Model Based Engineering and Its Integration with Safety Assurance Cases for Medical Device Software
|
|
|
- Gabriella Small
- 10 years ago
- Views:
Transcription
1 Model Based Engineering and Its Integration with Safety Assurance Cases for Medical Device Software Yi Zhang Ph.D., Paul Jones Office of Science and Engineering Laboratories Center for Devices and Radiological Health Food and Drug Administration March 25 th, 2015
2 Disclaimer The opinions and information in this presentation are those of the authors, and do not represent the views and/or policies of the U.S. Food and Drug Administration. -1-
3 Abstract Model based engineering (MBE) has the potential to help medical device manufacturers detect subtle design flaws at early stages of the development lifecycle, and reduce design/implementation errors in the final device. The rigor of the MBE process and derived artifacts can serve to justify the confidence of stakeholders (e.g. internal, third party, and regulatory) in device safety. In particular, artifacts generated through the MBE process are objective, verifiable, and traceable, and hence can be used as evidence in safety assurance cases to facilitate and ease vested stakeholder assessments of device safety. A variety of modeling and verification tools are available to implement the MBE process. These tools vary in their semantics, expressiveness, and verification rigor. Thus, developers have to realize the strength and weakness of these tools, and make reasonable choices. Furthermore, when applied to the design of medical devices, the MBE process has to be integrated with the organization s risk management activities (as specified in ISO-14971), to ensure that all foreseeable risks are adequately addressed and mitigated in the final device. -2-
4 Model Based Engineering (MBE) of Medical Device Software Requirement Engineering Design Implementation Requirement Solicitation Design Implementation Requirement Document Design Models Automatic Code Generation Final Software Requirement Models Formal Requirement Verification Formal Design Verification Model Based Testing/Verification Verification results could cause re-iteration of previous development activities Trustworthy development artifacts: clearly/unambiguous defined, and demonstrable/verifiable properties Explicit and complete traceability among development artifacts -3-
5 Safety-Driven Development of Medical Device Software Safety and effectiveness are two primary properties of interest. ISO 14971: Application of risk management to medical devices. All foreseeable risks of the device have to be identified and adequately mitigated. Software mitigation measures have to be correctly implemented and tested; Risks caused by software have to be adequately mitigated. Risk mitigation measures need to be traceable throughout the development artifacts to the final device. -4-
6 Generic Infusion Pump Project Establish safety-driven MBE methods for generic infusion pump software safety model. Developed a set of generic infusion pump safety reference models that can be used as a reference standard to verify safety properties in difference classes of infusion pumps. Joint effort between FDA and several universities GIP web site ( a repository of software development artifacts for infusion pump software Open contribution for community (manufacturers & academics) to advance the science and practice of developing high-confidence medical device software. -5-
7 Safety-Driven MBE of Generic Patient Controlled Analgesic Pump (GPCA) Model Common use scenarios and functions of PCA pumps Code Generation (TIMES tool) Model Development Platform- Independent Code Glue Code Common PCA pump hazards GPCA Pump Model (Simulink + UPPAAL) Code-Interfacing Compilation Generic PCA pump safety requirements Model Checking + Instrumentation Based Verification -6- Final software executable Testing
8 GPCA Pump Development Artifacts Hazards + Generic Safety Requirements GPCA Model + Verification Results (Simulink/Stateflow + UPPAAL) -7- Deployable code + Test cases and results
9 Lessons Learned Fidelity of design model is bounded by assumptions e.g. use scenarios, user inputs, environment, etc. There is gap between design models and final implementation of the device e.g. computational platform, operational systems Various verification techniques can be used to ensure the correctness and safety of design models Expert review Testing/Simulation/Instrumentation based verification Formal verification (i.e., model checking) Increasing order of rigor vs. increasing order of cost Not all safety/functional requirements can be formally verified * Details can be found in Safety-Assured Development of the GPCA Infusion Pump Software, B. Kim and et al., in proceedings of the 11 th International Conference on Embedded Software (EMSOFT 2011), pages , October
10 MBE and Safety Assurance Cases Safety Assurance Case: structured argument about device safety Claim: Device is safe (ISO 14971: free from unacceptable risk) Argument: Rationale & appeal to evidence justifying the claim Evidence: objective, verifiable, traceable Benefits of using MBE artifacts in Assurance Cases Using MBE processes as arguments & artifacts as evidence can improve the quality and trustworthiness of the claim (i.e. device is safe) Models support mathematical & computational rigor Verification results of models are objective &/measurable Explicit traceability among MBE artifacts helps justify design & development integrity -9-
