Information Systems: a Manager's Guide to Harness Technology Information Systems: a Manager's Guide to Harness Technology

Total Page:16

File Type:pdf, Size:1020Kb

Information Systems: a Manager's Guide to Harness Technology Information Systems: a Manager's Guide to Harness Technology Information Systems: A Manager's Guide to Harness Technology Information Systems: A Manager's Guide to Harness Technology [Author removed at request of original publisher] University of Minnesota Libraries Publishing edition, 2015. This edition adapted from a work originally produced in 2011 by a publisher who has requested that it not receive attribution. Minneapolis, MN Information Systems: A Manager's Guide to Harness Technology by [Author removed at request of original publisher] is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted. Contents Publisher Information vii About the Author viii Acknowledgments ix Dedication xi Preface xii Chapter 1: Setting the Stage: Technology and the Modern Enterprise 1.1 Tech’s Tectonic Shift: Radically Changing Business Landscapes 2 1.2 It’s Your Revolution 4 1.3 Geek Up—Tech Is Everywhere and You’ll Need It to Thrive 7 1.4 The Pages Ahead 13 Chapter 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners from Losers 2.1 Introduction 18 2.2 Powerful Resources 24 2.3 Barriers to Entry, Technology, and Timing 35 2.4 Key Framework: The Five Forces of Industry Competitive Advantage 38 Chapter 3: Zara: Fast Fashion from Savvy Systems 3.1 Introduction 43 3.2 Don’t Guess, Gather Data 48 3.3 Moving Forward 54 Chapter 4: Netflix: The Making of an E-commerce Giant and the Uncertain Future of Atoms to Bits 4.1 Introduction 58 4.2 Tech and Timing: Creating Killer Assets 61 4.3 From Atoms to Bits: Opportunity or Threat? 71 Chapter 5: Moore’s Law: Fast, Cheap Computing and What It Means for the Manager 5.1 Introduction 78 5.2 The Death of Moore’s Law? 91 5.3 Bringing Brains Together: Supercomputing and Grid Computing 95 5.4 E-waste: The Dark Side of Moore’s Law 99 iv Chapter 6: Understanding Network Effects 6.1 Introduction 105 6.2 Where’s All That Value Come From? 107 6.3 One-Sided or Two-Sided Markets? 111 6.4 How Are These Markets Different? 113 6.5 Competing When Network Effects Matter 117 Chapter 7: Peer Production, Social Media, and Web 2.0 7.1 Introduction 128 7.2 Blogs 137 7.3 Wikis 141 7.4 Electronic Social Networks 146 7.5 Twitter and the Rise of Microblogging 152 7.6 Other Key Web 2.0 Terms and Concepts 158 7.7 Prediction Markets and the Wisdom of Crowds 165 7.8 Crowdsourcing 168 7.9 Get SMART: The Social Media Awareness and Response Team 171 Chapter 8: Facebook: Building a Business from the Social Graph 8.1 Introduction 184 8.2 What’s the Big Deal? 187 8.3 The Social Graph 191 8.4 Facebook Feeds—Ebola for Data Flows 194 8.5 Facebook as a Platform 196 8.6 Advertising and Social Networks: A Work in Progress 200 8.7 Privacy Peril: Beacon and the TOS Debacle 207 8.8 Predators and Privacy 211 8.9 One Graph to Rule Them All: Facebook Takes Over the Web 213 8.10 Is Facebook Worth It? 218 Chapter 9: Understanding Software: A Primer for Managers 9.1 Introduction 223 9.2 Operating Systems 226 9.3 Application Software 231 9.4 Distributed Computing 236 9.5 Writing Software 242 9.6 Total Cost of Ownership (TCO): Tech Costs Go Way beyond the Price Tag 246 Chapter 10: Software in Flux: Partly Cloudy and Sometimes Free 10.1 Introduction 251 10.2 Open Source 253 10.3 Why Open Source? 