	{"id":906,"date":"2013-06-25T23:58:08","date_gmt":"2013-06-25T16:58:08","guid":{"rendered":"http:\/\/science-technology.vn\/?p=906"},"modified":"2013-06-25T23:58:08","modified_gmt":"2013-06-25T16:58:08","slug":"cmmi-24","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=906","title":{"rendered":"CMMI-24"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">H\u1ecfi: C\u00f3 th\u1ec3 nh\u1ea3y qua CMMI m\u1ee9c 2 v\u00e0 \u0111i v\u00e0o CMMI m\u1ee9c 3 kh\u00f4ng? T\u1ea1i sao c\u00f3 v\u00e0 t\u1ea1i sao kh\u00f4ng?<\/span><\/p>\n<p>\u0110\u00e1p: Kh\u00f4ng, khu\u00f4n kh\u1ed5 CMMI framework \u0111\u01b0\u1ee3c d\u1ef1a tr\u00ean kh\u00e1i ni\u1ec7m tr\u01b0\u1edfng th\u00e0nh l\u00e0 m\u1ed7i m\u1ee9c \u0111\u1ec1u \u0111\u01b0\u1ee3c x\u00e2y d\u1ef1ng tr\u00ean n\u1ec1n t\u1ea3ng c\u1ee7a m\u1ee9c tr\u01b0\u1edbc \u0111\u00f3 do \u0111\u00f3 b\u1ea1n KH\u00d4NG TH\u1ec2 nh\u1ea3y qua c\u00e1c m\u1ee9c \u0111\u01b0\u1ee3c.\u00a0 \u00dd t\u01b0\u1edfng c\u01a1 b\u1ea3n c\u1ee7a CMMI m\u1ee9c 2 l\u00e0 \u1edf ch\u1ed7 m\u1ecdi d\u1ef1 \u00e1n \u0111\u1ec1u tu\u00e2n theo m\u1ed9t qui tr\u00ecnh (t\u1eebng d\u1ef1 \u00e1n c\u00f3 th\u1ec3 theo qui tr\u00ecnh kh\u00e1c nhau) nh\u01b0ng \u1edf CMMI m\u1ee9c 3 t\u1ea5t c\u1ea3 c\u00e1c qui tr\u00ecnh kh\u00e1c nhau n\u00e0y \u0111\u1ec1u \u0111\u01b0\u1ee3c d\u00f9ng chung, \u0111\u01b0\u1ee3c ki\u1ec3m \u0111i\u1ec3m v\u00e0 r\u1ed3i \u0111\u01b0\u1ee3c t\u1ed5 ch\u1ee9c th\u00e0nh &#8220;qui tr\u00ecnh chu\u1ea9n&#8221; \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh v\u00e0 \u0111\u01b0\u1ee3c h\u1ee3p nh\u1ea5t t\u1ed1t m\u00e0 m\u1ecdi d\u1ef1 \u00e1n s\u1ebd tu\u00e2n theo.<\/p>\n<p>V\u1ec1 c\u0103n b\u1ea3n CMMI m\u1ee9c 1 l\u00e0 m\u00f4i tr\u01b0\u1eddng h\u1ed7n \u0111\u1ed9n v\u1edbi nh\u1eefng ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n l\u00e0m vi\u1ec7c l\u00e2u h\u00e0ng gi\u1edd \u0111\u1ec3 x\u00e2y d\u1ef1ng ph\u1ea7n m\u1ec1m \u0111\u00e1p \u1ee9ng l\u1ecbch bi\u1ec3u, h\u1ecd kh\u00f4ng c\u00f3 th\u1eddi gian \u0111\u1ec3 ki\u1ec3m th\u1eed m\u00e3 ri\u00eang c\u1ee7a m\u00ecnh cho n\u00ean ph\u1ea7n m\u1ec1m c\u00f3 nhi\u1ec1u l\u1ed7i. Kh\u00f4ng ai bi\u1ebft c\u00e1i g\u00ec l\u00e0m vi\u1ec7c, c\u00e1i g\u00ec kh\u00f4ng l\u00e0m vi\u1ec7c v\u00e0 n\u1ebfu b\u1eb1ng c\u00e1ch n\u00e0o \u0111\u00f3 d\u1ef1 \u00e1n ho\u00e0n th\u00e0nh \u0111\u00fang th\u1eddi gian th\u00ec \u0111i\u1ec1u \u0111\u00f3 g\u1ea7n nh\u01b0 may m\u1eafn. T\u1ea1i CMMI m\u1ee9c 1, kh\u00f4ng c\u00f3 qui tr\u00ecnh \u0111\u1ec3 tu\u00e2n theo v\u00e0 h\u1ea7u h\u1ebft m\u1ecdi ng\u01b0\u1eddi th\u1eadm ch\u00ed kh\u00f4ng bi\u1ebft qui tr\u00ecnh l\u00e0 g\u00ec. H\u1ecd qu\u00e1 b\u1eadn r\u1ed9n vi\u1ebft m\u00e3 v\u00e0 ki\u1ec3m th\u1eed. N\u1ebfu c\u1ea5p qu\u1ea3n l\u00ed \u00e1p \u0111\u1eb7t m\u1ed9t qui tr\u00ecnh chu\u1ea9n cho nh\u00f3m n\u00e0y, nh\u00f3m c\u00f2n ch\u01b0a c\u00f3 th\u00f3i quen tu\u00e2n theo qui tr\u00ecnh th\u00ec n\u00f3 s\u1ebd kh\u00f4ng c\u00f3 t\u00e1c d\u1ee5ng b\u1edfi v\u00ec h\u1ecd kh\u00f4ng c\u00f3 th\u1eddi gian hay hu\u1ea5n luy\u1ec7n l\u00e0m vi\u1ec7c g\u00ec \u0111\u00f3 kh\u00e1c. N\u1ebfu ai \u0111\u00f3 b\u1ea3o h\u1ecd r\u1eb1ng c\u00e1ch th\u1ee9c h\u1ecd \u0111\u00e3 t\u1eebng l\u00e0m vi\u1ec7c l\u00e0 x\u1ea5u, v\u00e0 \u0111\u00e2y l\u00e0 c\u00e1ch m\u1edbi m\u00e0 h\u1ecd n\u00ean l\u00e0m vi\u1ec7c t\u1eeb b\u00e2y gi\u1edd th\u00ec h\u1ecd c\u00f3 th\u1ec3 gi\u1eadn d\u1eef b\u1edfi v\u00ec h\u1ecd \u0111\u00e3 ch\u1ecbu nhi\u1ec1u c\u0103ng th\u1eb3ng \u0111\u1ec3 l\u00e0m vi\u1ec7c c\u1ee7a m\u00ecnh v\u00e0 b\u00e2y gi\u1edd h\u1ecd ph\u1ea3i tu\u00e2n theo m\u1ed9t s\u1ed1 qui tr\u00ecnh do ai \u0111\u00f3 t\u1ea1o ra. Ph\u1ea7n l\u1edbn nh\u1eefng ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n th\u1eadm ch\u00ed c\u00f3 th\u1ec3 kh\u00f4ng nh\u00ecn v\u00e0o \u0111i\u1ec1u b\u1ea1n \u0111\u00e3 x\u00e1c \u0111\u1ecbnh.<\/p>\n<p>T\u1ea1i m\u1ee9c 2, b\u1ea1n c\u00f3 th\u1ec3 y\u00eau c\u1ea7u r\u1eb1ng m\u1ed9t s\u1ed1 \u0111i\u1ec1u c\u1ea7n \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n, nh\u01b0ng kh\u00f4ng y\u00eau c\u1ea7u r\u1eb1ng ch\u00fang ph\u1ea3i \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n theo c\u00e1ch th\u1ee9c chu\u1ea9n. C\u00e1c d\u1ef1 \u00e1n \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u l\u00e0m t\u00e0i li\u1ec7u c\u00e1c qui tr\u00ecnh ri\u00eang c\u1ee7a h\u1ecd thay v\u00ec tu\u00e2n theo c\u00e1i g\u00ec \u0111\u00f3 \u0111\u01b0\u1ee3c ng\u01b0\u1eddi kh\u00e1c l\u00e0m t\u00e0i li\u1ec7u. Xem nh\u01b0 h\u1ec7 qu\u1ea3, b\u1ea1n c\u00f3 th\u1ec3 c\u00f3 nh\u1eefng qui tr\u00ecnh r\u1ea5t linh tinh v\u00e0 t\u01b0\u1edfng t\u01b0\u1ee3ng \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp t\u1eeb c\u00e1c d\u1ef1 \u00e1n kh\u00e1c nhau. C\u00e1ch \u0111o \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u v\u1ec1 t\u00ednh hi\u1ec7u l\u1ef1c v\u00e0 hi\u1ec7u qu\u1ea3 c\u1ee7a c\u00e1c qui tr\u00ecnh \u0111a d\u1ea1ng s\u1ebd cho ph\u00e9p SEPG x\u00e1c \u0111\u1ecbnh c\u00e1i g\u00ec l\u00e0m vi\u1ec7c t\u1ed1t nh\u1ea5t, xem x\u00e9t t\u1edbi m\u00f4i tr\u01b0\u1eddng, v\u0103n ho\u00e1, m\u1ee5c ti\u00eau, v.v (nh\u00f3m SQA s\u1ebd \u0111\u1ea3m b\u1ea3o r\u1eb1ng c\u00e1ch \u0111o th\u1ef1c t\u1ebf t\u01b0\u01a1ng \u1ee9ng v\u1edbi th\u1ef1c t\u1ea1i). Ph\u00e2n t\u00edch n\u00e0y v\u1ec1 c\u00e1c qui tr\u00ecnh hi\u1ec7n t\u1ea1i s\u1ebd cho ph\u00e9p SEPG b\u1eaft \u0111\u1ea7u h\u1ee3p nh\u1ea5t v\u00e0 c\u1ea3i ti\u1ebfn c\u00e1c qui tr\u00ecnh d\u1ef1a tr\u00ean d\u1eef li\u1ec7u v\u00e0 th\u1ef1c h\u00e0nh t\u1ed1t nh\u1ea5t \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh qui tr\u00ecnh chu\u1ea9n cho m\u1ee9c 3.<\/p>\n<p>L\u00e0 nghi\u00ean c\u1ee9u vi\u00ean t\u1ea1i Carnegie Mellon, t\u00f4i \u0111\u00e3 th\u1ea5y nhi\u1ec1u t\u1ed5 ch\u1ee9c c\u1ed1 g\u1eafng \u0111i th\u1eb3ng v\u00e0o m\u1ee9c 3 m\u00e0 kh\u00f4ng \u0111i qua m\u1ee9c 2 &#8211; v\u00e0 r\u1ed3i ho\u1eb7c m\u1ea5t quan t\u00e2m ho\u1eb7c b\u1ecf l\u1eedng n\u1ed7 l\u1ef1c c\u1ee7a h\u1ecd. T\u00f4i tin r\u1eb1ng l\u00ed do ch\u00ednh cho \u0111i\u1ec1u n\u00e0y l\u00e0 \u1edf ch\u1ed7 h\u1ecd \u0111\u01a1n gi\u1ea3n kh\u00f4ng c\u00f3 c\u01a1 s\u1edf hi\u1ec3u bi\u1ebft v\u1eefng ch\u1eafc v\u1ec1 \u0111i\u1ec1u h\u1ecd \u0111ang nh\u00ecn v\u00e0o, v\u00e0 t\u1ea1i sao, ch\u1eebng n\u00e0o h\u1ecd c\u00f2n ch\u01b0a \u0111\u1ea1t t\u1edbi s\u1ef1 \u1ed5n \u0111\u1ecbnh do m\u1ee9c 2 \u0111\u1ea3m \u0111\u01b0\u01a1ng. Kh\u00f4ng c\u00f3 \u0111i\u1ec1u \u0111\u00f3, b\u1ea1n kh\u00f4ng th\u1ec3 x\u00e1c \u0111\u1ecbnh m\u1ed9t c\u00e1ch hi\u1ec7n th\u1ef1c c\u00e1c qui tr\u00ecnh chu\u1ea9n cho m\u1ee9c 3 (hay b\u1ea5t k\u00ec m\u1ee9c n\u00e0o) c\u00e1c ch\u00ednh s\u00e1ch, th\u1ee7 t\u1ee5c v.v. T\u00f4i bi\u1ebft m\u1ed9t s\u1ed1 nh\u00e0 t\u01b0 v\u1ea5n th\u1eadm ch\u00ed b\u00e1n nh\u1eefng \u0111i\u1ec1u \u0111\u00f3 v\u00ec ti\u1ec1n nh\u01b0ng ph\u1ea3i c\u00f3 hi\u1ec3u bi\u1ebft v\u1eefng ch\u1eafc v\u1ec1 c\u00e1ch thay \u0111\u1ed5i t\u1ed5 ch\u1ee9c b\u00ean trong ho\u00e0n c\u1ea3nh duy nh\u1ea5t c\u1ee7a n\u00f3 \u0111\u1ec3 thay \u0111\u1ed5i v\u0103n ho\u00e1 v\u00e0 h\u00e0nh vi c\u00e1 nh\u00e2n.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u00ednh mong manh trong an ninh m\u00e1y t\u00ednh l\u00e0 g\u00ec? T\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 l\u00e0 g\u00ec? Gi\u1ea3 m\u1ea1o v\u1eadn h\u00e0nh th\u1ebf n\u00e0o? L\u00e0m sao ch\u00fang ta c\u00f3 th\u1ec3 tr\u00e1nh \u0111\u01b0\u1ee3c n\u00f3?<\/p>\n<p>\u0110\u00e1p: T\u00ednh mong manh l\u00e0 nh\u01b0\u1ee3c \u0111i\u1ec3m trong \u1ee9ng d\u1ee5ng, m\u00e0 c\u00f3 th\u1ec3 l\u00e0 m\u1ed9t thi\u1ebfu s\u00f3t thi\u1ebft k\u1ebf hay m\u1ed9t l\u1ed7i th\u1ef1c hi\u1ec7n cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng g\u00e2y h\u1ea1i cho \u1ee9ng d\u1ee5ng ph\u1ea7n m\u1ec1m. Thu\u1eadt ng\u1eef &#8220;t\u00ednh mong manh&#8221; th\u01b0\u1eddng \u0111\u01b0\u1ee3c d\u00f9ng r\u1ea5t l\u1ecfng l\u1ebbo. Tuy nhi\u00ean, \u1edf \u0111\u00e2y ch\u00fang ta c\u1ea7n ph\u00e2n bi\u1ec7t \u0111e do\u1ea1, t\u1ea5n c\u00f4ng v\u00e0 bi\u1ec7n ph\u00e1p \u0111\u1ed1i ph\u00f3. Khi v\u1ea5n \u0111\u1ec1 x\u1ea3y ra v\u1ec1 an ninh, \u0111i\u1ec1u b\u1ea1n kh\u00f4ng bi\u1ebft s\u1ebd l\u00e0m h\u1ea1i b\u1ea1n. \u0110i\u1ec1u quan tr\u1ecdng v\u1edbi b\u1ea1n l\u00e0 hi\u1ec3u c\u00e1c k\u0129 thu\u1eadt t\u1ea5n c\u00f4ng l\u00e0 g\u00ec \u0111\u1ec3 c\u1ea3nh gi\u00e1c.<\/p>\n<p>T\u1ea5n c\u00f4ng T\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 l\u00e0 n\u1ed7 l\u1ef1c l\u00e0m cho t\u00e0i nguy\u00ean m\u00e1y t\u00ednh kh\u00f4ng s\u1eb5n c\u00f3 cho ng\u01b0\u1eddi d\u00f9ng n\u00f3. K\u1ebb t\u1ea5n c\u00f4ng n\u00f3i chung nh\u1eafm t\u1edbi c\u00e1c m\u00e1y ph\u1ee5c v\u1ee5 web \u0111\u00edch c\u00f3 l\u1ecbch s\u1eed s\u1eed d\u1ee5ng cao.