Certification Process Overview. Wes Turner, Kitware Inc. Matthew McCall, KRM Associates Inc.
|
|
- Theodora Randall
- 5 years ago
- Views:
Transcription
1 Certification Process Overview Wes Turner, Kitware Inc. Matthew McCall, KRM Associates Inc.
2 Certification Approach Attest that software is Safe, Compliant and Functional. Plan publicly available: ert_plan_v1.0.pdf Initial Surge Phase through Transitioning to Early Maturation Phase.
3 Initial Surge Goals Establish Baseline Repository. Develop Certification Plan. Implement Environment for Initial Certification. Perform Initial Certification of Repository.
4 Initial Surge Milestones Project Start Certification Plan Finalized Certification Environment Notification of Acceptance
5 Certification Plan Overview Software Quality Certification Plan. Focus on safe, compliant, and functional. Safe: Individual code units do not cause errors in other components of the system and the code is robust to all code paths and conditions. Compliant: Code meets agreed upon interface specifications and is adherent to all applicable laws and reservations. Functional: Code has a defined set of requirements that are met when the code executes.
6 Certification Environment Git: Version Control. Enterprise Architect: Architecture Reference. Gerrit: Code Review. CTest: Automatic Testing. CDash: Dashboarding. Technical Journal: Documentation and Attestation. Bug Tracking: JIRA.
7 What Software Quality Certification Is Focus on safe, compliant, and functional. Safe: Individual code units do not cause errors in other components of the system and the code is robust to all code paths and conditions. Compliant: Code meets agreed upon interface specifications and is adherent to all applicable laws and reservations. Functional: Code has a defined set of requirements that are met when the code executes. A First Step
8 What Software Quality Certification Is Not The Final Word The initial framework is powerful But open source and adaptable Certification steps based on VA ProPath Procedures Can and will be adapted to the community needs We need you to get involved and drive the process!
9 Process Diagram XML Dashboard XML CTest XML Gerrit Code Review Automated Tests (XINDEX + Others) Contributor Mods Contributor Package OSERHA Technical Journal Review Git Clone
10 Support for certifying software quality on bug fixes, minor code changes, and periodic OSEHRA releases. GERRIT REVIEW TOOL
11 Reviewing code changes and release candidates The review (red arrow), and diff buttons (blue arrows) provide mechanisms for looking at the code changes and for starting a review. Expand to include Attestation Column
12 Reviewing code changes and release candidates Actual attestations are simple, but linked to the current ProPath Procedures. Two levels allow for peer review to attest code quality and SQA review to ensure compliance with applicable standards. mons/document/oshera-mcode-peer-review-checklist mons/document/oshera-finalreview-checklist
13 Support for certifying new package contributions or major code refactoring OSEHRA TECHNICAL JOURNAL
14 Reviewing larger code contributions The OSEHRA Technical Journal provides mechanisms for formal review (blue arrow) and informal, thumbs up, review (red arrow).
15 Reviewing larger code contributions Again, the initial attestations can be simple. Review checkboxes instantiate the peer and final review checklists.
16 Reviewing testing and attestation results OSEHRA SOFTWARE QUALITY DASHBOARD
17 Code Quality Dashboard A dashboard maintains the current state of the system including all of the automated testing and the manual attestations. Gerrit Reviews (Manual) Nightly Tests (Automated) Manual Verifications (Automated) OTJ Reviews (Manual)
18 Code Quality Dashboard Manual attestations can be viewed over longer time periods for both the Gerrit review site, Nightly Tests (Automated) Manual Verifications (Automated)
19 Code Quality Dashboard And the OSEHAR Technical Journal Site
20 Notification of Acceptance Presumption of Quality through FOIA Release. Baseline Software Quality Release. Initial Certification of Codebase as Safe, Compliant, and Functional. Includes: X-INDEX Review, Functional Review, Test Installation from repository.
21 Early Maturation Phase Goals Software Quality Certification process improvement and growth. Must support existing VA developers. Software Release Certification development and growth. Must align with requirements of the VA. Focus on process transparency and portability. Next Generation EHR. Must be applicable across projects and environments. Align with collaborative goals of the ecosystem.
