Latest Additions to the Library
Trusted Computing in Embedded Systems Workshop
This report describes the November 2010 Trusted Computing in Embedded Systems Workshop held at Carnegie Mellon University.
The SCAMPI Method Definition Document describes the requirements, activities, and practices associated with each of the processes that compose the SCAMPI method. It is intended to be one of the...
A Workshop on Analysis and Evaluation of Enterprise Architectures
This report summarizes a workshop on the analysis and evaluation of enterprise architectures that was held at the SEI in April of 2010.
Success in Acquisition: Using Archetypes to Beat the Odds
This report describes key elements in systems thinking, provides an introduction to general systems archetypes, and applies these concepts to the software acquisition domain.
Bryce Meyer and James Wessel provide a 10-step method for planning/assessing software performance, allowing for respective improvement of architecture and test processes.