<\/p>\n<p>T\u1eeb ch\u1ed1i m\u1ed9t d\u1ecbch v\u1ee5 \u0111\u1eb7c bi\u1ec7t s\u1ebd t\u1edbi trong m\u1ed9t trong hai d\u1ea1ng *:<\/p>\n<p>Ti\u00eau th\u1ee5 ho\u00e0n to\u00e0n t\u00e0i nguy\u00ean nh\u01b0 gi\u1ea3i th\u00f4ng, b\u1ed9 nh\u1edb, CPU, b\u1ed9 gi\u1ea3i quy\u1ebft t\u1ec7p, hay b\u1ea5t k\u00ec t\u00e0i s\u1ea3n h\u1eefu h\u1ea1n n\u00e0o.<\/p>\n<p>Khai th\u00e1c \u0111i\u1ec3m y\u1ebfu trong d\u1ecbch v\u1ee5 \u0111\u1ec3 d\u1eebng s\u1ef1 v\u1eadn h\u00e0nh c\u1ee7a n\u00f3 hay l\u00e0m cho d\u1ecbch v\u1ee5 \u0111\u1ed5 v\u1ee1.<\/p>\n<p>T\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 l\u00e0 m\u1ed9t s\u1ed1 trong nh\u1eefng vi\u1ec7c t\u1ea5n c\u00f4ng kh\u00f3 b\u1ea3o v\u1ec7 nh\u1ea5t. M\u1ecdi ng\u01b0\u1eddi \u0111\u00f4i khi g\u1ea1t b\u1ecf nh\u1eefng t\u1ea5n c\u00f4ng n\u00e0y b\u1edfi v\u00ec nh\u1eefng t\u1ea5n c\u00f4ng \u0111\u00f3 kh\u00f4ng nh\u1eafm th\u1eb3ng v\u00e0o \u0111\u1eb7c quy\u1ec1n ri\u00eang, nh\u01b0ng c\u00f3 nh\u1eefng tr\u01b0\u1eddng h\u1ee3p m\u00e0 k\u1ebb t\u1ea5n c\u00f4ng l\u1ea1i c\u00f3 th\u1ec3 m\u1ea1o nh\u1eadn m\u00e1y ph\u1ee5c v\u1ee5 n\u1ebfu m\u00e1y ph\u1ee5c v\u1ee5 tr\u1edf th\u00e0nh kh\u00f4ng s\u1eb5n c\u00f3. Lo\u1ea1i t\u1ea5n c\u00f4ng n\u00e0y \u0111ang tr\u1edf n\u00ean ng\u00e0y c\u00e0ng th\u00f4ng d\u1ee5ng, cho n\u00ean b\u1ea1n ph\u1ea3i \u0111\u01b0\u1ee3c chu\u1ea9n b\u1ecb v\u1ec1 ch\u00fang.<\/p>\n<p>Ph\u00f2ng th\u1ee7 ch\u1ed1ng l\u1ea1i cu\u1ed9c t\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 l\u00e0 kh\u00f3, v\u00ec kh\u00f4ng c\u00f3 c\u00e1ch n\u00e0o b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y m\u1ed9t c\u00e1ch ho\u00e0n h\u1ea3o. Xem nh\u01b0 qui t\u1eafc chung, b\u1ea1n n\u00ean:<\/p>\n<p>Gi\u1edbi h\u1ea1n t\u00e0i nguy\u00ean \u0111\u01b0\u1ee3c ph\u00e2n b\u1ed5 cho b\u1ea5t k\u00ec ng\u01b0\u1eddi d\u00f9ng n\u00e0o t\u1edbi tr\u1ea7n t\u1ed1i thi\u1ec3u.<\/p>\n<p>T\u1ed1i \u01b0u \u0111i\u1ec1u ch\u1ec9nh m\u00e1y ph\u1ee5c v\u1ee5 v\u1edbi hi\u1ec7u n\u0103ng t\u1ed1t nh\u1ea5t.<\/p>\n<p>Duy tr\u00ec c\u1eadp nh\u1eadt c\u00e1c mi\u1ebfng v\u00e1 an ninh.<\/p>\n<p>M\u1ed9t c\u00e1ch m\u00e0 c\u00e1c hacker l\u1ecdt v\u00e0o trong h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n l\u00e0 \u201cPhishing-gi\u1ea3 m\u1ea1o\u201d. B\u1edfi v\u00ec gi\u1ea3 m\u1ea1o d\u1ef1a tr\u00ean s\u1ef1 h\u1ee3p t\u00e1c t\u00edch c\u1ef1c c\u1ee7a ng\u01b0\u1eddi d\u00f9ng, vi\u1ec7c ph\u00f2ng th\u1ee7 quan tr\u1ecdng l\u00e0 v\u1ec1 ph\u1ea7n m\u1ed7i ch\u00fang ta ph\u1ea3i nh\u1eadn bi\u1ebft, t\u1ec9nh t\u00e1o v\u00e0 th\u1eadn tr\u1ecdng. Gi\u1ea3 m\u1ea1o l\u00e0 m\u1ed9t d\u1ea1ng c\u1ee7a vi\u1ec7c d\u00f9ng ki\u1ebfn th\u1ee9c x\u00e3 h\u1ed9i. Gi\u1ea3 m\u1ea1o d\u00f9ng l\u1eeba \u0111\u1ea3o \u0111\u1ec3 l\u1ea5y th\u00f4ng tin quan tr\u1ecdng v\u00e0 nh\u1ea1y c\u1ea3m c\u1ee7a b\u1ea1n nh\u01b0 t\u00ean truy nh\u1eadp, m\u1eadt kh\u1ea9u, chi ti\u1ebft th\u1ebb t\u00edn d\u1ee5ng v\u00e0 c\u00e1c th\u00f4ng tin doanh nghi\u1ec7p hay c\u00e1 nh\u00e2n kh\u00e1c. Cu\u1ed9c t\u1ea5n c\u00f4ng gi\u1ea3 m\u1ea1o th\u01b0\u1eddng \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf tr\u00f4ng h\u1ee3p ph\u00e1p. Ch\u1eb3ng h\u1ea1n, b\u1ea1n c\u00f3 th\u1ec3 nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t e-mail hay tin nh\u1eafn nhanh h\u01b0\u1edbng b\u1ea1n t\u1edbi m\u1ed9t m\u00f3c n\u1ed1i v\u00e0 b\u1ea1n \u0111\u01b0a d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh v\u00e0o m\u1ed9t website h\u01b0 huy\u1ec5n. M\u1eb7c d\u1ea7u th\u00f4ng \u0111i\u1ec7p n\u00e0y tr\u00f4ng &#8220;ch\u00ednh th\u1ee9c&#8221; hay \u0111\u00e1ng tin, cu\u1ed9c t\u1ea5n c\u00f4ng gi\u1ea3 m\u1ea1o \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 thu th\u1eadp d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m tr\u00ean website l\u1eeba \u0111\u1ea3o \u0111\u1ec3 thu \u0111\u01b0\u1ee3c quy\u1ec1n truy nh\u1eadp kh\u00f4ng c\u00f3 th\u1ea9m quy\u1ec1n hay \u0111\u00e1nh c\u1eafp c\u0103n c\u01b0\u1edbc. M\u1ee5c \u0111\u00edch c\u1ee7a cu\u1ed9c t\u1ea5n c\u00f4ng gi\u1ea3 m\u1ea1o l\u00e0 nh\u1eafm t\u1edbi v\u00e0 l\u1ea5y ID \u0111\u0103ng nh\u1eadp c\u1ee7a b\u1ea1n, m\u1eadt kh\u1ea9u v\u00e0 c\u00e1c th\u00f4ng tin \u0111\u1ecbnh danh c\u00e1 nh\u00e2n kh\u00e1c.<\/p>\n<p>Th\u00f4ng tin c\u1ee7a c\u00f4ng ti v\u00e0 c\u00e1 nh\u00e2n \u0111\u01b0\u1ee3c \u0111\u1eb7t tr\u00ean c\u00e1c website k\u1ebft m\u1ea1ng x\u00e3 h\u1ed9i (nh\u01b0, LinkedIn, Facebook v\u00e0 Twitter) c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c d\u00f9ng \u0111\u1ec3 t\u1ea1o ra nh\u1eefng th\u00f4ng \u0111i\u1ec7p c\u00f3 v\u1ebb nh\u01b0 h\u1ee3p ph\u00e1p v\u1edbi ng\u01b0\u1eddi d\u00f9ng v\u00e0 n\u00ean \u0111\u01b0\u1ee3c tr\u00e1nh. \u0110\u00e2y l\u00e0 v\u00e0i b\u01b0\u1edbc \u0111\u1eb7c bi\u1ec7t m\u00e0 b\u1ea1n c\u00f3 th\u1ec3 l\u1ea5y \u0111\u1ec3 c\u1ea3nh gi\u00e1c ch\u1ed1ng l\u1ea1i cu\u1ed9c t\u1ea5n c\u00f4ng gi\u1ea3 m\u1ea1o:<\/p>\n<p>Kh\u00f4ng \u0111\u00e1p l\u1ea1i. N\u1ebfu b\u1ea1n nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t e-mail kh\u1ea3 nghi y\u00eau c\u1ea7u th\u00f4ng tin c\u00e1 nh\u00e2n, t\u00e0i ch\u00ednh hay c\u00e1c th\u00f4ng tin nh\u1ea1y c\u1ea3m kh\u00e1c, \u0111\u1eebng \u0111\u00e1p l\u1ea1i.<\/p>\n<p>Kh\u00f4ng nh\u1ea5n v\u00e0o \u0111\u01b0\u1eddng m\u00f3c n\u1ed1i. C\u00e1c m\u00f3c n\u1ed1i b\u00ean trong email kh\u1ea3 nghi c\u00f3 th\u1ec3 \u0111\u01b0a b\u1ea1n t\u1edbi website h\u01b0 huy\u1ec5n hay tung ra ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p. \u0110\u00f4i khi vi\u1ec7c gi\u1ea3 m\u1ea1o s\u1ebd cung c\u1ea5p c\u1ea3 s\u1ed1 \u0111i\u1ec7n tho\u1ea1i \u0111\u1ec3 g\u1ecdi. \u0110\u1eebng b\u1ea5m hay g\u1ecdi; h\u00e3y ki\u1ec3m tra v\u1edbi ngu\u1ed3n \u0111\u00f3 \u0111\u1ec3 ch\u1eafc ch\u1eafn n\u00f3 l\u00e0 h\u1ee3p ph\u00e1p.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: L\u00e0m sao th\u1ea7y thuy\u1ebft ph\u1ee5c m\u1ecdi ng\u01b0\u1eddi ch\u00fa \u00fd t\u1edbi qui tr\u00ecnh ph\u1ea7n m\u1ec1m c\u1ee7a h\u1ecd khi t\u1eeb \u201cqui tr\u00ecnh\u201d \u0111\u01b0\u1ee3c nhi\u1ec1u ng\u01b0\u1eddi coi l\u00e0 gi\u1ea5y t\u1edd v\u00e0 quan li\u00eau?<\/p>\n<p>\u0110\u00e1p: C\u00f3 nh\u1eefng ng\u01b0\u1eddi tin r\u1eb1ng m\u1ecdi th\u1ee9 \u0111\u1ec1u c\u1ea7n ph\u1ea3i \u0111\u01b0\u1ee3c l\u00e0m t\u00e0i li\u1ec7u. H\u1ecd d\u00e0nh th\u1eddi gian l\u00e0m t\u00e0i li\u1ec7u c\u00e1c qui tr\u00ecnh c\u1ee7a m\u00ecnh m\u00e0 kh\u00f4ng d\u00f9ng c\u00e1ch hi\u1ec3u th\u00f4ng th\u01b0\u1eddng n\u00e0o. V\u00ec qui tr\u00ecnh ph\u1ea7n m\u1ec1m ng\u1ee5 \u00fd nh\u1eefng \u0111i\u1ec1u kh\u00e1c nhau v\u1edbi nh\u1eefng ng\u01b0\u1eddi kh\u00e1c nhau, sau \u0111\u00e2y l\u00e0 m\u1ed9t v\u00ed d\u1ee5 v\u1ec1 c\u00e1ch qui tr\u00ecnh n\u00ean \u0111\u01b0\u1ee3c d\u00f9ng nh\u01b0 ph\u01b0\u01a1ng ti\u1ec7n \u0111\u1ec3 \u0111\u1ea1t t\u1edbi CMM m\u1ee9c 2:<\/p>\n<p>1.\u00a0\u00a0\u00a0 C\u00e1c y\u00eau c\u1ea7u \u0111\u01b0\u1ee3c l\u00e0m t\u00e0i li\u1ec7u v\u00e0 \u0111\u01b0\u1ee3c d\u00f9ng nh\u01b0 tuy\u1ebfn c\u01a1 s\u1edf cho m\u1ecdi c\u00f4ng vi\u1ec7c.<\/p>\n<p>2.\u00a0\u00a0\u00a0 Thay \u0111\u1ed5i y\u00eau c\u1ea7u ph\u1ea3i tu\u00e2n theo th\u1ee7 t\u1ee5c \u0111\u1ec3 ki\u1ec3m so\u00e1t m\u1ed9t c\u00e1ch c\u00f3 h\u1ec7 th\u1ed1ng.<\/p>\n<p>3.\u00a0\u00a0\u00a0 C\u00e1c pha v\u00f2ng \u0111\u1eddi ph\u1ea7n m\u1ec1m \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh v\u1edbi ti\u00eau ch\u00ed v\u00e0o v\u00e0 ra v\u00e0 ki\u1ec3m \u0111i\u1ec3m \u0111\u01b0\u1ee3c ti\u1ebfn h\u00e0nh t\u1ea1i ch\u1ed7 cu\u1ed1i c\u1ee7a t\u1eebng pha.<\/p>\n<p>4.\u00a0\u00a0\u00a0 K\u1ebf ho\u1ea1ch d\u1ef1 \u00e1n ph\u1ea7n m\u1ec1m \u0111\u01b0\u1ee3c l\u00e0m t\u00e0i li\u1ec7u b\u1eb1ng b\u1ea3ng ph\u00e2n vi\u1ec7c v\u00e0 c\u00e1c \u01b0\u1edbc l\u01b0\u1ee3ng.<\/p>\n<p>5.\u00a0\u00a0\u00a0 Ti\u1ebfn \u0111\u1ed9 c\u1ee7a d\u1ef1 \u00e1n \u0111\u01b0\u1ee3c theo d\u00f5i t\u01b0\u01a1ng \u1ee9ng v\u1edbi k\u1ebf ho\u1ea1ch d\u1ef1 \u00e1n.<\/p>\n<p>6.\u00a0\u00a0\u00a0 Ng\u01b0\u1eddi \u0111\u1ea3m b\u1ea3o ch\u1ea5t l\u01b0\u1ee3ng v\u00e0 qu\u1ea3n l\u00ed c\u1ea5u h\u00ecnh \u0111\u01b0\u1ee3c tham gia v\u00e0o d\u1ef1 \u00e1n t\u1eeb r\u1ea5t s\u1edbm.<\/p>\n<p>N\u1ebfu c\u00e1c y\u00eau c\u1ea7u kh\u00f4ng \u0111\u01b0\u1ee3c l\u00e0m t\u00e0i li\u1ec7u, kh\u00e1ch h\u00e0ng c\u00f3 th\u1ec3 li\u00ean t\u1ee5c \u0111\u1ed5i \u00fd nhi\u1ec1u l\u1ea7n v\u00e0 ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n s\u1ebd kh\u00f4ng c\u00f3 tuy\u1ebfn c\u01a1 s\u1edf \u0111\u1ec3 b\u1eaft \u0111\u1ea7u c\u00f4ng vi\u1ec7c c\u1ee7a h\u1ecd.