search menu icon-carat-right cmu-wordmark

SEI Blog

The Latest Research in Software Engineering, Cybersecurity, and AI Engineering

Latest Posts

Building Next-generation Autonomous Systems

Building Next-generation Autonomous Systems

• SEI Blog
James Edmondson

An autonomous system is a computational system that performs a desired task, often without human guidance. We use varying degrees of autonomy in robotic systems for manufacturing, exploration of planets and space debris, water treatment, ambient sensing, and even cleaning floors. This blog post discusses practical autonomous systems that we are actively developing at the SEI. Specifically, this post focuses on a new research effort at the SEI called Self-governing Mobile Adhocs with Sensors and...

Read More
Reflections in Software Architecture: Presentations by Jeromy Carriere & Ian Gorton

Reflections in Software Architecture: Presentations by Jeromy Carriere & Ian Gorton

• SEI Blog
Bill Pollak

It's undeniable that the field of software architecture has grown during the past 20 years. In 2010, CNN/Money magazine identified "software architect" as the most desirable job in the U.S. Since 2004, the SEI has trained people from more than 900 organizations in the principles and practices of software architecture, and more than 1,800 people have earned the SEI Software Architecture Professional certificate. It is widely recognized today that architecture serves as the blueprint for...

Read More
Looking Ahead: The SEI Technical Strategic Plan

Looking Ahead: The SEI Technical Strategic Plan

• SEI Blog
Bill Scherlis

The Department of Defense (DoD) has become deeply and fundamentally reliant on software. As a federally funded research and development center (FFRDC), the SEI is chartered to work with the DoD to meet the challenges of designing, producing, assuring, and evolving software-reliant systems in an affordable and dependable manner. This blog post--the first in a multi-part series--outlines key elements of the forthcoming SEI Strategic Research Plan that addresses these challenges through research and acquisition support...

Read More
2012: The Research Year in Review

2012: The Research Year in Review

• SEI Blog
Douglas C. Schmidt

As part of our mission to advance the practice of software engineering and cybersecurity through research and technology transition, our work focuses on ensuring the development and operation of software-reliant Department of Defense (DoD) systems with predictable and improved quality, schedule, and cost. To achieve this mission, the SEI conducts research and development (R&D) activities involving the DoD, federal agencies, industry, and academia. As we look back on 2012, this blog posting highlights our many...

Read More
Ultimate Architecture Enforcement: Prevent Code Violations at Code-Commit Time

Ultimate Architecture Enforcement: Prevent Code Violations at Code-Commit Time

• SEI Blog
Paulo Merson

Occasionally this blog will highlight different posts from the SEI blogosphere. Today's post by Paulo Merson, a senior member of the technical staff in the SEI's Research, Technology, and System Solutions Program, is from the SATURN Network blog. This post explores Merson's experience using Checkstyle and pre-commit hooks on Subversion to verify the conformance between code and architecture....

Read More
Assessing the State of the Practice of Cyber Intelligence

Assessing the State of the Practice of Cyber Intelligence

• SEI Blog
Troy Townsend

The majority of research in cyber security focuses on incident response or network defense, either trying to keep the bad guys out or facilitating the isolation and clean-up when a computer is compromised. It's hard to find a technology website that's not touting articles on fielding better firewalls, patching operating systems, updating anti-virus signatures, and a slew of other technologies to help detect or block malicious actors from getting on your network. What's missing from...

Read More
Enabling and Measuring Early Detection of Insider Threats

Enabling and Measuring Early Detection of Insider Threats

• SEI Blog
Dr. Bill Claycomb

Sabotage of IT systems by employees (the so-called "inside threat") is a serious problem facing many companies today. Not only can data or computing systems be damaged, but outward-facing systems can be compromised to such an extent that customers cannot access an organization's resources or products. Previous blog postings on the topic of insider threat have discussed mitigation patterns, controls that help identify insiders at risk of committing cyber crime, and the protection of next-generation...

Read More
Reflection on 20 Years of Software Architecture: A Presentation by Robert Schwanke

Reflection on 20 Years of Software Architecture: A Presentation by Robert Schwanke

• SEI Blog
Bill Pollak

It is widely recognized today that software architecture serves as the blueprint for both the system and the project developing it, defining the work assignments that must be performed by design and implementation teams. Architecture is the primary purveyor of system quality attributes that are hard to achieve without a unifying architecture; it's also the conceptual glue that holds every phase of projects together for their many stakeholders. Last month, we presented two posting in...

Read More