Quality Assurance Involvement Compared to Program Results. Jill A. Brooks Network Centric Systems
|
|
- Ashlie Carter
- 5 years ago
- Views:
Transcription
1 Quality Assurance Involvement Compared to Program Results Jill A. Brooks Network Centric Systems
2 Agenda Introduction Software Engineering Institute Insight Raytheon North Texas Data Cost Performance Schedule Performance Quality Lessons Learned Other Considerations Next Steps Quality Assurance Involvement Compared to Program Results 10/25/2005 Page 2
3 Introduction - Raytheon Raytheon is an industry leader in defense and government electronics, space, information technology, technical services, and business aviation and special mission aircraft Network Centric Systems (NCS) develops and produces mission solutions for networking, command and control, battlespace awareness, and air traffic management Space and Airborne Systems (SAS) provides electro-optic/infrared sensors, airborne radars, solid state high energy lasers, precision guidance systems, electronic warfare systems, and space-qualified systems for civil and military applications Raytheon-specific data examined for this presentation draws on both NCS and SAS programs executed in North Texas. Data is from software programs 10/25/2005 Page 3
4 Introduction Raytheon continued For NCS North Texas: 8 QE engineers 145 Software Engineers 30 Programs (including maintenance efforts) 10/25/2005 Page 4
5 Introduction Raytheon continued Level 4 RTIS RTIS Integrated Integrated Product RTIS Product RTIS Policies Policies & & Development Procedures Development Procedures Process Process RTIS RTIS Software Software Operating Operating Baldridge Instructions Level 3 Instructions Award Level Level 3 Level 2 Defined Repeatable Level Level 45 4 Level Software Software Sigma Level 4 CMMI IPI 4 IPI Sigma IPI & & Cycle Cycle Time IPI Time Level 5 Level 3 10x Baseline Fault Density Validation Improvement Level Raytheon Acquisition Level 4/5 & Transition Managed/ Optimizing Self-assessment Self-assessment Software Software Improvement Improvement Team Team Formed Formed IPI CMM -based Internal Process Improvement Assessment IPI CMM -based Internal Process Improvement Assessment RTIS Raytheon/TI Systems RTIS Raytheon/TI Systems CMMI CMM Integrated CMMI CMM Integrated 10/25/2005 Page 5
6 Introduction The Burning Platform Although the CMMI introduces Quality Assurance (QA) at Level 2, and QA is further expanded at higher levels of maturity, QA functions still have to prove their worth as QA is often viewed as an overhead function 10/25/2005 Page 6
7 Software Engineering Institute (SEI) Insight Quality Assurance is introduced at Level 2 of the Capability Maturity Model Integrated (CMMI) Quality activities are in all process areas As organizations move up the maturity ladder, there are improvements in program performance SEI has both qualitative and quantitative data to support the previous statement Process Change Agent Process Participant Best Practices Consultant Process Analyst Continuous improvement Process Facilitator Quantitative Analysis Process deployment Predictive assessment Product Inspector Proactive QE Reactive QC The SEI has collected data which illustrates the correlation between organizational maturity and improved performance 10/25/2005 Page 7
8 SEI Insight Performance results summarized by the Software Engineering Institute, March 4, 2005 Performance Improvement Category Low Median High Number of Data Points Cost 4.5% 38% 87% 14 Schedule 20% 50% 90% 14 Productivity 11% 50% 376% 13 Quality 29% 50% 94% 16 Customer Satisfaction 10% 14% 55% 5 Return on Investment 2 : 1 3 : 1 13 : 1 8 Reference: 10/25/2005 Page 8
9 Raytheon North Texas Data Cost Performance QE Involvement is measured as a percentage of the total effort on the program Cost Performance Index (CPI) is measured as the ratio of the Budgeted Cost of Work Performed (BCWP) to the Actual Cost of Work Performed (ACWP) CPI = BCWP ACWP 10/25/2005 Page 9
10 Raytheon North Texas Data Cost Performance Over Budget Under Budget Less SQE Involvement More QE Involvement There is a positive correlation between QE Involvement and Program Cost (measured via CPI) 10/25/2005 Page 10
11 Raytheon North Texas Data Schedule Performance QE Involvement is measured as a percentage of the total effort on the program Schedule Performance Index (SPI) is measured as the ratio of the Budgeted Cost of Work Scheduled (BCWS) to the Actual Cost of Work Performed (ACWP) SPI = BCWS ACWP 10/25/2005 Page 11
12 Raytheon North Texas Data Schedule Performance Behind Schedule Ahead of Schedule Less SQE Involvement More QE Involvement No apparent correlation between QE Involvement and Program Schedule (via SPI) 10/25/2005 Page 12
