
The Software Tech News is a free publication provided by the DACS as a
resource to the software developmnent community.
To register to recieve your copy Click
Here.
Web
Services Interfaces Back to the future, or the revenge of the clients?
By Enrique Castro Srilu Uppala
December 2, 2004
Web services represent an evolution of the original Web because the Web
becomes accessible by any program and not just a browser.
Read the entire
article on-line at:
http://www.sys-con.com/
Software
as a service
By Eric Knorr , P.J. Connolly
February 11, 2005
How quickly and broadly will IT adopt hosted applications?
Read the entire
article on-line at:
http://www.infoworld.com/
Eastern
Europe to challenge Asia in outsourcing
By Scarlet Pruitt, IDG
News Service
February 16, 2005
Global offshoring of IT services, manufacturing, and other business
functions will continue
to grow over the next three years, with countries in Eastern Europe
taking on India and China
as leading destinations, according to a recent report.
Read the entire
article on-line at:
http://www.infoworld.com/
Encryption
Must Move Beyond SHA
by Bruce Schneier, Counterpane Internet Security Inc.
AUGUST 30, 2004
(COMPUTERWORLD)
At the Crypto 2004 conference in Santa Barbara, Calif.,
this month, researchers announced several weaknesses in common hash
functions. These results,
while mathematically significant, aren't cause for alarm. But even so,
it's probably time for
the cryptography community to get together and create a new hash
standard.
Read the entire
article on-line at: http://www.computerworld.com/
Researchers
find security flaw in SHA-1 algorithm
by Paul Roberts
FEBRUARY 17, 2005 (IDG NEWS SERVICE)
Security experts are warning that a security flaw has been found in a
powerful data encryption algorithm, dubbed SHA-1, by a team of
scientists from Shandong
University in China. The three scientists are circulating a paper
within the cryptographic research
community that describes
successful tests of a technique that could speed up how fast SHA-1
could be compromised.
Read the entire
article on-line at: http://www.computerworld.com/
Why
IT Projects Fail
by Jian Zhen
FEBRUARY 07, 2005
(COMPUTERWORLD)
It's estimated that over 50% -- some say 80% -- of all
large IT projects fail. The reasons for that startling failure rate
aren't mysterious. Too many companies make the same mistakes too many
times. I've identified five of the most common causes for failure. I've
also come up with some questions your organization should answer before
it starts a project, to boost the chance of success.
Read the entire
article on-line at: http://www.computerworld.com/
Federal
agencies get a D+ on cybersecurity
by Jaikumar Vijayan
FEBRUARY 17, 2005
(COMPUTERWORLD)
Despite some improvements over last year, the overall
security of federal government computer systems still merits only a D+
average, with seven of the 24 agencies receiving failing grades in the
federal computer security report card
released by the House Government Reform Committee yesterday.
Read the entire
article on-line at: http://www.computerworld.com/
Planning
and Scanning: Keys to Agile Project Management
by Jim Highsmith,
Cutter
Consortium
FEBRUARY 11, 2005
(CUTTER CONSORTIUM)
Agile software development and project management (ASDPM)
is geared toward managing uncertainty -- uncertainty related to "ends"
(customer objectives and requirements) and uncertainty related to
"means" (technology and people).
Read the entire
article on-line at: http://www.computerworld.com/
Software
Selection: You Have to Account for the Old Brain
by Douglas Greff
FEBRUARY 14, 2005
(COMPUTERWORLD)
Organizations spend millions of dollars selecting and
implementing the wrong software, for all the wrong reasons, all of the
time. To illustrate, a study done earlier this year by The Standish
Group International Inc. estimated that 30%
of all software projects are canceled, and of those that find their way
to completion, nine out of 10 hit the finish line late. And if you
think that's startling, you had better sit down for this: A whopping
60% of organizations rated their software projects as failures. The
fact that this trend isn't improving tells us that there is something
fundamentally wrong with our protocol approach to software selection
and implementation.
Read the entire
article on-line at: http://www.computerworld.com/
The
Engineering of Supersystems
by Graham Hellestrand,
Vast Systems Technology Corp.
IEEE Computing
The average car today contains from 20 to 80 computers executing a
couple hundred million to several billion instructions per second.
Typically, these computer systems communicate
through two to four networks that use various protocols with varying
packet transit times, bus bandwidths, and failure tolerances.
Read the entire
article on-line at:
http://www.computer.org/
The Data & Analysis Center for
Software (DACS) provides this E-News as a free service to provide you
summaries of, and links to, recent articles that may be of interest to
you, the busy software engineer and software manager, had you had time
to scour the web to find these articles. These articles are all
available on-line for you to read. E-news provides on-line articles or
on-line white papers that are not product advertisements, but rather
articles of general interest that may help you to be more productive.
Typically, as exemplified by the articles in this issue, many of the
links will be to recent articles that deal with software integration
and software standards. We will also tell you of new information and
happenings that are available from the DACS, either on our website or
in hardcopy format. Please let us know what you think of this E-News
idea by E-mailing [email protected]. Also if you have article or
white paper suggestions that are not commercial, please send them to
the same address. |