Acquisition
Blog Posts
The Myth of Machine Learning Reproducibility and Randomness for Acquisitions and Testing, Evaluation, Verification, and Validation
A reproducibility challenge faces machine learning (ML) systems today. This post explores configurations that increase reproducibility and provides recommendations for these challenges.
Read More•By Andrew O. Mellinger, Daniel Justice, Marissa Connor, Shannon Gallagher, Tyler Brooks
In Artificial Intelligence Engineering
The Top 10 Blog Posts of 2024
This post presents the top 10 most-visited posts of 2024, highlighting our work in software acquisition, artificial intelligence, large language models, secure coding, and more.
Read More•By Bill Scherlis
In Software Engineering Research and Development
Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Cross-Program Dependencies
Shared capabilities can help manage costs and complexities but can also result in cross-program dependencies. This post examines this phenomenon in a DevSecOps context.
Read More•By William E. Novak
In DevSecOps
Applying Large Language Models to DoD Software Acquisition: An Initial Experiment
This SEI Blog post illustrates examples of using LLMs for software acquisition in the context of a document summarization experiment and codifies the lessons learned from this experiment and related …
Read More•By Douglas Schmidt (Vanderbilt University), John E. Robert
In Artificial Intelligence Engineering
10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition
This post presents 10 benefits and 10 challenges of applying LLMs to the software acquisition process and suggests specific use cases where generative AI can provide value.
Read More•By John E. Robert, Douglas Schmidt (Vanderbilt University)
In Software Engineering Research and Development
The Latest Work from the SEI
This SEI Blog post summarizes some recent publications from the SEI in the areas of supply chain risk management, technical debt, large language models, quantum computing, acquisition, and trustworthiness in …
Read More•By Douglas Schmidt (Vanderbilt University)
In Software Engineering Research and Development
Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways
This SEI blog post draws on SEI experiences conducting independent technical assessments to examine problems common to disparate acquisition programs. It also provides recommendations for recovering from these problems and …
Read More•By William E. Novak
In DevSecOps
The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain
This post presents a framework to promote the use of SBOMs and establish practices and processes that organizations can leverage as they build their programs.
Read More•By Christopher J. Alberts, Michael S. Bandor, Charles M. Wallen, Carol Woody
In Secure Development
The Seven Virtues of Reconciling Agile and Earned Value Management (EVM)
This post discusses the interactions between Agile software development and earned value management (EVM).
Read More•By Stephen Wilson, Patrick R. Place, Keith Korzec
In Agile
What’s Going On in My Program? 12 Rules for Conducting Assessments
This post provides 12 rules for successful program or project assessments.
Read More