- March 2023 (5)
- 16: What is ChatGPT? (0)
- 12: Agile Performance Engineering (0)
- 12: What is Cybersecurity? (0)
- 11: Software Security Threats: A Comprehensive Guide (0)
- 11: What is Software Security? (0)
- October 2022 (1)
- August 2022 (1)
- December 2009 (2)
- November 2009 (2)
- September 2009 (1)
- August 2009 (2)
- July 2009 (2)
- June 2009 (3)
- May 2009 (6)
- 31: Key Project Practices (2)
- 31: Scenario Frames (2)
- 31: Scenario and Feature Matrix (0)
- 31: Axiomatic Design (4)
- 31: How To Frame a Problem with Skill (The Art of Framing) (0)
- 19: Customer-Connected Engineering Slides (PDF Download) (6)
- April 2009 (1)
- March 2009 (2)
- February 2009 (2)
- January 2009 (3)
- December 2008 (4)
- November 2008 (4)
- October 2008 (9)
- 26: What Is Application Architecture? (0)
- 12: Visualization Checklist (0)
- 11: Scenario and Feature Frame (1)
- 11: What’s a Scenario (0)
- 05: What is Systems Architecture (3)
- 05: How To Represent a Software Architecture? (Conceptual Architecture, Module, Execution, and Code View) (3)
- 05: 4 + 1 View Model of Software Architecture (2)
- 04: What is a Use Case? (0)
- 01: 3 Groups of Architectural Structures (0)
- September 2008 (13)
- 28: Better Work Breakdown Structures: Make a List of the Jobs to Be Done (0)
- 25: You Can’t Evaluate Architecture in a Vacuum (0)
- 21: How Do You Group Products Into Product Lines (1)
- 21: Organizational Structures to Support Product Lines (3)
- 21: Source Code Reuse (0)
- 21: Software Product Lines (1)
- 21: 5 Reasons Why the Manufacturing Metaphor Doesn’t Work for Software (2)
- 21: Data Architecture Practices (1)
- 16: Engineering Practices Frame (1)
- 15: patterns & practices Solution Engineering (1)
- 09: How To Cure Optimitis (1)
- 04: The Impact of People on Cost and Effort (1)
- 02: 7 Habits of Highly Successful Software Architects (0)
- August 2008 (13)
- 18: Extreme Programming (XP) at a Glance (2)
- 18: Microsoft Solution Framework (MSF) at a Glance (4)
- 18: MSF Agile at a Glance (4)
- 18: Rational Unified Process (RUP) at a Glance (3)
- 18: A Functional Skeleton of the System as a Whole (0)
- 18: Fixed Price in XP Development (0)
- 18: Insourcing (0)
- 17: Give Up Explicit Preparation for Change (0)
- 17: 20-80 Rule and XP (0)
- 17: Implement It Three Different Ways (0)
- 10: Architectural Styles, Patterns, and Metaphors (2)
- 10: Architectural Patterns vs. System Metaphors (2)
- 04: Adding People to Late Projects Makes Them Later (5)
- July 2008 (1)
- June 2008 (27)
- 23: Periodic Design Refactoring (4)
- 23: Mission Impossible (0)
- 23: Combining Software Process Models (Evolutionary, Incremental, and High-Risk) (6)
- 23: Choosing Between Evolutionary, Incremental, and High-Risk Software Process Models (0)
- 23: Evolutionary, Incremental, and High-Risk (3)
- 22: Macro and Micro Software Process (0)
- 22: Systems Engineering ‘in the large’ (5)
- 22: Systems Engineering ‘in the small’ (3)
- 22: A Process for Generating a Software Process (0)
- 22: Constructive Criticism of the Waterfall Model (3)
- 22: Four Reasons Why Defining Effective Software Process is Tough (1)
- 22: Waterfall, In the Large, and In the Small (5)
- 09: Why Differentiate User Requirements vs. System Requirements? (0)
- 02: Incrementally Render the Solution (0)
- 02: App Scenario (Scenario and Solution) Example (2)
- 01: App Scenarios Model (3)
- 01: Web Apps, Smart Clients, Web Services, and Data Access (0)
- 01: App Architecture Guide (1)
- 01: App Types (Archetypes) (3)
- 01: App Infrastructure Frame (4)
- 01: Architecture Styles (0)
- 01: The Quality Attribute Framework: Categories for Organizing Quality Attributes (1)
- 01: The Ultimate List of Quality Attributes (3)
- 01: App Types, Verticals, and Scenarios (4)
- 01: How To Learn Software Requirements Better with User, Business, and System Goals (2)
- 01: Shifts of Power (1)
- 01: Requirements Types (4)
- May 2008 (1)
- 12: User, Business, and Tech (5)
- April 2008 (7)
- 28: 5 Ways to Manage Complexity in Software Architectures (1)
- 28: Software Design Levels (1)
- 28: Why Do We Need Software Architects (4)
- 28: Scenario Types and Their Usage (7)
- 13: Secure Your Network, Host, and Application (0)
- 07: Security Principles (0)
- 07: Security Threats and Countermeasures Framework (2)
- March 2008 (5)