13 Raytheon North Texas Data Quality Defect Containment QE Involvement is measured as a percentage of the total effort on the program Defect Containment (DC) is measured as the ratio of the number of defects which were detected in phase versus the total number of defects DC = In-phase Defects Total Number of Defects 10/25/2005 Page 13
14 Raytheon North Texas Data Quality Defect Containment Lower Containment Higher Containment Less SQE Involvement More QE Involvement There is a positive correlation between QE involvement and Defect Containment 10/25/2005 Page 14
15 Raytheon North Texas Data Quality Defect Density QE Involvement is measured as a percentage of the total effort on the program Defect Density (DD) is measured as the ratio of the number of defects which were detected post delivery versus the size of the product. Note the Equivalent Lines of Code was used to adjust for programs with significant amounts of legacy code DD = Post Delivery Defects Equivalent Lines of Code 10/25/2005 Page 15
16 Raytheon North Texas Data Quality Defect Density (DD) Lower DD Higher DD 0 Less SQE Involvement More QE Involvement There is a negative correlation between QE involvement and Defect Density, which is a good thing! 10/25/2005 Page 16
17 Lessons Learned Data, data, data Multiple data repositories The color of money Level of granularity: QE sometimes counted as part of management, planning and control QE may perform expanded role activities (non-traditional QE activities) which are sometimes counted in the QE bucket 10/25/2005 Page 17
18 Other Considerations Execution of QE improved (QE productivity/efficiency) Don t currently have a formal metric for this Process has matured QE staff has had very little attrition Getting more bang for the QE buck? QE productivity / efficiency is an opportunity for future analysis 10/25/2005 Page 18
19 Other Considerations Customer value of QE involvement Don t currently have a formal metric for this (have customer satisfaction scorecards, but it is not clear if these have the level of granularity required to examine customer perceived value of QE activities) QE involvement required by some contracts QE often has established long-standing relationships with customers Customers request QE participation in various activities Customer Value of QE Involvement is another relationship to examine 10/25/2005 Page 19
20 Next Steps Continuous Improvement continues Data repository consolidation NCS is moving towards standardized cost collection system with increased granularity Metrics are being standardized across disciplines: Systems Engineering, Software Engineering, and Hardware Engineering Although there is evidence that increased QE involvement has a positive impact on program success, there are opportunities for improvement of the data and more analysis in the future! 10/25/2005 Page 20
21 Contact Information Jill Brooks /25/2005 Page 21
22 Questions 10/25/2005 Page 22
CMMI Version 1.2. Josh Silverman Northrop Grumman
CMMI Version 1.2 Josh Silverman Northrop Grumman Topics The Concept of Maturity: Why CMMI? CMMI Overview/Aspects Version 1.2 Changes Sunsetting of Version 1.1 Training Summary The Concept of Maturity:
More informationITIL Managing Across the Lifecycle Course
ITIL Managing Across the Lifecycle Course Duration: 5 Days Course Delivery: Classroom Language: English Course Overview ITIL 2011 edition is comprised of five core publications: Service Strategy, Service
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationCisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services
Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business
More informationEffective Use of Non- Directive Tools and Templates Integrating the How s with the What s
Copyright 2008 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a trademark of Raytheon Company. Effective Use of Non- Directive Tools and Templates Integrating the How s with
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationDAVIS SYSTEMS
Lessons Learned Using Agile Practices with TSP by Noopur Davis Davis Systems presented at the 2010 TSP Symposium Pittsburgh, PA September 23, 2010 DAVIS 1 2010 Agenda Background Project Planning Practices
More informationISO/IEC overview
ISO/IEC 20000 overview Overview 1. What is ISO/IEC 20000? 2. ISO/IEC 20000 and ITIL 2 BS 15000 BS15000 started in UK and first launched on July 1, 2003. Which was replaced by ISO/IEC 20000 after formal
More informationPractical Guide to Securing the SDLC
Practical Guide to Securing the SDLC Branko Ninkovic Dragonfly Technologies Founder Agenda Understanding the Threats Software versus Security Goals Secure Coding and Testing A Proactive Approach to Secure
