Loading…
Risk Management (Is Not) for Dummies
Software program managers crave a silver bullet in the form of a comprehensive checklist of things to watch so the program does not suffer from bad surprises. Highlighted in this article are some prime examples from almost 15 years' experience acquiring software in Department of Defense program...
Saved in:
Main Author: | |
---|---|
Format: | Report |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Glazewski, Steven R |
description | Software program managers crave a silver bullet in the form of a comprehensive checklist of things to watch so the program does not suffer from bad surprises. Highlighted in this article are some prime examples from almost 15 years' experience acquiring software in Department of Defense programs, from identifying broad areas where software risks tend to hide to describing an eight-step risk management process. While there are no silver bullets to be found, there are a few golden nuggets if you make the focused effort to look!
Published in CROSSTALK: The Journal of Defense Software Engineering, p27-29, Feb 2005. |
format | report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA489496</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA489496</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA4894963</originalsourceid><addsrcrecordid>eNrjZFAJyizOVvBNzEtMT81NzStR0PAsVvDLL9FUSMsvUnApzc3NTC3mYWBNS8wpTuWF0twMMm6uIc4euiklmcnxxSWZeakl8Y4ujiYWliaWZsYEpAEiRSLm</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Risk Management (Is Not) for Dummies</title><source>DTIC Technical Reports</source><creator>Glazewski, Steven R</creator><creatorcontrib>Glazewski, Steven R ; AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH</creatorcontrib><description>Software program managers crave a silver bullet in the form of a comprehensive checklist of things to watch so the program does not suffer from bad surprises. Highlighted in this article are some prime examples from almost 15 years' experience acquiring software in Department of Defense programs, from identifying broad areas where software risks tend to hide to describing an eight-step risk management process. While there are no silver bullets to be found, there are a few golden nuggets if you make the focused effort to look!
Published in CROSSTALK: The Journal of Defense Software Engineering, p27-29, Feb 2005.</description><language>eng</language><subject>Administration and Management ; CODE REUSE ; Computer Programming and Software ; CREATIVITY ; DEPARTMENT OF DEFENSE ; INTERFACES ; MANAGEMENT PLANNING AND CONTROL ; MONITORING ; OFF THE SHELF EQUIPMENT ; PROJECT MANAGEMENT ; REPRINTS ; RISK ANALYSIS ; RISK MANAGEMENT ; SOFTWARE ENGINEERING ; TEST AND EVALUATION ; TEST AND INTEGRATION HARDWARE</subject><creationdate>2005</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27566,27567</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA489496$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Glazewski, Steven R</creatorcontrib><creatorcontrib>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH</creatorcontrib><title>Risk Management (Is Not) for Dummies</title><description>Software program managers crave a silver bullet in the form of a comprehensive checklist of things to watch so the program does not suffer from bad surprises. Highlighted in this article are some prime examples from almost 15 years' experience acquiring software in Department of Defense programs, from identifying broad areas where software risks tend to hide to describing an eight-step risk management process. While there are no silver bullets to be found, there are a few golden nuggets if you make the focused effort to look!
Published in CROSSTALK: The Journal of Defense Software Engineering, p27-29, Feb 2005.</description><subject>Administration and Management</subject><subject>CODE REUSE</subject><subject>Computer Programming and Software</subject><subject>CREATIVITY</subject><subject>DEPARTMENT OF DEFENSE</subject><subject>INTERFACES</subject><subject>MANAGEMENT PLANNING AND CONTROL</subject><subject>MONITORING</subject><subject>OFF THE SHELF EQUIPMENT</subject><subject>PROJECT MANAGEMENT</subject><subject>REPRINTS</subject><subject>RISK ANALYSIS</subject><subject>RISK MANAGEMENT</subject><subject>SOFTWARE ENGINEERING</subject><subject>TEST AND EVALUATION</subject><subject>TEST AND INTEGRATION HARDWARE</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2005</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZFAJyizOVvBNzEtMT81NzStR0PAsVvDLL9FUSMsvUnApzc3NTC3mYWBNS8wpTuWF0twMMm6uIc4euiklmcnxxSWZeakl8Y4ujiYWliaWZsYEpAEiRSLm</recordid><startdate>200502</startdate><enddate>200502</enddate><creator>Glazewski, Steven R</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>200502</creationdate><title>Risk Management (Is Not) for Dummies</title><author>Glazewski, Steven R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA4894963</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Administration and Management</topic><topic>CODE REUSE</topic><topic>Computer Programming and Software</topic><topic>CREATIVITY</topic><topic>DEPARTMENT OF DEFENSE</topic><topic>INTERFACES</topic><topic>MANAGEMENT PLANNING AND CONTROL</topic><topic>MONITORING</topic><topic>OFF THE SHELF EQUIPMENT</topic><topic>PROJECT MANAGEMENT</topic><topic>REPRINTS</topic><topic>RISK ANALYSIS</topic><topic>RISK MANAGEMENT</topic><topic>SOFTWARE ENGINEERING</topic><topic>TEST AND EVALUATION</topic><topic>TEST AND INTEGRATION HARDWARE</topic><toplevel>online_resources</toplevel><creatorcontrib>Glazewski, Steven R</creatorcontrib><creatorcontrib>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Glazewski, Steven R</au><aucorp>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Risk Management (Is Not) for Dummies</btitle><date>2005-02</date><risdate>2005</risdate><abstract>Software program managers crave a silver bullet in the form of a comprehensive checklist of things to watch so the program does not suffer from bad surprises. Highlighted in this article are some prime examples from almost 15 years' experience acquiring software in Department of Defense programs, from identifying broad areas where software risks tend to hide to describing an eight-step risk management process. While there are no silver bullets to be found, there are a few golden nuggets if you make the focused effort to look!
Published in CROSSTALK: The Journal of Defense Software Engineering, p27-29, Feb 2005.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA489496 |
source | DTIC Technical Reports |
subjects | Administration and Management CODE REUSE Computer Programming and Software CREATIVITY DEPARTMENT OF DEFENSE INTERFACES MANAGEMENT PLANNING AND CONTROL MONITORING OFF THE SHELF EQUIPMENT PROJECT MANAGEMENT REPRINTS RISK ANALYSIS RISK MANAGEMENT SOFTWARE ENGINEERING TEST AND EVALUATION TEST AND INTEGRATION HARDWARE |
title | Risk Management (Is Not) for Dummies |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A25%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Risk%20Management%20(Is%20Not)%20for%20Dummies&rft.au=Glazewski,%20Steven%20R&rft.aucorp=AIR%20FORCE%20INST%20OF%20TECH%20WRIGHT-PATTERSON%20AFB%20OH&rft.date=2005-02&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA489496%3C/dtic_1RU%3E%3Cgrp_id%3Ecdi_FETCH-dtic_stinet_ADA4894963%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |