Software Defect Reduction Top 10 List

Total Page:16

File Type:pdf, Size:1020Kb

Software Defect Reduction Top 10 List SOFTWARE MANANGEMENT TWO Current software projects spend about Software 40 to 50 percent of their effort on avoid- able rework. Such rework consists of effort spent fixing software difficulties that could Defect Reduction have been discovered earlier and fixed less expensively or avoided altogether. By implication, then, some effort must con- sist of “unavoidable rework,” an obser- Top 10 List vation that has gained increasing credibility with the growing realization Barry Boehm, University of Southern California that better user-interactive systems result from emergent processes. In such Victor R. Basili, University of Maryland processes, the requirements emerge from prototyping and other multistakeholder- shared learning activities, a departure from traditional reductionist processes that stipulate requirements in advance, ecently, a National Science insight has been a major driver in focus- then reduce them to practice via design Foundation grant enabled us to ing industrial software practice on thor- and coding. Emergent processes indicate establish the Center for Empiri- ough requirements analysis and design, that changes to a system’s definition that R cally Based Software Engineer- on early verification and validation, and make it more cost-effective should not be ing. CeBASE seeks to transform on up-front prototyping and simulation discouraged by classifying them as avoid- software engineering as much as pos- to avoid costly downstream fixes.” able defects. sible from a fad-based practice to an engineering-based practice through deri- vation, organization, and dissemination Software’s complexity and of empirical data on software develop- accelerated development ment and evolution phenomenology. The phrase “as much as possible” reflects the schedules make avoiding defects fact that software development must remain a people-intensive and continu- difficult. These 10 techniques can ally changing field. We have found, how- help reduce the flaws in your code. ever, that researchers have established objective and quantitative data, relation- ships, and predictive models that help For this updated list, we have added Reducing avoidable rework can pro- software developers avoid predictable pit- the word “often” to reflect additional vide significant improvements in software falls and improve their ability to predict insights about this observation. One productivity. In our behavioral analysis and control efficient software projects. insight shows the cost-escalation factor of how software cost drivers affected Here we describe developments in this for small, noncritical software systems to effort for the Cocomo II model (B. Boehm area that have taken place since the publi- be more like 5:1 than 100:1. This ratio et al., Software Cost Estimation with cation of “Industrial Metrics Top 10 List” reveals that we can develop such systems Cocomo II, Prentice Hall, 2000), we in 1987 (B. Boehm, IEEE Software, Sept. more efficiently in a less formal, continu- found that most of the effort savings gen- 1987, pp. 84-85). Given that CeBASE ous prototype mode that still emphasizes erated by improving software process places a high priority on software defect re- getting things right early rather than late. maturity, software architectures, and soft- duction, we think it is fitting to update that Another insight reveals that good ware risk management came from reduc- earlier article by providing the following architectural practices can significantly tions in avoidable rework. Software Defect Reduction Top 10 List. reduce the cost-escalation factor even for large critical systems. Such practices THREE ONE reduce the cost of most fixes by confining About 80 percent of avoidable rework Finding and fixing a software problem them to small, well-encapsulated mod- comes from 20 percent of the defects. after delivery is often 100 times more ules. A good example is the million-line That 80 percent value may be lower expensive than finding and fixing it dur- CCPDS-R system described in Walker for smaller systems and higher for very ing the requirements and design phase. Royce’s book, Software Project Manage- large ones. Two major sources of avoid- As Boehm observed in 1987, “This ment (Addison-Wesley, 1998). able rework involve hastily specified January 2001 135 Software Management requirements and nominal-case design them later, we seek techniques that find tions. Improvements in fault detection and development, in which late accom- defects as early as possible. Numerous rates vary from 15 to 50 percent. Further, modation of off-nominal requirements studies confirm that peer review provides focused reading techniques facilitate train- causes major architecture, design, and an effective technique that catches from ing of inexperienced personnel, improve code breakage. A tracking system for 31 to 93 percent of the defects, with a communication about the process, and software-problem reports that records median of around 60 percent. Thus, the foster continuous improvement. the effort to fix each defect lets you ana- 60 percent value cited in the 1987 col- lyze the data fairly easily to determine umn remains a reasonable estimate. EIGHT and address additional major sources of Disciplined personal practices can rework. reduce defect introduction rates by up to 75 percent. FOUR Peer reviews, Several disciplined personal processes About 80 percent of the defects come analysis tools, have been introduced into practice. from 20 percent of the modules, and and testing catch These include Harlan Mills’s Cleanroom about half the modules are defect free. different classes of software development process and Watts Studies from different environments defects at different Humphrey’s Personal Software Process over many years have shown, with amaz- points in the (PSP). ing consistency, that between 60 and 90 development cycle. Data from the use of Cleanroom at percent of the defects arise from 20 per- NASA