22 Software Quality Certification process improvement and growth. Purpose of tomorrow s working group. Find gaps between our approach, and VA. Develop strategy for establishing boundaries and requirements for software submission to VA. Develop action plan for collaborating past this event.
23 Software Release Certification development and growth. OSEHRA will be incrementally releasing gold versions. Build process on top of Software Quality Certification. Continue assessing and integrating VA Requirements. Agile Model and Release Certification. Example Release Certification Elements: Pre-Certification. Documentation. Test Cases. Architectural Compliance. Certification. Request Prioritization. Functional Evaluation. Technical Evaluation. Code Review. Certification Release. Release Distribution. Community Engagement.
24 Focus on process transparency and portability. iehr and additional projects are coming. Software Quality and Release Certifications both affected. Continue assessing and integrating VA Requirements. Facilitate the migration of these processes from VistA to iehr and beyond. Encourages more robust community participation. Integrators, Practitioners, (ex. DSS, Medsphere, IBM, CHNWV). Initial projects to support these goals.
Procedures for Contributing Code and Performing Code Reviews
Procedures for Contributing Code and Performing Code Reviews 1. Purpose This document defines the concrete steps necessary for a user of the OSEHRA EHR system to contribute code back to the OSEHRA code
More informationOSHERA M-Code Primary Developer Checklist v0.5 (DRAFT)
OSHERA M-Code Primary Developer Checklist v0.5 () Date Submitted: 18 October 2011 Prepared for: Department Of Veterans Affairs Prepared by: Document Version Control Revision Editor Date Changes Copyright
More informationWorkflow Diagrams. Code Submission and Testing Process
Workflow Diagrams Code Submission and ing Process Code Submission and Certification Certification/Acceptance will be in 2 Phases Software Quality Certification Indicate acceptance to community VA Determine
More informationOpen Source Software Quality Certification
Open Source Software Quality Certification The Emerging ANSI Standard Wes Turner Director, Open Source Operations OSEHRA Mike Henderson Director, Open Source Product Management OSEHRA Wednesday, September
More informationOpen Source EHR Agent:
Open Source EHR Agent: An Engine of Rapid Innovation Looking at the Future Seong K. Mun, Ph.D. President and CEO OSEHRA Arlington, Virginia munsk@osehra.org 202-320-4613 1 Custodial Agent Facilitate rapid
More informationOSHERA Final Review Checklist v0.5 (DRAFT)
OSHERA Final Review Checklist v0.5 () Date Submitted: 18 October 2011 Prepared for: Department Of Veterans Affairs Prepared by: Document Version Control Revision Editor Date Changes Open Source Electronic
More informationUnderstanding the Open Source Development Model. » The Linux Foundation. November 2011
» The Linux Foundation Understanding the Open Source Development Model November 2011 By Ibrahim Haddad (PhD) and Brian Warner, The Linux Foundation A White Paper By The Linux Foundation This paper presents
More informationThe Open Group Professional Certification Program. Accreditation Requirements
The Open Group Professional Certification Program Accreditation Requirements Version 1.0 October 2018 Copyright 2018, The Open Group All rights reserved. This publication may be reproduced, stored in a
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationAfsin Ustundag, Ray Group International
Afsin Ustundag, Ray Group International 1 Background Epic EpicCare/Orders developer for 5 years during legacy to Epic desktop transition and first Inpatient implementation Epic Application Level Mumps
More informationOpenChain Conformance 2016-H1 Specification
Contents Introduction... 3 Definitions... 4 Requirements... 5 G1: Know Your FOSS Responsibilities... 5 G2: Assign Responsibility for Achieving Compliance... 6 G3: Review and Approve FOSS Content... 7 G4:
More informationSuperannuation Transaction Network
Superannuation Transaction Network Process and Requirements for New Gateway Operators Version 2.1 November 2016 For further information or questions, contact the GNGB secretariat via email at contactus@gngb.com.au
More informationTD-04 Contributed Software Attribution Policy
TD-04 Contributed Software Attribution Policy Version 2 December 15, 2014 Revision History Date Revision Description Author 10/31/14 0 Initial Approved Policy Henderson, Turner 11/05/14 1 Minor updates
More informationUniversity of British Columbia Library. Persistent Digital Collections Implementation Plan. Final project report Summary version
University of British Columbia Library Persistent Digital Collections Implementation Plan Final project report Summary version May 16, 2012 Prepared by 1. Introduction In 2011 Artefactual Systems Inc.
More informationOpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off]
OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off] DRAFT: This is the near final draft of the 1.2 version of the OpenChain Specification. We have recently completed the final
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationRequest for Proposal for Technical Consulting Services
Request for Proposal for Technical Consulting Services The Node.js Foundation is requesting proposals from highly qualified consultants with demonstrated expertise in providing Node.js technical consultation
More informationQuality Management Plan (QMP)
Quality Management Plan (QMP) UDM United Direct Marketing Team 09 Fall Semester Chun-Ling Chen Project manager/ Prototyper Chun-Pei Su Lifecycle Planner Shao-yen Cheng System Architect Yuan-Chang Chang
More informationQuality Management Plan (QMP)
Quality Management Plan (QMP) UDM United Direct Marketing Team 09 Chun-Ling Chen Project manager/ Prototyper Chun-Pei Su Lifecycle Planner/ Feasibility Analyst Shao-yen Cheng System Architect Yuan-Chang
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationVol. 1 Technical RFP No. QTA0015THA
General Services Administration (GSA) Enterprise Infrastructure Solutions (EIS) Core Infrastructure IPSS Concept of Operations Per the IPSS requirements, we provide the ability to capture and store packet
More informationNew Zealand Government IbM Infrastructure as a service
New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as
More informationSWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ
SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ 1 SWIFT Customer Security Controls Framework Why has SWIFT launched new security
More informationGreen Star Volume Certification. Process Guide
Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage
More informationServices for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam
Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Practice Leader : Borderless Network Architecture APJC Services Agenda Priorities & Smart Solutions Innovation and
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationData Governance Quick Start
Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry
More informationContinuous Integration / Continuous Testing
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 7,6 cm) Continuous Integration / Continuous Testing IIC What s SW Integration? Integration
More informationLeading Investment Management Software Firm Slashes Infrastructure Costs, Maximizes Application Availability ATTENTION. ALWAYS.
Leading Investment Management Software Firm Slashes Infrastructure Costs, Maximizes Application Availability ATTENTION. ALWAYS. THE CUSTOMER Our customer develops specialized software solutions for global
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationHPE 3PAR Remote Copy Extension Software Suite Implementation Service
Data sheet HPE 3PAR Remote Copy Extension Software Suite Implementation Service HPE Lifecycle Event Services HPE 3PAR Remote Copy Extension Software Suite Implementation Service provides customized deployment
More informationThinkPalm s BreakThrough DevOps Capabilities ThinkPalm
ThinkPalm s BreakThrough DevOps Capabilities ThinkPalm Dev Ops Business Planning Collaborative Development Customer Feedback & Optimization Testing Monitoring Release and Deployment STANDARDS OPERATE DEPLOY
More informationAlberta Reliability Standards Compliance Monitoring Program. Version 1.1
Version 1.1 Effective: January 14, 2011 Table of Contents 1. Introduction... 1 2. Purpose... 1 3. Applicability... 1 4. Definitions... 1 5. Compliance Monitoring Overview... 2 6. Monitoring Tools... 1
More informationONC Health IT Certification Program
ONC Health IT Certification Program Certification Requirements Update March 17, 2016 ICSA Labs Health IT Program Agenda Introduction Mandatory Product Disclosures and Transparency Requirements Certified
More informationThe Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide
Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,
More informationRed Hat Process Automation Manager 7.0 Planning a Red Hat Process Automation Manager installation
Red Hat Process Automation Manager 7.0 Planning a Red Hat Process Automation Manager installation Last Updated: 2018-08-31 Red Hat Process Automation Manager 7.0 Planning a Red Hat Process Automation
More informationIntroduction to AWS GoldBase. A Solution to Automate Security, Compliance, and Governance in AWS
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS September 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationSource KIDS White Paper
Source KIDS White Paper 26 August 2011 SUBJECT: OSEHRA technical investigation into Source KIDS 1. Purpose This white paper proposes development of Source KIDS in order to represent VistA software in a
More informationCyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD)
Randall Sandone, CCISO Executive Director Critical Infrastructure Resilience Institute rsandone@illinois.edu Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal
More informationIntroduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationThank you, and enjoy the webinar.