11 Safety Assurance Case with MBE Artifacts Claims Claims Claims Arguments Evidence -10-
12 Questions?
Fundamental Principles of Software Safety Assurance
Fundamental Principles of Software Safety Assurance Tim Kelly [email protected] Context Lack of agreement in the details of requirements of software safety assurance standards has long been recognised
Accountability Model for Cloud Governance
Accountability Model for Cloud Governance Massimo Felici, Hewlett-Packard Laboratories CSP Forum 2014, Athens, 21-22 May 2014 Overview Problem of Data Governance Data Governance in the Cloud Accountability
I S O 1 3 4 8 5 2 0 1 6 G AP A N A L Y I S T O O L
7.1 PLANNING REQUIREMENTS 1 2 Do you plan the processes that are needed to realize products? Do you develop the processes that you need to realize products? According to ISO 13485 2016 section 0.2, organizations
Safety Assurance Cases: What the medical device industry is doing
Safety Assurance Cases: What the medical device industry is doing Sherman Eagles SoftwareCPR [email protected] BECOMING AWARE 3 Early steps to awareness 2005 EWICS TC7 medical device group begins
Clinical Risk Management: Agile Development Implementation Guidance
Document filename: Directorate / Programme Document Reference NPFIT-FNT-TO-TOCLNSA-1306.02 CRM Agile Development Implementation Guidance v1.0 Solution Design Standards and Assurance Project Clinical Risk
Software-based medical devices from defibrillators
C O V E R F E A T U R E Coping with Defective Software in Medical Devices Steven R. Rakitin Software Quality Consulting Inc. Embedding defective software in medical devices increases safety risks. Given
How To Write Software
1 Medical Device Software - Software Life Cycle Processes IEC 62304 2 Credits John F. Murray Software Compliance Expert U.S. Food and Drug Administration Marcie R. Williams Medical Device Fellow Ph.D.
Quality Risk Management - The Medical Device Experience. Niamh Nolan Principal Design Assurance Engineer Boston Scientific
Quality Risk Management - The Medical Device Experience Niamh Nolan Principal Design Assurance Engineer Boston Scientific Agenda Intent of Risk Management (RM) and Associated Regulations Overview of RM
codebeamer INTLAND SOFTWARE codebeamer Medical ALM Solution is built for IEC62304 compliance and provides a wealth of medical development knowledge
codebeamer Medical ALM Solution is built for INTLAND Traceability matrix Medical wiki Risk management IEC 62304 compliance codebeamer INTLAND codebeamer Medical ALM Solution is built for Medical Device
Capability Maturity Model Integration (CMMI SM ) Fundamentals
Capability Maturity Model Integration (CMMI SM ) Fundamentals Capability Maturity Model Integration and CMMI are are service marks of Carnegie Mellon University 2008, GRafP Technologies inc. 1 What is
COTS Validation Post FDA & Other Regulations
COTS Validation Post FDA & Other Regulations TABLE OF CONTENTS 1. Abstract 3 2. What is COTS 3 3. Why should COTS require Validation? 3 4. Risk Based Approach 4 5. Validation Approach 6 6. Applicable Regulations
Agile Model-Based Systems Engineering (ambse)
Agile Model-Based Systems Engineering (ambse) Bruce Powel Douglass, Ph.D. Chief Evangelist, Global Technology Ambassador IBM Rational [email protected] Twitter: @BruceDouglass Yahoo: tech.groups.yahoo.com/group/rt-uml/
Risk Assessment for Medical Devices. Linda Braddon, Ph.D. Bring your medical device to market faster 1
