search menu icon-carat-right cmu-wordmark

SEI Blog

The Latest Research in Software Engineering and Cybersecurity

Latest Posts

The Growing Importance of Sustaining Software for the DoD: Part 1

The Growing Importance of Sustaining Software for the DoD: Part 1

• SEI Blog
Douglas C. Schmidt

Department of Defense (DoD) programs have traditionally focused on the software acquisition phase (initial procurement, development, production, and deployment) and largely discounted the software sustainment phase (operations and support) until late in the lifecycle. The costs of software sustainment are becoming too high to discount since they account for 60 to 90 percent of the total software lifecycle effort....

Read More
Lean Principles and Software Architecture: The Waste of Information Transformation

Lean Principles and Software Architecture: The Waste of Information Transformation

• SEI Blog
Nanette Brown

Occasionally this blog will highlight different posts from the SEI blogosphere. Today's post is from the SATURN Network blog by Nanette Brown, a senior member of the technical staff in the SEI's Research, Technology, and System Solutions program. This post, the third in a series on lean principles and architecture, continues the discussion on the eight types of waste identified in Lean manufacturing and how these types of waste manifst themselves in software development. The...

Read More
Improving Data Quality Through Anomaly Detection

Improving Data Quality Through Anomaly Detection

• SEI Blog
Mark Kasunic

Organizations run on data. They use it to manage programs, select products to fund or develop, make decisions, and guide improvement. Data comes in many forms, both structured (tables of numbers and text) and unstructured (emails, images, sound, etc.). Data are generally considered high quality if they are fit for their intended uses in operations, decision making, and planning. This definition implies that data quality is both a subjective perception of individuals involved with the...

Read More
Obstacles in Engineering Safety- and Security-Related Requirements, Second in a Three-Part Series

Obstacles in Engineering Safety- and Security-Related Requirements, Second in a Three-Part Series

• SEI Blog
Donald Firesmith

Background: In our research and acquisition work on commercial and Department of Defense (DoD) programs, ranging from relatively simple two-tier data-processing applications to large-scale multi-tier weapons systems, one of the primary problems that we see repeatedly is that acquisitionand development organizations encounter the following three obstacles concerning safety- and security-related requirements:...

Read More
The Evolution of Science Projects, Third in a Four-Part Series Exploring Themes Across Acquisition Programs

The Evolution of Science Projects, Third in a Four-Part Series Exploring Themes Across Acquisition Programs

• SEI Blog
Bill Novak

Background: Over the past decade, the U.S. Air Force has asked the SEI's Acquisition Support Program (ASP) to conduct a number of Independent Technical Assessments (ITAs) on acquisition programs related to the development of IT systems, communications, command and control, avionics, and electronic warfare systems. This blog post is the third in a series that enumerates common themes across acquisition programs that we identified as a result of our ITA work. Other themes explored in...

Read More
Insider Threat: The Latest Research from the SEI

Insider Threat: The Latest Research from the SEI

• SEI Blog
Douglas C. Schmidt

Happy Independence Day from all of us here at the SEI. I'd like to take advantage of this special occasion to keep you apprised of a new technical report from the SEI. It's part of an ongoing effort to keep you informed about the latest work of SEI technologists. This report highlights the latest work of SEI technologists in the fields of insider threat. This post includes a listing of the report, authors, and links...

Read More
The Importance of Safety- and Security-related Requirements, First of a Three-Part Series

The Importance of Safety- and Security-related Requirements, First of a Three-Part Series

• SEI Blog
Donald Firesmith

In our research and acquisition work on commercial and Department of Defense (DoD) programs ranging from relatively simple two-tier data-processing applications to large-scale multi-tier weapons systems , one of the primary problems that we see repeatedly is that requirements engineers tend to focus almost exclusively on functional requirements and largely ignore the so-called nonfunctional requirements, such as data, interface, and quality requirements, as well as technical constraints. Unfortunately, this myopia means that requirements engineers overlook...

Read More
Cloud Computing for the Battlefield

Cloud Computing for the Battlefield

• SEI Blog
Grace Lewis

The Department of Defense (DoD) is increasingly interested in having soldiers carry handheld mobile computing devicesto support their mission needs. Soldiers can use handheld devices to help with various tasks, such as speech and image recognition, natural language processing, decision-making and mission planning. Three challenges, however, present obstacles to achieving these capabilities. The first challenge is that mobile devices offer less computational power than a conventional desktop or server computer. A second challenge is that...

Read More