


default search action
Phillip G. Armour
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]John Leslie King
, Hal Berghel
, Phillip Glen Armour
, Robert N. Charette:
Healthy Skepticism. Computer 57(11): 86-91 (2024) - 2022
- [j53]Phillip Glen Armour
, Hal Berghel, Robert N. Charette
, John Leslie King
:
Ukraine Aftershocks. Computer 55(11): 85-93 (2022) - 2021
- [j52]Achintya K. Bhowmik, David A. Fabry, Phillip G. Armour, Hal Berghel, Robert N. Charette, John L. King:
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices. Computer 54(11): 108-120 (2021)
2010 – 2019
- 2016
- [j51]Phillip G. Armour:
The chaos machine. Commun. ACM 59(1): 36-38 (2016) - 2015
- [j50]Phillip G. Armour:
A little queue theory. Commun. ACM 58(1): 38-39 (2015) - [j49]Phillip G. Armour:
An updated software Almanac. Commun. ACM 58(7): 32-34 (2015) - [j48]Phillip G. Armour:
Thinking thoughts. Commun. ACM 58(10): 32-34 (2015) - 2014
- [j47]Phillip G. Armour:
Estimation is not evil. Commun. ACM 57(1): 42-43 (2014) - [j46]Phillip G. Armour:
Owning and using. Commun. ACM 57(6): 29-30 (2014) - [j45]Phillip G. Armour:
Vendor: vidi, vici. Commun. ACM 57(10): 30-31 (2014) - 2013
- [j44]Phillip G. Armour:
How we build things: ...and why things are 90% complete.. Commun. ACM 56(1): 32-33 (2013) - [j43]Phillip G. Armour:
What is a "good" estimate?: whether forecasting is valuable. Commun. ACM 56(6): 31-32 (2013) - [j42]Phillip G. Armour:
When faster is slower. Commun. ACM 56(10): 30-32 (2013) - 2012
- [j41]Phillip G. Armour:
The difference engine. Commun. ACM 55(1): 33-34 (2012) - [j40]Phillip G. Armour:
A measure of control. Commun. ACM 55(6): 26-28 (2012) - [j39]Phillip G. Armour:
The Goldilocks estimate. Commun. ACM 55(10): 24-25 (2012) - 2011
- [j38]Phillip G. Armour:
Don't bring me a good idea. Commun. ACM 54(1): 27-29 (2011) - [j37]Phillip G. Armour:
Practical application of theoretical estimation. Commun. ACM 54(6): 28-30 (2011) - [j36]Phillip G. Armour:
Testing: failing to succeed. Commun. ACM 54(10): 30-31 (2011) - 2010
- [j35]Phillip G. Armour:
The business of software - In praise of bad programmers. Commun. ACM 53(1): 35-36 (2010) - [j34]Phillip G. Armour:
Return at risk. Commun. ACM 53(9): 23-25 (2010)
2000 – 2009
- 2009
- [j33]Phillip G. Armour:
The business of software: The ontology of paper. Commun. ACM 52(1): 23-24 (2009) - [j32]Phillip G. Armour:
The business of software - The cliché defense. Commun. ACM 52(7): 34-36 (2009) - [j31]Phillip G. Armour:
The business of software - Contagious craziness, spreading sanity. Commun. ACM 52(10): 19-20 (2009) - 2008
- [j30]Phillip G. Armour:
Digging CACM. Commun. ACM 51(1): 13-15 (2008) - [j29]Phillip G. Armour:
The inaccurate conception. Commun. ACM 51(3): 13-16 (2008) - 2007
- [j28]Phillip G. Armour:
Agile ... and offshore. Commun. ACM 50(1): 13-16 (2007) - [j27]Phillip G. Armour:
Mortality play. Commun. ACM 50(3): 15-18 (2007) - [j26]Phillip G. Armour:
Twenty percent. Commun. ACM 50(6): 21-23 (2007) - [j25]Phillip G. Armour:
The conservation of uncertainty. Commun. ACM 50(9): 25-28 (2007) - 2006
- [j24]Phillip G. Armour:
Counting boulders and measuring mountains. Commun. ACM 49(1): 17-20 (2006) - [j23]Phillip G. Armour:
The operational executive sponsor. Commun. ACM 49(3): 15-18 (2006) - [j22]Phillip G. Armour:
The learning edge. Commun. ACM 49(6): 19-22 (2006) - [j21]Phillip G. Armour:
Software: hard data. Commun. ACM 49(9): 15-17 (2006) - 2005
- [j20]Phillip G. Armour:
The unconscious art of software testing. Commun. ACM 48(1): 15-18 (2005) - [j19]Phillip G. Armour:
Project portfolios: organizational management of risk. Commun. ACM 48(3): 17-20 (2005) - [j18]Phillip G. Armour:
Sarbanes-Oxley and software projects. Commun. ACM 48(6): 15-17 (2005) - [j17]Phillip G. Armour:
To plan, two plans. Commun. ACM 48(9): 15-19 (2005) - 2004
- [j16]Phillip G. Armour:
When executives code. Commun. ACM 47(1): 19-22 (2004) - [j15]Phillip G. Armour:
Beware of counting LOC. Commun. ACM 47(3): 21-24 (2004) - [j14]Phillip G. Armour:
Real work, necessary friction, optional chaos. Commun. ACM 47(6): 15-18 (2004) - [j13]Phillip G. Armour:
Not-defect: the mature discipline of testing. Commun. ACM 47(10): 15-18 (2004) - 2003
- [j12]Phillip G. Armour:
The reorg cycle. Commun. ACM 46(2): 19-22 (2003) - [j11]Phillip G. Armour:
In the zone: the need for flexible roles. Commun. ACM 46(5): 15-19 (2003) - [j10]Phillip G. Armour:
Closing the learning application gap. Commun. ACM 46(9): 27-31 (2003) - 2002
- [j9]Phillip G. Armour:
The spiritual life of projects. Commun. ACM 45(1): 11-14 (2002) - [j8]Phillip G. Armour:
The organism and the mechanism of projects. Commun. ACM 45(5): 17-20 (2002) - [j7]Phillip G. Armour:
Ten unmyths of project estimation. Commun. ACM 45(11): 15-18 (2002) - 2001
- [j6]Phillip G. Armour:
The laws of software process. Commun. ACM 44(1): 1517 (2001) - [j5]Phillip G. Armour:
Software as Currency. Commun. ACM 44(3): 13-14 (2001) - [j4]Phillip G. Armour:
Matching process to types of teams. Commun. ACM 44(7): 21-23 (2001) - [j3]Phillip G. Armour:
Zeppelins and jet planes: a metaphor for modern software projects. Commun. ACM 44(10): 13-15 (2001) - 2000
- [j2]Phillip G. Armour:
The case for a new business model. Commun. ACM 43(8): 19-22 (2000) - [j1]Phillip G. Armour:
The five orders of ignorance. Commun. ACM 43(10): 17-20 (2000)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint