With the rapid development of software industry, the scale of software systems is increasing, and the complexity of software writing is also increasing. The software development progress is not easy to track, the development cost is not easy to estimate, and the development quality is not easy to supervise. This paper studies the basic idea and framework of software quality management system CMMI, and the role of CMMI and software metrics in software quality management. On the basis of previous studies, the problems of the company's quality management are analyzed and explored. Combined with CMMI and software metrics, this paper puts forward suggestions to further improve the quality of software products of the company, and puts forward implementable methods applicable to product quality management of software companies.
With the rapid development of modern information technology, big data technology has become an important technical support in the process of digital development in all walks of life, effectively promoting the efficient reform of work models in different fields. In the management work of local governments, relying on big data technology to build an optimized network security management is to give full play to the core advantages of big data technology in the management work, so that the efficiency of security management can be effectively improved under the background of data. In view of the risks of hacker attack and tampering, virus or Trojan program invasion and theft of computer network information, this paper puts forward a computer network information security management method. This paper uses big data clustering algorithm to evaluate its computer network information security and verify its simulation. The research results show that the proposed method is more suitable for the nonlinear characteristics of computer network security, and can accurately reflect the state of computer network security operation, thus providing an effective idea and guarantee for the protection work.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.