Risk Assessment for Medical Devices Linda Braddon, Ph.D. Bring your medical device to market faster 1 My Perspective Work with start up medical device companies Goal: Making great ideas into profitable
IBM Rational systems and software solutions for the medical device industry
IBM Software August 2011 IBM Rational systems and software solutions for the medical device industry Improve processes, manage IEC 61508 and IEC 62304 standards, develop quality products Highlights Manage
A Risk Management Capability Model for use in Medical Device Companies
A Risk Management Capability Model for use in Medical Device Companies John Burton Vitalograph Ltd. Gort Rd. Business Park Ennis Ireland 353.65.686471 [email protected] Fergal Mc Caffery Lero
Why System Suitability Tests Are Not a Substitute for Analytical Instrument Qualification
White paper System Suitability Tests and AIQ R.D.McDowall PhD Principal, McDowall Consulting Paul Smith European Validation Program Manager, PerkinElmer Nicola Vosloo PhD European Market Development Leader,
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
3 Guidance for Successful Evaluations
3 Guidance for Successful Evaluations In developing STEP, project leads identified several key challenges in conducting technology evaluations. The following subsections address the four challenges identified
Quality Management System Process/ Management Review
Directorate in charge: Process concerned: Process owner: Executive Directorate Quality Management System Process/ Management Review Quality Section Manager Véronique Magnier Purpose and Scope of the :
Standards Initiatives for Software Product Line Engineering and Management within the International Organization for Standardization
Standards Initiatives for Software Product Line Engineering and within the International Organization for Standardization Timo Käkölä University of Jyväskylä Finland FiSMA 1 What is software product line
AAMI TIR 36: Validation of SW for Regulated Processes. Denise Stearns April 2008
AAMI TIR 36: Validation of SW for Regulated Processes Denise Stearns April 2008 Agenda Software for Regulated Processes TIR In Scope Discussion Software V&V Basis for TIR The Journey to Critical Thinking
Meeting your Electrical Safety Testing & Quality Requirements
Meeting your Electrical Safety Testing & Quality Requirements Vincent Crabtree PhD Project Manager/Regulatory Advisor StarFish Medical 1 of 23 Contents 1. What are Standards and 60601? 2. Gap Analysis
Dependable (Safe/Reliable) Systems. ARO Reliability Workshop Software Intensive Systems
Dependable (Safe/Reliable) Systems Composing, Analyzing and Validating s to Assess / Develop / Validate Methods and Supporting Tools for the Creation of Dependable Systems ARO Reliability Workshop Intensive
Data Management Maturity Model. Overview
Data Management Maturity Model Overview UPMC Center of Excellence Pittsburgh Jul 29, 2013 Data Management Maturity Model - Background A broad framework encompassing foundational data management capabilities,
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
FDA Software Validation-Answers to the Top Five Software Validation Questions
Whitepaper FDA Software Validation-Answers to the Top Five Software Validation Questions Author: Penny Goss, Penny Goss Technical Solutions The FDA (Food and Drug Administration) and IEC (International
CDC UNIFIED PROCESS PRACTICES GUIDE
Purpose The purpose of this document is to provide guidance on the practice called Project Close-Out and to describe the practice overview, requirements, best practices, activities, and key terms related
MEDICAL DEVICE Cybersecurity.