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationTHE BENEFITS OF DOING THE SAME THING, THE SAME WAY, EVERYWHERE
Approved for Public Release THE BENEFITS OF DOING THE SAME THING, THE SAME WAY, EVERYWHERE Tim Swett, Lianne Poisson, Twila Pfieffer, Danny Poisson Raytheon Company GBS Information Technology liveworx.com
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationBetter together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com
Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional
More informationMeasuring Cybersecurity Readiness: The Cybersecurity Maturity Model
Measuring Cybersecurity Readiness: The Cybersecurity Maturity Model NCHICA Cybersecurity Thought Leader Forum Richard Roberts, CISO & Director of Technology Strategy 757.213.6875 www.divurgent.com What
More informationNCOIC Rapid Response Capability (NRRC)
NCOIC Rapid Response Capability (NRRC) Wil Regier NCOIC Business Development Los Angeles, February 2014 Approved for Public Release NCOIC-NRRC Briefing 20140224 Copyright Published by The Aerospace Corporation
More informationUsing ITIL to Measure Your BCP
Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP
More informationFederal Information Security Management Act (FISMA) Operational Controls and Their Relationship to Process Maturity
Federal Information Security Management Act (FISMA) Operational Controls and Their Relationship to Process Maturity Ronda Henning rhenning@harris.com The Basic Premise of This Presentation Proper preparation
More informationCompTIA Project+ (2009 Edition) Certification Examination Objectives
CompTIA Project+ (2009 Edition) Certification Examination Objectives DRAFT INTRODUCTION The Project + examination is designed for business professionals involved with projects. This exam will certify that
More informationEXIN Expert in IT Service Management based on ISO/IEC Preparation Guide
EXIN Expert in IT Service Management based on ISO/IEC 20000 Preparation Guide Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
More informationArchitecture for a Truly Integrated Defense Network
Architecture for a Truly Integrated Defense Network Eric Firkin Director, USAF Business Development Raytheon Solipsys Corporation 15 June 2004 Corporate Overview Founded in March 1996 by Senior Researchers
More informationFederal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT?
CATEGORY MANAGEMENT IN THE Federal Government Each fiscal year the Federal Government is challenged to accomplish strategic goals while reducing spend and operating more efficiently. In 2014, the Federal
More informationSan Francisco Chapter. Cassius Downs Network Edge LLC
Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology
More informationAmerican Society for Quality
US Army BOSS Program Information Session American Society for Quality Choices and Challenges for the Future 10 September 2017 Certified Lean Six Sigma Black Belt Certified Change Management Advanced Practitioner
More information"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary
Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL
More informationThe Role of Converged and Hyper-converged Infrastructure in IT Transformation
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational
More informationEngineering Improvement in Software Assurance: A Landscape Framework
Engineering Improvement in Software Assurance: A Landscape Framework Lisa Brownsword (presenter) Carol C. Woody, PhD Christopher J. Alberts Andrew P. Moore Agenda Terminology and Problem Scope Modeling
More informationStandard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms
Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in
More informationGPI Asia Annual Conference 2012 CMMI for Development with CMMI for Service, or with ITIL
GPI Asia Annual Conference 2012 CMMI for Development with CMMI for Service, or with ITIL By: K. Panee Aramruthailert K. Anuchit Chitpirom 28 June 2012 Agenda Why service process is necessary Background
More informationProgress and challenges with the establishment of MRV system in African Countries
Progress and challenges with the establishment of MRV system in African Countries The progress, challenges and lesson learned on building an integrated MRV system: an example from South Africa in building
More informationCertified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team
Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationReinvent Your 2013 Security Management Strategy
Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for
More informationIT Service. Demystifying ITIL. J. Andrew Atencio Andy. 1. Introduction and History. 2. Why Service Management/ITIL?
