14. Building Information Systems

  1. http://www.usdoj.gov/jmd/irm/lifecycle/table.htm

INFORMATION RESOURCES MANAGEMENT. The Department of Justice Systems Development Life Cycle Guidance Document

2.  http://www.npd-solutions.com/case.html

Computer Aided Software Engineering. Nowadays everything has to go faster. Because of the increasing speed of changing market-demands

  1. http://www.sei.cmu.edu/legacy/case/case_whatis.html

Computer-Aided Software Engineering (CASE) Environments. What is a CASE Environment? Our Defintion of CASE Many definitions and descriptions of CASE exist.

  1. http://generalupdate.rau.ac.za/infosci/conf/Wednesday/Jakovljevic.htm

The purpose of this paper is to explore the application of the methodology of instructional program development based on technological stages in information system design. The growth of use of mind tools has put thinking skills in the focus of teaching practice but there is still a need for the innovation of more effective instructional strategies. This has re-emphasized the importance of developing an instructional program with the innovative structure of technological stages. Some of criteria used to set up the program emerged from research literature on complex thinking, mind tools, learning theories and instructional strategies.

  1. http://java.sun.com/developer/technicalArticles/Networking/XMLAndJava/

XML and Java Technology Tackle Enterprise Application Integration.

  1. http://www.dacs.dtic.mil/awareness/newsletters/technews2-1/toc.html

RAD

  1. http://www.extremeprogramming.org/

Extreme Programming: A gentle introduction. Lessons Learned. The goal of this site is to provide an introduction and overview of Extreme Programming (XP).

  1. http://www10.lotus.com/ldd/today.nsf/0/d330436f7afdd43888256ad80064570f/$FILE/OOLotusScript.pdf

In this article, we’ll develop five useful classes that demonstrate OO techniques. Each new class will build on the previous classes to add additional capabilities. We’ll learn how to extend existing classes and data types by composition and by inheritance.

  1. http://wwwoirm.nih.gov/security/nih-sdlc.html

Systems Development Life Cycle (SDLC) IT security activities for each phase of an application/system

  1. http://www.bee.net/bluebird/jaddoc.htm

Joint applications design

  1. http://www.comp-soln.com/JAD_whitepaper.pdf

JAD – Case study

  1. http://builder.com.com/5100-6315-1046507.html

Under the waterfall development method, each portion of work is evaluated separately and is often performed by different teams.

  1. http://www.sei.cmu.edu/cmm/cmms/cmms.html

Over the years, the SEI has developed six Capability Maturity Model products. ... SA-CMM (Software Acquisition Capability Maturity Model).