<\/p>\n<p>N\u1ebfu thay \u0111\u1ed5i y\u00eau c\u1ea7u kh\u00f4ng d\u1ef1a tr\u00ean qui tr\u00ecnh ki\u1ec3m so\u00e1t c\u00f3 h\u1ec7 th\u1ed1ng, kh\u00e1ch h\u00e0ng hay ng\u01b0\u1eddi qu\u1ea3n l\u00ed c\u00f3 th\u1ec3 cam k\u1ebft v\u1edbi s\u1ef1 bi\u1ebfn thi\u00ean r\u1ed9ng nh\u1eefng thay \u0111\u1ed5i kh\u00f4ng th\u1ec3 th\u1ee9c \u1edf gi\u1eefa ch\u1eebng d\u1ef1 \u00e1n. V\u1eady ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n s\u1ebd ph\u1ea3i \u0111\u1ed1i di\u1ec7n v\u1edbi s\u1ee9c \u00e9p l\u1ecbch bi\u1ec3u nghi\u00eam tr\u1ecdng v\u00e0 lu\u1ed3n l\u00e1ch ph\u1ea1m vi.<\/p>\n<p>N\u1ebfu d\u1ef1 \u00e1n kh\u00f4ng nh\u1eadn di\u1ec7n v\u00f2ng \u0111\u1eddi b\u1eb1ng ki\u1ec3m \u0111i\u1ec3m t\u1ea1i cu\u1ed1i m\u1ed7i pha, m\u1ecdi ng\u01b0\u1eddi s\u1ebd b\u1ecb bu\u1ed9c ph\u1ea3i tu\u00e2n theo c\u00e1c v\u00f2ng thi\u1ebft k\u1ebf, vi\u1ebft m\u00e3, ki\u1ec3m th\u1eed, thi\u1ebft k\u1ebf l\u1ea1i, vi\u1ebft m\u00e3 l\u1ea1i, v\u00e0 ki\u1ec3m th\u1eed l\u1ea1i v\u00f4 t\u1eadn. T\u1ed5 ph\u1ea7n m\u1ec1m s\u1ebd d\u00e0nh nhi\u1ec1u th\u1eddi gian h\u01a1n v\u00e0o vi\u1ec7c g\u1ee1 l\u1ed7i, \u01b0u ti\u00ean ho\u00e1 c\u00e1c nhi\u1ec7m v\u1ee5, v\u00e0 th\u1ef1c hi\u1ec7n vi\u1ec7c l\u00e0m l\u1ea1i \u0111\u1ebfn ph\u00fat ch\u00f3t, ch\u1ea5t l\u01b0\u1ee3ng ph\u1ea7n m\u1ec1m s\u1ebd b\u1ecb \u1ea3nh h\u01b0\u1edfng.<\/p>\n<p>N\u1ebfu d\u1ef1 \u00e1n kh\u00f4ng \u0111\u01b0\u1ee3c l\u1eadp k\u1ebf ho\u1ea1ch t\u01b0\u01a1ng \u1ee9ng theo qui tr\u00ecnh v\u1edbi b\u1ea3ng ph\u00e2n vi\u1ec7c v\u00e0 \u01b0\u1edbc l\u01b0\u1ee3ng th\u00ec k\u1ebf ho\u1ea1ch d\u1ef1 \u00e1n kh\u00f4ng l\u00e0 g\u00ec ngo\u00e0i s\u01a1 \u0111\u1ed3 l\u1ecbch bi\u1ec3u \u0111\u01b0\u1ee3c cam k\u1ebft. L\u00e0m sao b\u1ea1n c\u00f3 th\u1ec3 qu\u1ea3n l\u00ed \u0111\u01b0\u1ee3c m\u1ed9t d\u1ef1 \u00e1n v\u1edbi c\u00e1c nhi\u1ec7m v\u1ee5 kh\u00f4ng \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh v\u00e0 l\u1ecbch bi\u1ec3u kh\u00f4ng h\u1ee3p l\u00ed? Ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n s\u1ebd d\u00e0nh nhi\u1ec1u th\u1eddi gian h\u01a1n cho vi\u1ec7c tranh c\u00e3i v\u1ec1 \u0111i\u1ec1u h\u1ecd ph\u1ea3i l\u00e0m v\u00e0o l\u00fac n\u00e0o \u0111\u00f3 h\u01a1n l\u00e0 l\u00e0m vi\u1ec7c th\u1ef1c.<\/p>\n<p>N\u1ebfu ng\u01b0\u1eddi l\u00e0m \u0111\u1ea3m b\u1ea3o ch\u1ea5t l\u01b0\u1ee3ng v\u00e0 qu\u1ea3n l\u00ed c\u1ea5u h\u00ecnh kh\u00f4ng \u0111\u01b0\u1ee3c tham d\u1ef1 s\u1edbm v\u00e0o d\u1ef1 \u00e1n, b\u1ea1n s\u1ebd m\u1ea5t ki\u1ec3m so\u00e1t v\u1ec1 t\u00ednh to\u00e0n v\u1eb9n c\u1ee7a ph\u1ea7n m\u1ec1m v\u00e0 thay \u0111\u1ed5i qui tr\u00ecnh v\u00e0 m\u1ecdi th\u1ee9 s\u1ebd h\u1ed7n \u0111\u1ed9n v\u00e0 kh\u00f3 s\u1eeda.<\/p>\n<p>Kh\u00f4ng c\u00f3 qui tr\u00ecnh \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh, d\u1ef1 \u00e1n s\u1ebd m\u1ea5t nhi\u1ec1u th\u1eddi gian v\u00e0o tranh c\u00e3i thay v\u00ec l\u00e0m c\u00e1c ho\u1ea1t \u0111\u1ed9ng gia t\u0103ng gi\u00e1 tr\u1ecb.<\/p>\n<p>Ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m mu\u1ed1n c\u00f3 n\u0103ng su\u1ea5t; h\u1ecd s\u1ebd kh\u00f4ng dung th\u1ee9 vi\u1ec7c l\u00e3nh \u0111\u1ea1o y\u1ebfu k\u00e9m kh\u00f4ng cung c\u1ea5p s\u1ef1 h\u1ed7 tr\u1ee3 hay \u00edt gi\u00fap trong qu\u1ea3n l\u00ed d\u1ef1 \u00e1n. L\u00e3nh \u0111\u1ea1o y\u1ebfu k\u00e9m \u0111\u01b0a t\u1edbi nhi\u1ec1u c\u00e3i l\u1ed9n v\u00e0 s\u1eeda l\u1ed7i h\u01a1n l\u00e0 t\u1ea1o ra nhi\u1ec1u ph\u1ea7n m\u1ec1m h\u01a1n. C\u1ea3i ti\u1ebfn qui tr\u00ecnh \u0111\u1ea3m b\u1ea3o r\u1eb1ng c\u00f3 nh\u1eefng qui tr\u00ecnh t\u1ea1i ch\u1ed7 \u0111\u1ec3 h\u1ed7 tr\u1ee3 cho d\u1ef1 \u00e1n l\u00e0m c\u00f4ng vi\u1ec7c c\u00f3 gi\u00e1 tr\u1ecb th\u1ef1c, kh\u00f4ng t\u1ea1o ra t\u00e0i li\u1ec7u kh\u00f4ng c\u1ea7n thi\u1ebft.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: \u0110\u1ecbnh ngh\u0129a c\u1ee7a th\u1ea7y v\u1ec1 ch\u01b0\u01a1ng tr\u00ecnh c\u1ea3i ti\u1ebfn qui tr\u00ecnh th\u00e0nh c\u00f4ng l\u00e0 g\u00ec? \u0110\u1ea1t t\u1edbi CMMI m\u1ee9c 5 sao?<\/p>\n<p>\u0110\u00e1p: \u0110\u1ecbnh ngh\u0129a ri\u00eang c\u1ee7a t\u00f4i v\u1ec1 ch\u01b0\u01a1ng tr\u00ecnh c\u1ea3i ti\u1ebfn qui tr\u00ecnh th\u00e0nh c\u00f4ng l\u00e0 \u1edf ch\u1ed7 c\u00f3 t\u00e1c \u0111\u1ed9ng \u0111\u1ecbnh l\u01b0\u1ee3ng \u0111\u01b0\u1ee3c l\u00ean hi\u1ec7u n\u0103ng c\u1ee7a t\u1ed5 ch\u1ee9c. M\u1ee5c \u0111\u00edch t\u1ed1i th\u01b0\u1ee3ng c\u1ee7a b\u1ea5t k\u00ec ch\u01b0\u01a1ng tr\u00ecnh c\u1ea3i ti\u1ebfn n\u00e0o l\u00e0 c\u1ea3i ti\u1ebfn m\u1ee5c \u0111\u00edch doanh nghi\u1ec7p nh\u01b0 chi ph\u00ed, th\u1eddi gian, l\u1ecbch bi\u1ec3u v.v. M\u1ee9c tr\u01b0\u1edfng th\u00e0nh kh\u00f4ng c\u00f3 ngh\u0129a g\u00ec ch\u1eebng n\u00e0o n\u00f3 c\u00f2n kh\u00f4ng c\u00f3 t\u00e1c \u0111\u1ed9ng l\u00ean m\u1ee5c \u0111\u00edch v\u00e0 m\u1ee5c ti\u00eau doanh nghi\u1ec7p. B\u1eb1ng kh\u00f4ng c\u00f3 l\u1ebd n\u00f3 l\u00e0 vi\u1ec7c ph\u00ed th\u1eddi gian v\u00e0 ti\u1ec1n b\u1ea1c. T\u00f4i KH\u00d4NG th\u00edch m\u1ee9c \u0111\u1ed9 tr\u01b0\u1edfng th\u00e0nh b\u1edfi v\u00ec n\u00f3 \u0111\u00e3 b\u1ecb qu\u1ea3ng c\u00e1o v\u00e0 l\u1ea1m d\u1ee5ng qu\u00e1 m\u1ee9c.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u00f4i bi\u1ebft r\u1eb1ng Microsoft KH\u00d4NG d\u00f9ng CMMI nh\u01b0ng d\u1ea7u v\u1eady v\u1eabn r\u1ea5t th\u00e0nh c\u00f4ng. T\u1ea1i sao ch\u00fang ta kh\u00f4ng theo c\u00e1ch ti\u1ebfp c\u1eadn c\u1ee7a h\u1ecd?<\/p>\n<p>\u0110\u00e1p: Kh\u00f4ng ph\u1ea3i t\u1ea5t c\u1ea3 c\u00e1c t\u1ed5 ch\u1ee9c ph\u1ea7n m\u1ec1m \u0111\u1ec1u nh\u01b0 Microsoft. Ch\u00fang ta kh\u00f4ng th\u1ec3 so s\u00e1nh T\u00e1o v\u00e0 Cam \u0111\u01b0\u1ee3c. V\u1edbi m\u1ed9t s\u1ed1 t\u1ed5 ch\u1ee9c ph\u1ea7n m\u1ec1m, m\u1ee5c \u0111\u00edch l\u00e0 c\u00f3 s\u1ea3n ph\u1ea9m ph\u1ea7n m\u1ec1m ch\u1ea5t l\u01b0\u1ee3ng cao \u0111\u1ec3 h\u1ed7 tr\u1ee3 cho kinh doanh d\u00f9 n\u00f3 l\u00e0 l\u00e0m m\u00e1y bay hay cung c\u1ea5p d\u1ecbch v\u1ee5 cho kh\u00e1ch h\u00e0ng nh\u01b0 Ng\u00e2n h\u00e0ng. M\u1ee5c \u0111\u00edch kinh doanh c\u1ee7a Microsoft l\u00e0 s\u1ed1 m\u1ed9t tr\u00ean th\u1ecb tr\u01b0\u1eddng \u0111\u1ec3 th\u00e2u t\u00f3m th\u1ecb ph\u1ea7n v\u00e0 ki\u1ec3m so\u00e1t th\u1ecb tr\u01b0\u1eddng \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o m\u1ecdi ng\u01b0\u1eddi \u0111\u1ec1u mua ph\u1ea7n m\u1ec1m c\u1ee7a h\u1ecd. H\u1ecd kh\u00f4ng coi ch\u1ea5t l\u01b0\u1ee3ng hay chi ph\u00ed l\u00e0 quan tr\u1ecdng khi so s\u00e1nh v\u1edbi th\u1ecb ph\u1ea7n. Tuy nhi\u00ean, t\u00f4i tin ch\u00fang ta c\u00f3 th\u1ec3 h\u1ecdc \u0111\u01b0\u1ee3c nhi\u1ec1u t\u1eeb Microsoft. B\u00ed m\u1eadt c\u1ee7a h\u1ecd n\u1eb1m \u1edf \u0111\u1ed9ng c\u01a1 v\u00e0 c\u00e1c g\u00f3i \u0111\u1ec1n b\u00f9 c\u1ee7a h\u1ecd. N\u1ebfu ch\u00fang ta t\u1eadp trung v\u00e0o \u0111\u1ed9ng c\u01a1 v\u00e0 c\u1ea3i ti\u1ebfn tinh th\u1ea7n nh\u00e2n vi\u00ean, t\u00f4i ngh\u0129 ch\u00fang ta \u0111ang \u0111i \u0111\u01b0\u1eddng \u0111\u00fang.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: Ch\u00fang t\u00f4i hi\u1ec3u r\u1eb1ng vi\u1ec7c th\u1ea9m \u0111\u1ecbnh CMMI l\u00e0 r\u1ea5t t\u1ed1n k\u00e9m h\u01a1n v\u00e0 t\u1ed1n th\u1eddi gian cho n\u00ean ch\u00fang t\u00f4i ch\u1ec9 mu\u1ed1n ti\u1ebfn h\u00e0nh t\u1ef1 th\u1ea9m \u0111\u1ecbnh b\u1eb1ng vi\u1ec7c \u0111i\u1ec1n v\u00e0o b\u1ea3ng h\u1ecfi v\u1ec1 tr\u01b0\u1edfng th\u00e0nh. L\u00e0m th\u1ebf c\u00f3 \u0111\u01b0\u1ee3c kh\u00f4ng?<\/p>\n<p>\u0110\u00e1p: T\u1ea1i sao b\u1ea1n mu\u1ed1n ti\u1ebfn h\u00e0nh t\u1ef1 th\u1ea9m \u0111\u1ecbnh ki\u1ec3u nh\u01b0 th\u1ebf? C\u00f3 l\u1ebd \u0111\u1ec3 t\u00ecm ra b\u1ea1n \u0111ang \u1edf \u0111\u00e2u tr\u00ean thang tr\u01b0\u1edfng th\u00e0nh CMMI ch\u0103ng? \u0110\u01b0\u1ee3c, v\u1eady b\u1ea1n \u0111ang \u1edf CMMI m\u1ee9c 1 \u0111\u1ea5y r\u1ed3i g\u00ec n\u1eefa n\u00e0o? T\u00f4i m\u1ea1nh m\u1ebd th\u00fac gi\u1ee5c t\u1ed5 ch\u1ee9c kh\u00f4ng ti\u1ebfn h\u00e0nh b\u1ea5t k\u00ec th\u1ea9m \u0111\u1ecbnh n\u00e0o ch\u1eebng n\u00e0o to\u00e0n b\u1ed9 t\u1ed5 ch\u1ee9c c\u00f2n ch\u01b0a cam k\u1ebft \u0111\u1ea7y \u0111\u1ee7 v\u1edbi vi\u1ec7c c\u1ea3i ti\u1ebfn qui tr\u00ecnh. C\u00f3 nhi\u1ec1u \u0111i\u1ec1u c\u1ea7n \u0111\u01b0\u1ee3c l\u00e0m tr\u01b0\u1edbc khi ti\u1ebfn h\u00e0nh th\u1ea9m \u0111\u1ecbnh.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u1ea1i sao ch\u00fang ta c\u1ea7n tu\u00e2n theo khu\u00f4n kh\u1ed5 CMMI theo tr\u1eadt t\u1ef1 h\u1ecd qui \u0111\u1ecbnh? \u00cdch l\u1ee3i g\u00ec m\u00e0 c\u1ed1 l\u00ean m\u1ee9c 3 tr\u00ean n\u1ec1n vi\u1ec7c b\u01b0\u1edbc qua m\u1ee9c 2 nh\u01b0 m\u1ed9t \u0111i\u1ec1u ki\u1ec7n ti\u00ean quy\u1ebft?