MEDICAL DEVICE Cybersecurity. 2 MEDICAL DEVICE CYBERSECURITY Introduction Wireless technology and the software in medical devices have greatly increased healthcare providers abilities to efficiently and
THE APPLICATION OF A VALUE ASSURANCE SYSTEM TO OIL & GAS DEVELOPMENT PROJECTS (Guido Mattu, Franca Marini)
PAGE 1 THE APPLICATION OF A VALUE ASSURANCE SYSTEM TO OIL & GAS DEVELOPMENT PROJECTS (Guido Mattu, Franca Marini) Ing. Guido Mattu More than 25 years experience in Engineering and Project Management activities
Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.
Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.. www.pharmout.net Page 1 of 15 Version-02 1. Scope 1.1. Purpose This paper reviews the implementation of the ANSI/AAMI/IEC
Why do Project Fail? 42% 37% 27% 26% 24% 24% 0% 10% 20% 30% 40% 50% IBM Software Group Rational software. Source: AberdeenGroup, August 2006
Why do Project Fail? Unclear or continually changing product definitions Product does not meet customer or market requirements 37% 42% Unrealistic schedule expectations Projects not adequately staffed
Performance Standards and Test Procedures for Environmental Data Management Software. Martin Lloyd
Performance Standards and Test Procedures for Environmental Data Management Software Martin Lloyd Dr M H Lloyd, Farside Technology Research / SIRA Environmental Ltd 12 Acorn Industrial Park, Crayford Road,
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
IT Project Management Methodology. Project Scope Management Support Guide
NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA IT Project Management Methodology Project Scope Management Support Guide Version 0.3 Version Date Author Change Description 0.1 23 rd Mar, 2013 Gerald
Towards a Logical Foundation for Assurance Arguments for Plug & Play Systems
Towards a Logical Foundation for Assurance Arguments for Plug & Play Systems Lu Feng, Andrew King, Insup Lee, Oleg Sokolsky PRECISE Center School of Engineering and Applied Science University of Pennsylvania
The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements.
CAPACITY AND AVAILABILITY MANAGEMENT A Project Management Process Area at Maturity Level 3 Purpose The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision
Safety Risk Management in RT: A Software Manufacturer Perspective
Safety Risk Management in RT: A Software Manufacturer Perspective Jim Schewe, Ph.D. Philips Radiation Oncology Systems AAPM Spring Clinical Meeting March 16, 2014 1 Learning Objectives For the session
IVD Regulation Overview. Requirements to Assure Quality & Effectiveness
IVD Regulation Overview Requirements to Assure Quality & Effectiveness CLIAC Jan. 2002 Statutory and Regulatory Requirements Statute: Food, Drug, and Cosmetic Act Food and Drugs Act of 1906 Food and Drug
Bidirectional Tracing of Requirements in Embedded Software Development
Bidirectional Tracing of Requirements in Embedded Software Development Barbara Draxler Fachbereich Informatik Universität Salzburg Abstract Nowadays, the increased complexity of embedded systems applications
Spreading the Word on Nuclear Cyber Security
Spreading the Word on Nuclear Cyber Security Clifford Glantz, Guy Landine, Philip Craig, and Robert Bass Pacific Northwest National Laboratory (PNNL) PO Box 999; 902 Battelle Blvd Richland, WA 99352 USA
Office for Nuclear Regulation
ONR GUIDE LC17 Management Systems Document Type: ONR Nuclear Safety Technical Inspection Guide Unique Document ID and Revision No: NS-INSP-GD-017 Revision 2 Date Issued: November 2012 Review Date: November
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
ITIL v3 - Service Transition Lifecycle
ITIL v3 - Service Transition Lifecycle Course Course Service Transition Lifecycle - Part 01 Agenda - Overview Courseware Usage Courseware Conventions ITIL Lifecycle Exam ITIL Qualification Scheme Getting
How To Write An Slcm Project Plan
SLCM 2003.1 Artifacts in a Nutshell ( as of 01/21/2005) Project Development Phases Pension Benefit Guaranty Corporation s (PBGC) System Life Cycle Methodology (SLCM) is comprised of five project development
unless the manufacturer upgrades the firmware, whereas the effort is repeated.