have shown 25 to 75 percent reduc- cent of the modules, with a median of tions in failure rates during testing. Use of about 80 percent. With equal consis- Cleanroom also showed a reduction in tency, nearly all defects cluster in about Factors affecting the percentage of rework effort so that only 5 percent of the half the modules produced. defects caught include the number and fixes took more than an hour, whereas the Obviously, then, identifying the char- type of peer reviews performed, the size standard process caused more than 60 per- acteristics of error-prone modules in a and complexity of the system, and the cent of the fixes to take that long. particular environment can prove worth- frequency of defects better caught by exe- PSP’s strong focus on root-cause analy- while. A variety of context-dependent cution, such as concurrency and algo- sis of an individual’s software defects and factors contribute to error-proneness. rithm defects. Our studies have provided overruns, and on developing personal Some factors usually contribute to error- evidence that peer reviews, analysis tools, checklists and practices to avoid future proneness regardless of context, however, and testing catch different classes of recurrence, has significantly reduced per- including the level of data coupling and defects at different points in the devel- sonal defect rates. Developers frequently cohesion, size, complexity, and the opment cycle. We need further empirical enjoy defect reductions of 10:1 between amount of change to reused code. research to help choose the best mixed exercises 1 and 10 in the PSP training strategy for defect-reduction investments. course. FIVE Effects at the project level are more scat- About 90 percent of the downtime SEVEN tered. They depend on factors such as the comes from, at most, 10 percent of the Perspective-based reviews catch 35 organization’s existing software maturity defects. percent more defects than nondirected level and the staff’s and organization’s Some defects disproportionately affect reviews. willingness to operate within a highly a system’s downtime and reliability. For A scenario-based reading technique structured software culture. When you example, an analysis of the software fail- (V.R. Basili, “Evolving and Packaging couple PSP with the strongly compatible ure history of nine large IBM software Reading Technologies,” J. Systems and Team Software Process (TSP), defect products revealed that about 0.3 percent Software, vol. 38, no. 1, 1997, pp. 3-12) reduction rates can soar to factors of 10 or of the defects accounted for about 90 offers a set of formal procedures for higher for an organization that operates percent of the downtime. Thus, risk- defect detection based on varying per- at a modest maturity level. Results tend to based testing—including understanding spectives. The union of several perspec- be less spectacular if the organization a system’s operational profiles and tives into a single inspection offers broad already employs highly mature processes. emphasizing testing of high-risk scenar- yet focused coverage of the document The June 2000 special issue of ios—is clearly cost-effective. being reviewed. This approach seeks to CrossTalk, “Keeping Time with PSP and generate focused techniques aimed at TSP,” offers a good set of relevant dis- SIX specific defect-detection goals by taking cussions, including experience showing Peer reviews catch 60 percent of the advantage of an organization’s existing that adding PSP and TSP to a CMM defects. defect history. Level 5 organization reduced acceptance Given that finding and fixing most Scenario-based reading techniques have test defects by about 50 percent overall, defects earlier in the project development been applied in requirements, object-ori- and reduced high-priority defects by cycle is more cost-effective than finding ented design, and user interface inspec- about 75 percent. 136 Computer NINE A 1987 study in this area (P.S. Brown software engineering research challenge All other things being equal, it costs 50 and J.D. Gould, “An Experimental Study is one of several identified by a National percent more per source instruction to of People Creating Spreadsheets,” ACM Science Foundation study, “Gaining develop high-dependability software Trans.
Recommended publications
  • Top 15 ERP Software Vendors – 2010
    Top 15 ERP Software Vendors – 2010 Profiles of the Leading ERP Vendors Find the best ERP system for your company. For more information visit Business-Software.com/ERP. About ERP Software Enterprise resource planning (ERP) is not a new concept. It was introduced more than 40 years ago, when the first ERP system was created to improve inventory control and management at manufacturing firms. Throughout the 70’s and 80’s, as the number of companies deploying ERP increased, its scope expanded quite a bit to include various production and materials management functions, although it was designed primarily for use in manufacturing plants. In the 1990’s, vendors came to realize that other types of business could benefit from ERP, and that in order for a business to achieve true organizational efficiency, it needed to link all its internal business processes in a cohesive and coordinated way. As a result, ERP was transformed into a broad-reaching environment that encompassed all activities across the back office of a company. What is ERP? An ERP system combines methodologies with software and hardware components to integrate numerous critical back-office functions across a company. Made up of a series of “modules”, or applications that are seamlessly linked together through a common database, an ERP system enables various departments or operating units such as Accounting and Finance, Human Resources, Production, and Fulfillment and Distribution to coordinate activities, share information, and collaborate. Key Benefits for Your Company ERP systems are designed to enhance all aspects of key operations across a company’s entire back-office – from planning through execution, management, and control.
