|
|||||
Index
A
assignment
scope, 620
attribute
view, 482
abeyant
defects, 512
attributes,
60
access
control lists (ACLs), 143
attrition
benchmarks, 426
acquisition,
circa 2049,
204207
authentication,
authorization, and
activities,
60
access,
143
activity-level
productivity and
Authorization
Oriented
quality
benchmarks, 416417
Architecture
(Hamer-Hodges),
actors,
373
administrative
access, 143
automated
debugging, for defect
administrative
rights, 149
removal,
531
adware,
142143
automated
static analysis
Agile
as
defect prevention, 523
requirements
with embedded
for
defect removal,
531533
users,
456
automated
unit testing, for
defect
self-organizing
Agile teams,
removal,
535536
award
benchmarks, 428429
taxonomy
for software
methodology
analysis, 6667
algorithm
view, 481
B
analogy,
sizing by,
363365
back
doors, 143144
appraisals
backfiring,
318
for
software personnel, 5051
sizing
legacy applications
based
of
technical staff, 4546
on,
385389
approval,
90
bad
fixes, 513
approximations,
383
bad-fix
injections, 337
architects,
623624
balanced
matrix, 306
architecture
See
also matrix
management
best
practices, 7577
baselines,
best practices, 112115
circa
2049, 210213
benchmarking,
408411
enterprise,
210213, 475479
benchmarks
software,
470475
academic
benchmarks, 410
See
also service-oriented
activity-level
productivity and
architecture
(SOA)
quality
benchmarks, 416417
assemblers,
491
assessment
benchmarks,
assembly
languages, 491
assessment
benchmarks, 419421
award
benchmarks, 428429
645
646
Index
benchmarks
(continued)
software
maintenance
best
practices, 112115
and
customer support
blind
benchmarks, 430
benchmarks,
417418
categories
of, 411413
software
outsource vs.
internal
chart
of accounts for
activity-
performance
benchmarks, 417
level
software benchmarks, 68
software
performance
consultant
collection for
internal
benchmarks,
426427
benchmarks,
409
software
personnel and skill
consultant
collection for
benchmarks,
425426
proprietary
benchmarks, 410
software
turnover and
attrition
corporate
software portfolio
benchmarks,
426
benchmarks,
415
software
usage benchmarks,
cost
of quality (COQ)
benchmarks,
423
types
of benchmark studies
customer
satisfaction
performed,
429430
benchmarks,
427
best
practices, 3941
earned-value
benchmarks, 422
30
best practices for 1000
and
hybrid
assessment and
10,000function
point
benchmark
studies, 421422
projects,
31
industry
benchmarks, 413414
30
best practices of IT
projects
internal
collection for
internal
and
embedded/systems
benchmarks,
409
projects,
32
internal
collection for public
or
appraisals
and career planning
ISBSG
benchmarks, 410
for
software personnel, 5051
international
software
canceling
or turning around
benchmarks,
413
troubled
projects, 8486
ISO
quality benchmarks, 424
certification
of reusable
methodology,
418419
materials,
101107
open
benchmarks, 429
certifying
methods, tools, and
organizations,
430431
practices,
6470
overall
software cost and
certifying
software engineers,
resource
benchmarks, 414
specialists,
and managers,
partly
open benchmarks, 429430
phase-level
productivity and
communication
during software
quality
benchmarks, 415416
projects,
9799
quality
and test coverage
configuration
control, 119120
benchmarks,
422423
customer
support of software
reporting
methods for benchmark
applications,
156158
and
assessment data,
defining
and evaluating, 710
early
sizing and scope control
of
security
benchmarks, 424425
software
applications, 5153
Six
Sigma benchmarks,
executive
management support of
software
applications, 7475
software
compensation
inspections
and static analysis,
benchmarks,
426
software
data center
international
software standards,
benchmarks,
427
software
litigation and
failure
minimizing
harm from layoffs
benchmarks,
428
and
downsizing, 4145
Index
647
motivation
and morale of
software
quality assurance
managers
and executives,
(SQA),
120124
software
reusability, 99101
motivation
and morale of
software
security analysis and
technical
staff, 4547
control,
132134
outsourcing
software
software
warranties and
recalls,
applications,
5358
programming
or coding,
terminating
or withdrawing
legacy
applications, 166167
protecting
against viruses,
testing
and test library
control,
spyware,
and hacking,
training
clients or users of
protecting
intellectual property
software
applications,
in
software, 136138
requirements
of software
training
managers of software
applications,
7072
projects,
8991
selecting
software methods,
tools,
training
software technical
and
practices, 5964
personnel,
9192
selection
and hiring of
software
updates
