Software Solutions Symposium 2017 - Presentations
• Collection
Publisher
Software Engineering Institute
Abstract
The Software Solutions Symposium is a forum for learning about emerging technologies and practical solutions that you can apply today for help with systemic software issues such as assurance, cost, and schedule.
Click on the button to download all of the SSS presentations at once.
Collection Items
Struggles at the Frontiers: Persistent Pursuit of Software Assurance in the Development and Sustainment of Defense Systems
• Presentation
By Kenneth Nidiffer
This presentation presents new processes, techniques, and tools being used to improve software assurance in the development and sustainment of defense systems.
Learn MoreThe Relationship Between Design Flaws and Software Vulnerabilities: A Technical Debt Perspective
• Presentation
By Ipek Ozkaya, Robert Nord
This presentation explores the relationships between design flaws and software vulnerabilities, and their impact on software assurance and sustainable development and delivery.
Learn MoreA Tale of Two (Agile) Programs
• Presentation
By Suzanne Miller, Will Hayes
The SEI has worked with several government programs that are adopting Agile and Lean engineering approaches. In this presentation, we provide insights into two distinct patterns of adoption that we …
Learn More6 Things You Need to Know About Data Governance
• Presentation
By John Klein
This presentation discusses a framework to guide governance decisions.
Learn MoreUsing Malware Analysis to Identify Overlooked Security Requirements
• Presentation
By Nancy R. Mead, Jose A. Morales
This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
Learn MoreAgile Project Success and Failure (The Story of the FBI Sentinel Program)
• Presentation
By Thomas E. Friend (Agile On Target)
This presentation describes how the FBI adopted Agile and succeeded after two failed attempts at building a $300 million case management system.
Learn MoreApplied Machine Learning in Software Engineering
• Presentation
By Eliezer Kanal
This presentation describes why software engineers should care about machine learning and how they can immediately benefit from it.
Learn MoreKeynote: A Perspective on Military Software Needs
• Presentation
By Heidi Shyu (No Affiliation)
The commercial software industry is rapidly growing and creating disruptive technologies. How do we leverage the explosive growth in software capabilities for the military? What are the unique software challenges …
Learn MoreToward Successfully Navigating Large-Scale IT Modernization Efforts
• Presentation
By Felix Bachmann, Stephany Bellomo
The authors of this presentation share their experiences developing and putting in place an IT roadmap for a large government organization, resulting in the implementation of an enterprise-wide shared data …
Learn MorePanel: Software Sustainment - Continuous Engineering to Deliver Warfighter Capability
• Presentation
By Michael McLendon, Stephany Bellomo, Forrest Shull, John Stankowski (Office of the DASD for Maintenance Policy and Programs)
This technical panel focused on the DoD's software sustainment challenges and highlighted the key findings of the SEI's study of DoD software sustainment infrastructure.
Learn MoreNationwide IT: A Software Process Improvement Journey
• Presentation
By Guru Vasudeva (Nationwide IT)
By deploying and scaling a blend of Agile and Lean concepts, a unique team model, and fostering a problem solving and learning culture, Nationwide IT has produced significant business outcomes …
Learn MoreAgile in Government: A Research Agenda for Agile Software Development
• Presentation
By Will Hayes, Suzanne Miller, Eileen Wrubel
The SEI team working with Agile in government has built a rich narrative of Agile implementation experiences and now works with an extensive network of collaborators on fundamental research questions …
Learn MoreTesting in a Non-Deterministic World
• Conference Paper
By Donald Firesmith
This presentation discusses sources of non-determinism, testing ramifications of non-determinism, and recommendations for testing in a non-deterministic world.
ReadMethodology for Comparing Cloud Service Offerings
• Presentation
By Jeff Davenport, Sarah Sheard
This presentation describes a methodology for normalizing the offerings into common units of measure that are relevant to the procurer of the services.