257 10.4 Examples of Open Source Software 260 10.5 Why Give It Away? The Business of Open Source 262 10.6 Cloud Computing: Hype or Hope? 267 10.7 The Software Cloud: Why Buy When You Can Rent? 269 10.8 SaaS: Not without Risks 275 10.9 The Hardware Cloud: Utility Computing and Its Cousins 278 v 10.10 Clouds and Tech Industry Impact 282 10.11 Virtualization: Software That Makes One Computer Act Like Many 286 10.12 Make, Buy, or Rent 288 Chapter 11: The Data Asset: Databases, Business Intelligence, and Competitive Advantage 11.1 Introduction 292 11.2 Data, Information, and Knowledge 295 11.3 Where Does Data Come From? 299 11.4 Data Rich, Information Poor 306 11.5 Data Warehouses and Data Marts 309 11.6 The Business Intelligence Toolkit 313 11.7 Data Asset in Action: Technology and the Rise of Wal-Mart 319 11.8 Data Asset in Action: Harrah’s Solid Gold CRM for the Service Sector 323 Chapter 12: A Manager’s Guide to the Internet and Telecommunications 12.1 Introduction 329 12.2 Internet 101: Understanding How the Internet Works 330 12.3 Getting Where You’re Going 339 12.4 Last Mile: Faster Speed, Broader Access 347 Chapter 13: Information Security: Barbarians at the Gateway (and Just About Everywhere Else) 13.1 Introduction 357 13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation? 359 13.3 Where Are Vulnerabilities? Understanding the Weaknesses 363 13.4 Taking Action 381 Chapter 14: Google: Search, Online Advertising, and Beyond 14.1 Introduction 390 14.2 Understanding Search 396 14.3 Understanding the Increase in Online Ad Spending 403 14.4 Search Advertising 405 14.5 Ad Networks—Distribution beyond Search 411 14.6 More Ad Formats and Payment Schemes 416 14.7 Customer Profiling and Behavioral Targeting 420 14.8 Profiling and Privacy 424 14.9 Search Engines, Ad Networks, and Fraud 429 14.10 The Battle Unfolds 433 vi Publisher Information Information Systems: A Manager’s Guide to Harness Technology is adapted from a work produced and distributed under a Creative Commons license (CC BY-NC-SA) in 2010 by a publisher who has requested that they and the original author not receive attribution. This adapted edition is produced by the University of Minnesota Libraries Publishing through the eLearning Support Initiative. This adaptation has reformatted the original text, and replaced some images and figures to make the resulting whole more shareable. This adaptation has not significantly altered or updated the original 2011 text. This work is made available under the terms of a Creative Commons Attribution-NonCommercial-ShareAlike license. vii viii • INFORMATION SYSTEMS: A MANAGER'S GUIDE TO HARNESS TECHNOLOGY About the Author Information Systems: A Manager’s Guide to Harness Technology is adapted from a work produced by a publisher who has requested that they and the original author not receive attribution. This adaptation is produced by the University of Minnesota Libraries Publishing through the eLearning Support Initiative. Though the publisher has requested that they and the original author not receive attribution, this adapted edition reproduces all original text and sections of the book, except for publisher and author name attribution. Unnamed Author is an associate professor of information systems (IS) at Boston College’s Carroll School of Management. A dedicated teacher and active researcher, Professor Unnamed Author has been recognized for excellence and innovation in teaching by several organizations, including Boston College, BusinessWeek, the Decision Sciences Institute, Beta Gamma Sigma (the business honor society), and The Heights (Boston College’s student newspaper). Professor Unnamed Author’s research has been published in the Harvard Business Review, MIS Quarterly, and other leading IS journals. Professor Unnamed Author has consulted for and taught executive seminars for several organizations, including Accenture, Alcoa, Duke Corporate Education, ING, Partners Healthcare, Staples, State Street, the University of Ulster, and the U.S. Information Agency. His comments on business and technology have appeared in the New York Times, the Associated Press, The Daily Yomiuri (Japan), and The Nation (Thailand), and on National Public Radio and WCVB-TV, among others. Professor Unnamed Author’s courses and research focus on strategy and technology, and he has co-led the Boston College MBA