    [Show full text]
  • Avoiding the Top 10 Software Security Design Flaws
    AVOIDING THE TOP 10 SOFTWARE SECURITY DESIGN FLAWS Iván Arce, Kathleen Clark-Fisher, Neil Daswani, Jim DelGrosso, Danny Dhillon, Christoph Kern, Tadayoshi Kohno, Carl Landwehr, Gary McGraw, Brook Schoenfield, Margo Seltzer, Diomidis Spinellis, Izar Tarandach, and Jacob West CONTENTS Introduction ..................................................................................................................................................... 5 Mission Statement ..........................................................................................................................................6 Preamble ........................................................................................................................................................... 7 Earn or Give, but Never Assume, Trust ...................................................................................................9 Use an Authentication Mechanism that Cannot be Bypassed or Tampered With .................... 11 Authorize after You Authenticate ...........................................................................................................13 Strictly Separate Data and Control Instructions, and Never Process Control Instructions Received from Untrusted Sources ........................................................................................................... 14 Define an Approach that Ensures all Data are Explicitly Validated .............................................16 Use Cryptography Correctly ....................................................................................................................
    [Show full text]
  • HECO-UNIX-Top Cladding Screw Into the Timber
    HECO-UNIX -top Cladding Screw THE UNIQUE CLADDING SCREW WITH CONTRACTION EFFECT APPLICATION EXAMPLES Façade construction Secure and reliable façade fixing Louvred façades 1 2 3 The variable pitch of the HECO-UNIX full The smaller thread pitch means that the Gap free axial fixing of the timber board thread takes hold boards are clamped firmly together via the HECO-UNIX full thread PRODUCT CHARACTERISTICS The HECO-UNIX-top Cladding Screw into the timber. The façade is secured axially via with contraction effect the thread, which increases the pull-out strength. HECO-UNIX-top full thread This results in fewer fastening points and an Timber façades are becoming increasingly popular ultimately more economical façade construction. Contraction effect thanks to the full in both new builds and renovations. This applica - Thanks to the full thread, the sole function of thread with variable thread pitch tion places high demands on fastenings. The the head is to fit the screw drive. As such, the Axial fixing of component façade must be securely fixed to the sub-structure HECO-UNIX-top façade screw has a small and the fixings should be invisible or attractive raised head, which allows simple, concealed Reduced spreading effect thanks to to look at. In addition, the structure must be installation preventing any water penetration the HECO-TOPIX ® tip permanently sound if it is constantly exposed to through the screw. The screws are made of the weather. The HECO-UNIX-top façade screw stainless steel A2, which safely eliminates the Raised countersunk head is the perfect solution to all of these requirements.
    [Show full text]
  • Manuscript Instructions/Template
    INCOSE Working Group Addresses System and Software Interfaces Sarah Sheard, Ph.D. Rita Creel CMU Software Engineering Institute CMU Software Engineering Institute (412) 268-7612 (703) 247-1378 [email protected] [email protected] John Cadigan Joseph Marvin Prime Solutions Group, Inc. Prime Solutions Group, Inc. (623) 853-0829 (623) 853-0829 [email protected] [email protected] Leung Chim Michael E. Pafford Defence Science & Technology Group Johns Hopkins University +61 (0) 8 7389 7908 (301) 935-5280 [email protected] [email protected] Copyright © 2018 by the authors. Published and used by INCOSE with permission. Abstract. In the 21st century, when any sophisticated system has significant software content, it is increasingly critical to articulate and improve the interface between systems engineering and software engineering, i.e., the relationships between systems and software engineering technical and management processes, products, tools, and outcomes. Although systems engineers and software engineers perform similar activities and use similar processes, their primary responsibilities and concerns differ. Systems engineers focus on the global aspects of a system. Their responsibilities span the lifecycle and involve ensuring the various elements of a system—e.g., hardware, software, firmware, engineering environments, and operational environments—work together to deliver capability. Software engineers also have responsibilities that span the lifecycle, but their focus is on activities to ensure the software satisfies software-relevant system requirements and constraints. Software engineers must maintain sufficient knowledge of the non-software elements of the systems that will execute their software, as well as the systems their software must interface with.