Software Validation in Accredited Laboratories A Practical Guide Gregory D. Gogates Fasor Inc., 3101 Skippack Pike, Lansdale, Pennsylvania 19446-5864 USA [email protected] www.fasor.com Abstract Software
University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities
II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when
Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity
Reprinted from PHARMACEUTICAL ENGINEERING THE OFFICIAL TECHNICAL MAGAZINE OF ISPE JANUARY/FEBRUARY 2014, VOL 34, NO 1 Copyright ISPE 2014 www.pharmaceuticalengineering.org information systems in a GxP
Operational Risk Management - The Next Frontier The Risk Management Association (RMA)
Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first
Managing FDA regulatory compliance with IBM Rational solutions
IBM Software Healthcare Rational Managing FDA regulatory compliance with IBM Rational solutions 2 Managing FDA regulatory compliance with IBM Rational solutions Executive summary Today s healthcare, life
SecSDM: A Model for Integrating Security into the Software Development Life Cycle
SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,
Requirements Definition and Management Processes
Software Engineering G22.2440-001 Session 1 Sub-Topic 1 Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute
CMMI KEY PROCESS AREAS
CMMI KEY PROCESS AREAS http://www.tutorialspoint.com/cmmi/cmmi-process-areas.htm Copyright tutorialspoint.com A Process Area is a cluster of related practices in an area that, when implemented collectively,
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
Software Quality Management II
Software II Lecture 13 Software Engineering CUGS Kristian Sandahl Department of Computer and Information Science Linköping University, Sweden [email protected] A Software Life-cycle Model Which
KPMG in India s Software testing services Test consulting case studies
KPMG in India s Software testing services Test consulting case studies 0 Software test consulting case study 1 Key Activities Outcome IT consulting to assess, evaluate the core banking solution and existing
TÜV UK Ltd Guidance & Self Evaluation Checklist
ISO 9001:2015 Revision TÜV UK Ltd Guidance & Self Evaluation Checklist Why ISO 9001 is changing All ISO management system standards are subject to a periodic review under the rules by which they are written.
Applying 50 years of Aerospace Systems Engineering Lessons Learned to the Oil Field Technical Challenges of Today
Applying 50 years of Aerospace Systems Engineering Lessons Learned to the Oil Field Technical Challenges of Today Rick Taylor General Manager, Houston Operations Aerojet Rocketdyne - Extreme Engineering
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization 4.1 Understanding the organization and its context
Overview of how to test a. Business Continuity Plan
Overview of how to test a Business Continuity Plan Prepared by: Thomas Bronack Phone: (718) 591-5553 Email: [email protected] BRP/DRP Test Plan Creation and Exercise Page: 1 Table of Contents BCP/DRP Test
Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development
Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development ARBI GHAZARIAN University of Toronto Department of Computer Science 10 King s College Road, Toronto,
Verification and Validation According to ISO 26262: A Workflow to Facilitate the Development of High-Integrity Software
ABSTRACT Verification and Validation According to ISO 26262: A Workflow to Facilitate the Development of High-Integrity Software Mirko Conrad The MathWorks, Inc. Natick, MA, USA [email protected]
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Enabling Continuous Delivery by Leveraging the Deployment Pipeline
Enabling Continuous Delivery by Leveraging the Deployment Pipeline Jason Carter Principal (972) 689-6402 [email protected] Pariveda Solutions, Inc. Dallas,TX Table of Contents Matching
FINAL DOCUMENT. Implementation of risk management principles and activities within a Quality Management System. The Global Harmonization Task Force
GHTF/SG3/N15R8 FINAL DOCUMENT Title: Implementation of risk management principles and activities within a Quality Management System Authoring Group: GHTF Study Group 3 Endorsed by: The Global Harmonization
How To Use Risk It
Risk IT A set of guiding principles and the first framework to help enterprises identify, govern and effectively manage IT risk. In business today, risk plays a critical role. Almost every business decision
Software Engineering. Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti
Software Engineering Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical
FDA Perspectives on Human Factors in Device Development
FDA Perspectives on in Device Development Molly Follette Story, PhD FDA /CDRH / ODE Understanding Regulatory Requirements for Usability Testing RAPS Webinar June 7, 2012 Overview What are human factors
Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system
Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system Published in the Official State Gazette (BOE) number 270 of November
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT ERM as the foundation for regulatory compliance and strategic business decision making CONTENTS Introduction... 3 Steps to developing an
Business Continuity Policy
Business Continuity Policy St Mary Magdalene Academy V1.0 / September 2014 Document Control Document Details Document Title Document Type Business Continuity Policy Policy Version 2.0 Effective From 1st
The SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
Safe%Feed/Safe%Food% Overview of Certification Programs: Why Should a Feed Mill Get Certified?