Disclaimer This webinar may be recorded. This webinar presents a sampling of best practices and overviews, generalities, and some laws. This should not be used as legal advice. Itentive recognizes that
More informationThe Value of ANSI Accreditation. Top 10 Advantages. of accredited third-party conformity assessment
The Value of ANSI Accreditation Top 10 Advantages of accredited third-party conformity assessment The American National Standards Institute (ANSI) offers highly recognized accreditation programs globally
More informationMaster EMC Design Engineer Certification Application during Grandfathering Period ---FORMS MAY BE PHOTOCOPIED---
International Association for Radio, Telecommunications and Electromagnetics, Inc. 840 Queen Street New Bern, NC 28560-1-800-89-NARTE - Fax 1-252-672-0111 - www.narte.org Master EMC Design Engineer Certification
More informationTransitioning to Symyx
Whitepaper Transitioning to Symyx Notebook by Accelrys from Third-Party Electronic Lab Notebooks Ordinarily in a market with strong growth, vendors do not focus on competitive displacement of competitor
More informationCSF to Support SOC 2 Repor(ng
CSF to Support SOC 2 Repor(ng Ken Vander Wal, CPA, CISA, HCISPP Chief Compliance Officer, HITRUST * ken.vanderwal@hitrustalliance.net Agenda Introduction to SOC Reporting SOC 2 and HITRUST CSF AICPA and
More informationAn Industry Definition of Business Architecture
Architecture: State of the Art / State of the Practice ---------------------------- William M. Ulrich Tactical Strategy Group, Inc. www.systemtransformation.com An Industry Definition of Architecture A
More informationCommon Operating Environment (COE) Platform Certification Program. Certification Policy
Common Operating Environment (COE) Platform Certification Program Certification Policy February 2004 Version 2.0 Copyright February 2004, The Open Group All rights reserved. No part of this publication
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationBuilding ITSM Beyond ITIL
Building ITSM Beyond ITIL Glenn O Donnell Principal Product Marketing Manager EMC Corporation 1 ITSM is More Than ITIL ITIL is a great innovation for building IT discipline and business alignment ITIL
More informationGetting Started with Innoslate
Getting Started with Innoslate This manual introduces you to Innoslate concepts and graphical interfaces to help you get started using Innoslate. Contents Section One: Introducing Innoslate...3 About Innoslate...3
More informationOpenChain Specification Version 1.3 (DRAFT)
OpenChain Specification Version 1.3 (DRAFT) 2018.10.14 DRAFT: This is the draft of the next version 1.3 of the OpenChain specification. Recommended changes to be made over the current released version
More informationDRI: Dr Aileen O Carroll Policy Manager Digital Repository of Ireland Royal Irish Academy
DRI: Dr Aileen O Carroll Policy Manager Digital Repository of Ireland Royal Irish Academy Dr Kathryn Cassidy Software Engineer Digital Repository of Ireland Trinity College Dublin Development of a Preservation
More informationA set of Common Software Quality Assurance Baseline Criteria for Research Projects
A set of Common Software Quality Assurance Baseline Criteria for Research Projects Abstract The purpose of this document is to define a set of quality standards, procedures and best practices to conform
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More information2017 NACHA Third-Party Sender Initiatives
2017 NACHA Third-Party Sender Initiatives Jordan Bennett Senior Director, Network Risk NACHA 2 MAC is an organization of Bankcard professionals involved in the risk management side of Card Processing.
