Skip to main content

Web-Based Software Project Portals trends

Good article in Dr. Dobb's : Tools for Teams: A Survey of Web-Based Software Project Portals
It was pointed by the Modeling Languages Blog. Usually the blog is about UML, DSL, MDSD and such. But they personally participated to the study, so ...

It is well written. They take objectivity very seriously. and I would like to highlight some points:
  • "project portals would merge or integrate with social networking tools such as LinkedIn and personal life management tools such as Google Calendar." I strongly believe that it will happen. I see many trends to put everything (the code, the IDE ...) on-line and then search, connect and socialize. I wouldn't be surprised if someone came with a catchy name for this trend.
  • "we now wonder about the real importance of requirements elicitation and structured development process in the success of a development project". A direct result of Agile : Requirements are managed more efficiently and teams structure their processes to what fit them best.
  • "One clear trend in the portals ... was providing a hosted service." It will take some time, but enterprises will realize that their data are more secure and reliable within a well maintained application than behind their dumb firewall.
  • "...the portals were built ... to allow ... teams to scale up and ... spread out geographically. We believe this explains why they emphasize asynchronous communication (e.g., bulletin boards) over synchronous (e.g., chat)." I have a mixed feeling about this point. Some believe that teams could be just the temporary collaboration of highly specialized and efficient individuals. I doubt that it really works. Certainly the goal is to remove frontiers for developers. But face to face communication is still crucial for a team.
  • they "mainly target agile teams" and "none explicitly encouraged more traditional development processes". Looks like Agile has no competitors, but changing is hard. (By the way listen to all Linda Rising episodes : her voice is perfect for radio.)


Popular posts from this blog

VirtualBox, CentOS, Network and Template

I have been working with VirtualBox and CentOS recently, here are some notes about this experience.
I used VirtualBox 4.2 and CentOS 6.3, but most of this should work with other products too. I created the first headless, minimal CentOS via NetInstall.
I cover two points: create a template machine and configure the Network.
Configure the NetworkWe want Internet access and a LAN local to the host.
For background information read: Networking in VirtualBox by Fat Bloke on June 2012.
The easiest is to enable two Network Adapters: One will be "Host-only" and the second "Nat". In the "Preference" menu you can see the DHCP server range for the Host-only Network. So you may set fixed addresses outside this range.
Next: start the guest. There may be various results at first, depending on a lot of things. Some problem might be solved by rm -f /etc/udev/rules.d/70-persistent-net.rules and a reboot.
Anyway, configure the two interfaces (set your own IP and MAC addresses)…

One in six IT projects ends up ‘out of control’

A surprisingly high number of projects are 'ticking time bombs', according to researchers at the University of Oxford. They analysed 1,500 global projects that had revamped their information technology systems within the last 10 years. They discovered that one in six projects in the sample went over budget by an average of 200 per cent (in real terms) or over ran by an average of almost 70 per cent.

Their conclusion is similar to previous studies:

TLS: Disabling legacy cipher suites

First: "A cipher suite is a named combination of authentication, encryption, and message authentication code (MAC) algorithms".If you are using TLS (for HTTPS typicaly) you may want to remove some Cipher Suites.You maybe a little bit less compatible, but also a bit more secure. Things will be better when TLS1.2 is implemented everywhere.You can also claim to be FIPS 140 compliant: !How to do it:From the command line: code: Look at the "ciphers" attribute in someone knows how to do it on the IBM J9 via configuration, I am interested.