program’s international field study courses to Europe and Asia. As coordinator of the graduate and undergraduate Boston College TechTrek West field studies, Unnamed Author regularly spends time with executives, managers, entrepreneurs, and venture capitalists in Silicon Valley and Seattle. This fieldwork helps him bring current, practice-oriented examples into both the classroom and his writing. He is also the faculty advisor for the BC Information Systems Academy, and co-advisor to the student-run Boston College Venture Competition (which has spawned several venture-backed start-ups). Professor Unnamed Author earned his PhD in information systems from the Syracuse University School of Management, and he holds an MBA and an undergraduate degree in computer science, both from Boston College. viii Acknowledgments Sincerest thanks to Jeff Shelstad and Eric Frank, for their leadership and passion in restructuring the textbook industry and for approaching me to be involved with their efforts. Thanks also to Flat World’s dynamite team of editorial, marketing, and sales professionals—in particular to Jenn Yee, Sharon Koch, and Brett Sullivan. A tremendous thanks to my student research team at Boston College. In particular, the work of Xin (Steven) Liu, Justin Tease, Liz Dean, Nina Stingo, Phil Gill, and Marco Barbosa sped things along and helped me fill this project with rich, interesting examples. I am also deeply grateful to my colleagues at Boston College, especially to my department chair, Jim Gips, and dean, Andy Boynton, for their unwavering support of the project; to Rob Fichman and Jerry Kane for helping shape the social media section; to Sam Ransbotham for guiding me through the minefield of information security; and to Mary Cronin, Peter Olivieri, and Jack Spang for suggestions and encouragement. Thanks also to the many alumni, parents, and friends of Boston College who have so generously invited me to bring my students to visit with and learn from them.
Recommended publications
  • MAGIC Summoning: Towards Automatic Suggesting and Testing of Gestures with Low Probability of False Positives During Use
    JournalofMachineLearningResearch14(2013)209-242 Submitted 10/11; Revised 6/12; Published 1/13 MAGIC Summoning: Towards Automatic Suggesting and Testing of Gestures With Low Probability of False Positives During Use Daniel Kyu Hwa Kohlsdorf [email protected] Thad E. Starner [email protected] GVU & School of Interactive Computing Georgia Institute of Technology Atlanta, GA 30332 Editors: Isabelle Guyon and Vassilis Athitsos Abstract Gestures for interfaces should be short, pleasing, intuitive, and easily recognized by a computer. However, it is a challenge for interface designers to create gestures easily distinguishable from users’ normal movements. Our tool MAGIC Summoning addresses this problem. Given a specific platform and task, we gather a large database of unlabeled sensor data captured in the environments in which the system will be used (an “Everyday Gesture Library” or EGL). The EGL is quantized and indexed via multi-dimensional Symbolic Aggregate approXimation (SAX) to enable quick searching. MAGIC exploits the SAX representation of the EGL to suggest gestures with a low likelihood of false triggering. Suggested gestures are ordered according to brevity and simplicity, freeing the interface designer to focus on the user experience. Once a gesture is selected, MAGIC can output synthetic examples of the gesture to train a chosen classifier (for example, with a hidden Markov model). If the interface designer suggests his own gesture and provides several examples, MAGIC estimates how accurately that gesture can be recognized and estimates its false positive rate by comparing it against the natural movements in the EGL. We demonstrate MAGIC’s effectiveness in gesture selection and helpfulness in creating accurate gesture recognizers.
