13 results on '"Dangle, Kathleen"'
Search Results
2. Software process improvement in small organizations: a case study
- Author
-
Dangle, Kathleen Coleman, Larsen, Patricia, Zelkowitz, Marvin V., and shaw, Michele
- Subjects
Software development service ,Company business management ,Computer programming services -- Management - Published
- 2005
3. Obtaining Valid Safety Data for Software Safety Measurement and Process Improvement
- Author
-
Basili, Victor r, Zelkowitz, Marvin V, Layman, Lucas, Dangle, Kathleen, and Diep, Madeline
- Subjects
Quality Assurance And Reliability - Abstract
We report on a preliminary case study to examine software safety risk in the early design phase of the NASA Constellation spaceflight program. Our goal is to provide NASA quality assurance managers with information regarding the ongoing state of software safety across the program. We examined 154 hazard reports created during the preliminary design phase of three major flight hardware systems within the Constellation program. Our purpose was two-fold: 1) to quantify the relative importance of software with respect to system safety; and 2) to identify potential risks due to incorrect application of the safety process, deficiencies in the safety process, or the lack of a defined process. One early outcome of this work was to show that there are structural deficiencies in collecting valid safety data that make software safety different from hardware safety. In our conclusions we present some of these deficiencies.
- Published
- 2010
4. Empirical Findings in Agile Methods
- Author
-
Lindvall, Mikael, primary, Basili, Vic, additional, Boehm, Barry, additional, Costa, Patricia, additional, Dangle, Kathleen, additional, Shull, Forrest, additional, Tesoriero, Roseanne, additional, Williams, Laurie, additional, and Zelkowitz, Marvin, additional
- Published
- 2002
- Full Text
- View/download PDF
5. Early Identification of SE-Related Program Risks: Opportunities for DoD Systems Engineering (SE) Transformation via SE Effectiveness Measures (EMs) and Evidence-Based Reviews
- Author
-
Boehm, Barry, primary, Ingold, Dan, primary, Brown, Winsor, primary, Lane, JoAnn, primary, Friedman, George, primary, Dangle, Kathleen, primary, Esker, Linda, primary, Shull, Forrest, primary, Turner, Rich, primary, and Wade, Jon, primary
- Published
- 2009
- Full Text
- View/download PDF
6. Early Identification of SE-Related Program Risks
- Author
-
UNIVERSITY OF SOUTHERN CALIFORNIA LOS ANGELES, Boehm, Barry, Ingold, Dan, Dangle, Kathleen, Turner, Rich, Componation, Paul, UNIVERSITY OF SOUTHERN CALIFORNIA LOS ANGELES, Boehm, Barry, Ingold, Dan, Dangle, Kathleen, Turner, Rich, and Componation, Paul
- Abstract
This paper summarizes the results of a DoD Systems Engineering Research Center (SERC) project to synthesize analyses of DoD SE effectiveness risk sources into a lean framework and toolset for early identification of SE-related program risks. It includes concepts of operation which enable project sponsors and performers to agree on the nature and use of more effective evidence-based reviews. These enable early detection of missing SE capabilities or personnel competencies with respect to a framework of Goals, Critical Success Factors (CSFs), and Questions determined from leading DoD early-SE CSF analyses. The SE Effectiveness Measurement (EM) tools enable risk-based prioritization of corrective actions, as shortfalls in evidence for each question are early uncertainties, which when combined with the relative system impact of a negative answer to the question, translates into the degree of risk that needs to be managed to avoid system overruns and incomplete deliveries., Proceedings of the Conference on Systems Engineering Research, Hoboken, NJ, March 2010. DOD-sponsored. U.S. Government or Federal Rights License
- Published
- 2010
7. Early Identification of SE-Related Program Risks: Opportunities for DoD Systems Engineering (SE) Transformation via SE Effectiveness Measures (EMs) and Evidence-Based Reviews
- Author
-
SYSTEMS ENGINEERING RESEARCH CENTER HOBOKEN NJ, Boehm, Barry, Ingold, Dan, Brown, Winsor, Lane, JoAnn, Friedman, George, Dangle, Kathleen, Esker, Linda, Shull, Forrest, Turner, Rich, Wade, Jon, SYSTEMS ENGINEERING RESEARCH CENTER HOBOKEN NJ, Boehm, Barry, Ingold, Dan, Brown, Winsor, Lane, JoAnn, Friedman, George, Dangle, Kathleen, Esker, Linda, Shull, Forrest, Turner, Rich, and Wade, Jon
- Abstract
DoD programs need effective systems engineering (SE) to succeed. DoD program managers need early warning of any risks to achieving effective SE. This SERC project has synthesized analyses of DoD SE effectiveness risk sources into a lean framework and toolset for early identification of SE-related program risks. Three important points need to be made about these risks. * They are generally not indicators of bad SE. Although SE can be done badly, more often the risks are consequences of inadequate program funding (SE is the first victim of an underbudgeted program), of misguided contract provisions (when a program manager is faced with the choice between allocating limited SE resources toward producing contract-incentivized functional specifications vs. addressing key performance parameter risks, the path of least resistance is to obey the contract), or of management temptations to show early progress on the easy parts while deferring the hard parts till later. * Analyses have shown that unaddressed risk generally leads to serious budget and schedule overruns. * Risks are not necessarily bad. If an early capability is needed, and the risky solution has been shown to be superior to the alternatives, accepting and focusing on mitigating the risk is generally better than waiting for a better alternative to show up. Unlike traditional schedule-based and event-based reviews, the SERC SE EM technology enables sponsors and performers to agree on the nature and use of more effective evidence-based reviews. These enable early detection of missing SE capabilities or personnel competencies with respect to a framework of Goals, Critical Success Factors (CSFs), and Questions determined by the EM task from the leading DoD early-SE CSF analyses. The EM tools enable risk-based prioritization of corrective actions, as shortfalls in evidence for each question are early uncertainties.