<\/p>\n<p>\u0110\u00e1p: Gi\u1ea3 s\u1eed m\u1ed9t t\u1ed5 ch\u1ee9c CMMI m\u1ee9c 1 \u0111ang d\u01b0\u1edbi s\u1ee9c \u00e9p l\u1ecbch bi\u1ec3u c\u1ef1c k\u00ec gay c\u1ea5n ph\u1ea3i chuy\u1ec3n giao ph\u1ea7n m\u1ec1m. Kh\u00f4ng s\u1eeda s\u1ee9c \u00e9p l\u1ecbch bi\u1ec3u n\u00e0y b\u1eb1ng vi\u1ec7c qu\u1ea3n l\u00ed d\u1ef1 \u00e1n v\u00e0 thay \u0111\u1ed5i y\u00eau c\u1ea7u (c\u00e1c ho\u1ea1t \u0111\u1ed9ng m\u1ee9c 2), t\u1ed5 ch\u1ee9c v\u1eabn &#8220;ph\u1ea3i ch\u1ecbu s\u1ed1 ph\u1eadn&#8221; \u0111i l\u00ean m\u1ee9c 3. Tuy nhi\u00ean, ph\u1ea7n l\u1edbn c\u00e1c th\u1ea9m \u0111\u1ecbnh m\u1ee9c 1 \u0111\u1ec1u khuy\u1ebfn c\u00e1o m\u1ed9t s\u1ed1 ho\u1ea1t \u0111\u1ed9ng m\u1ee9c 3 nh\u01b0 thi\u1ebft l\u1eadp SEPG n\u1ebfu c\u00f2n ch\u01b0a c\u00f3, v\u00e0 \u0111i\u1ec1u kh\u00e1 th\u00f4ng d\u1ee5ng l\u00e0 khuy\u1ebfn c\u00e1o ti\u1ebfn h\u00e0nh nhi\u1ec1u ki\u1ec3m \u0111i\u1ec3m h\u01a1n. L\u00e0 m\u1ed9t th\u00e0nh vi\u00ean SEPG, b\u1ea1n ph\u1ea3i nh\u1ea1y c\u1ea3m v\u1edbi s\u1ef1 ch\u1ed1ng l\u1ea1i thay \u0111\u1ed5i, v\u00e0 c\u00f3 l\u1ebd m\u1ee9c \u0111\u1ed9 ho\u00e0i nghi n\u00e0o \u0111\u00f3 trong \u0111\u00e1p \u1ee9ng l\u1ea1i th\u00f4ng \u0111i\u1ec7p c\u1ee7a b\u1ea1n, &#8220;SEPG \u1edf \u0111\u00e2y \u0111\u1ec3 gi\u00fap b\u1ea1n c\u1ea3i ti\u1ebfn.&#8221; B\u1ea1n c\u1ea7n hi\u1ec3u m\u1ecdi kh\u00eda c\u1ea1nh c\u1ee7a thay \u0111\u1ed5i \u0111\u1ec3 cho b\u1ea1n c\u00f3 th\u1ec3 v\u01b0\u1ee3t qua nhi\u1ec1u r\u00e0o ch\u1eafn v\u00e0 th\u01b0\u1eddng \u0111i\u1ec1u \u0111\u00f3 ngh\u0129a l\u00e0 gi\u1ea3i quy\u1ebft v\u1edbi nh\u1eefng m\u1ed1i quan t\u00e2m chuy\u00ean d\u1ef1 \u00e1n tr\u01b0\u1edbc h\u1ebft r\u1ed3i m\u1edbi t\u1edbi chu\u1ea9n ho\u00e1 t\u1ed5 ch\u1ee9c sau.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: L\u1eadp tr\u00ecnh c\u1ef1c \u0111oan eXtreme Programming (EP) l\u00e0 g\u00ec. Ch\u00fang ta n\u00ean hay kh\u00f4ng n\u00ean ch\u1ea5p thu\u1eadn EP v\u00e0 l\u00e0m sao n\u00f3 kh\u1edbp v\u00e0o c\u00e1c ho\u1ea1t \u0111\u1ed9ng CMM?<\/p>\n<p>\u0110\u00e1p: L\u1eadp tr\u00ecnh c\u1ef1c \u0111oan eXtreme Programming (EP) l\u00e0 ph\u01b0\u01a1ng ph\u00e1p ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m \u0111\u00e3 \u0111\u01b0\u1ee3c Kent Beck m\u00f4 t\u1ea3 b\u1eb1ng c\u00e1c t\u00e0i li\u1ec7u c\u00f3 li\u00ean quan do Martin Fowler v\u00e0 Ron Jeffries sinh ra. M\u1edbi tho\u00e1ng nh\u00ecn, ng\u01b0\u1eddi ta c\u00f3 th\u1ec3 ngh\u0129 r\u1eb1ng n\u00f3 l\u00e0 ph\u01b0\u01a1ng ph\u00e1p \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf v\u1edbi s\u1ef1 t\u1eadp trung v\u00e0o l\u1eadp tr\u00ecnh, kh\u00f4ng ph\u1ea3i v\u00e0o k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m. Tuy nhi\u00ean, b\u1ea3n th\u00e2n l\u00e0 m\u1ed9t ng\u01b0\u1eddi l\u1eadp tr\u00ecnh EP, t\u00f4i tin n\u00f3 bao qu\u00e1t nhi\u1ec1u \u00fd t\u01b0\u1edfng k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m tuy\u1ec7t h\u1ea3o nh\u01b0 l\u1eadp tr\u00ecnh c\u1eb7p \u0111\u00f4i, ph\u00e1t tri\u1ec3n gia t\u0103ng, kh\u00e1ch h\u00e0ng t\u1ea1i ch\u1ed7, t\u00edch h\u1ee3p li\u00ean t\u1ee5c, v\u00e0 ki\u1ec3m th\u1eed li\u00ean t\u1ee5c. M\u1ee5c \u0111\u00edch \u0111\u1eb1ng sau eXtreme Programming l\u00e0 th\u1eddi gian chu k\u00ec v\u00e0 qu\u1ea3n l\u00ed r\u1ee7i ro. V\u00e0 n\u00f3 c\u0169ng kh\u00f4ng th\u1ef1c s\u1ef1 m\u1edbi; n\u00f3 ch\u1ec9 l\u1ea5y c\u00e1c kh\u00e1i ni\u1ec7m n\u1ed5i ti\u1ebfng v\u00e0 \u0111\u1ea9y ch\u00fang t\u1edbi c\u00e1c gi\u1edbi h\u1ea1n.<\/p>\n<p>Theo \u00fd ki\u1ebfn c\u1ee7a t\u00f4i, n\u00f3 c\u00f3 t\u00e1c d\u1ee5ng t\u1ed1t cho t\u1ed5 nh\u1ecf (2 t\u1edbi 6 ng\u01b0\u1eddi) l\u00e0m s\u1ea3n ph\u1ea9m ph\u1ea7n m\u1ec1m ri\u00eang l\u1ebb v\u1edbi vi\u1ec7c t\u00edch h\u1ee3p hay trao \u0111\u1ed5i d\u1eef li\u1ec7u c\u00f3 gi\u1edbi h\u1ea1n. C\u0169ng gi\u1ed1ng nh\u01b0 t\u1eadp b\u1ea5t k\u00ec m\u00f4n th\u1ec3 thao m\u1ed9t c\u00e1ch m\u00f9 qu\u00e1ng \u0111\u1ec1u r\u1ea5t nguy hi\u1ec3m, l\u00e0m eXtreme Programming, m\u00e0 kh\u00f4ng hi\u1ec3u r\u00f5 r\u00e0ng nh\u1eefng gi\u1edbi h\u1ea1n c\u1ee7a n\u00f3 v\u1ec1 s\u1eed d\u1ee5ng ph\u01b0\u01a1ng ph\u00e1p n\u00e0y, c\u00f3 th\u1ec3 d\u1eabn d\u1ef1 \u00e1n EP v\u00e0o m\u00f4i tr\u01b0\u1eddng h\u1ed7n \u0111\u1ed9n kh\u00f4ng th\u1ec3 th\u1ee9c.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u00f4i \u0111\u00e3 xem c\u00e1c blog c\u1ee7a th\u1ea7y v\u1ec1 CMMI v\u00e0 tin n\u00f3 l\u00e0 t\u1ed1t nh\u01b0ng ch\u00fang t\u00f4i kh\u00f4ng c\u00f3 th\u1eddi gian \u0111\u1ec3 l\u00e0m t\u1ea5t c\u1ea3 nh\u1eefng ho\u1ea1t \u0111\u1ed9ng cho d\u1ef1 \u00e1n r\u1ea5t l\u1edbn c\u1ee7a t\u00f4i. N\u1ebfu t\u00f4i ch\u1ec9 c\u00f3 th\u1ec3 l\u00e0m m\u1ed9t ho\u1ea1t \u0111\u1ed9ng \u0111\u1ec3 c\u1ea3i ti\u1ebfn, n\u00f3 s\u1ebd th\u1ebf n\u00e0o?<\/p>\n<p>\u0110\u00e1p: Th\u1ed1ng k\u00ea ch\u1ec9 ra r\u1eb1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh ph\u1ea7n m\u1ec1m l\u1edbn th\u1ea5t b\u1ea1i \u1edf t\u1ec9 l\u1ec7 \u0111\u00e1ng b\u00e1o \u0111\u1ed9ng. T\u1ec9 l\u1ec7 th\u1ea5t b\u1ea1i \u0111\u1ed1i v\u1edbi ch\u01b0\u01a1ng tr\u00ecnh l\u1edbn (qu\u00e3ng 1 tri\u1ec7u d\u00f2ng m\u00e3 hay h\u01a1n) cao v\u00e0o qu\u00e3ng 65%, t\u01b0\u01a1ng \u1ee9ng v\u1edbi nghi\u00ean c\u1ee9u \u0111\u01b0\u1ee3c Ts. Capers Jones th\u1ef1c hi\u1ec7n. Nhi\u1ec1u ch\u01b0\u01a1ng tr\u00ecnh ph\u00ed ti\u1ec1n b\u1ea1c, t\u00e0i nguy\u00ean, v\u00e0 th\u1eddi gian v\u00e0 kh\u00f4ng chuy\u1ec3n giao \u0111i\u1ec1u ch\u00fang h\u1ee9a h\u1eb9n. C\u00e1c nghi\u00ean c\u1ee9u th\u00eam t\u00ecm ra c\u0103n nguy\u00ean c\u1ee7a t\u1ea5t c\u1ea3 nh\u1eefng \u0111i\u1ec1u t\u1ed3i t\u1ec7 n\u00e0y l\u00e0 \u1edf ch\u1ed7 ng\u01b0\u1eddi qu\u1ea3n l\u00ed ch\u01b0\u01a1ng tr\u00ecnh v\u00e0 kh\u00e1ch h\u00e0ng kh\u00f4ng x\u00e1c \u0111\u1ecbnh v\u00e0 thi\u1ebft l\u1eadp th\u00edch h\u1ee3p v\u1ec1 ph\u1ea1m vi v\u00e0 y\u00eau c\u1ea7u c\u1ee7a ch\u01b0\u01a1ng tr\u00ecnh. N\u1ebfu b\u1ea1n ch\u1ec9 c\u00f3 th\u1ec3 l\u00e0m \u0111\u01b0\u1ee3c m\u1ed9t \u0111i\u1ec1u, t\u00f4i g\u1ee3i \u00fd t\u1eadp trung v\u00e0o vi\u1ec7c n\u1eafm b\u1eaft y\u00eau c\u1ea7u v\u00e0 ki\u1ec3m so\u00e1t ph\u1ea1m vi c\u1ee7a ch\u01b0\u01a1ng tr\u00ecnh.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u1ea1i sao ch\u00fang t\u00f4i c\u1ea7n c\u1ea3i ti\u1ebfn qui tr\u00ecnh\u00a0 khi kinh doanh c\u1ee7a ch\u00fang t\u00f4i l\u00e0 ph\u00e1t tri\u1ec3n s\u1ea3n ph\u1ea9m \u0111\u1ec3 b\u00e1n tr\u00ean th\u1ecb tr\u01b0\u1eddng?<\/p>\n<p>\u0110\u00e1p: Thu\u1eadt ng\u1eef \u201cc\u1ea3i ti\u1ebfn qui tr\u00ecnh\u201d \u0111\u01b0\u1ee3c d\u00f9ng \u0111\u1ec3 \u0111\u1eb7c tr\u01b0ng cho n\u1ed7 l\u1ef1c c\u1ee7a t\u1ed5 ch\u1ee9c ki\u1ec3m tra ch\u1eb7t ch\u1ebd v\u00e0 c\u1ea3i ti\u1ebfn qui tr\u00ecnh c\u1ee7a m\u00ecnh. N\u00f3 d\u1ef1a tr\u00ean gi\u1ea3 \u0111\u1ecbnh r\u1eb1ng qui tr\u00ecnh \u0111\u01b0\u1ee3c c\u1ea3i ti\u1ebfn s\u1ebd c\u00f3 t\u00e1c d\u1ee5ng v\u00e0o s\u1ea3n ph\u1ea9m \u0111\u01b0\u1ee3c c\u1ea3i ti\u1ebfn. M\u1ee5c \u0111\u00edch t\u1ed1i th\u01b0\u1ee3ng l\u00e0 th\u1ef1c s\u1ef1 c\u1ea3i ti\u1ebfn b\u1ea3n th\u00e2n s\u1ea3n ph\u1ea9m. N\u1ebfu qui tr\u00ecnh \u0111\u01b0\u1ee3c c\u1ea3i ti\u1ebfn kh\u00f4ng c\u00f3 t\u00e1c d\u1ee5ng t\u00edch c\u1ef1c l\u00ean s\u1ea3n ph\u1ea9m \u0111\u01b0\u1ee3c sinh ra, th\u1ebf th\u00ec ch\u1eb3ng c\u00f3 bi\u1ec7n minh g\u00ec \u0111\u01b0\u1ee3c cho vi\u1ec7c t\u1ea1o ra thay \u0111\u1ed5i c\u1ea3.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u00f4i mu\u1ed1n ph\u00e1t tri\u1ec3n m\u1ed9t c\u00f4ng c\u1ee5 \u0111\u1ec3 t\u1ef1 \u0111\u1ed9ng ho\u00e1 c\u1ea3i ti\u1ebfn qui tr\u00ecnh \u0111\u1ec3 gi\u00fap t\u1ed5 ch\u1ee9c \u0111\u1ea1t t\u1edbi m\u1ee9c tr\u01b0\u1edfng th\u00e0nh cao h\u01a1n. C\u00f3 c\u00f4ng c\u1ee5 nh\u01b0 th\u1ebf tr\u00ean th\u1ecb tr\u01b0\u1eddng ch\u01b0a?<\/p>\n<p>\u0110\u00e1p: T\u00f4i kh\u00f4ng bi\u1ebft c\u00f4ng c\u1ee5 nh\u01b0 th\u1ebf ng\u00e0y nay c\u00f3 t\u1ed3n t\u1ea1i kh\u00f4ng nh\u01b0ng tr\u01b0\u1edbc khi b\u1ea1n b\u1eaft \u0111\u1ea7u t\u1ea1o ra c\u00f4ng c\u1ee5, b\u1ea1n c\u00f3 th\u1ec3 c\u1ea7n xem x\u00e9t \u0111i\u1ec1u n\u00e0y: Qui tr\u00ecnh ph\u1ea3i t\u1ed3n t\u1ea1i tr\u01b0\u1edbc khi t\u1ef1 \u0111\u1ed9ng ho\u00e1 qui tr\u00ecnh c\u00f3 th\u1ec3 x\u1ea3y ra v\u00e0 c\u1ea3i ti\u1ebfn qui tr\u00ecnh l\u00e0 c\u1ea3i ti\u1ebfn qui tr\u00ecnh \u0111ang t\u1ed3n t\u1ea1i. L\u00e0m sao b\u1ea1n ph\u00e1t tri\u1ec3n m\u1ed9t c\u00f4ng c\u1ee5 \u0111\u1ec3 c\u1ea3i ti\u1ebfn qui tr\u00ecnh m\u00e0 c\u00f3 th\u1ec3 c\u00f2n ch\u01b0a t\u1ed3n t\u1ea1i?\u00a0 C\u00f4ng c\u1ee5 l\u00e0 vi\u1ec7c th\u1ef1c hi\u1ec7n c\u1ee7a qui tr\u00ecnh v\u00e0 n\u00f3 ph\u1ea3i tu\u00e2n theo qui tr\u00ecnh \u0111ang t\u1ed3n t\u1ea1i ch\u1ee9 kh\u00f4ng ph\u1ea3i l\u00e0 kh\u00e1i ni\u1ec7m v\u1ec1 qui tr\u00ecnh.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: Ch\u00fang t\u00f4i quan t\u00e2m t\u1edbi vi\u1ec7c b\u1eaft \u0111\u1ea7u ch\u01b0\u01a1ng tr\u00ecnh c\u1ea3i ti\u1ebfn qui tr\u00ecnh trong t\u1ed5 ch\u1ee9c c\u1ee7a m\u00ecnh. L\u00e0m sao ch\u00fang t\u00f4i b\u1eaft \u0111\u1ea7u \u0111\u00e2y?