and releases of
software
personnel,
50
applications,
164165
software
architecture and
design,
use
of software specialists,
software
benchmarks and
user
involvement in software
baselines,
112115
projects,
7273
software
change control before
using
contractors and
release,
117119
management
consultants,
software
change management
after
release, 159161
See
also neutral
practices; worst
software
deployment and
practices
customization,
154155
software
maintenance and
See
also testing
enhancement,
161164
blacklists,
148
software
performance analysis,
blind
benchmarks, 430
bohrbug,
135
software
project cost
estimating,
books,
258259, 260263
bot
herders, 144
software
project governance,
botnets,
144
browser
hijackers, 144
software
project measurements
browsing,
244
and
metrics, 110112
bugs,
509512
software
project milestone and
business
analysis, 468470
cost
tracking, 115116
business
analysts, 625626
software
project organization
structures,
8789
C
software
project planning, 7778
canceling
troubled projects,
best
software
project risk
analysis,
practices,
8486
capability-based
security, 143
software
project value
analysis,
career
planning, for
software
personnel,
5051
648
Index
cautions
and counter
indications
conferences,
254255
customer
support
configuration
control, best
organizations,
327
practices,
119120
hierarchical
organizations, 304
contractors,
best practices, 5859
matrix
organizations, 308
cookie
poisoning, 145
one-person
projects, 286
cookies,
144145
pair
programming, 289
corporate
software portfolio
self-organizing
Agile teams, 293
benchmarks,
415
software
maintenance
cost,
of learning methods, 230
organizations,
321
cost
drivers for software
software
test organizations, 340
applications,
2
Team
Software Process
(TSP)
revised
sequence circa 2019, 3
teams,
297
cost
estimating, best
practices,
certification
best
practices, 9497
cost
of quality control and
defect
circa
2049, 218220
repairs,
122123
influence
of on defect prevention
cost
of quality (COQ),
590591
and
removal, 604
benchmarks,
423
and
specialization, 241
cost
per defect, 1718
certification
of reusable materials,
cost
tracking, best
practices,
best
practices, 101107
certification
of web sites, 142
cost-estimating
tool circa 2049,
certifying
methods, tools, and
features,
178179, 193
practices,
best practices, 6470
costs,
of software development, 45
change
control before release,
best
creeping
requirements, 457
practices,
117119
quality
impacts of, 584585
change
management after
release,
See
also requirements
creep
best
practices, 159161
critical
topics, 1923
chart
of accounts for
activity-level
Crosby,
Phil, 123
software
benchmarks, 68
CrossTalk, 257
class,
defined, 65
cumulative
defect removal
client
management, 90
cloud
computing, 474475
currency,
230
curricula,
proposed, 269273
code
inspections, 125
customer
satisfaction, 121
code
reuse, as defect
benchmarks,
427
prevention,
521
customer
support
code
structure, as defect
benchmarks,
417418
prevention,
525526
best
practices, 156158
coding,
best practices,
107109
circa
2049, 188190
colocation,
vs. distributed
customer
support organizations,
development,
278281
commercial
education, 250252
customer
training, circa 2049,
communication,
best practices,
customization,
best practices,
compensation
benchmarks, 426
compilers,
491
Cutter
Journal, 257
complexity
of software, 122
cyberextortion,
145
Index
649
cyberstalking,
145
synergies
and combinations
of,
537
defect
removal efficiency,
6970,
D
costs,
599
data
center benchmarks, 427
cumulative
defect removal
data
complexity, 393,
451452
data
defects, 513
by
defect type, 336
data
mining for legacy
levels,
596597
requirements,
457458
measuring,
593600
data
quality specialists, 625
defect
repair rates, 314
data
view, 481482
database
analysts, 623
accumulation,
595
defect
discovery point, 587588, 589
defects
defect
origin point,
588590
causes,
571
defined,
512
overview,
573
defining
and predicting,
predicting,
578579
for
a sample application, 580
examples
of defects per KLOC
defect
prevention, 130131,
and
function point, 582
330331,
518
kinds
of defects occurring in
forms
of, 520529
source
code, 509512
influence
of certification on, 604
logistics
of software code
defects,
international
standards, 606
methods
and techniques, 602
overview
of delivered software
metrics
and measures, 604
defects,
574
optimal
activities, 575
percentages
of defects by
overview,
600608
origin,
579
proposal
for a nonprofit
points
of origin, 570
international
software quality
predicting,
579584
foundation,
608613
delivered
defects by
usage
patterns of defect
application,
