First Page | Meta Content | |
---|---|---|
Document Date: 2005-11-29 16:05:10Open Document File Size: 115,49 KBShare Result on FacebookCompanyBooz Allen Hamilton / Object Management Group / Mitre Corporation / CSC / /IndustryTermpotential software component extensions / ever-changing technology requirements / software system / educated software developers / software assets / networked and autonomous software components / ever-larger networks / vulnerable applications / software providers / software intensive organizations / Wireless technologies / software consumers / Software implementations / software integrators / software trustworthiness / software development efforts / hybrid networks / component-level software properties / software components / increase software assurance / individual software components / software industry / software developers / software suppliers / software assurance / interoperable enterprise applications / secure and reliable products / open source software / secure software assets / secure and reliable software / mission critical software portfolios / unstable and vulnerable applications / particular applications / legacy applications / software properties / software development / software systems / software resilience / software understanding / secure software / /OrganizationTask Force / James Madison University / /PersonLarry Wagoner / Liz Fong / David Wheeler / Ken Hong Fong / Michael Kass / Charles Johnson / Robert Martin / Joe Jarzombek / William Ulrich / Patrick Holley / Nikolai Mansurov / Mitchell Komaroff / Rama Moorthy / Sean Barnoom / John Barkley / Paul Croll / Paul Black / Samuel T. Redwine / /TechnologyHybridization / Wireless technologies / /SocialTag |