Archive: 2022
Containerization at the Edge
Containerization is a technology that addresses many of the challenges of operating software systems at the edge.
• By Kevin A. Pitstick, Jacob Ratzlaff
In Edge Computing
Creating a Proposal for Virtual Prototyping in 7 Steps
Engineers and scientists often do not know how to create a compelling proposal for a virtual prototyping program—especially the key software component—and obtain funding and support.
• By Douglass Post (DoD High Performance Computing Modernization Program)
In Software Engineering Research and Development
Internet-of-Things (IoT) Security at the Edge
Assuring the security of any hardware device is a hard problem. In particular, Internet-of-Things (IoT) devices have increasingly been the target of malicious attacks.
• By Sebastián Echeverría, Grace Lewis
In Edge Computing
Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations
Use of machine-learning (ML) modeling and a suite of software tools to create decision-making preferences that make non-player characters (NPCs) more realistic in simulations.
• By Dustin D. Updyke, Thomas G. Podnar, Geoffrey B. Dobson, John Yarger
In Cyber Workforce Development
A Case Study in Applying Digital Engineering
Case study of an SEI project in which digital engineering is being used successfully to provide visibility of products under development from inception in a requirement to delivery on a …
• By Nataliya Shevchenko, Peter Capell
Improving Automated Retraining of Machine-Learning Models
This post describes how to improve representative MLOps pipelines by automating exploratory data-analysis tasks.
• By Rachel Brower-Sinning
In Artificial Intelligence Engineering
Six Dimensions of Trust in Autonomous Systems
This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.
• By Paul Nielsen
In Software Engineering Research and Development
Security Analytics: Tracking Proxy Bypass
This post describes how to track the amount of network traffic that is evading security proxies for services that such proxies are expected to cover.
• By Timothy J. Shimeall
In Cybersecurity Engineering
A Method for Assessing Cloud Adoption Risks
The move to a cloud environment provides significant benefits. Realizing these benefits, however, requires organizations to manage associated organizational and technical risks effectively.
• By Christopher J. Alberts
In Cloud Computing
Cybersecurity Capacity Building with Human Capital in Sub-Saharan Africa
This post explores the creation of skilled cybersecurity human capital to solve real-life threats unique to the African continent.
• By Angel Luis Hueca
SEI Blog Archive
Recent
Year