search menu icon-carat-right cmu-wordmark

Posts by SPRUCE Project

7 Recommended Practices for Managing Intellectual Property in the Acquisition of Software-Intensive Systems

7 Recommended Practices for Managing Intellectual Property in the Acquisition of Software-Intensive Systems

• Blog
SPRUCE Project

This is the third installment in a series of three blog posts highlighting seven recommended practices for acquiring intellectual property. This content was originally published on the Cyber Security & Information Analysis Center's website online environment known as SPRUCE (Systems and Software Producibility Collaboration Environment. The first post in the series explored the challenges to acquiring intellectual property. The second post in the series presented the first four of seven practices for acquiring intellectual property....

Read More
7 Recommended Practices for Managing Intellectual Property in the Acquisition of Software-Intensive Systems

7 Recommended Practices for Managing Intellectual Property in the Acquisition of Software-Intensive Systems

• Blog
SPRUCE Project

This is the second installment in a series of three blog posts highlighting seven recommended practices for acquiring intellectual property. This content was originally published on the Cyber Security & Information Analysis Center's website online environment known as SPRUCE (Systems and Software Producibility Collaboration Environment. The first post in the series explored the challenges to acquiring intellectual property. This post, which can be read in its entirety on the SPRUCE website, will present the first...

Read More
The SPRUCE Series: The Challenges to Acquiring Intellectual Property

The SPRUCE Series: The Challenges to Acquiring Intellectual Property

• Blog
SPRUCE Project

Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how to apply Agile methods in government acquisition frameworks, systematic verification and validation of safety-critical systems, and operational risk management. In the Department of Defense (DoD), these techniques are just a few of the options available to face the myriad challenges in producing large, secure software-reliant systems on schedule and within budget....

Read More
Final Installment: 7 Recommended Practices for Monitoring Software-Intensive System Acquisition (SISA) Programs

Final Installment: 7 Recommended Practices for Monitoring Software-Intensive System Acquisition (SISA) Programs

• Blog
SPRUCE Project

This is the third installment in a series of three blog posts highlighting seven recommended practices for monitoring software-intensive system acquisition (SISA) programs. This content was originally published on the Cyber Security & Information Analysis Center's website online environment known as SPRUCE (Systems and Software Producibility Collaboration Environment). The first two posts in the series explored the challenges to monitoring SISA programs and presented the first five recommended best practices: Address in contracts Set up...

Read More
Second Installment: 7 Recommended Practices for Monitoring Software-Intensive System Acquisition (SISA) Programs

Second Installment: 7 Recommended Practices for Monitoring Software-Intensive System Acquisition (SISA) Programs

• Blog
SPRUCE Project

This is the second installment in a series of three blog posts highlighting seven recommended practices for monitoring software-intensive system acquisition (SISA) programs. This content was originally published on the Cyber Security & Information Analysis Center's website online environment known as SPRUCE (Systems and Software Producibility Collaboration Environment. The first post in the series explored the challenges to monitoring SISA programs and presented the first two recommended best practices: Address in contracts Set up a...

Read More
7 Recommended Practices for Monitoring Software-Intensive System Acquisition (SISA) Programs

7 Recommended Practices for Monitoring Software-Intensive System Acquisition (SISA) Programs

• Blog
SPRUCE Project

This is the first post in a three-part series. Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how to apply agile methods in government acquisition frameworks, systematic verification and validation of safety-critical systems, and operational risk management. In the Department of Defense (DoD), these techniques are just a few of the options available to face the myriad challenges in producing large, secure...

Read More
10 Recommended Practices for Achieving Agile at Scale

10 Recommended Practices for Achieving Agile at Scale

• Blog
SPRUCE Project

This is the second installment of two blog posts highlighting recommended practices for achieving Agile at Scale that was originally published on the Cyber Security & Information Systems Information Analysis Center (CSIAC) website. The first post in the series by Ipek Ozkaya and Robert Nord explored challenges to achieving Agile at Scale and presented the first five recommended practices: 1. Team coordination2. Architectural runway3. Align development and decomposition.4. Quality-attribute scenarios5. Test-driven developmentThis post presents the...

Read More
10 Recommended Practices for Achieving Agile at Scale

10 Recommended Practices for Achieving Agile at Scale

• Blog
SPRUCE Project

This post is the first in a two-part series highlighting 10 recommended practices for achieving agile at scale. Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how to apply agile methods in government acquisition frameworks, systematic verification and validation of safety-critical systems, and operational risk management. In the Department of Defense (DoD), these techniques are just a few of the options available...

Read More
The SPRUCE Series: 8 Recommended Practices in the Software-Development of Safety-Critical Systems

The SPRUCE Series: 8 Recommended Practices in the Software-Development of Safety-Critical Systems

• Blog
SPRUCE Project

This is the second installment of two blog posts highlighting recommended practices for developing safety-critical systems that was originally published on the Cyber Security & Information Systems Information Analysis Center (CSIAC) website. The first post in the series by Peter Feiler, Julien Delange, and Charles Weinstock explored challenges to developing safety critical systems and presented the first three practices: Use quality attribute scenarios and mission-tread analyses to identify safety-critical requirements. Specify safety-critical requirements, and prioritize...

Read More
The SPRUCE Series: Recommended Practices in the Software Development of Safety-Critical Systems

The SPRUCE Series: Recommended Practices in the Software Development of Safety-Critical Systems

• Blog
SPRUCE Project

Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how to apply agile methods in government acquisition frameworks, systematic verification and validation of safety-critical systems, and operational risk management. In the Department of Defense (DoD), these techniques are just a few of the options available to face the myriad challenges in producing large, secure software-reliant systems on schedule and within budget....

Read More
The SPRUCE Series: 9 Recommended Practices for Managing Operational Resilience

The SPRUCE Series: 9 Recommended Practices for Managing Operational Resilience

• Blog
SPRUCE Project

Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how to apply agile methods in government acquisition frameworks, systematic verification and validation of safety-critical systems, and operational risk management. In the Department of Defense (DoD), these techniques are just a few of the options available to face the myriad challenges in producing large, secure software-reliant systems on schedule and within budget....

Read More
The SPRUCE Series: Challenges to Managing Operational Resilience

The SPRUCE Series: Challenges to Managing Operational Resilience

• Blog
SPRUCE Project

Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how to apply agile methods in government acquisition frameworks, systematic verification and validation of safety-critical systems, and operational risk management. In the Department of Defense (DoD), these techniques are just a few of the options available to face the myriad challenges in producing large, secure software-reliant systems on schedule and within budget....

Read More

Contact the Author

SPRUCE Project