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • What Is UNIX? the Directory Structure Basic Commands Find
    What is UNIX? UNIX is an operating system like Windows on our computers. By operating system, we mean the suite of programs which make the computer work. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. The Directory Structure All the files are grouped together in the directory structure. The file-system is arranged in a hierarchical structure, like an inverted tree. The top of the hierarchy is traditionally called root (written as a slash / ) Basic commands When you first login, your current working directory is your home directory. In UNIX (.) means the current directory and (..) means the parent of the current directory. find command The find command is used to locate files on a Unix or Linux system. find will search any set of directories you specify for files that match the supplied search criteria. The syntax looks like this: find where-to-look criteria what-to-do All arguments to find are optional, and there are defaults for all parts. where-to-look defaults to . (that is, the current working directory), criteria defaults to none (that is, select all files), and what-to-do (known as the find action) defaults to ‑print (that is, display the names of found files to standard output). Examples: find . –name *.txt (finds all the files ending with txt in current directory and subdirectories) find . -mtime 1 (find all the files modified exact 1 day) find . -mtime -1 (find all the files modified less than 1 day) find . -mtime +1 (find all the files modified more than 1 day) find .
    [Show full text]
  • LS Series Pistons Professional Professional As the Leader in LS-1 Forged Pistons, Wiseco Pulled out All the Stops When Designing the LS Series
    Pro Prof ProfessionalProfessional Professional P Professional Hi-PerformanceForged ROFESSIONAL Professional Automotive Professional Professional ProfessionalCHEVY Professional ProfessionalRacing Pistons Professional Professional ProfessionalEFI Late Models Professional Professio for Professional NEW ArmorGlide Coated Skirts LS Series Pistons Professional Professional As the leader in LS-1 forged pistons, Wiseco pulled out all the stops when designing the LS Series. These pistons are designed to accommodate the reluctor ring on stroker cranks without having to notch the pin bosses. Offset pins like O.E. and skirt shapes specifi cally designed for street applications make these the best available. They have been tested successfully in the highest horsepower applications. LS Series LS 5.3 • 3.622 Stroke Std. Tension Rings Kit Bore Comp. Stroke Rod 0 Deck at Std. Avg. Volume Compression ratio at: Pin Part # 1/16, 1/16, 3mm Valve Part # Ht. Deck Ht. Wt. 58cc 61cc (included) (included) Pocket K474M96 3.780 3785HF 1.300 3.622 6.098 9.209 9.240 FT -2.2 10.9 10.4 S643 LS1,2,6 K474M965 3.800 6.125 9.236 .927 x 2.250 3805HF LS 5.3 • 4.000 Stroke K473M96 3.780 3785HF 1.110 4.000 6.098 9.209 9.240 -7cc 11.2 10.8 S643 LS1,2,6 K473M965 3.800 6.125 9.236 .927 x 2.250 3805HF LS7 • OE Titanium Rod & Pin Dia. Kit Comp. Std. Avg. Compression ratio at: Pin Part # Std. Tension Rings Valve Bore Stroke Rod 0 Deck at Volume 1.2, 1.2, 3mm Part # Ht. Deck Ht. Wt. 72cc (included) (included) Pocket K0004X125 4.125 4127GFX 1.175 4.000 6.067 9.242 9.240 2.5 12.0 S761 LS7 K0004X130 4.130 .9252 x 2.250 4137GFX • 2618 Alloy: High strength.
    [Show full text]
  • GNU M4, Version 1.4.7 a Powerful Macro Processor Edition 1.4.7, 23 September 2006
    GNU M4, version 1.4.7 A powerful macro processor Edition 1.4.7, 23 September 2006 by Ren´eSeindal This manual is for GNU M4 (version 1.4.7, 23 September 2006), a package containing an implementation of the m4 macro language. Copyright c 1989, 1990, 1991, 1992, 1993, 1994, 2004, 2005, 2006 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License.” i Table of Contents 1 Introduction and preliminaries ................ 3 1.1 Introduction to m4 ............................................. 3 1.2 Historical references ............................................ 3 1.3 Invoking m4 .................................................... 4 1.4 Problems and bugs ............................................. 8 1.5 Using this manual .............................................. 8 2 Lexical and syntactic conventions ............ 11 2.1 Macro names ................................................. 11 2.2 Quoting input to m4........................................... 11 2.3 Comments in m4 input ........................................ 11 2.4 Other kinds of input tokens ................................... 12 2.5 How m4 copies input to output ................................ 12 3 How to invoke macros........................