    [Show full text]
  • Getting the Most out of Information Systems: a Manager's Guide (V
    Getting the Most Out of Information Systems A Manager's Guide v. 1.0 This is the book Getting the Most Out of Information Systems: A Manager's Guide (v. 1.0). This book is licensed under a Creative Commons by-nc-sa 3.0 (http://creativecommons.org/licenses/by-nc-sa/ 3.0/) license. See the license for more details, but that basically means you can share this book as long as you credit the author (but see below), don't make money from it, and do make it available to everyone else under the same terms. This book was accessible as of December 29, 2012, and it was downloaded then by Andy Schmitz (http://lardbucket.org) in an effort to preserve the availability of this book. Normally, the author and publisher would be credited here. However, the publisher has asked for the customary Creative Commons attribution to the original publisher, authors, title, and book URI to be removed. Additionally, per the publisher's request, their name has been removed in some passages. More information is available on this project's attribution page (http://2012books.lardbucket.org/attribution.html?utm_source=header). For more information on the source of this book, or why it is available for free, please see the project's home page (http://2012books.lardbucket.org/). You can browse or download additional books there. ii Table of Contents About the Author .................................................................................................................. 1 Acknowledgments................................................................................................................
    [Show full text]
  • GPU Developments 2018
    GPU Developments 2018 2018 GPU Developments 2018 © Copyright Jon Peddie Research 2019. All rights reserved. Reproduction in whole or in part is prohibited without written permission from Jon Peddie Research. This report is the property of Jon Peddie Research (JPR) and made available to a restricted number of clients only upon these terms and conditions. Agreement not to copy or disclose. This report and all future reports or other materials provided by JPR pursuant to this subscription (collectively, “Reports”) are protected by: (i) federal copyright, pursuant to the Copyright Act of 1976; and (ii) the nondisclosure provisions set forth immediately following. License, exclusive use, and agreement not to disclose. Reports are the trade secret property exclusively of JPR and are made available to a restricted number of clients, for their exclusive use and only upon the following terms and conditions. JPR grants site-wide license to read and utilize the information in the Reports, exclusively to the initial subscriber to the Reports, its subsidiaries, divisions, and employees (collectively, “Subscriber”). The Reports shall, at all times, be treated by Subscriber as proprietary and confidential documents, for internal use only. Subscriber agrees that it will not reproduce for or share any of the material in the Reports (“Material”) with any entity or individual other than Subscriber (“Shared Third Party”) (collectively, “Share” or “Sharing”), without the advance written permission of JPR. Subscriber shall be liable for any breach of this agreement and shall be subject to cancellation of its subscription to Reports. Without limiting this liability, Subscriber shall be liable for any damages suffered by JPR as a result of any Sharing of any Material, without advance written permission of JPR.
    [Show full text]
  • Amigaos 3.2 FAQ 47.1 (09.04.2021) English
    $VER: AmigaOS 3.2 FAQ 47.1 (09.04.2021) English Please note: This file contains a list of frequently asked questions along with answers, sorted by topics. Before trying to contact support, please read through this FAQ to determine whether or not it answers your question(s). Whilst this FAQ is focused on AmigaOS 3.2, it contains information regarding previous AmigaOS versions. Index of topics covered in this FAQ: 1. Installation 1.1 * What are the minimum hardware requirements for AmigaOS 3.2? 1.2 * Why won't AmigaOS 3.2 boot with 512 KB of RAM? 1.3 * Ok, I get it; 512 KB is not enough anymore, but can I get my way with less than 2 MB of RAM? 1.4 * How can I verify whether I correctly installed AmigaOS 3.2? 1.5 * Do you have any tips that can help me with 3.2 using my current hardware and software combination? 1.6 * The Help subsystem fails, it seems it is not available anymore. What happened? 1.7 * What are GlowIcons? Should I choose to install them? 1.8 * How can I verify the integrity of my AmigaOS 3.2 CD-ROM? 1.9 * My Greek/Russian/Polish/Turkish fonts are not being properly displayed. How can I fix this? 1.10 * When I boot from my AmigaOS 3.2 CD-ROM, I am being welcomed to the "AmigaOS Preinstallation Environment". What does this mean? 1.11 * What is the optimal ADF images/floppy disk ordering for a full AmigaOS 3.2 installation? 1.12 * LoadModule fails for some unknown reason when trying to update my ROM modules.
