|
Common Risk Patterns
|
Last Update 2009/11/18 13:56
|
Category
Management
Risk
|
Description
This paper identifies risk patterns that reoccurred over the years as the author conducted risk assessments. These patterns lead to fifteen actions that practitioners should perform during the course of their projects to ward off the evil effects of current and future risks that seem to plague large software developments.
|
Hits: 64
|
Understanding Risk Management
|
Last Update 2007/5/22 5:06
|
Category
Management
Risk
|
Description
The U.S. Air Force's Software Technology Support Center offers an updated and condensed version of the "Guidelines for Successful Acquisition and Management of Software-Intensive Systems" (GSAM) on its Web site www.stsc.hill.af.mil/resources/tech_docs. This article is taken from Chapter 5 "Risk Management" of the GSAM (Version 4.0). We are pleased that all editions have been so well received and that many individuals and programs have worked hard to implement the principles contained therein. The latest edition provides a usable desk reference that gives a brief but effective overview of important software acquisition and development topics, provides checklists for rapid self-inspection, and provides pointers to additional information on the topics covered.
|
Hits: 61
|
Risk Management (Is Not) for Dummies
|
Last Update 2007/5/22 5:01
|
Category
Management
Risk
|
Description
Software program managers crave a silver bullet in the form of a comprehensive checklist of things to watch so the program does not suffer from bad surprises. Highlighted in this article are some prime examples from almost 15 years' experience acquiring software in Department of Defense programs, from identifying broad areas where software risks tend to hide to describing an eight-step risk management process. While there are no silver bullets to be found, there are a few golden nuggets if you make the focused effort to look!
|
Hits: 92
|
|
|
|