    [Show full text]
  • GNU M4, Version 1.4.19 a Powerful Macro Processor Edition 1.4.19, 28 May 2021
    GNU M4, version 1.4.19 A powerful macro processor Edition 1.4.19, 28 May 2021 by Ren´eSeindal, Fran¸coisPinard, Gary V. Vaughan, and Eric Blake ([email protected]) This manual (28 May 2021) is for GNU M4 (version 1.4.19), a package containing an implementation of the m4 macro language. Copyright c 1989{1994, 2004{2014, 2016{2017, 2020{2021 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." i Table of Contents 1 Introduction and preliminaries ::::::::::::::::: 3 1.1 Introduction to m4 :::::::::::::::::::::::::::::::::::::::::::::: 3 1.2 Historical references :::::::::::::::::::::::::::::::::::::::::::: 3 1.3 Problems and bugs ::::::::::::::::::::::::::::::::::::::::::::: 4 1.4 Using this manual :::::::::::::::::::::::::::::::::::::::::::::: 5 2 Invoking m4::::::::::::::::::::::::::::::::::::::: 7 2.1 Command line options for operation modes ::::::::::::::::::::: 7 2.2 Command line options for preprocessor features ::::::::::::::::: 8 2.3 Command line options for limits control ::::::::::::::::::::::: 10 2.4 Command line options for frozen state ::::::::::::::::::::::::: 11 2.5 Command line options for debugging :::::::::::::::::::::::::: 11 2.6 Specifying input files on the command line :::::::::::::::::::::
    [Show full text]
  • An Overview of the Scala Programming Language
    An Overview of the Scala Programming Language Second Edition Martin Odersky, Philippe Altherr, Vincent Cremet, Iulian Dragos Gilles Dubochet, Burak Emir, Sean McDirmid, Stéphane Micheloud, Nikolay Mihaylov, Michel Schinz, Erik Stenman, Lex Spoon, Matthias Zenger École Polytechnique Fédérale de Lausanne (EPFL) 1015 Lausanne, Switzerland Technical Report LAMP-REPORT-2006-001 Abstract guage for component software needs to be scalable in the sense that the same concepts can describe small as well as Scala fuses object-oriented and functional programming in large parts. Therefore, we concentrate on mechanisms for a statically typed programming language. It is aimed at the abstraction, composition, and decomposition rather than construction of components and component systems. This adding a large set of primitives which might be useful for paper gives an overview of the Scala language for readers components at some level of scale, but not at other lev- who are familar with programming methods and program- els. Second, we postulate that scalable support for compo- ming language design. nents can be provided by a programming language which unies and generalizes object-oriented and functional pro- gramming. For statically typed languages, of which Scala 1 Introduction is an instance, these two paradigms were up to now largely separate. True component systems have been an elusive goal of the To validate our hypotheses, Scala needs to be applied software industry. Ideally, software should be assembled in the design of components and component systems. Only from libraries of pre-written components, just as hardware is serious application by a user community can tell whether the assembled from pre-fabricated chips.
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • Balancing Agility and Discipline a Guide for the Perplexed
    Balancing Agility and Discipline A Guide for the Perplexed Written by Barry Boehm & Richard Turner August 2003 Presented by Ben Underwood for EECS810 Fall 2015 Balancing Agility and Discipline, A Guide for the Perplexed: Boehm & Turner 1 Presentation Outline What to Expect • Meet the Authors • Discipline, Agility, and Perplexity • Contrasts and Home Grounds • A Day in the Life • Expanding the Home Grounds: Two Case Studies • Using Risk to Balance Agility and Discipline • Conclusions • Q & A Balancing Agility and Discipline, A Guide for the Perplexed: Boehm & Turner 2 Meet the Authors Barry Boehm • Born 1935 • Educated in Mathematics at Harvard and UCLA • Worked in Programming and Information Sciences in private industry and government • General Dynamics, Rand Corporation, TRW, and DARPA • Currently at the University of Southern California • Professor of Software Engineering • Founding Director of USC’s Center for Systems and Software Engineering Balancing Agility and Discipline, A Guide for the Perplexed: Boehm & Turner 3 Meet the Authors Richard Turner • Born 1954 • Educated in Mathematics, Computer Science, and Engineering Management • Worked in Computer Science, Technology, and Research in private industry and government • FAA, Systems Engineering Research Center, Software Engineering Institute, George Washington University, and more • One of the core authors of CMMI • Currently at Stevens Institute of Technology • Professor in the School of Systems and Enterprises Balancing Agility and Discipline, A Guide for the Perplexed: Boehm &
    [Show full text]