<\/p>\n<p>\u0110\u00e1p: C\u1ea3i ti\u1ebfn qui tr\u00ecnh ph\u1ea7n m\u1ec1m l\u00e0 cu\u1ed9c h\u00e0nh tr\u00ecnh d\u00e0i y\u00eau c\u1ea7u c\u00f3 cam k\u1ebft. C\u00f3 nh\u1eefng v\u1ea5n \u0111\u1ec1 m\u00e0 b\u1ea1n s\u1ebd g\u1eb7p ph\u1ea3i nh\u01b0 s\u1ef1 h\u1ed7 tr\u1ee3 c\u1ee7a c\u1ea5p qu\u1ea3n l\u00ed, t\u00e0i nguy\u00ean nh\u00e2n l\u1ef1c, tri th\u1ee9c v\u00e0 k\u0129 n\u0103ng. T\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n ph\u1ea3i c\u00f3 kh\u1ea3 n\u0103ng gi\u1ea3i quy\u1ebft nh\u1eefng \u0111i\u1ec1u n\u00e0y tr\u01b0\u1edbc khi b\u1eaft \u0111\u1ea7u cu\u1ed9c h\u00e0nh tr\u00ecnh c\u1ea3i ti\u1ebfn qui tr\u00ecnh: B\u1ea1n c\u1ea7n t\u1ef1 h\u1ecfi m\u00ecnh nh\u1eefng c\u00e2u h\u1ecfi sau:<\/p>\n<p>1.\u00a0\u00a0\u00a0 M\u1ee5c \u0111\u00edch c\u1ee7a ch\u00fang ta l\u00e0 g\u00ec?<\/p>\n<p>2.\u00a0\u00a0\u00a0 T\u1ea1i sao ch\u00fang ta c\u1ea7n c\u1ea3i ti\u1ebfn qui tr\u00ecnh?<\/p>\n<p>3.\u00a0\u00a0\u00a0 Ch\u00fang ta c\u1ea7n c\u00f3 lo\u1ea1i k\u1ebft c\u1ea5u n\u1ec1n n\u00e0o t\u1ea1i ch\u1ed7?<\/p>\n<p>4.\u00a0\u00a0\u00a0 Ai c\u1ea7n \u0111\u01b0\u1ee3c tham gia v\u00e0o?<\/p>\n<p>5.\u00a0\u00a0\u00a0 L\u00e0m sao ch\u00fang ta c\u00f3 \u0111\u01b0\u1ee3c s\u1ef1 \u1ee7ng h\u1ed9 c\u1ee7a c\u1ea5p qu\u1ea3n l\u00ed?<\/p>\n<p>6.\u00a0\u00a0\u00a0 L\u00e0m sao ch\u00fang ta \u0111\u1eb7t ra c\u00e1c \u01b0u ti\u00ean?<\/p>\n<p>7.\u00a0\u00a0\u00a0 Ch\u00fang ta c\u00f3 th\u1ec3 c\u00f3 gi\u00fap \u0111\u1ee1 t\u1eeb \u0111\u00e2u?<\/p>\n<p>Kh\u00f4ng \u0111\u1ec1 c\u1eadp t\u1edbi nh\u1eefng c\u00e2u h\u1ecfi n\u00e0y s\u1ebd l\u00e0m n\u1ea3y sinh cu\u1ed9c h\u00e0nh tr\u00ecnh c\u1ea3i ti\u1ebfn h\u1ed7n \u0111\u1ed9n kh\u00f4ng th\u1ec3 th\u1ee9c ch\u1eb3ng d\u1eabn t\u1edbi \u0111\u00e2u c\u1ea3.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: Qu\u1ea3n l\u00ed y\u00eau c\u1ea7u ch\u1ec9 \u00e1p d\u1ee5ng cho d\u1ef1 \u00e1n m\u1edbi ph\u00e1t tri\u1ec3n th\u00f4i ch\u1ee9? Ch\u00fang ta c\u00f3 th\u1ec3 \u00e1p d\u1ee5ng n\u00f3 cho d\u1ef1 \u00e1n b\u1ea3o tr\u00ec kh\u00f4ng?<\/p>\n<p>\u0110\u00e1p: Qu\u1ea3n l\u00ed y\u00eau c\u1ea7u c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c \u00e1p d\u1ee5ng cho c\u1ea3 d\u1ef1 \u00e1n ph\u00e1t tri\u1ec3n v\u00e0 b\u1ea3o tr\u00ec. Trong d\u1ef1 \u00e1n b\u1ea3o tr\u00ec \u0111i\u1ec3n h\u00ecnh, c\u00f3 Y\u00eau c\u1ea7u thay \u0111\u1ed5i, B\u00e1o c\u00e1o v\u1ea5n \u0111\u1ec1 &#8230;v.v. \u0111i\u1ec1u c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c xem nh\u01b0 c\u00e1c y\u00eau c\u1ea7u v\u00ec ch\u00fang x\u00e1c \u0111\u1ecbnh ra ph\u1ea1m vi c\u1ee7a n\u1ed7 l\u1ef1c ri\u00eang m\u00e0 b\u1ea1n s\u1ebd ph\u1ea3i l\u00e0m vi\u1ec7c tr\u00ean ch\u00fang. \u0110i\u1ec1u CMMI y\u00eau c\u1ea7u l\u00e0 t\u1ea5t c\u1ea3 c\u00e1c y\u00eau c\u1ea7u \u0111\u1ec1u ph\u1ea3i \u0111\u01b0\u1ee3c l\u00e0m t\u00e0i li\u1ec7u, \u0111\u01b0\u1ee3c ki\u1ec3m so\u00e1t v\u00e0 \u0111\u01b0\u1ee3c \u0111\u1ed3ng \u00fd t\u1eeb m\u1ecdi nh\u00f3m b\u1ecb \u1ea3nh h\u01b0\u1edfng. M\u1ecdi k\u1ebf ho\u1ea1ch, thay \u0111\u1ed5i, v\u00e0 ho\u1ea1t \u0111\u1ed9ng \u0111\u1ec1u ph\u1ea3i \u0111\u01b0\u1ee3c gi\u1eefa nh\u1ea5t qu\u00e1n v\u00e0 theo d\u00f5i \u0111\u01b0\u1ee3c v\u1ec1 nh\u1eefng y\u00eau c\u1ea7u n\u00e0y.<\/p>\n<p>H\u1ecfi:<\/p>\n<p>S\u1ef1 kh\u00e1c bi\u1ec7t gi\u1eefa d\u00f9ng l\u1ea1i theo c\u01a1 h\u1ed9i v\u00e0 d\u00f9ng l\u1ea1i c\u00f3 h\u1ec7 th\u1ed1ng l\u00e0 g\u00ec?<\/p>\n<p>\u0110\u00e1p:<\/p>\n<p>D\u00f9ng l\u1ea1i theo c\u01a1 h\u1ed9i bao g\u1ed3m ph\u1ea7n l\u1edbn l\u00e0 m\u00e3, \u0111i\u1ec1u c\u00f3 th\u1ec3 c\u00f3 s\u1eb5n trong kho n\u01a1i m\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 truy l\u1ee5c v\u00e0 d\u00f9ng. M\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 thay \u0111\u1ed5i n\u00f3 khi h\u1ecd th\u1ea5y kh\u1edbp. Vi\u1ec7c d\u00f9ng kh\u00f4ng th\u1ec3 th\u1ee9c n\u00e0y kh\u00f4ng r\u1ea5t \u00edch l\u1ee3i do vi\u1ec7c th\u1ef1c hi\u1ec7n v\u00e0 s\u1eeda \u0111\u1ed5i kh\u00f4ng \u0111\u00fang. Kh\u00f4ng c\u00f3 ti\u1ebft ki\u1ec7m chi ph\u00ed trong c\u00e1ch ti\u1ebfp c\u1eadn n\u00e0y v\u00ec ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n v\u1eabn ph\u1ea3i t\u00ecm \u0111i\u1ec1u h\u1ecd c\u1ea7n, s\u1eeda n\u00f3, v\u00e0 ki\u1ec3m th\u1eed s\u1ea3n ph\u1ea9m cu\u1ed1i c\u00f9ng.<\/p>\n<p>D\u00f9ng l\u1ea1i c\u00f3 h\u1ec7 th\u1ed1ng l\u00e0 vi\u1ec7c ph\u00e1t tri\u1ec3n s\u1ea3n ph\u1ea9m ph\u1ea7n m\u1ec1m t\u1eeb t\u1eadp c\u00e1c t\u00e0i s\u1ea3n d\u00f9ng l\u1ea1i, \u0111\u1ec3 cho s\u1ef1 t\u01b0\u01a1ng t\u1ef1 trong c\u00e1c y\u00eau c\u1ea7u v\u00e0 ki\u1ebfn tr\u00fac gi\u1eefa c\u00e1c \u1ee9ng d\u1ee5ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c khai th\u00e1c \u0111\u1ec3 \u0111\u1ea1t t\u1edbi \u00edch l\u1ee3i b\u1ea3n ch\u1ea5t v\u1ec1 n\u0103ng su\u1ea5t, hi\u1ec7u n\u0103ng, ch\u1ea5t l\u01b0\u1ee3ng v\u00e0 m\u1ee5c \u0111\u00edch kinh doanh. C\u00e1ch ti\u1ebfp c\u1eadn n\u00e0y y\u00eau c\u1ea7u d\u00f9ng l\u1ea1i theo thi\u1ebft k\u1ebf kh\u00f4ng ng\u1eabu nhi\u00ean. T\u00e0i s\u1ea3n d\u00f9ng l\u1ea1i l\u00e0 c\u00e1c y\u00eau c\u1ea7u, k\u1ebf ho\u1ea1ch d\u1ef1 \u00e1n, \u01b0\u1edbc l\u01b0\u1ee3ng, ki\u1ebfn tr\u00fac, thi\u1ebft k\u1ebf, giao di\u1ec7n ng\u01b0\u1eddi d\u00f9ng, k\u1ebf ho\u1ea1ch ki\u1ec3m th\u1eed, tr\u01b0\u1eddng h\u1ee3p ki\u1ec3m th\u1eed, d\u1eef li\u1ec7u, KH\u00d4NG ch\u1ec9 c\u00f3 m\u00e3. T\u00f4i tin d\u00f9ng l\u1ea1i c\u00f3 h\u1ec7 th\u1ed1ng, n\u1ebfu \u0111\u01b0\u1ee3c hi\u1ec3u \u0111\u00fang, v\u00e0 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n \u0111\u1ea7y \u0111\u1ee7, c\u00f3 th\u1ec3 c\u1ea3i ti\u1ebfn tri\u1ec7t \u0111\u1ec3 n\u0103ng l\u1ef1c ph\u00e1t tri\u1ec3n c\u1ee7a t\u1ed5 ch\u1ee9c ph\u1ea7n m\u1ec1m.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u00f4i \u0111\u01b0\u1ee3c b\u1ea3o ph\u1ea3i thi\u1ebft l\u1eadp tuy\u1ebfn c\u01a1 s\u1edf \u0111o nh\u01b0ng t\u1ed5 ch\u1ee9c c\u1ee7a ch\u00fang t\u00f4i \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00e1i t\u1ed5 ch\u1ee9c nhi\u1ec1u l\u1ea7n trong qu\u00e1 kh\u1ee9, ph\u1ea7n l\u1edbn d\u1eef li\u1ec7u \u0111\u1ec1u kh\u00f4ng li\u00ean quan v\u00e0 kh\u00f4ng nh\u1ea5t qu\u00e1n.<\/p>\n<p>\u0110\u00e1p: T\u1ed5 ch\u1ee9c c\u1ea7n thu th\u1eadp d\u1eef li\u1ec7u hi\u1ec7u n\u0103ng l\u1ecbch s\u1eed (l\u1ecbch bi\u1ec3u, chi ph\u00ed, ch\u1ea5t l\u01b0\u1ee3ng) \u0111\u1ec3 thi\u1ebft l\u1eadp tuy\u1ebfn c\u01a1 s\u1edf cho so s\u00e1nh t\u01b0\u01a1ng lai. Ch\u00fang ta \u0111ang t\u00ecm xu h\u01b0\u1edbng ch\u1ee9 kh\u00f4ng ph\u1ea3i l\u00e0 d\u1eef li\u1ec7u ch\u00ednh x\u00e1c hay tuy\u1ec7t \u0111\u1ed1i, t\u00f4i tin b\u1ea5t k\u1ec3 t\u1ed5 ch\u1ee9c thay \u0111\u1ed5i th\u1ebf n\u00e0o, xu h\u01b0\u1edbng nh\u01b0 v\u1eady \u0111\u1ec1u c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y m\u00e0 kh\u00f4ng m\u1ea5t qu\u00e1 nhi\u1ec1u c\u00f4ng s\u1ee9c.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: Sao ch\u00fang ta c\u1ea7n c\u1ea3i ti\u1ebfn qui tr\u00ecnh ph\u1ea7n m\u1ec1m khi kho\u00e1n ngo\u00e0i d\u01b0\u1eddng nh\u01b0 l\u00e0 c\u00e2u tr\u1ea3 l\u1eddi?<\/p>\n<p>\u0110\u00e1p: T\u00f4i bi\u1ebft r\u1eb1ng ch\u1ea5t l\u01b0\u1ee3ng, n\u0103ng su\u1ea5t, chi ph\u00ed v\u00e0 th\u1eddi gian chu k\u00ec l\u00e0 then ch\u1ed1t cho th\u00e0nh c\u00f4ng kinh doanh. Trong ph\u1ea7n l\u1edbn c\u00e1c t\u1ed5 ch\u1ee9c ph\u1ea7n m\u1ec1m c\u00e1c nh\u00e2n t\u1ed1 n\u00e0y th\u01b0\u1eddng kh\u00f4ng th\u00edch h\u1ee3p \u0111\u00f3 l\u00e0 l\u00ed do t\u1ea1i sao ch\u00fang ta c\u1ea7n c\u1ea3i ti\u1ebfn qui tr\u00ecnh ph\u1ea7n m\u1ec1m. R\u1ea5t d\u1ec5 nh\u1ea3y v\u00e0o k\u1ebft lu\u1eadn khi c\u00e1c t\u1eeb \u00a0th\u00f4ng d\u1ee5ng nh\u01b0 \u201cKho\u00e1n ngo\u00e0i,\u201d \u201cth\u01b0\u01a1ng m\u1ea1i s\u1eb5n tr\u00ean gi\u00e1\u201d, \u201cC\u00f4ng c\u1ee5 Case,\u201d \u201cPh\u01b0\u01a1ng ph\u00e1p lu\u1eadn th\u1ea7n k\u00ec\u201d \u0111ang n\u00f3ng trong c\u00f4ng nghi\u1ec7p. V\u1edbi ho\u00e0n c\u1ea3nh l\u1ecbch s\u1eed, \u0111i\u1ec1u d\u01b0\u1eddng nh\u01b0 l\u00e0 thi\u1ec3n c\u1eadn cho b\u1ea5t k\u00ec t\u1ed5 ch\u1ee9c n\u00e0o th\u1ef1c hi\u1ec7n c\u00f4ng ngh\u1ec7 m\u00e0 kh\u00f4ng c\u00f3 xem x\u00e9t n\u00e0o \u0111\u00f3.<\/p>\n<p>T\u00f4i tin, d\u00e0nh ti\u1ec1n cho ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m t\u1eeb \u0111\u1ea7u khi \u0111\u00e3 c\u00f3 s\u1ea3n ph\u1ea9m h\u00e0ng ho\u00e1 ho\u00e0n h\u1ea3o &#8220;s\u1eb5n tr\u00ean gi\u00e1&#8221; kh\u00f4ng ph\u1ea3i l\u00e0 c\u00e1ch d\u00f9ng ti\u1ec1n t\u1ed1t. T\u00f4i c\u0169ng tin r\u1eb1ng vi\u1ec7c ch\u1ecdn l\u1ef1a ph\u1ea7n m\u1ec1m COTS \u0111\u00e3 \u0111\u00f3ng g\u00f3i s\u1eb5n t\u1eeb m\u1ed9t c\u00f4ng ti, v\u00e0 d\u00e0nh th\u1eddi gian \u0111\u1ec3 s\u1eeda n\u00f3 \u0111\u1ec3 ch\u1eafc ch\u1eafn n\u00f3 l\u00e0m vi\u1ec7c kh\u00f4ng ph\u1ea3i l\u00e0 n\u01b0\u1edbc \u0111i kh\u00f4n ngoan n\u1eefa. Tr\u01b0\u1edbc khi ch\u00fang ta \u0111\u1ec3 ai \u0111\u00f3 l\u00e0m vi\u1ec7c cho ch\u00fang ta (kho\u00e1n ngo\u00e0i, h\u1ee3p \u0111\u1ed3ng ph\u1ee5) ch\u00fang ta ph\u1ea3i c\u00f3 qui tr\u00ecnh \u0111\u1ec3 l\u1ef1a c\u00f4ng ti c\u00f3 ph\u1ea9m ch\u1ea5t t\u1ed1t nh\u1ea5t, qu\u1ea3n l\u00ed h\u1ee3p \u0111\u1ed3ng c\u1ea9n th\u1eadn, \u0111i\u1ec1u ph\u1ed1i s\u1ef1 ph\u00e1t tri\u1ec3n c\u1ee7a h\u1ecd \u0111\u1ec1u k\u00ec, v\u00e0 t\u1ea1o ra ti\u00eau ch\u00ed ch\u1ea5p nh\u1eadn \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o hi\u1ec7u n\u0103ng c\u1ee7a s\u1ea3n ph\u1ea9m c\u1ee7a h\u1ecd tr\u01b0\u1edbc khi t\u00edch h\u1ee3p ch\u00fang v\u00e0o m\u00f4i tr\u01b0\u1eddng c\u1ee7a ch\u00fang ta.