Main Menu
Home Articles Directory Submit Popular Site Top Rated Site - Programming - Database - Management - Software Testing and Quality Assurance - Approaches, Process, Methods New Links RSS/Atom
Sponsors



  Main  |  Submit New Article  

  Popular articles (top10)  |  Top rated articles (top10)  |  Category List  

Main  arrow  Management  arrow  Risk  (28)


Sort by:   Title ( Title (A to Z) Title (Z to A)) Date ( Date (Old Links Listed First) Date (New Links Listed First)) Rating ( Rating (Lowest Score to Highest Score) Rating (Highest Score to Lowest Score)) Popularity ( Popularity (Least to Most Hits) Popularity (Most to Least Hits))
Articles currently sorted by: Date (New Links Listed First)


Visit   Managing Risks in Distributed Teams    Last Update 2011/7/28 4:33
Category  Management  arrow  Project Management  :  Management  arrow  Risk
Description
This article proposes a process for managing risks associated in managing the distributed software projects.

Hits: 18  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Common Risk Patterns    Last Update 2009/11/18 13:56
Category  Management  arrow  Risk
Description
This paper identifies risk patterns that reoccurred over the years as the author conducted risk assessments. These patterns lead to fifteen actions that practitioners should perform during the course of their projects to ward off the evil effects of current and future risks that seem to plague large software developments.

Hits: 64  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Interoperability Test and Evaluation: A System of Systems Field Study    Last Update 2008/10/29 13:41
Category  Approaches, Process, Methods  arrow  Software Architecture  :  Management  arrow  Risk
Description
Effective operational test and evaluation (OT&E) is an essential part of successful systems and software engineering. But increased program dependencies, network-centric operations, and growing interoperability requirements have greatly complicated test and evaluation. This article examines the policy, process, and practice of the Air Force (AF) test and evaluation programs, such as Force Development Evaluations (FDEs), particularly during the sustainment of systems. Several observations are made regarding the current process and five areas are emphasized for improvement.

Hits: 7  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Modeling and Analysis of Interoperability Risk in Systems of Systems Environments    Last Update 2008/10/29 13:38
Category  Software Testing and Quality Assurance  arrow  Software Testing  :  Approaches, Process, Methods  arrow  Software Process Improvement  :  Approaches, Process, Methods  arrow  Software Architecture  :  Management  arrow  Risk
Description
This article describes the use of a set of modeling and analysis techniques in an interoperability risk probe that found gaps in the ability of a North Atlantic Treaty Organization (NATO) modernization program to react to changing demands. The modeling and analysis techniques were used to create models of the people, processes, and technologies of the program and to represent the way demands were placed on this complex socio-technical system. Analysis of the models revealed interoperability risks that were manifested in the linkages between operational requirements of functional capabilities and the way in which those capabilities were being maintained. The risks identified in this probe were typed as mission, composition, and performance risks. The structural models produced by the techniques bring a welcome engineering rigor to the process of examining interoperability.

Hits: 14  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Your Risk Management Process - A Practical and Effective Approach    Last Update 2008/3/10 7:47
Category  Management  arrow  Project Management  :  Management  arrow  Risk
Promote  Vicki Wrona   
Description
A solid risk management process can help to make a project run smoothly. By identifying and addressing a list of project risks as part of a larger project management system, many surprises and roadblocks can be eliminated. Learn more about the definition of a risk as well as the steps that should be a part of your business's risk management process and how you can incorporate such a process into all projects going forward.

Hits: 61  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Implementing Vulnerability Remediation Strategies Within the Web Application Development Lifecycle    Last Update 2007/7/20 4:08
Category  Software Testing and Quality Assurance  arrow  Software Testing  :  Management  arrow  Risk  :  Programming  arrow  Security
Promote  Caleb Sima and Vincent Liu   
Description
After a security assessment has been performed as part of the web application development lifecycle, it is important to understand how to address and fix any application vulnerabilities that are uncovered. Learn more about the steps that should be taken during the remediation process, from categorization to testing and validation, and find out why collaboration among developers is critical for success.

Hits: 39  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Web Application Vulnerability Assessment Essentials: Your First Step to a Highly Secure Web Site    Last Update 2007/7/6 8:55
Category  Software Testing and Quality Assurance  arrow  Software Testing  :  Management  arrow  Risk  :  Programming  arrow  Security
Description
It is important for a business to understand the fundamentals of running a vulnerability assessment in order to determine how one will be run and what can be expected from the results. A web application security scanner can automate the process, but a quality assessment may still require actual human eyes to catch specific issues. Learn more about the whys and hows of vulnerability assessments.

Hits: 56  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Understanding Risk Management    Last Update 2007/5/22 5:06
Category  Management  arrow  Risk
Description
The U.S. Air Force's Software Technology Support Center offers an updated and condensed version of the "Guidelines for Successful Acquisition and Management of Software-Intensive Systems" (GSAM) on its Web site www.stsc.hill.af.mil/resources/tech_docs. This article is taken from Chapter 5 "Risk Management" of the GSAM (Version 4.0). We are pleased that all editions have been so well received and that many individuals and programs have worked hard to implement the principles contained therein. The latest edition provides a usable desk reference that gives a brief but effective overview of important software acquisition and development topics, provides checklists for rapid self-inspection, and provides pointers to additional information on the topics covered.

Hits: 61  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Risk Management for Systems of Systems    Last Update 2007/5/22 5:03
Category  Approaches, Process, Methods  arrow  Software Architecture  :  Management  arrow  Risk
Description
Systems of systems (SOS) present some unusual risk management challenges that often are not explicitly addressed, yet can impact the resulting degree of system effectiveness. Potential risks associated with integrating a diverse set of systems and associated hardware/hardware, hardware/software, and software/software often exist; these are made all the more difficult by individual systems at different levels of maturity and potential risks that do not exist at the individual system level. Established risk management processes may be in place for different systems, yet process steps and associated tools and techniques may not be compatible. This article briefly examines some key SOS risk management process issues together with methods for better implementing risk management on such programs.

Hits: 58  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Risk Management (Is Not) for Dummies    Last Update 2007/5/22 5:01
Category  Management  arrow  Risk
Description
Software program managers crave a silver bullet in the form of a comprehensive checklist of things to watch so the program does not suffer from bad surprises. Highlighted in this article are some prime examples from almost 15 years' experience acquiring software in Department of Defense programs, from identifying broad areas where software risks tend to hide to describing an eight-step risk management process. While there are no silver bullets to be found, there are a few golden nuggets if you make the focused effort to look!

Hits: 92  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)



« 1 (2) 3 » 
Practical
Methods & Tools
RSS 2.0
Twitter
Contact
THEME_VALIDXHTML    THEME_VALIDCSS

Copyright (c) 2007-2013 Martinig & Associates | Methods & Tools Software Development Magazine | Privacy Policy
Software Development Tools | Software Development Articles | Software Development Directory | Software Development Videos
Software Development Jobs | Software Development News | Software Development Books
Software Development Blogs | Software Development Conferences