122
prevention
methods,
delivered
defects, reliability
and
customer
satisfaction, 600
defect
quantities and
origins,
delivery
productivity, 540541, 581
demographics
customer
support organizations,
effort
accumulation, 594
forms
of, 529537
hierarchical
organizations,
forms
of software defect
removal
activities,
332
matrix
organizations, 306
influence
of certification on, 604
one-person
projects, 284
international
standards, 606
pair
programming, 288
for
legacy applications,
536537
self-organizing
Agile teams, 291
metrics
and measures, 604
software
maintenance
optimal
activities, 575
organizations,
319
overview,
613619
software
quality assurance
(SQA)
overview
of 80 varieties of
organizations,
345
activities,
615617
650
Index
demographics
(continued)
graduate
university education,
software
test organizations,
in-house,
248249
Team
Software Process
(TSP)
knowledge
areas, 232
teams,
295
learning
methods, 227230
denial
of service, 145146
proposed
curricula, 269273
deployment
ranking
of learning channels in
best
practices, 154155
2009,
231
circa
2049, 190191
topics
software engineers need
to
paths,
1214
learn
in 2009, 230233
quantifying,
1619
undergraduate
university
design,
479480
education,
263265
best
practices, 7577
vendor,
252253
circa
2049, 182184
e-learning,
245246
views,
481484
electromagnetic
pulse (EMP), 146
desk
checking, for defect
removal,
electromagnetic
radiation,
development
electronic
books, 246247,
258259
circa
2049, 184186
e-mail
address harvesting, 150
paths,
1012
EMP.
See
electromagnetic
practices
by size of
pulse
(EMP)
application,
11
end
user license
agreements
quantifying,
1619
(EULAs),
158159
development
methodology. See
development
process
best
practices, 161164
development
process, 6162
circa
2049, 191195
development
productivity,
enhancement
value of high-
540541,
581
quality
reusable
disposable
prototypes, 460
materials,
105
distributed
development, vs.
paths,
1416
colocation,
278281
enterprise
architects, 622
documentation,
circa 2049,
enterprise
architecture, 475479
circa
2049, 210213
dotted
line reporting authority, 305
value
of increases with
downsizing,
best practices for
applications,
477
minimizing
harm from, 4145
entropy,
315
drivers,
286
error-prone
modules, 316318, 514
due
diligence, circa 2049, 216218
estimated
software security
costs,
153
E
estimating,
defined, 78
earned
quality value (EQV), 590
estimating
specialists, 626
earned
value, 111
EULAs.
See
end
user license
earned-value
benchmarks, 422
agreements
(EULAs)
e-bombs,
146
evaluation,
circa 2049, 204207
e-books,
246247, 258259
evangelists,
236240
economic
value of quality, 123
evolutionary
prototypes, 460
education
executable
English, 458
commercial,
250252
Index
651
executives
high-level
programming
management
support of software
languages,
491
applications,
7475
as
defect prevention, 524
motivation
and morale, 4750
hiring,
software personnel, 50
external
view, 481
Hull,
Raymond, 301
externally
caused defects, 513
hybrid
assessment and
benchmark
studies,
421422
F
facilitation,
90
I
Fagan,
Michael, 124
identity
theft, 147
failure
benchmarks, 428
insurance,
142
failure
rate, 5
IEEE
Computer, 257
IFPUG
sizing
based on IFPUG function
formal
inspections, 125
point
analysis, 376379
function
point analysis,
sizing
See
also function
point analysis;
based
on, 376379
function
points
function
point approximations,
-ility
words, 561563
high-speed
sizing using,
incidents,
514
industry
benchmarks, 413414
Function
Point Outlook tool, 384
Information
Technology
Infrastructure
Library
function
point specialists,
630631
(ITIL),
196
function
points
information
technology (IT)
number
of pages created per
organizations,
vs. systems
function
point, 377
software
organizations,
sizing
using function point
variations,
380383
Information
Technology Metrics
See
also micro
function points
and
Productivity Institute
functional
requirements, 459
Journal, 258
funding,
90
in-house
education, 248249
inspection
moderators, 632
G
inspections
best
practices, 124128
governance,
476
as
defect prevention, 522523
best
practices, 109110
instrumentation,
134
graduate
university education,
intangible
value, 84
intellectual
property protection,
best
practices, 136138
See
also testing
intepreters,
491
international
software
benchmarks,
413
H
international
software quality
hacking,
147
foundation
(ISQF), proposal for,
hacking
protection, best
practices,
international
software standards,
heisenbug,
134135
best
practices, 135136
hierarchical
organizations,
invalid
defects, 512
652
Index
ISO
quality benchmarks, 424
proposed
curricula, 269273
ITIL.
