i-Meliore
  Use i-Meliore's e-Learning center to browse articles, white papers and research papers on technologies that make a difference today and that can be used to build the systems of tomorrow






 

e-Learning Center
Project Management
Risk Management
Software Engineering
Privacy
Research

Client Resources
Log-In
Sign Up
Newsletter Subscription



e-Learning: Risk Management

Schedule Risk Analysis
The critical path method (CPM) of scheduling a project is a key tool for project management. A schedule “network” represents the project strategy. Activities, where the work is accomplished, are linked by relationships (e.g. finish-start, start-start, finish-to-finish) showing how the work is planned. Strings of linked predecessor and successor activities constitute “paths” through the network. When two or more paths are to be done simultaneously, they are described as parallel paths. Some of the most important points in the project are where several parallel paths converge. At these merge or join points, the paths must all be completed before a milestone is recorded for payment, an inspection can be done, sub-assemblies can be integrated for testing or the project can be recorded as complete.

Security Risk Analysis and Management White Paper
Risk Analysis helps establish a good security posture; Risk Management keeps it that way. Security measures cannot assure 100% protection against all threats. Therefore, risk analysis, which is the process of evaluating system vulnerabilities and the threats facing it, is an essential part of any risk management program. The analysis process identifies the probable consequences or risks associated with the vulnerabilities and provides the
basis for establishing a cost-effective security program. Risk management is the process of implementing and maintaining countermeasures that reduce the effects of risk to an acceptable level. The risk analysis process gives management the information it needs to make educated judgments concerning information security. The procedure identifies the existing security controls, calculates vulnerabilities, and evaluates the effect of threats on each area of vulnerability.

Software Risk Management
This paper presents a holistic vision of the risk-based methodologies for Software Risk Management (SRM) developed at the Software Engineering Institute (SEI). SRM methodologies address the entire life cycle of software acquisition, development, and maintenance. This paper is driven by the premise that the ultimate efficacy of the developed methodologies and tools for software engineering is to buy smarter, manage more effectively, identify opportunities for continuous improvement, use available information and databases more efficiently, improve industry, raise the community’s playing field, and review and evaluate progress. The methodologies are based on seven management principles: shared product vision, teamwork, global perspective, forward-looking view, open communication, integrated management, and continuous process.

Building a Security Framework: A Comprehensive Risk Management Guide
If only each IT manager had a crystal ball to help them predict hack attacks, viruses and system failures. Until such a time, IT is increasingly relying on risk management methodology to help them plan ahead for breaches in network security. In the past, IT relied on common sense, intuition and a healthy dose of good luck to fortify the network against impending threats. However, with technology and networks now critical to corporate performance, intuition and good luck do not provide sufficient assurance against IT error and oversights. Senior management and shareholders are demanding a more structured and scientific approach to managing and mitigating network risk.
 

 

  Submit an RFP to receive a quote and a proposal (click here).  
  Questions/Comments? Email us for more information at .