    [Show full text]
  • Understanding and Mitigating the Security Risks of Apple Zeroconf
    2016 IEEE Symposium on Security and Privacy Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf Xiaolong Bai*,1, Luyi Xing*,2, Nan Zhang2, XiaoFeng Wang2, Xiaojing Liao3, Tongxin Li4, Shi-Min Hu1 1TNList, Tsinghua University, Beijing, 2Indiana University Bloomington, 3Georgia Institute of Technology, 4Peking University [email protected], {luyixing, nz3, xw7}@indiana.edu, [email protected], [email protected], [email protected] Abstract—With the popularity of today’s usability-oriented tend to build their systems in a “plug-and-play” fashion, designs, dubbed Zero Configuration or ZeroConf, unclear are using techniques dubbed zero-configuration (ZeroConf ). For the security implications of these automatic service discovery, example, the AirDrop service on iPhone, once activated, “plug-and-play” techniques. In this paper, we report the first systematic study on this issue, focusing on the security features automatically detects another Apple device nearby running of the systems related to Apple, the major proponent of the service to transfer documents. Such ZeroConf services ZeroConf techniques. Our research brings to light a disturb- are characterized by automatic IP selection, host name ing lack of security consideration in these systems’ designs: resolving and target service discovery. Prominent examples major ZeroConf frameworks on the Apple platforms, includ- include Apple’s Bonjour [3], and the Link-Local Multicast ing the Core Bluetooth Framework, Multipeer Connectivity and
    [Show full text]
  • Cooper ( Interaction Design
    Cooper ( Interaction Design Inspiration The Myth of Metaphor Cooper books by Alan Cooper, Chairman & Founder Articles June 1995 Newsletter Originally Published in Visual Basic Programmer's Journal Concept projects Book reviews Software designers often speak of "finding the right metaphor" upon which to base their interface design. They imagine that rendering their user interface in images of familiar objects from the real world will provide a pipeline to automatic learning by their users. So they render their user interface as an office filled with desks, file cabinets, telephones and address books, or as a pad of paper or a street of buildings in the hope of creating a program with breakthrough ease-of- learning. And if you search for that magic metaphor, you will be in august company. Some of the best and brightest designers in the interface world put metaphor selection as one of their first and most important tasks. But by searching for that magic metaphor you will be making one of the biggest mistakes in user interface design. Searching for that guiding metaphor is like searching for the correct steam engine to power your airplane, or searching for a good dinosaur on which to ride to work. I think basing a user interface design on a metaphor is not only unhelpful but can often be quite harmful. The idea that good user interface design is based on metaphors is one of the most insidious of the many myths that permeate the software community. Metaphors offer a tiny boost in learnability to first time users at http://www.cooper.com/articles/art_myth_of_metaphor.htm (1 of 8) [1/16/2002 2:21:34 PM] Cooper ( Interaction Design tremendous cost.
    [Show full text]
  • UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations
    UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations Title Efficient Bug Prediction and Fix Suggestions Permalink https://escholarship.org/uc/item/47x1t79s Author Shivaji, Shivkumar Publication Date 2013 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA SANTA CRUZ EFFICIENT BUG PREDICTION AND FIX SUGGESTIONS A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE by Shivkumar Shivaji March 2013 The Dissertation of Shivkumar Shivaji is approved: Professor Jim Whitehead, Chair Professor Jose Renau Professor Cormac Flanagan Tyrus Miller Vice Provost and Dean of Graduate Studies Copyright c by Shivkumar Shivaji 2013 Table of Contents List of Figures vi List of Tables vii Abstract viii Acknowledgments x Dedication xi 1 Introduction 1 1.1 Motivation . .1 1.2 Bug Prediction Workflow . .9 1.3 Bug Prognosticator . 10 1.4 Fix Suggester . 11 1.5 Human Feedback . 11 1.6 Contributions and Research Questions . 12 2 Related Work 15 2.1 Defect Prediction . 15 2.1.1 Totally Ordered Program Units . 16 2.1.2 Partially Ordered Program Units . 18 2.1.3 Prediction on a Given Software Unit . 19 2.2 Predictions of Bug Introducing Activities . 20 2.3 Predictions of Bug Characteristics . 21 2.4 Feature Selection . 24 2.5 Fix Suggestion . 25 2.5.1 Static Analysis Techniques . 25 2.5.2 Fix Content Prediction without Static Analysis . 26 2.6 Human Feedback . 28 iii 3 Change Classification 30 3.1 Workflow . 30 3.2 Finding Buggy and Clean Changes .