<\/p>\n<p>Ch\u1eebng n\u00e0o c\u00f2n ch\u01b0a quy\u1ebft \u0111\u1ecbnh v\u1ec1 kho\u00e1n ngo\u00e0i, v\u1eabn c\u00f2n nhi\u1ec1u ch\u1ed7 \u0111\u1ec3 c\u1ea3i ti\u1ebfn trong nh\u00e0, \u0111\u1eb7c bi\u1ec7t trong qui tr\u00ecnh ph\u1ea7n m\u1ec1m. Trong h\u1ea7u h\u1ebft c\u00e1c t\u1ed5 ch\u1ee9c t\u1eebng d\u1ef1 \u00e1n \u0111\u1ec1u v\u1eabn \u0111\u01b0\u1ee3c coi l\u00e0 duy nh\u1ea5t, v\u00e0 b\u00e0i h\u1ecdc r\u00fat ra t\u1eeb d\u1ef1 \u00e1n qu\u00e1 kh\u1ee9 kh\u00f4ng \u0111\u01b0\u1ee3c b\u1eaft gi\u1eef hay d\u00f9ng theo c\u00e1ch c\u00f3 t\u1ed5 ch\u1ee9c. N\u1ebfu ch\u00fang ta ph\u1ea1m ph\u1ea3i sai l\u1ea7m, ch\u00fang ta c\u00f3 th\u1ec3 l\u1eb7p l\u1ea1i c\u00f9ng sai l\u1ea7m l\u1eb7p \u0111i l\u1eb7p l\u1ea1i. T\u00f4i tin r\u1eb1ng n\u1ebfu ch\u00fang ta c\u00f3 th\u1ec3 d\u00f9ng l\u1ea1i th\u1ef1c h\u00e0nh t\u1ed1t nh\u1ea5t, kh\u1eed b\u1ecf c\u00e1c l\u1ed7i v\u00e0 ph\u1ebf th\u1ea3i t\u1eeb qui tr\u00ecnh hi\u1ec7n th\u1eddi, th\u00ec s\u1ebd t\u1ea1o ra s\u1ea3n ph\u1ea9m ch\u1ea5t l\u01b0\u1ee3ng, n\u0103ng su\u1ea5t s\u1ebd \u0111\u01b0\u1ee3c c\u1ea3i thi\u1ec7n, v\u00e0 chung cu\u1ed9c chi ph\u00ed v\u00e0 th\u1eddi gian chu k\u00ec s\u1ebd gi\u1ea3m.<\/p>\n<p>&nbsp;<\/p>\n<p>H\u1ecfi: T\u1ea1i sao ch\u00fang ta kh\u00f4ng th\u1ec3 tri\u1ec3n khai nhi\u1ec1u h\u00e0nh \u0111\u1ed9ng m\u1ed9t l\u00fac \u0111\u1ec3 cho ch\u00fang ta c\u00f3 th\u1ec3 x\u00fac ti\u1ebfn c\u00e1c ho\u1ea1t \u0111\u1ed9ng c\u1ea3i ti\u1ebfn? T\u1ea1i sao ph\u1ea3i \u0111i qua c\u00e1c pha nh\u01b0 x\u00e1c \u0111\u1ecbnh, th\u1eed nghi\u1ec7m, x\u00e9t duy\u1ec7t v\u00e0 th\u1ec3 l\u1ec7 ho\u00e1.<\/p>\n<p>\u0110\u00e1p: Th\u1ef1c hi\u1ec7n gia t\u0103ng \u0111\u01b0\u1ee3c d\u1ef1a tr\u00ean c\u00e1c b\u00e0i h\u1ecdc r\u00fat ra t\u1eeb kinh nghi\u1ec7m qu\u00e1 kh\u1ee9. T\u00f4i tin c\u1ea3i ti\u1ebfn l\u00e0 qu\u00e1 tr\u00ecnh h\u1ecdc t\u1eadp v\u00e0 t\u1ed5 ch\u1ee9c kh\u00f4ng th\u1ec3 h\u1ecdc m\u1ecdi th\u1ee9 m\u1ed9t l\u00fac \u0111\u01b0\u1ee3c. C\u00f3 \u0111\u01b0\u1eddng cong h\u1ecdc t\u1eadp cho m\u1ecdi nhi\u1ec7m v\u1ee5 m\u1edbi v\u00e0 vi\u1ec7c th\u1ec3 l\u1ec7 ho\u00e1 m\u1ea5t th\u1eddi gian. Sau khi th\u1ea9m \u0111\u1ecbnh, t\u1ed5 ch\u1ee9c s\u1ebd l\u1eadp k\u1ebf ho\u1ea1ch h\u00e0nh \u0111\u1ed9ng v\u00e0 b\u1ea3n k\u1ebf ho\u1ea1ch h\u00e0nh \u0111\u1ed9ng ph\u1ea3i bao g\u1ed3m nhi\u1ec1u nhi\u1ec7m v\u1ee5 nh\u1ecf c\u1ea7n \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n trong khu\u00f4n kh\u1ed5 th\u1eddi gian hay pha ba th\u00e1ng (x\u00e1c \u0111\u1ecbnh, th\u1eed nghi\u1ec7m, x\u00e9t duy\u1ec7t v\u00e0 th\u1ec3 l\u1ec7 ho\u00e1). T\u1ed5 ch\u1ee9c c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n m\u1ed9t t\u1eadp hai hay ba nhi\u1ec7m v\u1ee5 \u0111\u1ed3ng th\u1eddi \u0111\u1ec3 gi\u1ea3m nh\u1eb9 r\u1ee7i ro v\u00e0 \u0111\u1ea3m b\u1ea3o th\u1eddi gian h\u1ecdc cho t\u1ed5 ch\u1ee9c.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Question: Is it possible to skip CMMI level 2 and go to CMMI Level 3? Why and Why not?<\/p>\n<p>Answer: No, the CMMI framework is based on a maturity concept that each level is built on the foundation of previous level therefore you can NOT skip level.\u00a0 The basic idea of CMMI level 2 is that every project is following a process (Each project may follow different process) but at CMMI level 3 all of these different processes are shared, reviewed and then organized into a well defined and consolidated well defined \u201cStandard process\u201d that all projects will follow.<\/p>\n<p>Typically CMMI Level 1 is a chaotic environment with developers working long hours to build software to meet the schedule, they do not have time to test their own code so the software have many defects. Nobody knows what works, what do not work and if somehow the project complete on time is it mostly luck. At CMMI Level 1, there is no process to follow and most people do not even know what a process is. They just too busy coding and testing. If management imposes a standard process on this group who are not yet in the habit of following a process then it will not work because they do not have time or the training to do something else. If someone tells them that the way they have been working is bad, and this is the new way that they should work from now on then they could be angry because they already have a lot of stress to do their works and now they have to follow some processes created by somebody. Most developers may not even look at what you have defined.<\/p>\n<p>At level 2, you can request that a number of things be done, but without requiring that they be performed in a standard manner. The projects are requested to document their own processes rather than following something documented by another. As a consequence, you may have some very diverse and imaginative processes established in different projects. The required metrics on the efficiency and effectiveness of the various processes will allow the SEPG to determine what is working best, considering the environment, the culture, the objectives, etc (the SQA group will ensure that the metrics actually correspond to the reality). This analysis of the existing processes will allow the SEPG to start consolidating and improving the processes based on data and best practices to define the standard process for Level 3.<\/p>\n<p>As a researcher at Carnegie Mellon, I have seen so many organizations try to go directly to Level 3 without moving through Level 2 &#8211; and then either losing interest or abandoning their efforts. I believe that the primary reason for this is that they simply don&#8217;t have a solid basis of understanding of what they&#8217;re good at, and why, until they achieve the stability afforded by Level 2. Without that, you cannot realistically define standard processes at Level 3 that serve the projects&#8217; needs. Anyone can write standard process for Level 3 (or any level) policies, procedures, etc. I know some consultants even sell them for money but it takes a solid understanding of how to change an organization within its unique context to change the culture and individual behavior.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: What is vulnerability in computer security? What is Denial of Service? How it Phishing works? How can we avoid it?<\/p>\n<p>Answer: Vulnerability is a weakness in the application, which can be a design flaw or an implementation defect that allows an attacker to cause harm to the software application. The term &#8220;vulnerability&#8221; is often used very loosely. However, here we need to distinguish threats, attacks, and countermeasures. When it comes to security, what you don&#8217;t know will hurt you. It&#8217;s important for you to understand what attack techniques to watch for.<\/p>\n<p>A Denial of Service attack is an attempt to make a computer resource unavailable to its users. Attackers generally target high-profile web servers.<\/p>\n<p>Denial of a particular service will come in one of two forms*:<\/p>\n<p>Complete consumption of a resource such as bandwidth, memory, CPU, file handles, or any other finite asset.<\/p>\n<p>Exploiting a weakness in the service to stop it functioning or causing the service to crash.<\/p>\n<p>Denial of service attacks are some of the most difficult attacks to protect against. People sometimes dismiss these attacks because the attacks don&#8217;t directly elevate privilege, but there are cases in which an attacker might be able to impersonate the server if a server becomes unavailable. This kinds of attack are becoming increasingly common, so you should be prepared for them.<\/p>\n<p>Defending against denial of service attacks is difficult, as there is no way to protect against these attacks perfectly. As a general rule, you should:<\/p>\n<p>Limit the resources allocated to any user to a bare minimum.<\/p>\n<p>Optimize server tuning for best performance.<\/p>\n<p>Stay up to date with security patches.