Solutions

Enhanced Acquisition Capability    

Enhanced Acquisition Capability

The U.S. Army and the SEI engaged in a multi-year partnership to improve the Army's capability to acquire software-reliant systems.


Reliable Financial Systems 

Reliable, Fast Financial System

Bursatec, the technology arm of the Mexican Stock Exchange, combined our Team Software Process (TSP) and Architecture-Centric Engineering (ACE) methods in a project to build a reliable and fast stock trading system that works ceaselessly while handling sharp fluctuations in trading volume.

Automotive Software Process 

Automotive Software Process Improvement

Urban Science, a global company of automotive retail performance experts, found that our Accelerated Improvement Method (AIM) provided a more structured approach to software development to complement its use of Scrum.

Standards for Secure Coding
 

Standards for Secure Coding

Software developers and designers need metrics for evaluating and contrasting software security, safety, reliability, and related properties. We have developed standards for secure coding for several programming languages and a tool to assess code conformance with ISO/IEC 17000.



Improved Risk Assessment
 

Improved Risk Assessment in Healthcare Compliance

Government agencies in Clark County, Nevada, found that our OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) method improved their efficiency in complying with federal Health Information Portability and Accountability Act (HIPAA) requirements.



Products that rely on software systems—and most do today—are developed to satisfy qualities such as performance, modifiability, and security that are critical to an organization's business or mission goals.
 

Products that rely on software systems—and most do today—are developed to satisfy qualities such as performance, modifiability, and security that are critical to an organization's business or mission goals. Achieving system qualities is haphazard at best without a unifying vision of the product's software architecture.

tank
 

The U.S. Department of Defense (DoD) now acquires systems that increasingly rely on software to deliver capabilities to the warfighter. These systems are more complex and costly than ever. Yet, DoD acquisition managers are challenged to operate in an environment of constrained budgets and faster delivery.

Protecting information against cyber attacks
 

Information has become an essential asset supporting the operation of government and industrial organizations. Those organizations have increasing concerns about protecting information against cyber attacks that stem from criminal intentions or motivations and commercial motivations.

A new view of risk analysis and management.
 

Software engineering organizations now are in an environment that is more uncertain—due in large part to the increasingly distributed nature of software development. How well those organizations navigate through this environment will determine their success or failure, and effective navigation requires a new view of risk analysis and management.

Delivering a software-reliant system
 

Leading software-engineering organizations emphasize faster delivery of products having exceptional quality and the flexibility to be easily adapted to meet changing customer needs. Delivering a software-reliant system that meets all of those business goals has proven to be difficult, witness the still-stubborn high percentage of products that fail in operation or do not meet expectations.

Insider Threat
 

Insider Threat

Analysis for the DoD Personnel Security Research Center (PERSEREC) reveals a full picture of insider threat and leads to the development of the CERT Insider Threat Center.

Enhancement Agility
 

Enhancement Agility

Mandate to respond to needs for innovation and adaptation leads to the development of a framework for rapid life cycle management.


Acquisition and Innovation
 

Acquisition and Innovation

DoD acquisition search for guidance on adopting agile practices leads to SEI development of a model to reduce uncertainty regarding the use of Agile techniques.

Acquisition Patterns of Failure
 

Acquisition Patterns of Failure

Answering why problems persist in software development and systems acquisition led to the identification of solutions to 13 archetypal patterns of failure.

Secure Coding Standards
 

Secure Coding Standards

CERT security experts observed that most vulnerabilities stem from a relatively small number of common programming errors. In response, they devised a comprehensive approach to secure software development.


Cloudlets in Tactical Settings
 

Cloudlets in Tactical Settings

SEI experts recognized three challenges to U.S. Department of Defense (DoD) interest in having soldiers carry handheld mobile computing devices: lower computational power, greater demands on battery power, and reliability issues with tactical networks.

Rate Monotonic Analysis 

Rate Monotonic Analysis

SEI researchers applied the theory of generalized rate monotonic scheduling, Rate Monotonic Analysis (RMA), to evolve a set of analytic tools for real-time systems.

Architecture Analysis and Design Language
 

Architecture Analysis and Design Language

SEI experts in embedded systems provided technical leadership for the standards effort led by the U.S. Army AMRDEC Software Engineering Directorate (SED) that developed the Architecture Analysis and Design Language (AADL), an international industry standard.

Software Assurance Curriculum
 

Software Assurance Curriculum

The issue

CERT Program researchers, collaborating with a team of educators from Embry-Riddle Aeronautical University, Monmouth University, and Stevens Institute of Technology built a model curriculum for software assurance education and defined strategies to implement it.

Architecture Evaluation
 

Architecture Evaluation

Discovering that software architecture is essential to the achievement of system qualities, SEI researchers developed the evaluation method called the Architecture Tradeoff Analysis Method (ATAM).

TSP-Secure
 

TSP-Secure

Knowing that secure software is not built by accident, CERT researchers integrated secure coding techniques into the Team Software Process (TSP) so that high quality, secure software can be developed with predictable cost and schedule results.

Cyber Intelligence Tradecraft
 

Cyber Intelligence Tradecraft

SEI researchers benchmarked a baseline data from 26 organizations against an analytic framework to determine the state of best practices in cyber intelligence.

Find Us Here

Find us on Youtube  Find us on LinkedIn  Find us on twitter  Find us on Facebook

Share This Page

Share on Facebook  Send to your Twitter page  Save to del.ico.us  Save to LinkedIn  Digg this  Stumble this page.  Add to Technorati favorites  Save this page on your Google Home Page 

For more information

Contact Us

info@sei.cmu.edu

412-268-5800

Help us improve

Visitor feedback helps us continually improve our site.

Please tell us what you
think with this short
(< 5 minute) survey.