More informationGlobal Trade Professionals Alliance (GTPA) Creating an international standard for trade professionals, businesses & consulting services
Global Trade Professionals Alliance (GTPA) Creating an international standard for trade professionals, businesses & consulting services Our goal is to bring people and organisations together Improve professional
More informationTHE AUTOMATED TEST FRAMEWORK
2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationTesting for Reliable and Dependable Health Information Exchange
Testing for Reliable and Dependable Health Information Exchange Presented by Didi Davis, Testing Programs Director 1 Copyright 2016 The Sequoia Project. All rights reserved. Discussion Topics 1. ehealth
More informationOpenChain Conformance 2016-H1 Conformance Check
Table of Contents Introduction... 3 Definitions... 4 G1: Know Your FOSS Responsibilities... 5 G2: Assign Responsibility for Achieving Compliance... 6 G3: Review and Approve FOSS Content... 7 G4: Deliver
More informationOliopäivät Modelling Now and in the Future, with Acronyms or without = RSA
IBM Software Group Oliopäivät 28-29.11.2006 Modelling Now and in the Future, with Acronyms or without = RSA rami.talme@fi.ibm.com 2006 IBM Corporation IBM Software Group Rational software The business-driven
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST
More informationSkyhook designs and deploys high performance mobile location solutions, and exists to make location faster, more precise and practical.
CLEARVISION CASE STUDY INDUSTRY: Computer Software EST: 2003 COMPANY SIZE: 150-200 HEADQUARTERS Boston MA About Skyhook Skyhook designs and deploys high performance mobile location solutions, and exists
More informationVistA API-SDK -WK. 1. Executive Summary. 2. Background
VistA API-SDK -WK VistA Application Programming Interface (API) And Software Development Kit (SDK) White Paper (DRAFT) July XX, 2013 Table of Contents 1. Executive Summary 2. Background 2.1. Current API
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationNYS Early Learning Trainer Credential. Portfolio Instructions
TC Portfolio Guidelines 8/17/2011 Contents Trainer Definitions 3 General Instructions.....4 Credential Levels...4 Portfolio Structure...5 Portfolio Content Parts 1 and 2: Portfolio Entries.........5 Portfolio
More informationMagento Enterprise Edition Customer Support Guide
Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part
More informationEnterprise Networking Solutions, Inc.
Enterprise Networking Solutions, Inc. Virtualization Cloud Integration Business Continuity www.ens-inc.com Reap the Benefits of Business Driven Technology Solutions Cost Savings Cost Avoidance Business
More informationLearn Atlassian and more with the experts
Learn Atlassian and more with the experts Clearvision s training courses are designed to transform your teams with a hands on, practical journey of learning. Browse our courses and find out more. 3 Clearvision
More informationIntroduction in the Dragon1 open EA Method
Introduction in the Dragon1 open EA Method Dragon1 starts the third wave in Enterprise Architecture: Entering the era of Visual EA Management Overview Revision date: 28 November 2013 Management Overview
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationAn Overview of TOGAF Version 9.1
An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6
More informationIT Updates. Maryland Health Benefit Exchange Board Meeting April 15, Presented by: Isabel FitzGerald Secretary, DoIT
IT Updates Maryland Health Benefit Exchange Board Meeting April 15, 2014 Presented by: Isabel FitzGerald Secretary, DoIT A service of Maryland Health Benefit Exchange Agenda Overview of process for CT
More informationHow ISO can assist with your GDPR compliance
How ISO 27001 can assist with your GDPR compliance GDPR Summit May 30 th 2018 Sharon O Reilly IT Governance Ltd www.itgovernance.eu Introduction: Speaker Background GRC/GDPR Consultant Ireland IT Governance
More informationCode of Ethics Certification 2018 CHECKLIST
Code of Ethics Certification 2018 CHECKLIST Medical technology companies (both AdvaMed members and non-members) may participate in this certification program. The certification affirms that the company
More informationConformance Handbook for OpenChain Specification 1.1
Conformance Handbook for OpenChain Specification 1.1 Revision 1 Miriam Ballhausen, Shane Coughlan Copyright 2017 The OpenChain Project. This document is licensed under the Creative Commons Attribution
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationRichard Atkins FRIAS, RIBA, FRSA Managing Director, Home Energy and Data Services Limited. How the Schemes Work
