Blog

Cybersecurity Maturity Model Certification

CMMC v1.0 The Cybersecurity Maturity Model Certification (CMMC) v1.0 was released on the last day of January 2020.  Many organizations are familiarizing themselves with the requirements of CMMC in anticipation that draft RFPs requiring some level of CMMC compliance will begin appearing in June 2020.  What is still being developed by the CMMC Advisory Board…

ITIL 4 Best Practices and Guiding Principles

ITIL 4 is here, and with it comes many questions from software developers, IT providers, and project managers alike. You may be wondering what ITIL 4 is, what to expect in the ITIL 4 update, what the difference is between ITIL 3 and 4, or how to put ITIL 4 principles into practice. For those…

Cybersecurity Maturity Model Certification (CMMC) V0.6

With the release of DoD’s Cybersecurity Maturity Model Certification (CMMC) v0.6 draft version on November 7, 2019, it has become apparent that a strong DevSecOps implementation will aid in achieving a CMMC Maturity Level rating. V0.6 contains the practices required for the Maturity level’s one through three (Maturity levels four and five will be published…

Guide to Choosing the Right DevOps Tools

Constructing your DevOps toolchain is one of the major tasks in implementing DevOps. While it is not as difficult as potentially changing the culture of the organization to allow DevOps to work, it can be a contentious activity since your organization will want to consolidate the implementation/maintenance of your DevOps toolchain under a single infrastructure…

Agile Management Tips | BTI

In today’s highly competitive marketplace, it’s critical for businesses to streamline their processes as much as possible. Moreover, companies — especially those that develop software — need to be responsive and quickly adapt their products to their customers’ needs. In this pressure-filled environment, traditional project management methodologies don’t offer sufficient speed and flexibility. That’s why…

Benefits of ITSM

As technology has developed and become integrated with almost all core business functions, former impromptu attitudes to the delivery of IT have become outdated and inefficient. Fortunately, IT service management — or ITSM — has emerged as a proven strategic approach that closes the gap between the delivery of IT services and support for an…

The Difference Between Lean Six Sigma White, Green, and Black Belts

How White, Green, and Black Belt Lean Six Sigma Differ Central to the goal of nurturing maximum efficiency and ensuring minimum waste within an organization or project is the application of Lean Six Sigma — or LSS. This system is a synthesis of Lean production methodology and the Six Sigma manufacturing management approach. Taken together,…

All About DevSecOps

What Is DevSecOps and Why Is It Important? To accurately define DevSecOps, it’s important to first look at the advent of DevOps — or Development/Operations — as a methodology that was created to help organizations improve the agile manner they utilize to develop, deliver, and maintain support for their products and services. DevOps was initially…

Process Mining and Essential Data Science Tips

Process Mining and Essential Data Science Tips For today’s businesses, the gap between ideal processes and process realities can lead to inefficiencies, blind spots, and ultimately an inability to effectively manage the employees entrusted with completing those processes. In fact, it’s not uncommon to hear the phrase, “That’s just not how we work,” from business…

Part 4: Process Mining to Implement Better DevOps

Part 4:  Process Mining to Implement Better DevOps In the previous articles, we introduced process mining, reviewed a case study, and examined the benefits realized by organizations, projects, and teams using process mining tools to understand their process mining tools. Here’s another real-life example from a successful project: The Scenario:  A large Department of Defense…

Partners with

Supporter of