IT Service Management: Demystifying ITIL J. Andrew Atencio Andy City of Greenwood Village aatencio@greenwoodvillage.com Agenda 1. Introduction and History 2. Why Service Management/ITIL? 3. The How and
More informationRisk-based security in practice Turning information into smart screening. October 2014
Risk-based security in practice Turning information into smart screening October 2014 Organizations charged with securing our society s vital functions transit, commerce, communication have expansive missions
More informationModule 6: Functions. ITIL Foundation v V1. Reader s Note QAI India Ltd. I
ITIL Foundation v 2011 - V1 Module 6: Functions Reader s Note 2012 QAI India Ltd. I 9 ITIL Foundation v 2011 - V1 Module 6: Functions Reader s Note 2012 QAI India Ltd. I 10 ITIL Foundation v 2011 - V1
More informationSecurity Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security
Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a
More informationWelcome John Harris, Director General
Business Plan 2018 Welcome John Harris, Director General Agenda - speakers Chief Minister, Senator Ian Gorst, Government of Jersey Key highlights of Lord Eatwell, Chairman, JFSC Strategic and major priorities
More informationConvergence of BCM and Information Security at Direct Energy
Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc
More informationThe Secret Sauce of ILM
The Secret Sauce of ILM the ILM Assessment Core LeRoy Budnik, Knowledge Transfer Abstract The Secret Sauce of ILM Assessment Professional Services and internal consulting figure prominently in the success
More informationMOVING MISSION IT SERVICES TO THE CLOUD
MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights
More informationCourse Information
Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme
More informationEXIN Specialist in IT Service Management based on ISO/IEC Preparation Guide
EXIN Specialist in IT Service Management based on ISO/IEC 20000 Preparation Guide Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
More informationUNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10
Exhibit R-2, PB 2010 Office of Secretary Of Defense RDT&E Budget Item Justification DATE: May 2009 3 - Advanced Technology Development (ATD) COST ($ in Millions) FY 2008 Actual FY 2009 FY 2010 FY 2011
More informationIKM in NATO. Antonio de Frutos (NIC-ESP) Information Manager JFC Naples HQ
IKM in NATO Antonio de Frutos (NIC-ESP) Information Manager JFC Naples HQ Antonio de Frutos, NIC-ESP: JFC Naples, Information Manager (2009- ) IM Governance/IM Training/IM Planning/IM Projects Introduction
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationHow To Reduce the IT Budget and Still Keep the Lights On
How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,
More informationDeployment Explained: DREN IPv6 Pilot
1 Department of Defense High Performance Computing Modernization Program Defense Research and Engineering Network Approved for public release; distribution is unlimited. Next Generation Internet: How IPv6
More informationWorldwide Government 2008 Top 10 Predictions
Worldwide Government 2008 Top 10 Predictions Webcast - January 11, 2008 Webcast Logistics Audio lines are muted until Q&A session Submit your questions via the Live Meeting Chat window at any time (or
More informationHealth Information Technology - Supporting Joint Readiness
Health Information Technology - Supporting Joint Readiness Session # 104, March 7, 2018 Mr. T. Pat Flanders, DADIO/J-6, CIO Kevin P. Seeley, Deputy CIO, Colonel, USAF, MSC 1 Speaker Introduction Pat Flanders
More information2013 Program Excellence Award
2013 Program Excellence Award The Aviation Week Program Excellence Award initiative was developed in 2004 in recognition of the need Phase I Submission Name of Program: Integrated Space Command and Control
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST
More informationProcess Improvement for Present and Future. Erik van Veenendaal.
Test Improvement with TMMi Process Improvement for Present and Future Erik van Veenendaal www.erikvanveenendaal.nl Erik van Veenendaal www. erikvanveenendaal.nl Founder and major shareholder ImproveQS
More informationCYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS
CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED
More informationRunway Safety Teams (RSTs) Description and Processes. Session 5 Presentation 1
Runway Safety Teams (RSTs) Description and Processes Session 5 Presentation 1 A framework for RSTs Establishing an RST Membership Terms of reference Work programme (schedule, agenda, venue, etc) Support
More informationOffice of Acquisition Program Management (OAPM)
Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)
More informationVMware BCDR Accelerator Service
AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution
More informationNorth Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts
North Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts Paul Embley Chief Information Officer National Center for State Courts January
More informationAcross an Organization
Building Automated Testing Competence Across an Organization Integrated Defense System (IDS) Matthew Thomann Senior Systems Engineer II March 2, 2016 Copyright 2016 Raytheon Company. All rights reserved.
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element 8.306 7.299 10.429-10.429 11.464 12.492 12.840 13.010 Continuing Continuing
More informationSOFTWARE TESTING FOUNDATION COURSE CURRICULUM
On a Mission to Transform Talent SOFTWARE TESTING FOUNDATION COURSE CURRICULUM Table of Contents Module 1: Industry Orientation...1 Module 2: ISTQB Syllabus (Duration: 6 Weeks)...2 Module 3: Project Work...3
More informationData Collection & Industry Standards
Data Collection & Industry Standards (Chapter 8 Software Project Estimation) Alain Abran (Tutorial Contribution: Dr. Monica Villavicencio) 1 Copyright 2015 Alain Abran Topics covered 1. Introduction 2.
More informationSan Francisco Chapter. What an auditor needs to know
What an auditor needs to know Course Objectives Understand what a data center looks and feels like Know what to look for in a data center and what questions to ask Deepening understanding of controls that
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationDoD Strategy for Cyber Resilient Weapon Systems
DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1
More informationLesson Learned Initiatives to Address and Reduce Misoperations
Lesson Learned Initiatives to Address and Reduce Misoperations Primary Interest Groups Transmission Owners (TOs) Generator Owners (GOs) Problem Statement A registered entity experienced a high rate of
More informationComing up soon: TMMI
Coming up soon: TMMI What to expect Jan Jaap Cannegieter Vice President SYSQA Almere Quality Assurance in ICT / 1 Agenda The history: TMM Why TMMI What we know in advance TMMI compared to other models
More information1. You should attempt all 40 questions. Each question is worth one mark.