See
Information
Technology
ranking
of learning channels in
Infrastructure
Library (ITIL)
2009,
231
self-study
using books, e-books,
and
training material,
J
Joint
Application Design
(JAD),
self-study
with CDs or DVDs,
requirements,
459
journals,
257258
simulation
web sites,
K
software
journals, 257258
Kawasaki,
Guy, 240
undergraduate
university
key
practice areas, 120
education,
263265
keystroke
loggers, 147148
vendor
education, 252253
knowledge
areas, circa 2009, 232
web
browsing, 244
knowledge
representation, 481
webinars,
podcasts, and
e-learning,
245246
L
wiki
sites, 255256
language
development
See
also knowledge
areas;
chronology
of, 494
training
history
of, 490491
legacy
defects, 514
See
also programming
languages
licensing
layoff,
best practices for
minimizing
circa
2049, 218220
harm
from, 4145
and
specialization, 241
learning
effectiveness, 230
lines
of code (LOC), 17
learning
efficiency, 230
circa
1960, 538539
learning
methods
circa
1970, 539542
commercial
education, 250252
circa
1980, 542546
education
channels available in
circa
1990, 546548
1995,
229
circa
2000, 548549
electronic
books, 246247
circa
2010, 549550
evaluating,
229230
circa
2020, 550551
evolution
of learning channels,
overview,
537538
sizing
based on, 366370
gaps
in training circa
2009,
litigation
benchmarks,
428
graduate
university education,
circa
2049, 221225
live
conferences, 254255
in-house
education, 248249
LOC.
See
lines
of code (LOC)
live
conferences, 254255
LOC
to function point
conversion
mentoring,
260
ratios
of logical source
code
new
directions in software
statements
to function
learning,
267268
points,
387
omissions
from, 227228,
sizing
legacy applications
based
on,
385389
on-the-job
training, 259260
logistical
view,
professional
books, monographs,
and
technical reports, 260263
Index
653
M
monographs,
260263
monthly
status reports, 406
macro
viruses, 151
motivation
and morale
maintenance,
103
of
managers and
executives,
benchmarks,
417418
best
practices, 161164
of
technical staff, 4547
circa
2049, 191195
kinds
of maintenance work, 311
maintenance
value of high-
N
quality
reusable
nature,
60
materials,
104
defined,
65
paths,
1416
navigators,
286
quantifying,
1619
software
maintenance
See
also best
practices; worst
organizations,
309322
practices
specialists,
631632
nonfunctional
requirements, 459
maintenance
assignment scope,
Northern
Scope, 53
malicious
software engineers,
O
object
code, 491
malware,
148
object-oriented
(OO) paradigm,
management
consultants, best
practices,
5859
observers,
286
managers
occupation
titles, 235236
motivation
and morale, 4750
one-person
projects, 284286
training,
8991
online
education, 229
mandelbug,
135
on-the-job
training, 259260
manual
unit testing, for
defect
open
benchmarks, 429
removal,
533535
organization
structures
matrix
management, 304308
best
practices, 8789
measurements,
as defect
customer
support organizations,
prevention,
527528
measurements
and metrics, best
hierarchical
organizations,
practices,
110112
mentoring,
260
matrix
organizations, 304308
methodologies,
as defect
one-person
projects, 284286
prevention,
527528
pair
programming, 286289
methodologies,
practices, and
self-organizing
Agile teams,
results,
2429
methodology
benchmarks, 418419
software
maintenance
Metric
Views, 257
organizations,
309322
micro
function points, 318
software
quality assurance
(SQA)
milestone
tracking, best
practices,
organizations,
342348
software
test organizations,
milestones
defined,
116
specialist
organizations, 308309
tracking
milestones for large
Team
Software Process
(TSP)
software
projects, 404405
teams,
293298
654
Index
outsourcing
podcasts,
245246
best
practices, 5358
polymorphic
viruses, 151
circa
2049, 195204
portfolio
analysis, circa 2049,
distribution
of outsource results
after
24 months, 54
private
defect removal, 529530
overall
software cost and
resource
Priven,
Lew, 124
benchmarks,
414
problem
domains of software
applications,
500
P
problem
tracking, 403408
pair
programming, 108,
286289
process
assessments, 411412
as
defect prevention, 528
productivity
rates
partly
open benchmarks, 429430
customer
support
pattern
matching
organizations,
326
initial
starting values for
sizing
hierarchical