- Published
- 2009
8. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008
- Author
-
SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT, Basili, Victor, Dangle, Kathleen, Esker, Linda, Marotta, Frank, Rus, Ioana, Brosgol, Benjamin M., Jamin, Sugih, Arthur, James D., Ravichandar, Ramya, Wisnosky, Dennis E., Feldshteyn, Dimitry, Mancuso, Wil, Gough, Al, Riutort, Eric J., Strassman, Paul, SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT, Basili, Victor, Dangle, Kathleen, Esker, Linda, Marotta, Frank, Rus, Ioana, Brosgol, Benjamin M., Jamin, Sugih, Arthur, James D., Ravichandar, Ramya, Wisnosky, Dennis E., Feldshteyn, Dimitry, Mancuso, Wil, Gough, Al, Riutort, Eric J., and Strassman, Paul
- Abstract
CONTENTS: 1) Measures and Risk Indicators for Early Insight Into Software Safety by Dr. Victor Basili, Kathleen Dangle, Linda Esker, Frank Marotta, and Ioana Rus. While software increases functionality and control, it also adds complexity and vulnerability to hazards. This article explores a measurement approach that provides early visibility into the implementation of the software safety hazard process. 2) Safety and Security: Certification Issues and Technologies by Dr. Benjamin M. Brosgol. This article looks at the DO-178B and the Common Criteria standards, analyzes language-related issues, and assesses three possible technologies for safety-critical or high-security systems. 3) WebBee: A Platform for Secure Mobile Coordination and Communication in Crisis Scenarios by Sugih Jamin. In a disaster, first-responders must be able to communicate using devices they already have and are well-accustomed, on a secure and mobile channel, and with systems beyond the consumer communication infrastructure. This article analyzes how WebBee addresses these concerns. 4) Constructing Change-Tolerant Systems Using Capability-Based Design by Dr. James D. Arthur and Ramya Ravichandar. Advancements in technology have created large-scale software systems that still require change while meeting stakeholder expectations, technology advancements, scheduling constraints, and market demands. This article explores a capability-based approach to evolving change-tolerant systems. 5) DoD Business Mission Area Service-Oriented Architecture to Support Business Transformation by Dennis E. Wisnosky, Dimitry Feldshteyn, Wil Mancuso, Al (Edward) Gough, Eric J. Riutort, and Paul Strassman. Will a service-oriented architecture be the DoD Business Mission Area's answer to their multifaceted operational needs? This article explores their complex business transformation infrastructure as well as the service-oriented architecture's capabilities in readiness, information assurance, and governance., CrossTalk,The Journal of Defense Software Engineering is co-sponsored by the Department of Defense Chief Information Office (DoD-CIO); the Office of the Secretary of Defense (OSD) Acquisition, Technology and Logistics (AT&L); U.S. Navy (USN); U.S. Air Force (USAF); and the U.S. Department of Homeland Security (DHS). DoD-CIO co-sponsor: Assistant Secretary of Defense (Networks and Information Integration). OSD (AT&L) co-sponsor: Software Engineering and System Assurance.USN cosponsor: Naval Air Systems Command. USAF cosponsors: Oklahoma City-Air Logistics Center (ALC) 76 Software Maintenance Group (SMXG); and Ogden-ALC 309 SMXG. DHS co-sponsor: National Cyber Security Division in the National Protection and Programs Directorate. The original document contains color images.
- Published
- 2008
9. Measures and Risk Indicators for Early Insight into Software Safety. Development of Fault-Tolerant Systems
- Author
-
ABERDEEN TEST CENTER MD, Basili, Victor, Marotta, Frank, Dangle, Kathleen, Esker, Linda, Rus, Ioana, ABERDEEN TEST CENTER MD, Basili, Victor, Marotta, Frank, Dangle, Kathleen, Esker, Linda, and Rus, Ioana
- Abstract
Software contributes an ever-increasing level of functionality and control in today's systems. This increased use of software can dramatically increase the complexity and time needed to evaluate the safety of a system. Although the actual system safety cannot be verified during its development, measures can reveal early insights into potential safety problems and risks. An approach for developing early software safety measures is presented in this article. The approach and the example software measures presented are based on experience working with the safety engineering group on a large Department of Defense program., Published in CROSSTALK: The Journal of Defense Software Engineering, p4-8, October 2008. Prepared in collaboration with University of Maryland, Fraunhofer Center, and Honeywell Aerospace.