Sample Paper D Question Booklet Multiple Choice Exam Duration: 60 minutes Instructions 1. You should attempt all 40 questions. Each question is worth one mark. 2. Mark your answers on the answer sheet
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationAchieving ICT Service Management Excellence with ITIL and ISO20000 Frameworks
CCPM Solutions Experts in ICT Performance Supporting Your Business Achieving ICT Service Management Excellence with ITIL and ISO20000 Frameworks 1 st July 2011, Addis Ababa By Yared Haile-Selassie & Workneh
More informationImplementing a Successful Data Governance Program
Implementing a Successful Data Governance Program Mary Anne Hopper Data Management Consulting Manager SAS #AnalyticsX Data Stewardship #analyticsx SAS Data Management Framework BUSINESS DRIVERS DATA GOVERNANCE
More informationEvaluation Criteria. 1) Evidence of Credentials / Certifications in all 4 Fields (Energy, GIS, Master Planning, and Real Property): 10 PTS
Evaluation Criteria Selection Criteria for: Master Planning and Miscellaneous Engineering Activities [Real Property Inventories, Geospatial Information Systems (GIS Capabilities), Facility Energy Audits,
More informationArgon ST. Creative People Applying Advanced Technology
Argon ST Creative People Applying Advanced Technology Background Argon ST provides advanced intelligence, surveillance, and reconnaissance systems to the U.S. Department of Defense and certain foreign
More informationStrategic Security Analyst
Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*
More information2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals
2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationVideo AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers
Video AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers Live and on-demand programming delivered by over-the-top (OTT) will soon
More informationSA-CMM and the CMMI sm A Comparison
SA-CMM and the CMMI sm A Comparison John Marciniak November 14 2002 CMM is registered with the U.S. Patent and Trademark Office sm CMMI is a service mark of Carnegie Mellon University Outline Introduction
More informationUp and Running Software The Development Process
Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running
More informationPRINCE2 Practitioner Course Outline
PRINCE2 Practitioner Course Outline 1 PRINCE2 Practitioner Program Overview PRINCE2 provides an easily tailored and scalable method for the management of all types of projects. This method is the de facto
More information(Objective-CS605 Software Engeenring-II)
Which one of the following is NOT a useful indicator of software quality? Correctness Code size (Page 67) Maintainability Integrity Usability Which one of the following does not belong to a strategy for
More informationITIL Managing Across the Lifecycle. Lesson Plan. Mock Exam: Duration: Language: Included in Course (x2) 30 hours, self-paced English
ITIL Managing Across the Lifecycle Lesson Plan Delivery: e-learning Certificate: Examination (included) Accredited By: EXIN Mock Exam: Duration: Language: Included in Course (x2) 30 hours, self-paced English
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationHow Cisco IT Improved Development Processes with a New Operating Model
How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick
More informationFifteen Best Practices for a Successful Data Center Migration
Fifteen Best Practices for a Successful Data Center Migration Published: 6 March 2017 ID: G00324187 Analyst(s): Henrique Cecci Data center migrations are often complex and risky. These best practices will
More informationProject Management Professional (PMP) Exam Preparation elearning Course
Project Management Professional (PMP) Exam Preparation elearning Course Course Code: PMC001CL Duration: 4 Days, 35 Hours Format: elearning Certification Exam: PMI s PMP Exam Certification Track: N/A Course
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationVirtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,
Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationWhat is ISO/IEC 20000?
An Introduction to the International Service Management Standard By President INTERPROM July 2015 Copyright 2015 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION... 3 SERVICE
More informationGet your business Skype d up. Lessons learned from Skype for Business adoption
Get your business Skype d up Lessons learned from Skype for Business adoption On the rise with Skype for Business Recent figures from Microsoft found that 90% of Fortune 500 companies and over 100 million
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationDon t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL
Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL ITSM Executive Overview PMI Southwest Ohio Mega Keith D. Sutherland April, 2016 Acknowledgements Service Management Dynamix,
More informationSession 408 Tuesday, October 22, 10:00 AM - 11:00 AM Track: Industry Insights
Session 408 Tuesday, October 22, 10:00 AM - 11:00 AM Track: Industry Insights ITIL Success: Five Years Later Paul Fibkins Director and Founder, FIBKO LLC fibkinsp@hotmail.com Session Description In 2007,
More information