organizations, 303
by,
395
matrix
organizations, 307
requirements,
459460
one-person
projects, 285
sizing
based on, 389401
pair
programming, 288
pattern
view, 482
self-organizing
Agile teams,
patterns,
389
150
applications sized
used
software
maintenance
pattern
matching, 396400
organizations,
320
architectural,
7677
software
quality assurance
(SQA)
as
defect prevention, 521522
organizations,
345
staffing
patterns for software
software
test organizations, 338
projects,
88
Team
Software Process
(TSP)
payloads,
152
teams,
296
performance
benchmarks, 426427
professional
malpractice
performance
issues, 515516
defined,
34
performance
specialists, 627
methods
and practices
considered
personnel
professional
malpractice, 34
appraisals
and career planning,
profilers,
134
programming
motivation
and morale, 4547
best
practices, 107109
ratio
of specialists to general
history
of, 490491
software
personnel, 241243
pair
programming, 108
selection
and hiring of, 50
programming
languages, 492495
See
also specialists
chronology
of programming
Peter,
Lawrence J., 301
language
development, 494
the
Peter Principle, 301
creating
a national programming
phase-level
productivity and
language
translation center,
quality
benchmarks, 415416
phishing,
148
estimated
number of software
See
also spear
phishing
engineers
by language, 507
physical
security, 148
how
many needed,
499501
piracy,
148149
how
many programmers use
planning
various
languages,
best
practices, 7778
defined,
78
Index
655
impact
of multiple languages
protecting
intellectual property,
on
cost, 505
best
practices, 136138
multiple
languages in the same
prototypes,
460
applications,
504505
as
defect prevention, 525
popularity
of, 494499
typed
vs. un-typed, 494
Q
used
for critical software
quality
applications,
503
applying
definitions to Vista,
progress
tracking, 403408
customer
support organizations,
project
management
numbers
and size ranges of
defining,
558565
project
management
economic
value of quality,
633642
tools,
356
hierarchical
organizations, 303
overview,
351359
impact
of creeping requirements,
performance
circa 2009, 352
performance
on successful and
matrix
organizations, 307
unsuccessful
projects, 355
measuring,
585587
potential
performance
one-person
projects, 285
by
2019, 353
overview,
555558
See
also sizing
of software
pair
programming, 289
applications
rank
order of quality factors
by
project
nature, 390,
448449
importance,
577
project
offices, 78
return
on investment in quality,
project
planning, best
practices,
self-organizing
Agile teams, 292
project
risk analysis, best
practices,
software
maintenance
organizations,
320321
project
scope, 390391, 449
software
quality assurance
(SQA)
project
size
organizations,
346
customer
support
software
test organizations, 339
organizations,
326
Team
Software Process
(TSP)
hierarchical
organizations, 303
teams,
296
matrix
organizations, 306307
value
of for applications of 100
one-person
projects, 284285
function
points, 636637
pair
programming, 288
value
of for applications of
1000
self-organizing
Agile
function
points, 637638
teams,
291
value
of for applications of
10,000
software
maintenance
function
points, 638639
organizations,
319
value
of for applications of
software
quality assurance
(SQA)
100,000
function points,
organizations,
345
software
test organizations, 338
See
also defect
prevention; defect
Team
Software Process
(TSP)
removal
teams,
295296
quality
benchmarks, 422423
project
type, 391392, 450
quality
function deployment
(QFD),
project
value analysis, best
requirements,
460461
practices,
8384
quality
specialists, 619632
656
Index
R
use-cases,
466
user
stories, 466467
Radice,
Ron, 124
requirements
analysis, circa 2049,
recalls,
best practices, 158159
refactoring,
162
requirements
analysts, 629630
releases,
best practices,
164165
requirements
changes, sizing,
renovation
productivity, 314
requirements,
439
Agile
requirements with
quality
impacts of, 584585
embedded
users, 456
requirements
of software
completeness
by software
applications,
best practices,
size,
445
creating
taxonomies of reusable
reusability,
best practices,
99101
software
requirements,
reusable
materials
certification
of, 101107
creeping
requirements, 457
customer
