Articles - QESP
- Tuesday, December 4th, 2012
Non-functional requirements are the killers of most modern multi-language, multi-layer applications. The continuing stream of business system disasters being reported in the press are rarely the result of a functional defect. Rather they are structural flaws in the system that we cluster under the catchall phrase, ‘non-functional requirements’. Okay, fine, but shouldn’t these structural, non-functional requirements have been stated clearly from the beginning? After all, they are requirements!
By Six Sigma
- Saturday, December 1st, 2012
Many organizations have struggled over the past few decades with a blizzard of process improvement methodologies such as Total Quality Management (TQM), Kaizen, JIT Production, and Re-Engineering. These operations are understandably leery of adopting new methodologies given their past experience, especially with a focus on return on investments and leveraging existing practices. This article examines the relationship of Agile, CMMI®, Lean Production and the Six Sigma Define, Measure, Analyze, Improve, and Control (DMAIC) roadmap. The intent is to explain how these methodologies might be synergistically combined for a cohesive approach to enhance continuous process improvement.
- Saturday, December 1st, 2012
Integration of CMMI, Agile, and Lean Six Sigma Abstract. Many organizations have struggled over the past few decades with a blizzard of process improvement methodologies such as Total Quality Management (TQM), Kaizen, JIT Production, and Re-Engineering. These operations are understandably leery of adopting new methodologies given their past experience, especially with a focus on return […]
- Thursday, October 25th, 2012
Too often when I meet with executives I get confronted with, “Hey, you’re the CMM guy. How come my outsourcer is Level 5 and the software they sent me is full of bugs?” CMM and its successor, CMMI, were never meant to be certifications for defect-free software products. Rather, they were roadmaps to help organizations […]
- Friday, August 24th, 2012
Abstract . The totality of human society has become existentially dependent upon the safe and secure operation of the cyber domain. It is impossible to envision a successful military operation without dependable access to the cyber domain. We will fail to comprehend the essential nature of the cyber domain if we continue to think of […]
- Wednesday, August 22nd, 2012
Working side-by-side with designers developing technologies of the future are engineers deciphering what went wrong with some of the technologies of the present. They analyze readouts from precision tools, devise ways to test large pieces of rocket hardware without damaging the rocket itself, and burn, blow up or vaporize leftover fragments in an effort to find out why something failed. Think of it as CSI: KSC.
Tags: Failure Analysis, Technology Failures
- Saturday, August 4th, 2012
Editor’s Note : The following is an extract from a CrossTalk-July/August 2012 article. The original is available at http://www.crosstalkonline.org/storage/issue- archives/2012/201207/201207-Childs.pdf ) Words of Wisdom Abstract . Process performance forms the cornerstone of the high-maturity concepts in the CMMIR. High maturity generates great discussion in the CMMI-based process improvement world. However, understanding process performance provides benefits […]
Tags: Process Management, Statistical Analysis
By Chronologist Blog
- Tuesday, December 27th, 2011
In this post we will introduce the Theory of Constraints (TOC) and start looking at how it can be applied to software engineering management. TOC is most well known for its so called “Five Focusing Steps”, and often that process is referred to when trying to identify and deal with bottlenecks in Kanban for Software. […]
Tags: Agile, Software Development Process, Software Engineering