Richard Atkins FRIAS, RIBA, FRSA Managing Director, Home Energy and Data Services Limited www.rias-regs.co.uk How the Schemes Work Todays Presentation will cover: Scheme Management Certification Environment
More informationJ2EE Application Development : Conversion and Beyond Osmond Ng
IBM Software Group J2EE Application Development : Conversion and Beyond Osmond Ng IBM Software Group Practitioner View Point IBM Rational Application Developer J2EE/EJB Tooling J2EE construction tools
More informationGOVSEC - SECURE GOVERNANCE ( ) IDENTIFICATION OF THE ACTION EXECUTIVE SUMMARY. Service in charge
328 8.16 GOVSEC - SECURE GOVERNANCE (2018.09) 8.16.1 IDENTIFICATION OF THE ACTION Service in charge Associated Services DIGIT EU Institutions, Member States 8.16.2 EXECUTIVE SUMMARY With the emergence
More informationDirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure
DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-
More informationCharter: Forwarding Abstractions Working Group
Charter: Forwarding Abstractions Working Group INTRODUCTION Over the past several decades, the Moore s Law effect has seen network hardware improve along almost all hardware oriented dimensions, including
More informationIdentity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition
Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization
More informationCertification and Re-Certification Policies and Procedures
National Wellness Institute Certified Worksite Wellness Specialist (CWWS) and Program Manager (CWWPM) expiring between 3/1/2016 and 12/31/2018 Certification and Re-Certification Policies and Procedures
More informationexisting customer base (commercial and guidance and directives and all Federal regulations as federal)
ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationHow to Attest for MIPS AMERICAN OPTOMETRIC ASSOCIATION QUALITY IMPROVEMENT AND REGISTRY COMMITTEE
How to Attest for MIPS - 2017 AMERICAN OPTOMETRIC ASSOCIATION QUALITY IMPROVEMENT AND REGISTRY COMMITTEE S TE P 1 Register For A CMS Enterprise (EIDM) Account Before a user can report data for the Quality
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationISSEP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard
Certification Exam Outline Effective Date: March 2018 About CISSP-ISSEP The Information Systems Security Engineering Professional (ISSEP) is a CISSP who specializes in the practical application of systems
More informationIntegrating TOGAF, Zachman and DoDAF Into A Common Process
Integrating TOGAF, Zachman and DoDAF Into A Common Process Rolf Siegers Senior Principal Software Systems Engineer The Open Group Architecture Practitioner s Conference October 2003 Customer Success Is
More informationDUBAI GRAND HOTEL. March 26 to (4 days) 9 am to 4 pm
TOGAF 9.1 Certification Training DUBAI GRAND HOTEL March 26 to 29-2017 (4 days) 9 am to 4 pm ISIDUS TECH TEAM FZE PO Box 9798 Dubai UAE, email mr@isidus.net M: +97150 7840755 T +97155 1602215 http://www.isidus.net
More informationHarnessing the Potential of SAP HANA with IBM Power Systems
Harnessing the Potential of SAP HANA with IBM Power Systems Contents Introduction.... 3 CHAPTER 1: Transition to the Future: SAP HANA and IBM Power Systems... 4 CHAPTER 2: SAP HANA on IBM Power Systems:
More informationCloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.
George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security
More informationFedRAMP Security Assessment Framework. Version 2.0
FedRAMP Security Assessment Framework Version 2.0 June 6, 2014 Executive Summary This document describes a general Security Assessment Framework (SAF) for the Federal Risk and Authorization Management
More informationCTAL. ISTQB Advanced Level.
ASTQB CTAL ISTQB Advanced Level TYPE: DEMO http://www.examskey.com/ctal.html Examskey ASTQB CTAL exam demo product is here for you to test the quality of the product. This ASTQB CTAL demo also ensures
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and
More informationTrust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014)
Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) This document has been developed by representatives of Apple, Google, Microsoft, and Mozilla. Document History
More informationWescom Solutions, Inc. Practitioner Engagement Android Version CFR EPCS Certification Report
Wescom Solutions, Inc. Practitioner Engagement Android Version 1.0 21 CFR EPCS Certification Report April 27, 2017 Prepared by Drummond Group drummondgroup.com Page 1 of 5 Certification Summary Overview
More information