Acquisition
Blog Posts
Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Cross-Program Dependencies
Shared capabilities can help manage costs and complexities but can also result in cross-program dependencies. This post examines this phenomenon in a DevSecOps context.
Read More• By William E. Novak
In DevSecOps
Applying Large Language Models to DoD Software Acquisition: An Initial Experiment
This SEI Blog post illustrates examples of using LLMs for software acquisition in the context of a document summarization experiment and codifies the lessons learned from this experiment and related …
Read More• By Douglas Schmidt (Vanderbilt University) , John E. Robert
In Artificial Intelligence Engineering
10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition
This post presents 10 benefits and 10 challenges of applying LLMs to the software acquisition process and suggests specific use cases where generative AI can provide value.
Read More• By John E. Robert , Douglas Schmidt (Vanderbilt University)
In Software Engineering Research and Development
The Latest Work from the SEI
This SEI Blog post summarizes some recent publications from the SEI in the areas of supply chain risk management, technical debt, large language models, quantum computing, acquisition, and trustworthiness in …
Read More• By Douglas Schmidt (Vanderbilt University)
In Software Engineering Research and Development
Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways
This SEI blog post draws on SEI experiences conducting independent technical assessments to examine problems common to disparate acquisition programs. It also provides recommendations for recovering from these problems and …
Read More• By William E. Novak
In DevSecOps
The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain
This post presents a framework to promote the use of SBOMs and establish practices and processes that organizations can leverage as they build their programs.
Read More• By Christopher J. Alberts , Michael S. Bandor , Charles M. Wallen , Carol Woody
In Secure Development
The Seven Virtues of Reconciling Agile and Earned Value Management (EVM)
This post discusses the interactions between Agile software development and earned value management (EVM).
Read More• By Stephen Wilson , Patrick R. Place , Keith Korzec
In Agile
What’s Going On in My Program? 12 Rules for Conducting Assessments
This post provides 12 rules for successful program or project assessments.
Read More• By William E. Novak
A Case Study in Applying Digital Engineering
Case study of an SEI project in which digital engineering is being used successfully to provide visibility of products under development from inception in a requirement to delivery on a …
Read More• By Nataliya Shevchenko , Peter Capell
Six Acquisition Pathways for Large-Scale, Complex Systems
How to map technical reference frameworks (TRFs) to the pathways that compose the DoD’s Adaptive Acquisition Framework (AAF)
Read More