Section 1.10.33 of “de Finibus Bonorum et Malorum”, written by Cicero in 45 BC

“At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore,… Continue reading Section 1.10.33 of “de Finibus Bonorum et Malorum”, written by Cicero in 45 BC

Section 1.10.32 of “de Finibus Bonorum et Malorum”, written by Cicero in 45 BC

“Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt. Neque… Continue reading Section 1.10.32 of “de Finibus Bonorum et Malorum”, written by Cicero in 45 BC

The standard Lorem Ipsum passage, used since the 1500s

“Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat… Continue reading The standard Lorem Ipsum passage, used since the 1500s

Why Information security needs Risk Management: a guide to robust Information Security Management

Information security is one of the most talked about concept these days in company and every one wants to have it. Common myth is that it’s a plug and play system where you can just install it in your company and get your self secure with all threats. Unfortunately, its not an umbrella that will… Continue reading Why Information security needs Risk Management: a guide to robust Information Security Management

Measuring CMMI® for Quality Project Management: is it so hard to adopt?

As many organizations, specially the software industry are now days aiming their sight towards CMMI® (Capability Maturity Model) CMMI-DEV, many are still reluctant to grasp what it is? Do we really need it? Will it increase our ROI? Or how far will it help in making our business better with greater project management and performance… Continue reading Measuring CMMI® for Quality Project Management: is it so hard to adopt?

Project Monitoring and Control-CMMI with SCRUM methodology in action

The project monitoring and control process in CMMI® consist of all those activities that ensure that the approved project is going to be delivered in time, budget, required quality and with marginal risk involved. The process revolves around verification, validation and monitoring the considerable changes in the plan and the equivalent action control taken by… Continue reading Project Monitoring and Control-CMMI with SCRUM methodology in action

Top 5 Reasons to get trained into the New ISO/IEC 27001:2013 ISMS

A lot of noise on the shore, a lot of stuff to read on , a lot more people talking about the newer version of Information Security ISO ISMS 27001:2013 right?. Let’s head up all information security managers, system administrators, ISO 27001 certified Consultants, ISO 27001 certified auditors; it’s the time to hear well about… Continue reading Top 5 Reasons to get trained into the New ISO/IEC 27001:2013 ISMS

Project Planning–CMMI–A vertebral to Project Performance

After managed requirements blog you all just read in the pane, the next stage we come across in the process implementation of CMMI is Project Planning phase. Once an organization has defined an agreed upon set of requirements that are traceable then the next important stage is making a Plan against these requirements. This in… Continue reading Project Planning–CMMI–A vertebral to Project Performance