    [Show full text]
  • Automatic Program Repair Using Genetic Programming
    Automatic Program Repair Using Genetic Programming A Dissertation Presented to the Faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements for the Degree Doctor of Philosophy (Computer Science) by Claire Le Goues May 2013 c 2013 Claire Le Goues Abstract Software quality is an urgent problem. There are so many bugs in industrial program source code that mature software projects are known to ship with both known and unknown bugs [1], and the number of outstanding defects typically exceeds the resources available to address them [2]. This has become a pressing economic problem whose costs in the United States can be measured in the billions of dollars annually [3]. A dominant reason that software defects are so expensive is that fixing them remains a manual process. The process of identifying, triaging, reproducing, and localizing a particular bug, coupled with the task of understanding the underlying error, identifying a set of code changes that address it correctly, and then verifying those changes, costs both time [4] and money. Moreover, the cost of repairing a defect can increase by orders of magnitude as development progresses [5]. As a result, many defects, including critical security defects [6], remain unaddressed for long periods of time [7]. Moreover, humans are error-prone, and many human fixes are imperfect, in that they are either incorrect or lead to crashes, hangs, corruption, or security problems [8]. As a result, defect repair has become a major component of software maintenance, which in turn consumes up to 90% of the total lifecycle cost of a given piece of software [9].
    [Show full text]
  • Intuition As Evidence in Philosophical Analysis: Taking Connectionism Seriously
    Intuition as Evidence in Philosophical Analysis: Taking Connectionism Seriously by Tom Rand A thesis submitted in conformity with the requirements for the degree of Ph.D. Graduate Department of Philosophy University of Toronto (c) Copyright by Tom Rand 2008 Intuition as Evidence in Philosophical Analysis: Taking Connectionism Seriously Ph.D. Degree, 2008, by Tom Rand, Graduate Department of Philosophy, University of Toronto ABSTRACT 1. Intuitions are often treated in philosophy as a basic evidential source to confirm/discredit a proposed definition or theory; e.g. intuitions about Gettier cases are taken to deny a justified-true-belief analysis of ‘knowledge’. Recently, Weinberg, Nichols & Stitch (WN&S) provided evidence that epistemic intuitions vary across persons and cultures. In- so-far as philosophy of this type (Standard Philosophical Methodology – SPM) is committed to provide conceptual analyses, the use of intuition is suspect – it does not exhibit the requisite normativity. I provide an analysis of intuition, with an emphasis on its neural – or connectionist – cognitive backbone; the analysis provides insight into its epistemic status and proper role within SPM. Intuition is initially characterized as the recognition of a pattern. 2. The metaphysics of ‘pattern’ is analyzed for the purpose of denying that traditional symbolic computation is capable of differentiating the patterns of interest. 3. The epistemology of ‘recognition’ is analyzed, again, to deny that traditional computation is capable of capturing human acts of recognition. 4. Fodor’s informational semantics, his Language of Thought and his Representational Theory of Mind are analyzed and his arguments denied. Again, the purpose is to deny traditional computational theories of mind.