support value of
data
mining for legacy
high-quality
reusable
requirements,
457458
materials,
105
defects
by application size, 446
development
value of
defects
per function point, 445
high-quality
reusable
engineering,
461
materials,
103
executable
English, 458
enhancement
value of
focus
groups, 458459
high-quality
reusable
functional
and nonfunctional
materials,
105
requirements,
459
maintenance
value of
inspections,
462
high-quality
reusable
Joint
Application Design
materials,
104
(JAD),
459
total
cost of ownership of
pages
per function point, 444
high-quality
reusable
pages
produced by application
materials,
106
size,
444
reusable
requirements, 463464
pattern
matching, 459460
reused
defects, 514
prototypes,
460
reverse
appraisals, of technical
quality
function deployment
staff,
4546
(QFD),
460461
risk
analysis, best practices, 8183
reusable
requirements, 463464
risk
analysis specialists, 620622
security
requirements
rogue
security sites, 144
deployment
(SRD), 464465
root
users, 149
statistical
analysis of software
rootkits,
149
requirements,
442447
structure
and contents of
software
requirements,
S
SANS
report, 509512
toxic
requirements that
cause
Sarbanes-Oxley
(SOX) Act,
serious
harm, 446
traceability,
462463
schedules
unified
modeling language
customer
support
(UML),
465466
organizations,
326
Index
657
hierarchical
organizations, 303
Shoulders
Corporation, project
matrix
organizations, 307
tracking
method, 116
one-person
projects, 285
simulation
web sites,
256257
pair
programming, 288
Six
Sigma
self-organizing
Agile teams, 292
benchmarks,
423424
software
maintenance
as
defect prevention, 528
organizations,
320
specialists,
622
software
quality assurance
(SQA)
size
of application, 60
organizations,
345346
sizing
of software applications,
software
test organizations, 339
Team
Software Process
(TSP)
based
on IFPUG function point
teams,
296
analysis,
376379
schrodenbug,
135
based
on pattern matching,
scope,
defined, 65
scope
control, best
practices,
best
practices, 5153
deliverables
whose sizes should
scope
managers, 53
be
quantified, 360361
Scrum
masters, 291
high-speed
sizing using function
Scrum
sessions, 290291
point
approximations,
secondhand
defects, 512513
security
analysis and control,
best
legacy
applications based on
practices,
132134
backfiring
or LOC to function
security
benchmarks, 424425
point
conversion, 385389
security
costs, 153
requirements
changes, 401402
security
requirements deployment
traditional
sizing based on
(SRD),
464465
lines
of code (LOC)
metrics,
security
specialists, 624625
security
view, 482
traditional
sizing by analogy,
security
vulnerabilities, 514
segmentation,
as defect prevention,
using
function point
variations,
SEI
scoring system for
the
using
story point metrics,
CMM,
419
selecting
software methods,
tools,
using
use-case metrics,
and
practices, best
practices,
See
also scope
control
self-organizing
Agile teams,
smart
card hijacking, 149
SOA.
See
service-oriented
self-study
architecture
(SOA)
using
books, e-books, and
software
architecture, 470475
training
material, 258259
value
of increases with structural
using
CDs or DVDs, 249250
size,
471
Software
Assurance (SwA), 139
Selling
of the Dream
(Kawasaki),
240
software
compensation
Service
and Support
Professionals
benchmarks,
426
Association
(SSPA), 323324
software
design, 479480
service-oriented
architecture
views,
481484
software
journals, 257258
658
Index
software
learning, circa 2049,
one-person
projects, 285286
pair
programming, 289
software
outsource vs.
internal
self-organizing
Agile teams, 292
performance
benchmarks, 417
software
maintenance
software
package evaluation
and
organizations,
321
acquisition,
circa 2049,
204207
software
quality assurance
(SQA)
software
personnel. See
personnel
organizations,
347
software
personnel and skill
software
test organizations, 340
benchmarks,
425426
Team
Software Process
(TSP)
software
quality assurance
(SQA)
teams,
296297
best
practices, 120124
varieties
of circa 2009, 236241
organizations,
342348
SPR
assessment scoring system, 420
specialists,
627628
Software
Security State of the
Art
spyware,
150151
Report
(SOAR), 139
spyware
protection, best
practices,
software
test organizations,
SQA.