<\/p>\n<p>One way hackers get into your system is \u201cPhishing\u201d. Because phishing relies on the active cooperation of users, an important defense is for each of us to be aware, alert and cautious. Phishing is a form of social engineering. Phishing uses fraudulent attempts to acquire your important and sensitive information such as usernames, passwords, credit card details and other business or personal information. A phishing attack usually is designed to look legitimate. For example, you might receive an e-mail or instant message directing you to link to and enter your data at a bogus Web site. Although the message looks &#8220;official&#8221; or trustworthy, a phishing attack is designed to gather sensitive data on these fraudulent Web sites to gain unauthorized access or steal identities. The goal of a phishing attack is to target and get your logon IDs, passwords and other personally identifiable information.<\/p>\n<p>Company and personal information placed on social networking Web sites (e.g., LinkedIn, Facebook and Twitter) can be used to craft messages that appear to be legitimate to the user and should be avoided. Here are some specific steps that you can take to guard against phishing attacks:<\/p>\n<p>Don&#8217;t respond. If you get a suspicious e-mail that requests personal, financial or other sensitive information, don&#8217;t respond.<\/p>\n<p>Don&#8217;t click on links. Links inside suspicious e-mails can take you to bogus Web sites or launch spyware. Sometimes phishing will provide a phone number to call. Don&#8217;t click or call; check with the source to make sure it is legitimate.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: How do you convince people to pay attention to their software process when the word \u201cprocess\u201d is viewed by many as paperwork and bureaucracy?<\/p>\n<p>Answer: There are people who believe that for everything there must be documented. They spend time documenting their processes without using any common sense. Since software process means different things to different people, here is an example of how a process should be used as a means to achieve CMM Level 2:<\/p>\n<p>1.\u00a0\u00a0\u00a0 Requirements are documented and used as a baseline for all the work.<\/p>\n<p>2.\u00a0\u00a0\u00a0 Changes to requirements follow a procedure for systemic control.<\/p>\n<p>3.\u00a0\u00a0\u00a0 Software life cycle phases are defined with entry and exit criteria and reviews are conducted at the end of each phase.<\/p>\n<p>4.\u00a0\u00a0\u00a0 Software project plans are documented with work breakdown structures and estimates.<\/p>\n<p>5.\u00a0\u00a0\u00a0 Progress of a project is tracked according to the project plan.<\/p>\n<p>6.\u00a0\u00a0\u00a0 Quality assurance and configuration management people are involved in the project very early.<\/p>\n<p>If requirements are not documented, customers may continue to change their minds several times and developers will have no baseline to start their work.<\/p>\n<p>If changes to requirements are not based on a systemic control process, customers or managers may commit to a wide variety of ad-hoc changes in the middle of a project. Developers will then be facing serious schedule pressure and scope creep.<\/p>\n<p>If projects do not identify life cycles with reviews at the end of each phase, people will be forced to follow the design, code, test, redesign, recode, and retest cycles ad infinitum. The software team will spend more time fixing bugs, prioritizing tasks, and doing reworks and in the end, the quality of the software will suffer.<\/p>\n<p>If the project is not planned according to a process with a work breakdown structure and estimates then the project plan is nothing but a committed schedule chart. How can you manage a project with undefined tasks and an unreasonable schedule? Developers will spend more time arguing over what they have to do at certain times than doing real work.<\/p>\n<p>If quality assurance and configuration management people are not involved early in the project, you will lose control of software integrity and the change process and everything will be chaotic and difficult to fix.<\/p>\n<p>Without a defined process, the project will spend a lot of time arguing rather than doing value added activities.<\/p>\n<p>Software developers like to be productive; they will not tolerate weak leadership that provides no support or little help in managing the project. Weak leadership leads to more arguing and fixing defects than to creating more software. Process improvement is ensuring that there are processes in place to support the project to do real value work, not to create unnecessary documentation.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: What is your definition of a successful process improvement program? Achieving CMMI level 5?<\/p>\n<p>Answer: My own definition of a successful process improvement program is that there is a quantifiable impact on organization performance. The ultimate goal of any improvement program is to improve the business goals such as cost, time, schedule etc. A maturity level does not mean anything unless it has impact on the business goals and objectives. Otherwise it is probably a waste of time and money. I do NOT like maturity level because it has been overly advertised and abused.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: I know that Microsoft did NOT use the CMMI but still very successful. Why can\u2019t we follow their approach?<\/p>\n<p>Answer: Not all software organizations are like Microsoft. We can not compare Apples and Oranges. To some software organizations, the goal is to have high quality software products to support the business whether it is building an airplane or providing a service to customer such as a Bank. Microsoft\u2018s business goal is to be the first on the market to capture market share and control the market to ensure everybody buy their software. They do not consider quality or cost as important when compare with market share. However, I believe we can learn a lot from Microsoft. Their secret lies in their motivation and compensation packages. If we focus on motivation and improving employee morale, I think we are on the right track.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: We understand that a CMMI appraisal is very costlier and time consuming so we only want to conduct a self-assessment by fill out the maturity questionnaire. Is it OK?<\/p>\n<p>Answer: Why would you want to conduct a self-assessment like that? Perhaps to find out where you are on the CMMI maturity scale? OK so you are a CMMI level 1 then what? I strongly urge the organization not to conduct any assessment unless the entire organization is fully committed to improve the process. There are many things needed to be done before conduct assessment.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: Why do we need to follow the CMMI framework in the order they prescribe? What are the benefits of striving for Level 3 as opposed to stepping through Level 2 as a prerequisite?<\/p>\n<p>Answer: Suppose a CMMI Level 1 organization is under extreme schedule pressure to deliver software. Without fixing this schedule pressure by managing the project and requirements changes (Level 2 activities), the organization is \u201cdoomed\u201d to go to level 3. However, most Level 1 assessments do recommend some Level 3 activities such as the establishment of a SEPG if one doesn&#8217;t already exist, and it&#8217;s fairly common to recommend conducting more reviews. As a SEPG member, you must be sensitive to the resistance to change, and perhaps a degree of cynicism in response to your message, &#8220;SEPG is here to help you to improve&#8221;. You need to understand all aspects of the change process so you can overcome many roadblocks and frequently that means dealing with project-specific concerns first and organizational standardization later.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: What is eXtreme Programming (EP). Should we or shouldn\u2019t we adopt EP and how does it fit in CMM activities?<\/p>\n<p>Answer: eXtreme Programming (EP) is a software development method that has been described by Kent Beck with related materials generated by Martin Fowler and Ron Jeffries. At first glance, one may think that it is a method designed with a focus on programming, not software engineering. However, as an EP programmer myself, I believe it covers many excellent software engineering ideas like pair programming, incremental development, on-site customer, continuous integration, and continuous testing. The goals behind eXtreme Programming are cycle time and risk management. And it&#8217;s not really new; it just takes well-known concepts and pushes them to the limits.<\/p>\n<p>In my opinion, it works well for a small team (2 to 6 people) doing stand-alone software products with limited integration or data exchange. Just like blindly doing any sport can be very dangerous, doing eXtreme Programming, without clearly understanding its limitations on the usage of the method, can lead an EP Project into an ad hoc chaotic environment.