Safe%Feed/Safe%Food% Overview of Certification Programs: Why Should a Feed Mill Get Certified? Henry Turlington, Ph.D. Director, Quality & Manufacturing Regulatory Affairs American Feed Industry Association
Product Lifecycle Management for the Pharmaceutical Industry
Product Lifecycle Management for the Pharmaceutical Industry An Oracle White Paper Author: Todd Hein, Oracle Life Sciences Key Contributors: i. Arvindh Balakrishnan, Oracle Life Sciences ii. Hardeep Gulati,
The Role of Requirements Traceability in System Development
The Role of Requirements Traceability in System Development by Dean Leffingwell Software Entrepreneur and Former Rational Software Executive Don Widrig Independent Technical Writer and Consultant In the
Configuration Management Practices
Safety Critical Software Management Practices Linda Westfall Westfall Team, Inc. International Conference on Software Quality ICSQ 2011 Copyright 1999-2010 Westfall Team, Inc. All Rights Reserved. Management
Requirements Traceability. Mirka Palo
Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS
Project Management Certificate (IT Professionals)
Project Management Certificate (IT Professionals) Whether your field is architecture or information technology, successful planning involves a carefully crafted set of steps to planned and measurable goals.
Review Protocol Agile Software Development
Review Protocol Agile Software Development Tore Dybå 1. Background The concept of Agile Software Development has sparked a lot of interest in both industry and academia. Advocates of agile methods consider
What is Process Validation?
What is Process Validation? Process Validation is defined as the collection and evaluation of data, from the process design stage throughout production, which establishes scientific evidence that a process
Ellucian Implementation Methodology. Summary of Project Management and Solution Delivery Phases
Ellucian Implementation Methodology Summary of Project Management and Solution Delivery Phases Rev. 5/10/2013 Table of Contents Overview 3 Project Management Initiation 4 Planning 5 Execution 6 Monitor
Project Risk Management: IV&V as Insurance for Project Success
Project Risk Management: IV&V as Insurance for Project Success Introduction Software development projects can be expensive and risky: Ever more complex mission-critical requirements lead to increasingly
Software Engineering Compiled By: Roshani Ghimire Page 1
Unit 7: Metric for Process and Product 7.1 Software Measurement Measurement is the process by which numbers or symbols are assigned to the attributes of entities in the real world in such a way as to define
Intland s Medical Template
Intland s Medical Template Traceability Browser Risk Management & FMEA Medical Wiki Supports compliance with IEC 62304, FDA Title 21 CFR Part 11, ISO 14971, IEC 60601 and more INTLAND codebeamer ALM is
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
The Quality Assurance Centre of Excellence
The Quality Assurance Centre of Excellence A X I S T E C H N I C A L G R O U P A N A H E I M H E A D Q U A R T E R S, 300 S. H A R B O R, B L V D. S U I T E 904, A N A H E I M, CA 92805 PHONE :( 714) 491-2636