- Published
- 2008
10. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 5
- Author
-
SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT, Dangle, Kathleen, Dwinnell, Laura, Hickok, John, Turner, Richard, Basel, David R., Foat, Dana, Shelton, Cragin, Martin, Robert A., McMahon, Paul E., Cook, David A., Skinner, James M., Gold, Robert, Jakubek, David, SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT, Dangle, Kathleen, Dwinnell, Laura, Hickok, John, Turner, Richard, Basel, David R., Foat, Dana, Shelton, Cragin, Martin, Robert A., McMahon, Paul E., Cook, David A., Skinner, James M., Gold, Robert, and Jakubek, David
- Abstract
"Introducing the Department of Defense Acquisition Best Practices Clearinghouse," by Kathleen Dangle, Laura Dwinnell, John Hickok, and Dr. Richard Turner -- This new capability will help acquisition personnel identify, select, and implement validated practices according to their programmatic needs. "Ports, Protocols, and Services Management Process for the Department of Defense," by David R. Basel, Dana Foat, and Cragin Shelton -- This article explains how to comply with the registration requirements for all automated information systems used on Department of Defense data networks. "Transformational Vulnerability: Management through Standards," by Robert A. Martin -- The Department of Defense's new vulnerability and configuration standardization efforts will dramatically improve the insight and oversight of the security and integrity of the agency's systems and networks. "Extending Agile Methods: A Distributed Project and Organizational Improvement Perspective," by Paul E. McMahon -- This article promotes using agile methods by exposing common myths and providing information that can help managers and customers facilitate practical agility within their organizations. "How to Perform Credible Verification, Validation, and Accreditation for Modeling and Simulation," by Dr. David A. Cook and Dr. James M. Skinner -- Verification and validation of the model, simulation, and accompanying life-cycle steps are required to know that you have the right model and valid simulation results. "Technology Readiness Assessments for IT and IT-Enabled Systems," by Robert Gold and David Jakubek -- This article summarizes the revised Technology Readiness Assessment guidelines and provides examples in applying them to major defense acquisitions.
- Published
- 2005
11. Obtaining valid safety data for software safety measurement and process improvement
- Author
-
Basili, Victor R., primary, Zelkowitz, Marvin V., additional, Layman, Lucas, additional, Dangle, Kathleen, additional, and Diep, Madeline, additional
- Published
- 2010
- Full Text
- View/download PDF
12. Introducing the Department of Defense Acquisition Best Practices Clearinghouse.
- Author
-
Dangle, Kathleen, Hickok, John, Turner, Richard, and Dwinnell, Laura
- Subjects
- *
CLEARINGHOUSES , *BEST practices , *BENCHMARKING (Management) , *INFORMATION services - Abstract
This article introduces the U.S. Department of Defense Acquisition Best Practices Clearinghouse (BPCh). It will provide brief, useful descriptions of practices and their characteristics based on carefully analyzed data. Users can access the information according to their preferences and needs. The BPCh will also provide the trail of evidence used to establish the characteristics as well as advice on where to find out more detailed information. Sponsored by the Defense Acquisition University (DAU), the assistant secretary of defense for Network and Information Integration, and the under secretary of defense for Acquisition, Technology and Logistics, the BPCh will be a single source for identifying, selecting and implementing validated acquisition-related practices based on specific program needs. The Fraunhofer Center at the University of Maryland is developing the concept and processes, Northrop Grumman Information Technology will build the operational system, and DAU will host and continue to evolve the capability as an integrated part of the knowledge-sharing systems of the Office of the Secretary of Defense. The BPCh comprises an integrated set of processes, tools, data and people that maintain a continuously improving resource of best practice information that is readily accessible via a wide range of methods.
- Published
- 2005
13. Measures and Risk Indicators for Early Insight Into Software Safety.
- Author
-
Basili, Victor, Marotta, Frank, Dangle, Kathleen, Esker, Linda, and Rus, Ioana
- Subjects
- *
SYSTEM safety , *COMPUTER software development , *SYSTEMS software management , *SOFTWARE measurement , *INDUSTRIAL safety , *SAFETY engineers , *SYSTEMS engineering , *SYSTEMS development - Abstract
Software contributes an ever-increasing level of functionality and control in today's systems. This increased use of software can dramatically increase the complexity and time needed to evaluate the safety of a system. Although the actual system safety cannot be verified during its development, measures can reveal early insights into potential safety problems and risks. An approach for developing early software safety measures is presented in this article. The approach and the example software measures presented are based on experience working with the safety engineering group on a large Department of Defense program. [ABSTRACT FROM AUTHOR]
- Published
- 2008
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.