| Sampling Factors: |
Location (Not Relevant: Only one location exists for the R&D Management Center so there is no impact on where the projects are developed. All processes are applied at this location. [Not Relevant])
Customer (Not Relevant: The type of customer does not impact the way work is performed for any type of customer. All processes are implemented accordingly in a similar fashion for any customer. [Not Relevant.])
Size (Not Relevant: All processes are implemented at organizational unit level. All processes remain applicable regardless of size as such aggregate size (FTE/PTE) of each project is around 18 staff members. These processes do not differentiate project because of their size. [Not Relevant.])
Organizational Structure (Not Relevant: R&D Management Center is where all the projects are developed. Standardized processes are used accordingly so org structure does not impact the way work is performed. [Not Relevant])
Type of Work: Two types of work. (a) CBSC [Cloud Based Security Controls] where cloud-based applications are developed to implement security controls for network elements. The emphasis is on the configuration, interfaces, security requirements, etc. (b) IDPA [Intrusion Detection and Prevention Analytics] is to analyze data in near real-time to take action. It emphasizes on the measurement, analytical tools, data security, testing, etc. [Relevant] |
| Sampling Factor Values: |
Cloud Based Security Controls (Type of Work): CBSC [Cloud Based Security Controls] where cloud-based applications are developed to implement security controls for network elements. The emphasis is on the configuration, interfaces, security requirements, etc.
Intrusion Detection and Prevention Analytics (Type of Work): IDPA [Intrusion Detection and Prevention Analytics] is to analyze data in near real-time to take action. It emphasizes on the measurement, analytical tools, data security, testing, etc. |
| Subgroups: |
IDPA: IDPA [Intrusion Detection and Prevention Analytics] is to analyze data in near real-time to take action. It emphasizes on the measurement, analytical tools, data security, testing, etc.
18 People, 1 Basic Units
– Intrusion Detection and Prevention Analytics
CBSC: CBSC [Cloud Based Security Controls] where cloud-based applications are developed to implement security controls for network elements. The emphasis is on the configuration, interfaces, security requirements, etc.
17 People, 1 Basic Units
– Cloud Based Security Controls |