By Topic

Software, IEEE

Issue 1 • Date Jan.-Feb. 1997

Filter Results

Displaying Results 1 - 18 of 18
  • What if there were no software piracy?

    Publication Year: 1997 , Page(s): 20 - 21
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (117 KB)  

    Software companies often perceive loss to piracy as a routine cost of doing business, but it is a huge one: in 1996, the software industry lost $15.2 billion worldwide to theft. If you are a software developer, some part of this loss is yours. If it were within your power to stop piracy, what would you gain? You must answer this question before you can make rational decisions on whether to condone piracy or commit additional resources to fight it. The end of piracy would be like the end of the Cold War in microcosm. Barriers to international interaction would be significantly reduced. Software developers could boldly engage in a truly global commerce, without fear that their investment of time and money would be constantly at risk. Our main piracy concern would be to maintain technical superiority over those who would prefer a return to the lawless days. With a better picture of the benefits, you can determine the investment you should make toward ending piracy. You can invest in anti-piracy technology, establish a "no tolerance" policy on piracy in the workplace and at home, and educate the public about your rights and those of others engaged in creative pursuits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Explore Object Mathods, Patterns, and Architectures?

    Publication Year: 1997 , Page(s): 27 - 29
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (136 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investing in a European Test-Tools Tome

    Publication Year: 1997 , Page(s): 86 - 87
    Save to Project icon | Request Permissions | PDF file iconPDF (79 KB)  
    Freely Available from IEEE
  • DTV Agreement Good for Software Developers

    Publication Year: 1997 , Page(s): 88 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (113 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storm Offers Main Excitement at Biggest Conmdex Yet

    Publication Year: 1997 , Page(s): 91 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (936 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Successfully implementing configuration management

    Publication Year: 1997 , Page(s): 98 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    To increase product quality, development efficiency, and enterprise profitability, many organizations are striving to achieve repeatable, engineered software development processes. Effective configuration management is essential to reaching this goal. CM can organize project components and streamline and control software development processes. A fully deployed and integrated CM solution consists of several tools. By carefully designing how CM components fit your processes and how your processes will change as a result of using CM, you can significantly enhance your software quality. We suggest an approach and provide planning and implementation guidelines for a pilot client-server software development project View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified object topology

    Publication Year: 1997 , Page(s): 31 - 35
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    To navigate the object, pattern and architecture fields, the authors have developed a unified object topology, which uses a technology's domain dependency and implementation details to organize relationships with other technologies and to identify how the system will evolve. It also supports object repositories and identifies future research directions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in software inspection

    Publication Year: 1997 , Page(s): 18 - 19
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    In manufacturing, agriculture and transportation, inspections are a routine part of business, making our lives safer and more comfortable. Yet in software, we generally leave inspections to companies that are quite advanced in their process maturity. Why do most companies skip inspections when their is so much to gain? In 1991, the author began the National Software Quality Experiment, an ongoing database of software defects and inspections practice. In his study, participants from dozens of organizations described defects and these were entered into the experiment's database. In this article, the author makes a case for implementing inspections at all levels of software development practice, based on what he has learned thus far View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal methods: promises and problems

    Publication Year: 1997 , Page(s): 73 - 85
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (188 KB)  

    Successfully applying formal methods to software development promises to move us closer to a true engineering discipline. The authors offer suggestions for overcoming the problems that have hindered the use of formal methods thus far View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using patterns to improve our architectural vision

    Publication Year: 1997 , Page(s): 53 - 59
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (144 KB)  

    Pattern languages can play an important role in furthering the use of architecture and objects in software design, but first we must understand what these terms mean. The authors use the work of Christopher Alexander (1975, 1979, 1981, 1985) to illuminate the problems and shed light on future directions in our use of pattern languages in design View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Annualized software delivery

    Publication Year: 1997
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (76 KB)  

    Projects in the commercial software industry are often characterized by frenzied attempts to leapfrog the competition. Companies try to deliver innovative products quickly, and in their ill-fated attempts to serve two masters, both development time and product innovation suffer. A history of the GigaCorp company describes the current situation in more detail View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Professionalism through OO and reuse

    Publication Year: 1997
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (72 KB)  

    The trend towards the reuse of software components through design patterns, class libraries, and frameworks continues and will greatly influence future software development. One expected impact of component reuse is that software will increasingly be viewed as a resource to be used rather than as something to be produced. The paper considers how the object oriented approach can contribute greatly to software development productivity View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use and misuse of focus groups

    Publication Year: 1997 , Page(s): 94 - 95
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (96 KB)  

    Focus groups are a somewhat informal technique that can help you assess user needs and feeling both before interface design and long after implementation. In a focus group, you bring together six to nine users to discuss issues and concerns about the features of a user interface. The group typically lasts about two hours and is run by a moderator who maintains the group's focus. Focus groups often bring out users' spontaneous reactions and ideas and let you observe some group dynamics and organizational issues. The paper discusses the use and misuse of focus groups View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural styles, design patterns, and objects

    Publication Year: 1997 , Page(s): 43 - 52
    Cited by:  Papers (38)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB)  

    Architectural styles, object-oriented design and design patterns all hold promise as approaches that simplify software design and reuse by capturing and exploiting system design knowledge. This article explores the capabilities and roles of the various approaches, their strengths and their limitations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive design of an application-independent architecture

    Publication Year: 1997 , Page(s): 61 - 72
    Cited by:  Papers (12)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB)  

    The authors' development method focuses on a systematic process using precise specification of system components to create application-independent architectures with a high degree of automation-achieved through large-scale code generation-and broad applicability, focusing on real-time systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Superdistribution and the economics of bits

    Publication Year: 1997 , Page(s): 22 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (96 KB)  

    Why is the engineering and distribution of software fundamentally different from the engineering and distribution of other engineered objects? The author presents a unique answer to this question-an answer that could lead to a fundamental change in the way that software professionals view their creations and software marketers sell them. The infrastructure he proposes would make it feasible to buy and sell digital goods with any terms and conditions imaginable: pay-per-year, pay-per-minute, pay-per-save, pay-per-keystroke, and so on. Even today's pay-to-own terms and conditions would remain feasible, with ownership technologically enforced via invocation metering, but precisely which prices, terms and conditions should vendors offer, and which set of conditions would be most desirable to the buyers they hope to attract? Such questions are complicated, but answerable. Each is merely the electronic counterpart to questions we routinely confront in the tangible world of everyday experience, but cyberspace emerged less than a generation ago, which is not nearly enough time to even define-let alone build and deploy-a robust basis for the ownership of digital property. These technical issues are only the easy part compared to the social issues of building a true information-age economy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Idioms and patterns as architectural literature

    Publication Year: 1997 , Page(s): 36 - 42
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB)  

    If patterns are not about objects, and if they reach beyond software architecture, then what is a pattern? The author explores the relationships that might exist between objects, patterns and architecture, then examines their implications for software developers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The fundamentals of information security

    Publication Year: 1997 , Page(s): 15 - 16, 60
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB)  

    Some quality models, such as IS0 9126, fail to include computer security. The author explains why security is an essential but difficult facet of quality. As a software professional, you can take several actions to improve the security of your code: (1) learn the techniques of security; (2) when incorporating security features into a system, think like the attacker, i.e. consider each point as a potential weakest link; and, finally, (3) consult an expert View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software's mission is to build the community of leading and future software practitioners. The magazine delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org