2011年11月3日
摘要: Refer to http://en.wikipedia.org/wiki/Role-based_access_controln computer systems security,role-based access control(RBAC)[1][2]is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees,[3]and it is a newer alternative app 阅读全文
posted @ 2011-11-03 15:38 -Anny- 阅读(291) 评论(0) 推荐(0) 编辑
摘要: Refer to http://www.subcide.com/articles/how-to-write-meaningful-user-stories/I’ve seen a lot of projects fail when by all accounts, they shouldn’t have. The reason for this nearly every time, was that the requirements gathering stage of a project was done poorly, or sometimes not at all. Sometimes 阅读全文
posted @ 2011-11-03 15:08 -Anny- 阅读(329) 评论(0) 推荐(0) 编辑
摘要: So far, there are 2 projects/products using agile software development.There are 4 type workitems used in agile software development: user stories, tasks, test cases, bugs1. user storiesA team creates user stories to define the features, functions, and requirements to be implemented. A user story de 阅读全文
posted @ 2011-11-03 15:06 -Anny- 阅读(264) 评论(0) 推荐(0) 编辑