Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Increasingly complex supplier-relationships dominate product development, independent of industries and products. Mostly the primary source of risks and later problems is insuffic...
Manuel Reis Monteiro, Christof Ebert, Matthias Rec...
Release planning is a critical activity in the software development process. The creation of a clear and realistic plan is extremely difficult, as key factors such as time and cos...
This is an experience report on the architectural reengineering of a large software portfolio. In order to minimize the risks of such an undertaking, companies tend to be conserva...
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...