Learn MoreMethodology for the Cost Benefit Analysis of a Large Scale Multi-phasic Software Enterprise Migration
• Presentation
By Jerry Jackson, Bryce L. Meyer, James Wessel
This presentation describes the methodology used by the SEI to conduct a cost-benefit analysis of the proposed migration of all Army software-based systems to a common operating environment (COE) and …
Learn MoreTemporal Partitioning and Verification in Distributed Cyber-Physical Systems
• Presentation
By Dionisio de Niz, Bjorn Andersson
This presentation describes innovations in the temporal protection of components that perform computations throughout multiple processors and have end-to-end timing requirements.
Learn MoreSo Much Money for So Little Capability: The Reality of Sustaining DoD Software Systems
• Presentation
By David Schneider, Alfred Schenker, Grady Campbell
This presentation identifies and explains some of the most significant factors that affect long-term software sustainment.
Learn MoreMeasuring Complexity for System Safety Assurance
• Presentation
By Sarah Sheard, Michael D. Konrad, Bill Nichols, Charles Weinstock
This presentation describes a two-year research effort to define complexity measures for avionics systems in order to help the FAA identify when systems are too complex to assure their safety.
Learn MoreSecurity Measurement: Establishing Confidence that Security Is Sufficient
• Presentation
By Carol Woody, Christopher J. Alberts
The SEI is researching how measurement can be used to establish confidence in software security. This presentation shares our progress to date.
Learn MoreImprovements in Safety Analysis for Safety Critical Software Systems
• Presentation
By Peter H. Feiler
Recent advances in virtual system integration through architecture modeling and analysis have led to improvements in safety analysis in several ways, which will be described in this presentation.
Learn MoreWhy Does Software Cost So Much? Toward a Causal Model (March 2017)
• Presentation
By Robert W. Stoddard, Michael D. Konrad, Bill Nichols, David Danks (Carnegie Mellon University), Kuh Zhang (Carnegie Mellon University)
This presentation shares early research results that may confirm some well-known drivers of DoD software cost and debunk others.
Learn MoreRisks in the Software Supply Chain
• Presentation
By Mark Sherman
This presentation describes the parts of the software supply chain, how vulnerabilities have been introduced, and the actions developers can employ to avoid or mitigate the risks inherent in an …
Learn MoreKeynote: Learning to Drive a C.A.R. at the U.S. Census Bureau
• Presentation
By Harry Lee
Keynote address by Harry A. Lee, Assistant Director for Information Technology and Deputy CIO.
Learn MoreReplacing Promises with Data: A Structured Way to Assess Software Health
• Presentation
By Karen LaFond (U.S. Army), Alfred Schenker, Robert W. Stoddard
Acquisition programs need a structured approach to evaluating the health of contractors' software projects. This presentation describes the Army Ground Combat Systems program's efforts in this area.
Learn MoreHow to Minimize Configuration Switching Time and Cost for Design of Experiments
• Presentation
By Robert V. Binder
This presentation shows how classical integer programming can be used to determine the least cost (that is, the quickest) order for test configurations.
Learn MorePanel: Secure Software Workforce Development Panel Session
• Presentation
By Girish Seshagiri (Advanced Information Services Inc), Nancy R. Mead, William Newhouse (NIST), James W. Over
This panel discussed programs designed to meet the growing need for software assurance professionals.
Learn MoreBuilding Secure Software for Mission Critical Systems
• Presentation
By Mark Sherman
This presentation explores the expanding landscape of vulnerabilities that accompanies the increasing reliance on software and then examines some key steps to help mitigate the increased risk.
Learn MoreSecure Tactical Cloudlets for Mission Support at the Edge
• Presentation
By Grace Lewis, Sebastián Echeverría, Dan J. Klinedinst, Keegan M. Williams
This presentation introduces the architecture and features of tactical cloudlets and presents a solution for establishing trusted identities in disconnected environments based on the generation and exchange of secure keys …
Learn More