Today there are a lot of misunderstandings when it comes to the Capability Maturity Model Integration (CMMI®)  and peer reviews. But why should you care? First, peer reviews are an expected practice and required to achieve CMMI compliance. Second, while peer reviews are commonly held today, the way these reviews are often conducted is costing many organizations wasted time and effort, and failing to provide the promised higher performance payback on their investments. In some Summary cases, poor peer review practices may result in delaying, or not achieving, CMMI compliance. Recent case study data  reveals a major cause of these failures can be traced to the fact that many organizations don’t realize the options and flexibility they have to use peer reviews to gain higher organizational performance.
This white paper provides straight talk and advice on what the CMMI really requires with respect to peer reviews, how to get the most value from your peer reviews, and what to look for in peer review software to improve the performance of your organization while achieving CMMI compliance. You will learn techniques to eliminate wasted effort while tuning your team’s performance for optimal competitive advantage.
The term "Scrum" is typically applied to a Rugby game in which three members of each team line up opposite each other with a group of two and three lined behind them with the emerging formation of eight players of each team into three-two-three ratio. The ball then is rolled between the opposing front lines; the players standing with arms around a teammate’s waist meet the opponents’ shoulder to shoulder and attempt to kick the ball backward to a teammate. The principle behind this is that each team tries to go the distance as a unit while passing the ball back and forth. The term is now used in the business management system which bases its operations on the current platform of scrum and requirements management.
Project Definition: Reduce Rework by Reducing Defect Leakage Currently, over 30% of the Software Engineering effort is consumed reworking products already deemed “fit-for-purpose”. A major contributor to this is defect leakage. Defect leakage is calculated as a percentage by summing the defects attributable to a specific phase that are detected in later phases divided by the total number of defects attributable to that phase. Defect leakage is a good indicator of the quality of the different phases of the software process. Defect leakage for the some software development phases is as high as 75%, where as our goal is set at 20%. Not catching and correcting defects at the earliest point in the process leads to cost and budget over-runs due to excessive rework. By investigating what types of defects go undetected during the various phases, corrections can be introduced into the process to help identify the top defect types.
With the current world health crisis, more organizations are making the shift to remote working environments for their employees. At ISACA, we are living this today as ISACA’s office is closed and all staff are working remotely.
Technology is integral to successfully transition a large portion of the workforce to working remotely. As we moved to remote work, we had the good fortune of being in the business we are in— one that is tuned to best cybersecurity and governance practices. We were able to make the transition to remote work seamlessly because we know that a good framework, such as COBIT 2019, and cybersecurity best practices can help organizations and the personnel responsible for security, infrastructure, risk and governance navigate these uncertain times.
In a previous Journal article, I wrote about artificial intelligence (AI) and talked about the massive amount of digital data that are being accumulated, how new digitally oriented technology is affecting us, the sources of online data (e.g., personal, private), how data are used and how a career in AI can be useful to those interested in developing the skills to use AI.
In my most recent Journal article, I look at AI from an information security and privacy perspective. The article outlines AI concerns, threats and risk factors as a way of understanding AI as a cyberthreat. Once we have an understanding of the threat, we discuss ways to protect the cyberdata (and personal privacy). Preventive measures, protective controls, and detective practices and tools are presented to help understand how to manage the threat by using AI and other countermeasures.
The integration of AIRA — Artificial Intelligence Review Assistant — into Frontiers’ digital peer-review platform enables better, more efficient quality control and manuscript
Frontiers peer review now incorporates powerful AI technology to safeguard both manuscript and peer-review quality more efficiently and keep pace with ever-growing submissions. AIRA assists editors, reviewers handling and internal teams by analyzing, interpreting and communicating the quality of submitted manuscripts and the review process, as well as suggesting actions and identifying potential reviewers. Built in-house and fully integrated into the Frontiers Review Forum and internal workflows, these groundbreaking capabilities have already streamlined Frontiers’ publishing process — and will continually drive further optimization through ongoing learning and inclusion of new quality checks.
Attention all Lead appraisers
Send us an email with the Subject: Appraisal Plan and we will send you the Demix Appraisal Plan.XLSX tool. It provides wonderful features to simplify your appraisal planning.