Feb 11
2013
By Douglas C. Schmidt
Principal Researcher
As
part of an ongoing effort to keep you informed about our latest work,
I’d like to let you know about some recently published SEI technical
reports and notes. These reports highlight the latest work of SEI
technologists in and systems engineering, resilience, and insider threat.
This post includes a listing of each report, author(s), and links where
the published reports can be accessed on the SEI website.
Read more...
Feb 4
2013
By Bill Scherlis
SEI Principal Researcher and Director, Institute for Software Research
The Department of Defense (DoD) has become deeply reliant on software. As a federally funded research and development center (FFRDC),
the SEI is chartered to work with the DoD to meet the challenges of
designing, producing, assuring, and evolving software-reliant systems in
an affordable and dependable manner. This blog post is the second in a
multi-part series that describes key elements of our forthcoming
Strategic Research Plan that address these challenges through research,
acquisition support, and collaboration with the DoD, other federal
agencies, industry, and academia. The first post
in this series focused on Architecture-Led Incremental Iterative
Development. This part focuses on the remaining three elements of our
strategic plan: (1) designed-in security and quality (evidence-based
software assurance), (2) a set of DoD critical component capabilities
relating to cyber-physical systems (CPS), autonomous systems, and big
data analytics, and (3) cybersecurity tradecraft and analytics.
Read more...
Jan 24
2013
By James Edmondson,
Senior Member of the Technical Staff
Research, Technology, & System Solutions
An
autonomous system is a computational system that performs a desired
task, often without human guidance. We use varying degrees of autonomy
in robotic systems for manufacturing, exploration of planets and space
debris, water treatment, ambient sensing, and even cleaning floors. This
blog post discusses practical autonomous systems that we are actively
developing at the SEI. Specifically, this post focuses on a new research
effort at the SEI called Self-governing Mobile Adhocs with Sensors and
Handhelds (SMASH) that is forging collaborations with researchers,
professors, and students with the goal of enabling more effective
search-and-rescue crews.
Read more...
Jan 21
2013
By Bill Pollak
Transition Manager
Research Technology & System Solutions
It’s undeniable that the field of software architecture has grown during the past 20 years. In 2010, CNN/Money magazine identified "software architect" as the most desirable job in the U.S.
Since 2004, the SEI has trained people from more than 900 organizations
in the principles and practices of software architecture, and more than
1,800 people have earned the SEI Software Architecture Professional certificate.
It is widely recognized today that architecture serves as the blueprint
for both the system and the project developing it, defining the work
assignments that must be performed by design and implementation teams.
Architecture is the primary purveyor of system quality attributes, which
are hard to achieve without a unifying architecture; it’s also the
conceptual glue that holds every phase of projects together for their
many stakeholders. This blog posting—the final installment in a series—provides lightly edited transcriptions of presentations by Jeromy Carriere and Ian Gorton at a SATURN 2012 roundtable, “Reflections on 20 Years of Software Architecture.”
Read more...
Jan 14
2013
By Sagar Chaki,
Senior Member of the Technical Staff
Research, Technology & System Solutions
A
malicious program disrupts computer operations, gains access to private
computational resources, or collects sensitive information. In February
2012, nearly 300 million malicious programs were detected, according to
a report compiled by SECURELIST.
To help organizations protect against malware, I and other researchers
at the SEI have focused our efforts on trying to determine the origin of
the malware. In particular, I’ve recently worked with my colleagues—Arie Gurfinkel, who works with me in the SEI’s Research, Technology, & System Solutions Program, and Cory Cohen, a malware analyst with the CERT Program—to
use the semantics of programming languages to determine the origin of
malware. This blog post describes our exploratory research to derive
precise and timely actionable intelligence to understand and respond to
malware.
Read more...
Jan 7
2013
First in a Series
By Bill Scherlis
Chief Technology Officer, Acting
The Department of Defense (DoD) has become deeply and fundamentally reliant on software. As a federally funded research and development center (FFRDC),
the SEI is chartered to work with the DoD to meet the challenges of
designing, producing, assuring, and evolving software-reliant systems in
an affordable and dependable manner. This blog post—the first in a
multi-part series—outlines key elements of the forthcoming SEI Strategic
Research Plan that addresses these challenges through research and
acquisition support and collaboration with DoD, other federal agencies,
industry, and academia.
Read more...
Dec 31
2012
By Douglas C. Schmidt
Principal Researcher
As part of our mission to advance the practice of software engineering and cybersecurity through research and technology transition,
our work focuses on ensuring the development and operation of
software-reliant Department of Defense (DoD) systems with predictable
and improved quality, schedule, and cost. To achieve this mission, the
SEI conducts research and development (R&D) activities involving the
DoD, federal agencies, industry, and academia. As we look back on 2012,
this blog posting highlights our many R&D accomplishments.
Read more...
Dec 24
2012
By Paulo Merson,
Visiting Scientist
Research, Technology, & System Solutions
Occasionally this blog will highlight different posts from the SEI blogosphere. Today’s post by Paulo Merson, a senior member of the technical staff in the SEI’s Research, Technology, and System Solutions Program, is from the SATURN Network blog. This post explores Merson’s experience using Checkstyle and pre-commit hooks on Subversion to verify the conformance between code and architecture.
Read more...
Recent Comments