    [Show full text]
  • Mobile Marketing
    MOBILE MARKETING What are customers thinking about? Thach To Degree Thesis Degree Programme Förnamn Efternamn 2012 DEGREE THESIS Arcada Degree Programme: International Business – BBA 08 Identification number: 10310 Author: Thach To Title: Mobile Marketing Supervisor (Arcada): Peter Mildén Commissioned by: Arcada Polytechnic Abstract: This thesis focuses mainly on consumer’s perception about mobile marketing. Based on that information, some tactics for companies are recommended. The method conducted in this thesis is mainly quantitative, although there is also little qualitative included. The strategy for conducting this research is composing 2 surveys, and the Conjoint Analysis and Descriptive Analysis are used. The results are mainly in agreement with previous re- search. However, some interesting results were revealed and these are critically compared with published sources. Findings describe perceptions of student consumers in Finland, and probably the findings are even more representative of female student consumers in Finland. Keywords: Mobile Marketing, Seventh Mass Media, Cellphone, Con- joint Analysis, Elop Effect, Nokia brand, NFC, Bluetooth, SMS, MMS, E-mail, Augmented Reality, Surround sound Marketing, Engagement Marketing. Number of pages: 77 Language: English Date of acceptance: CONTENTS 1 INTRODUCTION ................................................................................................... 9 1.1 Background ..................................................................................................................
    [Show full text]
  • The Impact of Code Review Coverage and Code Review Participation on Software Quality
    The Impact of Code Review Coverage and Code Review Participation on Software Quality A Case Study of the Qt, VTK, and ITK Projects Shane McIntosh1, Yasutaka Kamei2, Bram Adams3, and Ahmed E. Hassan1 1Queen’s University, Canada 2Kyushu University, Japan 3Polytechnique Montréal, Canada 1{mcintosh, ahmed}@cs.queensu.ca [email protected] [email protected] ABSTRACT 1. INTRODUCTION Software code review, i.e., the practice of having third-party Software code reviews are a well-documented best practice team members critique changes to a software system, is a for software projects. In Fagan's seminal work, formal design well-established best practice in both open source and pro- and code inspections with in-person meetings were found prietary software domains. Prior work has shown that the to reduce the number of errors detected during the testing formal code inspections of the past tend to improve the qual- phase in small development teams [8]. Rigby and Bird find ity of software delivered by students and small teams. How- that the modern code review processes that are adopted in a ever, the formal code inspection process mandates strict re- variety of reviewing environments (e.g., mailing lists or the view criteria (e.g., in-person meetings and reviewer check- Gerrit web application1) tend to converge on a lightweight lists) to ensure a base level of review quality, while the mod- variant of the formal code inspections of the past, where ern, lightweight code reviewing process does not. Although the focus has shifted from defect-hunting to group problem- recent work explores the modern code review process qual- solving [34].
    [Show full text]
  • Johnny Bock Andersen CV for Software Consultancy 1 Summary
    Johnny Bock Andersen CV for Software Consultancy 1 Summary and Introduction The consultant specializes in development and design of advanced and high- performance software. In the areas of compiler, programming language and computer vision and graphics technologies, he has particularly strong skills that he uses in his company, Hardcore Processing, to turn cutting edge technologies into real-life applications. In doing this, he has also gained considerable experience in implementing numerical algorithms where nu- merical stability is often a challenge. He has worked both as an employee and even more so as a consultant for several companies over the years us- ing a very broad spectrum of platforms, tools and languages with many of which he has thorough in-depth experience, which he often gains relatively quickly. He is usually in a good mood, well-liked among colleagues and gladly answers questions. He performs best when focusing on larger tasks alone. From his 32 years of experience, out of which 22 are professional, he has a very strong intuition about what the best, or at least near-optimal, solution is to many complex problems, even when it would be very hard and time-consuming to find the optimal solution by thorough analysis. He has worked more than full time over many of the years, which is hard to reflect with this style of CV where the workload is not fully specified. YearofBirth : 1975 Citizenship: Danish(Denmark) Current residence : Copenhagen, Denmark Education Year Education Place 2004-2010 M.Sc.ComputerScience UniversityofCopenhagen, Denmark The last 102.5 ECTS points were passed in 1.5 years, i.e.
    [Show full text]