Capability maturity model:-
Software CMM is a business
process management and quality improvement concepts to software development and
maintenance. It’s a community-developed guide for evolving towards a culture of
engineering excellence, model for organizational improvement. The underlying
structure for reliable and consistent software process assessments and software
capability evaluations. The Capability Maturity Model for Software (CMM) is a
framework that describes the key elements of an effective software process.
It has the following 5
levels
CMM
level 1 (initial):
Software development follows little to no rules. The project may go from one
crisis to the next. The success of the project depends on the skills of
individual developers. They may need to finish the project in a heroic effort.
CMM
level 2 (repeatable):
Software development successes are repeatable. The organization may use some
basic project management to track cost and schedule. The precise implementation
differs from project to project within the organization.
CMM
level 3 (defined):
Software development across the organization uses the same rules and events for
project management. Crucially, the organization follows this process even under
schedule pressures, ideally because management recognizes that it is the
fastest way to finish.
CMM
level 4 (managed):
Using precise measurements, management can effectively control the software
development effort. In particular, management can identify ways to adjust and
adapt the process to particular projects without measurable losses of quality
or deviations from specifications.
CMM
level 5 (optimizing):
Quantitative feedback from previous projects is used to improve the project
management, usually using pilot projects, using the skills shown in level 4.
(Note) All of the above mentioned levels
have many key processing areas in it
ISO:-
International Organization
for Standardization, it provides a reference framework, or a common
technological language, for different industry types which will help Industries
to develop & maintain quality of the products. The ISO 9000 and ISO 14000
families are among ISO's most widely known standards ever. The familiar three
standards ISO 9001, ISO 9002 and ISO 9003 have been integrated into the new ISO
9001:2000.
Six Sigma
Six Sigma is a rigorous and
a systematic methodology that utilizes information (management by facts) and
statistical analysis to measure and improve a company's operational
performance, practices and systems by identifying and preventing 'defects' in
manufacturing and service-related processes in order to anticipate and exceed
expectations of all stakeholders to accomplish effectiveness.
Six sigma levels Metric:
3.4 Defects Per Million Opportunities. DPMO allows you to take complexity of
product/process into account. Rule of thumb is to consider at least three
opportunities for a physical part/component - one for form, one for fit and one
for function, in absence of better considerations. Also you want to be Six
Sigma in the “Critical to quality” characteristics and not the whole
unit/characteristics.
Methodology: DMAIC/DFSS
structured problem solving roadmap and tools.
Philosophy: Reduce
variation in your business and take customer-focused, data driven decisions.
BS7799: -
BS 7799, Information
Security Management, released by the British Standards Institution (BSI) in
1995, and revised in 1998 and 1999, provides a comprehensive set of controls
comprising the best information security management system (ISMS) practices.
BS 7799 applies to
information systems used by organizations in industry and commerce, including
information processing technology in the area of networks and communications.
Organizations complying with BS 7799 should assess security risks, select
controls and develop guidelines. This standard may be used for ISMS audits and
as a basis for a registration scheme. It covers such areas as document control,
security policy and organization, asset classification and control, physical
and environmental security, communications and operations management, access
control and compliance with legal requirements.