Software Solutions Conference (SSC) 2015 Presentations
• Collection
Publisher
Software Engineering Institute
Topic or Tag
Abstract
The three-day SSC 2015 technical program included tutorials, presentations, panel discussions, and keynote addresses by distinguished experts in government. The conference offered attendees the opportunity to learn about emerging technologies and technical strategies for assuring quality, timeliness, trust, and affordability in systems that rely on software.
Collection Items
Agile Acquisition and FITARA
• Presentation
By John Weiler
This presentation describes the FITARA Roadmap for Sustainable IT Reform, a decision analytics maturity model for measuring business value and risk of commercial IT.
Learn MoreBuilding Secure Software for Mission Critical Systems (2015)
• Presentation
By Mark Sherman
This presentation explores the expanding landscape of vulnerabilities that accompanies an increasing reliance on software and examines key steps to help mitigate the increased risk.
Learn MoreBusting Silos & Red Tape: DevOps in Federal Government
• Presentation
By Aaron Volkmann
In this presentation, the authors describe how they helped shift a government stakeholder's thinking through coaching and initiating DevOps in the organization's operational and development environments.
Learn MoreA Case Study: Experiences with Agile and Lean Principles
• Presentation
By Jeff Davenport
This case study tells the story of the development of a critical IT system in the U.S. Federal Government and is written so that other government entities can benefit from …
Learn MoreCommon System and Software Testing Pitfalls
• Presentation
By Donald Firesmith
This presentation discusses a taxonomy of 167 testing anti-patterns that the author analyzed and fully documented, describing each pitfall and providing recommendations for avoiding them and mitigating their harm.
Learn MoreContracting Officer’s Representative (COR) Interactive SharePoint Wiki
• Presentation
By James Smith, Andrew Boyd
This presentation shows the creation of a single point of reference consisting of a curated set of DoD and local documents, templates, and checklists to aid the COR and promote …
Learn MoreDashing All the Way: Defining the Best Dashboard for Your Program
• Presentation
By Tom Merendino, Michael S. Bandor, Robert Ferguson
This presentation shows a program dashboard representation used in some Air Force programs to aggregate the data being reported and includes methods that provide some insight into schedule risk.
Learn MoreA Defect Prioritization Method Based on the Risk Priority Number
• Presentation
By Will Hayes, Robert Ferguson, Julie B. Cohen
This presentation presents a defect-prioritization method based on a risk priority number, which will help program offices establish priorities for updating systems.
Learn MoreDesigning the Infrastructure for an Enterprise IT System
• Presentation
By William E. Novak, Patrick R. Place
This presentation discusses five issues faced by government organizations embarking on the development of enterprise-wide IT systems that integrate and modernize legacy system functions.
Learn MoreEdge Analytics: Analysis of Social Media to Support Tactical Users
• Presentation
By William Anderson, Keegan M. Williams
This presentation explores the architecture and implementation of Edge Analytics, discusses field trials, and presents findings from analyzing Twitter data related to the 2012 attack on the U.S. Diplomatic Mission …
Learn MoreElicitation of Unstated Needs
• Presentation
By Mary Beth Chrissis, Robert W. Stoddard, Michael D. Konrad
This presentation covers the KJ method and additional extensions that allow KJ to be used in a virtual environment (KJ+). The results of a KJ+ case study and two brief …
Learn MoreEngineering High-Assurance Software for Distributed Adaptive Real-Time Systems
• Presentation
By Mark H. Klein, Sagar Chaki, Dionisio de Niz
This presentation describes an evidence-based approach for producing high-assurance DART software involving multiple layers of the CPS stack.
Learn MoreExperiences in Migrations of Legacy Systems
• Presentation
By William Wood, Michael J. Gagliardi, Philip Bianco
This presentation describes a rational way for modernizing a legacy system using system architectural concepts to develop architectural options, create a scorecard, apply the scorecard, and present the results with …
Learn MoreFrom Virtual System Integration to Incremental Lifecycle Assurance
• Presentation
By Peter H. Feiler
This presentation discusses problems associated with the increasing complexity of software systems that are threatening industry's ability to build the next generation of safety-critical embedded systems.
Learn MoreGovernment As the Integrator: Why, Why Not, and How?
• Presentation
By William E. Novak, James Smith
This presentation identifies many of the factors that determine whether government as the integrator (GATI) is more likely to be successful in certain domains and circumstances.
Learn MoreImplementing Product Development Flow: The Key to Managing Large Scale Agile Development
• Presentation
By Will Hayes
In this presentation, you will learn about the sound principles and engineering-minded tradeoffs that occur when agile methods are applied successfully.
Learn MoreIntellectual Property Rights: Why You Should Care and How to Manage Them
• Presentation
By Julie B. Cohen, Eileen Wrubel
This presentation discusses strategies and language for addressing IP rights throughout the acquisition lifecycle.
Learn MoreThe Joint Fire Science Program (JFSP) and the Interagency Fuels Treatment Decision Support System (IFTDSS)
• Presentation
By Steve Palmquist, John H. Cissel (Joint Fire Science Program)
This presentation describes how the interagency Joint Fire Science Program developed and assessed the Interagency Fuel Treatment Decision Support System to meet the needs of the wildland fire community for …
Learn MoreKeynote: A Case Study of Toyota Unintended Acceleration and Software Safety
• Presentation
By Philip Koopman (Carnegie Mellon University)
This talk will outline key events in the still-ongoing Toyota unintended acceleration story and pull together the technical issues that have been discovered by NASA and other experts.
Learn MoreKeynote: Gaps in Science and Technology Activities for the IT Acquisition of Business Systems
• Presentation
By Arun Seraphin
In this presentation, Mr. Seraphin summarizes congressional concerns about gaps in science and technology activities related to the IT acquisition of business systems.
Learn MoreKeynote: SEI Research Program
• Presentation
By Kevin Fall
This presentation summarizes the SEI's research program, including topics in software development, vulnerability discovery, digital forensics, malware analysis, embedded systems, formal methods, cyber training, and risk management.
Learn MoreKeynote: Speed with Discipline
• Presentation
By Tim Rudolph
This presentation describes an approach for achieving software security assurance while keeping the desired pace of releasing new capabilities.
Learn MoreManaging Software and System Complexity
• Presentation
By Sarah Sheard
This presentation discusses the research the SEI is doing to determine what characteristics of avionics systems can be measured to help evaluate whether a system is capable of being certified …
Learn MoreMeasurement and Analysis in the Real World: Tools for Cleaning Messy Data
• Presentation
By The Software Engineering Institute
This presentation includes a brief demonstration of tools created by SEI staff that help scan, analyze, and prepare data to be used on a weekly metrics report.
Learn MoreMoving to the IC Cloud
• Presentation
By Eric Werner
This presentation explores up-and-coming cloud technologies used by members of the intelligence community along with some of the challenges and opportunities they present.
Learn MoreOpen Systems Architecture: Progress and Challenges
• Presentation
By Forrest Shull, Harry L. Levinson, Thomas DuBois (The Boeing Company), Michael S. Bandor, Douglas Schmidt (Vanderbilt University), Michael McLendon
Panel members discussed OSA from several perspectives, including technical engineering, policy, contracting, and science and technology research.
Learn MorePaying Due Diligence to Software Architecture in Acquisition
• Presentation
By Michael J. Gagliardi, Timothy Morrow
This presentation describes approaches that the SEI has used with program offices to adopt software architecture and quality attribute practices in acquisition contexts.
Learn MorePerformance Metrics That Matter: Eliminating Surprises in Agile Projects
• Presentation
By Girish Seshagiri (Advanced Information Services Inc)
This presentation focuses on how the government can experience true agility with quality. It describes the challenges the author's organization faced using agile and how they were successfully overcome.
Learn MoreProviding Information Superiority to Small Tactical Units
• Presentation
By Jeff Boleng
This presentation discusses the Information Security to the Edge (ISE) system built by the Advanced Mobile Systems Initiative at the Carnegie Mellon Software Engineering Institute.
Learn MoreScaling Agile Methods for Major Defense Programs: Frameworks and Methods in Use Today
• Presentation
By Will Hayes, Mary Ann Lapham
This presentation addresses what is meant by scaling, contextual drivers for implementation choices, and the agile frameworks available for use today.
Learn MoreSoS Architectures - Identifying Architecture, Engineering and Capability Challenges Early in the Lifecycle
• Presentation
By Michael J. Gagliardi, Timothy Morrow, William Wood
The SEI has applied its Mission Thread Workshop (MTW) approach on a variety of system of systems (SoS) architectures in DoD organizations. This talk presents the MTW in the context …
Learn MoreA Systematic Method for Big Data Technology Selection
• Presentation
By John Klein
This talk discusses why prototyping is necessary for evaluating big data technology and how the LEAP4BD method provides a systematic framework for technology evaluation.
Learn MoreTactical Cloudlets: Moving Cloud Computing to the Tactical Edge
• Presentation
By Grace Lewis, James Root, Dan J. Klinedinst, Keegan M. Williams, Ben W. Bradshaw, Sebastián Echeverría
This presentation explains the tactical cloudlet concept and describes an implementation targeted at promoting the survivability of mobile systems.
Learn MoreTechnical Debt: Why Should You Care?
• Presentation
By Ipek Ozkaya, Robert Nord
This presentation explores common fallacies about technical debt and includes possible actions that development teams can take to better manage it.
Learn MoreWhat Happens and How: Analyzing the Results of 13 Acquisition Program Assessments
• Presentation
By William E. Novak, Forrest Shull
This presentation explains a set of recurring dynamics that drive the key high-level findings of independent technical assessments and provides qualitative models of each adverse behavior.
Learn MorePart of a Collection
Software and Cyber Solutions Symposium: Past Presentations
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.