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: I have seen your blogs on CMMI and believe it is good but we do not have time to do all activities for my very large project. If I can do only one activity to improve, what would it be?<\/p>\n<p>Answer: Statistics show that large software programs fail at an alarming rate. The failure rate for large programs (around 1 million lines of code or more) is as high as 65%, according to studies performed by Dr. Capers Jones. Many programs waste money, resources, and time and not deliver what they promise. Further studies found the root cause of all the bad things is that the program manager and the customer fail to adequately define and establish the scope and requirements of the program. If you can only do one thing, I suggest focusing on capturing requirements and controlling the scope of the program.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: Why do we need to improve the process when our business is to develop a product to be sold on the market?<\/p>\n<p>Answer: The term \u201cProcess improvement\u201d is used to characterize the efforts of an organization to closely examine and improved its process. It is based on the assumption that an improved process will result in an improved product. The ultimate goal is really to improve the product itself. If an improved process has no positive impact on the product generated, then there is no justification for making the change.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: I would like to develop a tool for automate process improvement to help organization achieving higher level of maturity. Is there tool like that in the market yet?<\/p>\n<p>Answer: I do not know such a tool exist today but before you start to create a tool, you may want to consider this: Process must exist before process automation can take place and process improvement is the improvement of an existing process. How do you develop a tool to improve a process that may not exist yet?\u00a0 Tool is the implementation of a process and it must flows from an existing process not a concept of a process.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: We are interested in starting a process improvement program in our organization. How do we start?<\/p>\n<p>Answer: Software process improvement is a long journey that requires commitments. There are issues that you will encounter such as management support, resources, knowledge and skills. Your organization must be able to resolve these before starting the process improvement journey: You need to ask yourself the following questions:<\/p>\n<p>1.\u00a0\u00a0\u00a0 What are our goals?<\/p>\n<p>2.\u00a0\u00a0\u00a0 Why do we need to improve the process?<\/p>\n<p>3.\u00a0\u00a0\u00a0 What kind of infrastructure do we need to have in place?<\/p>\n<p>4.\u00a0\u00a0\u00a0 Who needs to be involved?<\/p>\n<p>5.\u00a0\u00a0\u00a0 How do we obtain management sponsorship?<\/p>\n<p>6.\u00a0\u00a0\u00a0 How do we set priorities?<\/p>\n<p>7.\u00a0\u00a0\u00a0 Where can we turn for help?<\/p>\n<p>Failure to address these questions properly will result in ad-hoc chaotic improvement journey that leads to nowhere.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: Does Requirements Management only apply to new development project? Can we apply it to maintenance project too?<\/p>\n<p>Answer: Requirements Management can be applied both to development and maintenance projects. In a typical maintenance project, there are Change Requests, Problem Reports &#8230;etc. which can be considered requirements since they define the scope of specific efforts that you will have to work on them. What the CMMI requires is all requirements must be documented, controlled and agreed by all affected groups. All plans, changes, and activities must be kept consistent with and traceable to these requirements.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: What is the different between opportunistic reuse and systemic reuse?<\/p>\n<p>Answer: Opportunistic reuse involves mostly code, which may available in a repository where people can retrieve and use. People may modify it as they see fit. This ad-hoc reuse is not very beneficial due to improper implementation and modification. There is no cost saving in this approach since developer still have to search for what they want, modify it, and test the final product.<\/p>\n<p>Systemic reuse is the developing software product from a set of reusable assets, so that similarity in requirements and architecture between applications can be exploited to achieve substantial benefits in productivity, performance, quality and business goals. This approach requires reuse by design not random. Reusable assets are requirements, project plans, estimates, architectures, designs, user interfaces, test plans, test cases, data, NOT just code. I believe systemic reuse, properly understood, and fully implemented, can radically improve the development capability of a software organization.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: We are told to establish a measurement baseline but our organization has been reorganized several times in the past, most data are irrelevant and inconsistent.<\/p>\n<p>Answer: Organization needs to collect historical performance data (Schedule, cost, quality) to establish a baseline for future comparison. We are looking for trends not accurate or absolute data, I believe regardless of organization changes, such a trend can be found without too much effort.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: Why do we need software process improvement when outsourcing seems to be the answer?<\/p>\n<p>Answer: I do know that quality, productivity, costs, and cycle time are the key to business success. In most software organizations these factors are often inadequate that is why we need software process improvement. It is very easy to jump into conclusion when certain buzzword such as \u201cOutsourcing\u201d, \u201cCommercial Off The Shelf\u201d, \u201cCase-Tools\u201d, \u201cMiracle Methodology\u201d are hot in the industry. Given historical perspective, it seems shortsighted for any organization to implement technology without certain consideration.<\/p>\n<p>I believe, spending money developing software from scratch when there are perfectly good \u201cOff-the-Shelf\u201d product is not a good use of money. I also believe that selecting a pre-packaged COTS software from a company, and spending time modifying it to make sure it works is not a wise move, either. Before we let somebody to do the work for us (Outsourcing, subcontracting) we must have a process to select the best qualified company, manage the contracts carefully, monitor their development periodically, and create an acceptance criteria to ensure the performance of their product before integrate them into our environment.<\/p>\n<p>Until decision is made on outsourcing, there are plenty of rooms to improve in house, especially in the software process. In most organizations each project is still considered unique, and lessons learn from past project is not captured or used in an organized way. If we made mistakes, we could repeat the same mistake again and again. I believe that if we can reuse the best practices, eliminating defects and waste from current process, then produce quality product, productivity will improve, and ultimately costs and cycle time will fall.<\/p>\n<p>&nbsp;<\/p>\n<p>Question: Why can\u2019t we deploy several actions at once so we can expedite the improvement activities? Why go through phases such as define, pilot, revise, and institutionalize.<\/p>\n<p>Answer: Incremental implementation is based on lessons learned from past experiences. I believe improvement is a learning process and the organization can not learn everything at once. There is a learning curve for every new task and institutionalization takes time. After the assessment, organization will plan actions and the action plan should consist of several small tasks to be implemented in a three month time frame or phrase (Define, pilot, revise, and institutionalize). The organization can implemented a set of two or three tasks at the same time to mitigate risk and ensure learning time to the organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>H\u1ecfi: C\u00f3 th\u1ec3 nh\u1ea3y qua CMMI m\u1ee9c 2 v\u00e0 \u0111i v\u00e0o CMMI m\u1ee9c 3 kh\u00f4ng? T\u1ea1i sao c\u00f3 v\u00e0 t\u1ea1i sao kh\u00f4ng? \u0110\u00e1p: Kh\u00f4ng, khu\u00f4n &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":["post-906","post","type-post","status-publish","format-standard","hentry","category-tang-truong-nang-luc-to-chuc"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=906"}],"version-history":[{"count":2,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/906\/revisions"}],"predecessor-version":[{"id":908,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/906\/revisions\/908"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}