Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Robert is active.

Publication


Featured researches published by John Robert.


international conference on software maintenance | 2003

Measuring software sustainability

Robert C. Seacord; Joseph P. Elm; Wolf Goethert; Grace A. Lewis; Daniel Plakosh; John Robert; Lutz Wrage; Mikael Lindvall

Planning and management of software sustainment is impaired by a lack of consistently applied, practical measures. Without these measures, it is impossible to determine the effect of efforts to improve sustainment practices. In this paper we provide a context for evaluating sustainability and discuss a set of measures developed at the Software Engineering Institute at Carnegie Mellon University.


enterprise distributed object computing | 1999

Custom vs. off-the-shelf architecture

Robert C. Seacord; Kurt C. Wallnau; John Robert; Santiago Cornelia Dorda; Scott A. Hissam

Members of the COTS-based system initiative at the Software Engineering Institute have developed the Generic Enterprise Ensemble (GEE), a generic approach to building distributed, transaction based, secure enterprise information systems (EIS). GEE is a tool to help in the selection of technologies and architectural choices when building enterprise information systems. Enterprise JavaBeans/sup TM/ (EJB) is a specification from Sun Microsystems for an application server based on Java technology. a comparison is made between GEE based solutions and off-the-shelf solutions based on the EJB specification.


Lecture Notes in Computer Science | 2003

Bringing COTS Information Technology into Small Manufacturing Enterprises

John Robert; Charles Buhman; Suzanne Garcia; David Allinder

Due to increasing competitive pressure, many small manufacturing enterprises (SMEs) are considering COTS software technology improvements to increase productivity. However, SMEs are generally not as prepared to bring COTS software technology into their company as are medium and large organizations. SMEs face unique COTS issues due to organizational constraints, limited interaction with vendors and a passive role (in terms of technology and business process) in the manufacturing supply chain. This report describes these unique SME COTS software challenges as observed in several hands-on technology demonstrations conducted over a two-year period as part of the SEI Technology Insertion Demonstration & Evaluation (TIDE) program.


Lecture Notes in Computer Science | 2004

Managed Technology Adoption Risk: A Way to Realize Better Return from COTS Investments

Suzanne Garcia; John Robert; Len Estrin

Two companies can install the same COTS (Commercial Off The Shelf) software package, yet one company enjoys more success, and a better return, than the other. Needless to say, many factors could be involved in this common scenario. Yet, chances are, one of the factors is that the successful company actively managed the non-technical aspects of the adoption of the COTS software adoption, instead of just selecting it and installing it. What is the difference? According to technology transition researchers, “installed” means that the system is operational; however, only a few people use the software as intended (or at all!) [Fichman1995]. “Adopted” means that the system is operational, and employees are using it in the way that was intended to support the business need that led to the COTS adoption to begin with. Every organization exhibits different risks for adopting a particular technology, and whether and how those risks are managed often determine whether adoption is achieved, vs merely achieving installation. Managing adoption, especially managing adoption risk, actually starts before acquiring any technology and continues after installation.


international conference on engineering of complex computer systems | 1999

Securing Internet sessions with Sorbet

Fred Long; Robert C. Seacord; Scott A. Hissam; John Robert

More and more organizations are using intranets and even the Internet as the communications media for important data. However, such communications media are inherently insecure and subject to hijacking. To secure these connections, mechanisms must be built on top of the underlying communications facilities. We discuss one such security mechanism and describe an implementation using common object request broker architecture (CORBA) based interceptors.


Archive | 2000

Volume II: Technical Concepts of Component-Based Software Engineering

Felix Bachman; Len Bass; Charles Buhman; Santiago Comella-Dorda; Fred Long; John Robert; Robert C. Seacord; Kurt C. Wallnau


Archive | 2000

A Survey of Legacy System Modernization Approaches

Santiago Comella-Dorda; Kurt C. Wallnau; Robert C. Seacord; John Robert


Archive | 2001

Volume I: Market Assessment of Component-Based Software Engineering

Len Bass; Charles Buhman; Santiago Comella-Dorda; Fred Long; John Robert; Robert C. Seacord; Kurt C. Wallnau


Archive | 2000

Volume II: Technical Concepts of Component-Based Software Engineering, 2nd Edition

Felix Bachmann; Len Bass; Charles Buhman; Santiago Comella-Dorda; Fred Long; John Robert; Robert C. Seacord


NIST Interagency/Internal Report (NISTIR) - 7055 | 2003

Advanced Engineering Environments for Small Manufacturing Enterprises: Volume II

Steven J. Fenves; Ram D. Sriram; Young Choi; Joseph P. Elm; John Robert

Collaboration


Dive into the John Robert's collaboration.

Top Co-Authors

Avatar

Robert C. Seacord

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Charles Buhman

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Fred Long

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Joseph P. Elm

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Kurt C. Wallnau

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Santiago Comella-Dorda

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Len Bass

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Len Estrin

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Suzanne Garcia

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Scott A. Hissam

Software Engineering Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge