estimating Capabilities
Last month we examined criteria for assessing the credibility of individual software cost and schedule estimates.
Business Process: Crossing the Chasm?
I have had the pleasure of meeting Geoff Moore, author of the best-selling and enormously influential Crossing the Chasm, several times in the past few years.
Process Rework: Theories into Practice
This month, I am concluding our four-part series, taking an imaginary consulting firm -- Ultra-Consulting -- through a multistep procedure intended to yield a comprehensive, coherent, and complete business process strategy.
Measuring Project Progress by "Earned Value"
Many organizations today are undertaking large software deployment projects (building or purchasing) as a result of major reengineering initiatives. And many of these efforts are running aground on the project management rocks.
June 1996 Application Development Strategies
Double Dummy Spit and Other Estimating Games
Process Vectors and Patterns
In the past two issues, I have presented the stages of a process-centered strategic plan for information technology, using a four-phase approach:
1. Process Positioning
May 1996 Application Development Strategies
Protecting Your Information Infrastructure
Protecting Your Information Infrastructure
Software Development Issues in Computer Security
Computer security applications require programs of high quality.
Software Development Issues in Computer Security
Computer security applications require programs of high quality.
Risk-Free Access Into the Global Information Infrastructure via Anonymous Remailers
Copyright 1996 by Science Applications International Corporation. All rights reserved.


