Latest Additions to the Library
This technical note presents an insider threat pattern on how organizations can combat insider theft of intellectual property. The technical note describes how to use the centralized log storage and...
Issues and Opportunities for Improving the Quality and Use of Data in the Department of Defense
The Office of the Secretary of Defense for Acquisition, Technology, and Logistics (OSD [AT&L]), Director, Defense Research & Engineering (DDR&E) sponsored a workshop to bring together leading researchers and practitioners...
CMMI for Services: Guidelines for Superior Service, Second Edition
This book serves as an introduction to the CMMI-SVC model and contains a comprehensive set of guidelines to help organizations establish and improve their delivering services.
Emerging Technologies for Software-Reliant Systems of Systems
The purpose of this report is to present an informal survey of technologies that are, or are likely to become, important for software-reliant systems of systems in response to current...
Acquisition Archetypes: Brooks' Law
This April 2009 whitepaper focuses on the problems of underspending, which can result in funds being shifted from one acquisition program to another.