See
software
quality
software
turnover and
attrition
assurance
(SQA)
benchmarks,
426
SSPA.
See
Service
and Support
solid
line reporting authority, 305
Professionals
Association (SSPA)
source
code, 491
staffing
patterns for software
Southern
Scope, 53
projects,
88
SOX.
See
Sarbanes-Oxley
(SOX) Act
standards,
best practices, 135136
spam,
149150
Starr,
Paul, 218219
static
analysis, best
practices,
spear
phishing, 150
See
also phishing
status
reports, 406
specialist
organizations, 308309
Stewart,
Roger, 124
specialists
story
point metrics, sizing
using,
best
practices for use of, 9294
the
challenge of organizing,
strong
matrix, 306
See
also matrix
management
circa
2009, 233236
structural
view, 481
distribution
of specialists for
structured
programming, 525
1000
total software staff, 283
subroutine
testing, for defect
occupation
groups, 9394
removal,
533
quality
specialists, 619632
systems
analysis. See
business
ratio
of specialists to general
analysis
software
personnel, 241243
systems
analysts, 626627
See
also personnel
systems
software organizations,
specialization
vs.
information technology (IT)
customer
support
organizations,
277278
organizations,
327
hierarchical
organizations, 304
T
impact
on software quality, 621
tangible
financial value, 83
in
large software
organizations,
taxonomies,
proposed taxonomy for
software
methodology analysis,
matrix
organizations, 307308
Index
659
TCO.
See
total
cost of
total
cost of ownership (TCO), 106
ownership
(TCO)
toxic
requirements, 516
Team
Software Process
(TSP)
traceability,
119
taxonomy
for software
tracking
progress and
problems,
methodology
analysis, 67
teams,
293298
training
teams,
overview, 275277
best
practices for training
clients
technical
reports, 260263
or
users of software,
155156
technical
staff
best
practices for
training
motivation
and morale, 4547
managers,
8991
skill
sets needed, 92
best
practices for
training
training
best practices, 9192
technical
personnel, 9192
See
also personnel
gaps
in training circa
2009,
technical
writers, 631
technology
selection, circa
2049,
proposed
curricula, 269273
See
also learning
methods
technology
transfer, circa 2049,
training
material, 258259
Trojans,
151
terminating
legacy applications,
troubled
projects, best
practices,
best
practices, 166167
test
case coverage, 122
turning
around troubled
projects,
test
coverage benchmarks,
best
practices, 8486
turnover
benchmarks, 426
test-based
development (TBD), as
type,
60
defect
prevention, 523524
defined,
65
test-driven
development
(TDD),
330
U
testers,
630
UCITA.
See
Uniform
Computer
testing
Information
Transaction Act
best
practices, 128132
(UCITA)
undergraduate
university
by
customers or users, 129
education,
263265
by
developers, 128
undetected
defects, 513
unified
modeling language
(UML),
software
test organizations,
requirements,
465466
Uniform
Computer Information
test
cases for selected
test
Transaction
Act (UCITA),
stages,
335
by
test specialists or
software
quality
assurance, 129
updates,
best practices, 164165
test
staffing for selected
test
usability
labs, 121
stages,
333
usability
specialists, 624
unit
tests, 329
usage
benchmarks, 427428
use-case
metrics
requirements,
466
The
Social Transformation of
sizing
using, 373376
American
Medicine (Starr),
user
documentation, circa
2049,
660
Index
web
browsing, 244
user
groups and forums, 121
web
designers, 628629
user
involvement in software
web
sites, simulation, 256257
projects,
best practices,
7273
webinars,
229,
245246
user
stories, requirements,
whaling,
152
V
See
also testing
value
analysis
best
practices, 8384
wireless
security leaks, 152
intangible
value, 84
withdrawing
legacy applications,
tangible
financial value, 83
best
practices, 166167
vendor
education, 252253
worms,
152
vendor
project management, 90
worst
practices, 17
virtual
environments, 9798
See
also best
practices; neutral
virus
protection, best
practices,
practices
viruses,
151
Z
Zachman,
John, 75
W
Zachman
architectural schema,
war
driving, 152
warranties,
best practices, 158159
zombies,
146
weak
matrix, 306
See
also matrix
management
Table of Contents:
|
|||||