IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Capability Maturity Model

RSS Feed    Add to Google    Add to My Yahoo!
Capability Maturity Model Reports
 
SearchSoftwareQuality.com eGuide: CMMI for development: An overview of a process improvement model
sponsored by IBM
EGUIDE: Don't miss this e-guide, expertly compiled by SearchSoftwareQuality.com, to learn the basics of CMMI and it's best use cases in today's enterprise environment.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

IBM

Best Practices for Delivering Better Software Faster with ALM
sponsored by IBM
WHITE PAPER: This paper outlines the steps that organizations must take to improve their systems and software development processes, including key best practices. It discusses solutions for unifying fractured, global development groups with existing infrastructures.
Posted: 17 Mar 2010 | Published: 17 Dec 2009

IBM

Journey towards Zero Defects: Challenges, Best Practices and Testing Models
sponsored by Wipro Technologies
WHITE PAPER: Organizations face different challenges at different levels of testing maturity. Testing Maturity Model (TMM) and Test Process Improvement (TPI) are two of the contemporary testing maturity models discussed in this paper.
Posted: 10 Nov 2005 | Published: 01 Nov 2005

Wipro Technologies

CollabNet Success Story: Agile CMMI
sponsored by CollabNet
CASE STUDY: Facing pressure to deliver solutions quickly and meet rapidly changing priorities, investment banks are reluctant to change processes and adopt new tools. Learn how CollabNet enabled software development/change management process that would enable CMMI compliance while accommodating existing Agile development practices used by various teams.
Posted: 06 Jan 2010 | Published: 06 Jan 2010

CollabNet

Collab Net Success Story
sponsored by CollabNet
CASE STUDY: Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

CollabNet

Transforming Storage Operations from Entrepreneurial to Predictive
sponsored by EMC Corporation
WHITE PAPER: Some organizations continue to operate without documented processes, procedures and polices. Learn how to avoid risks to services levels, business continuity - and a new approach to IT - one that moves from a reactive to a more predictive model.
Posted: 13 Dec 2004 | Published: 01 Dec 2004

EMC Corporation

Top 15 Vendors in Capacity Management Software
sponsored by TeamQuest Corporation
PRESENTATION: This research presentation from a former Forrester research director provides a rundown of the top 15 capacity management vendors today—including HPE, BMC, and TeamQuest—and details what makes the leaders in the space stand out.
Posted: 22 Jul 2016 | Published: 29 Feb 2016

TeamQuest Corporation

Easy Collaboration and Version Control with Full GPU Performance and Data Security
sponsored by AMD
WHITE PAPER: Learn how VDI powered by hardware-based virtualized GPU technology empowers GPU-accelerated mobility and collaboration while simplifying version control, safeguarding sensitive data, and more.
Posted: 21 Jul 2016 | Published: 30 Jun 2016

AMD

A Business Risk Approach to IT Governance
sponsored by IBM
WHITE PAPER: Learn best practices for assessing overall effectiveness in today's highly distributed organizations and how to manage IT risks. Also discover the role a centralized IT governance system can play in realizing your IT governance strategy.
Posted: 20 Jul 2016 | Published: 30 Sep 2011

IBM

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement