IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

CMM (Capability Maturity Model)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Capability Maturity Model
DEFINITION: The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process. The model describes a five-level evolutionary path of increasingly organized and systematically more mature processes. CMM was developed and is promoted by the Software Engineering Institute (SEI), a research and development center sponsored by the U.S. Department of Defense  … 
Definition continues below.
CMM (Capability Maturity Model)White Papers (View All Report Types)
3 Matches

There are currently no reports cataloged under the topic:
CMM (Capability Maturity Model)

Please conduct a new search.

3 Matches
 
CMM (CAPABILITY MATURITY MODEL) DEFINITION (continued): …  (DoD). SEI was founded in 1984 to address software engineering issues and, in a broad sense, to advance software engineering methodologies. More specifically, SEI was established to optimize the process of developing, acquiring, and maintaining heavily software-reliant systems for the DoD. Because the processes involved are equally applicable to the software industry as a whole, SEI advocates industry-wide adoption of the CMM.The CMM is similar to ISO 9001, one of the ISO 9000 series of standards specified by the International Organization for Standardization (ISO). The ISO 9000 standards … 
CMM (Capability Maturity Model) definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement