• Predictive Analytics for Improved Cost Management  



Blog



The Capability Maturity Model Integration – Development (CMMI-Dev) is a model designed to help organizations achieve and institutionalize process maturity. CMMI specifies the goals that need to be achieved to reach a specific maturity or capability level – it is neither rigid nor prescriptive with how exactly these goals are to be met.   Agile is a philosophy and set of tenets  for software projects that are characterized by highly collaborative, cross-functional teams who work closely with their customers to deliver regular increments of functional software capability that the customers and end users are happy with.  Neither the agile philosophy ...
In the previous (second) blog in this series, we discussed using the NIST Special Publication 800-171 Appendix E to list all possible cyber security requirements.  We then down selected the entire list of 123 items into roughly 60 that may directly impact the software development process.  Now, we will cover how the impact of those 60 items could possibly be included in a TruePlanning® estimate. I will offer three primary methods for accounting for additional effort of cyber security requirements.  We will look at modeling the requirements as individual cost objects in the estimate.  We will then consider setting inputs ...
We will pick up where we left off on estimating the cost of cyber security by looking at requirements.  Recall from a previous blog that the requirements for Cyber Security are outlined in Appendix E of the National Institute of Standards and Technology (NIST) Special Publication 800-171 document titled “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.”  In Appendix E, there are a series of tables that outline the requirement, as well as the responsible authority for ensuring those requirements are met.  There are four categories of requirements*: NCO: Not directly related to protecting ...
A recent article in the National Defense Magazine highlighted the ever increasing need for cyber security.  (See http://www.nationaldefensemagazine.org/blog/lists/posts/post.aspx?ID=2268)  When working on a software estimate for a program office here at Wright-Patterson AFB, I was asked “how do you handle cyber security requirements?”  My response was, “What does that mean for your program?  How are the requirements different?”  There was no good answer.  We may be required to incorporate cyber security requirements into a new software project, but there is no really good guidance as to what that exactly means.  We can probably assume that costs are higher for a ...
If you’ve taken my Software Training class, you’ve heard me use the analogy of “taking someone else’s spreadsheet and adding your own logic” to distinguish between modifications, adapted code and glue code.  But let’s take a step back to make sure we’re all in agreement {if not, blame me not the product!} #1.) To be clear, COTS is shrink-wrapped, ready-to-go with near-zero modification to core functionality.  Generally, we really prefer to see COTS modification no more than 10%. #2.) If this latter core functionality needs modification, then we recommend using the SW Component object with Adapted code, as well as Reused ...
We’ve kicked off a study of the cost impacts of various development standards, and this post discusses a customer request on the cost impacts of IEEE/EIA 12207. IEEE 12207 establishes a common framework for software life cycle processes, with well-defined terminology that can be referenced by the software industry [1].  Adherence to this standard helps to eliminate misunderstandings between contractors and procurers and significantly improves chances of mission success, a major part of which is preventing cost and schedule overruns [2, 3]. IEEE 12207 contains a set of management, engineering, and data requirements for all parties involved (acquirers, suppliers, developers, operators, ...
Here’s something I’ve been thinking about a lot lately  - technical debt and its relationships to software maintenance costs.  Technical debt speaks to the structural quality of software applications.  Technical debt is incurred for many different reasons; sometimes it is intentional when shortcuts are taken to meet a time to market requirement; sometimes it occurs because a development team gets sloppy about applying good coding practices (or a development team has not documented coding practices); sometimes it happens when the technology in an application is not kept up to date and it literally gets lapped by technology. Not all technical ...
Original Post Date: Friday, July 9, 2010  While sitting in the operatory chair yesterday, my dentist said something that made me stop. He was complaining about an increasing rate of incompetence and apathy he observes in those delivering services to him. And while I do agree with him in principal, he and I are of the age where some folks label us as grumpy old men. So, it may not be as bad as we think. Regardless, the statement he said he made to the an unfortunate poor-quality service provider was, “If you don’t have the time to do it ...
Original Post Date: Monday, October 18, 2010 Some of us remember taking the Iowa tests during our early school days. The Iowa Tests of Basic Skills (ITBS) are standardized tests provided as a service to schools by the College of Education of The University of Iowa. The tests, administered to students in grades K-8, became a national standard for measuring scholastic aptitude – I was educated in Pennsylvania. Now out of Iowa comes another test of sorts, something called an Integrity Index Score based upon a proprietary algorithm of an organization called Iowa Live. Iowa Live calls itself, “a ...
Original Post Date: Wednesday, November 3, 2010 The midterm elections are finally over. The themes of reduced spending and lower taxes showed up in force at the ballot box. But what does that mean for the defense industry? The U.S. Secretary of Defense, Robert Gates, caused quite a stir when he announced his proposals for reigning in defense spending. There are the expected assortment of eliminations (U.S. Joint Forces Command and Business transformation Agency to name two), reductions (in service support contracts, number of senior civilian executive and general/admiral military officers, and funding for intelligence community advisory contracts), freezes (of ...