News at SEI

Being Your Own Boss—Part IV: Being a Victim 8/1/07
Being Your Own Boss—Part IV: Being a Victim
 
Bright Star Dimmed: Roger Bate, 1923–2009 8/1/07
Bate, who was a former chair and member of the SEI Board of Visitors, and a senior member of the technical staff and, later, a visiting scientist at the SEI, died March 18, 2009, in McKinney, Texas. He was 86.
 
CMMI Version 1.3—Plans for the Next Version 7/31/09
The CMMI Steering Group has approved criteria for the next release of the CMMI Product Suite. This column will describe the key ingredients and the plans for release of CMMI Version 1.3.
 
The Value of High Maturity to the Customer 1/1/09
The Value of High Maturity to the Customer
 
Educating Educators in Making Better Architecture 8/1/08
Educating Educators in Making Better Architecture
 
Create, Apply, and Amplify: A Story of Technology Development 8/1/08
Create, Apply, and Amplify: A Story of Technology Development
 
How Mexico is Doing It 8/1/08
How Mexico is Doing It
 
Lessons Learned about Risk Mitigation in Acquisition through Architecture Evaluation 7/1/08
Lessons Learned about Risk Mitigation in Acquisition through Architecture Evaluation
 
Clarifying the CMMI for Development Model for High Maturity 8/1/07
CMMI in Focus [2008 | 7]
 
New Priorities 7/1/08
Watts New [2008 | 7]
 
A Specification for Software Project Performance Measures 6/1/08
A Specification for Software Project Performance Measures
 
Building More Secure Software 6/1/08
Building More Secure Software
 
Requisite Agility 5/1/08
Requisite Agility
 
Architecture Competence: What Is It? How Do We Measure It? 5/1/08
Architecture Competence: What Is It? How Do We Measure It?
 
PACC Starter Kit Provides Tools for Developing Systems that Exhibit Predictable Behavior 5/1/08
PACC Starter Kit Provides Tools for Developing Systems that Exhibit Predictable Behavior
 
Place of Architecture in a Crowdsourced World, The 5/1/08
The Place of Architecture in a Crowdsourced World
 
Crisis Management 8/1/07
Watts New [2008 | 5]
 
Process Improvement in a Multimodel Environment Builds Resilient Organizations 4/1/08
Process Improvement in a Multimodel Environment Builds Resilient Organizations
 
First Workshop on CMMI High Maturity Measurement Brings Organizations Together 4/1/08
First Workshop on CMMI High Maturity Measurement Brings Organizations Together
 
Making SIMPLE Decisions about Software Product Lines 4/1/08
Making SIMPLE Decisions about Software Product Lines
 
Steps Toward Network-Centric Operation 3/1/08
Steps Toward Network-Centric Operation
 
SMART Ultra-Large-Scale Systems Forum: “Scale Changes Everything” 3/1/08
SMART Ultra-Large-Scale Systems Forum: “Scale Changes Everything”
 
Cyber Attack Scenarios Test Responses 3/1/08
Cyber Attack Scenarios Test Responses
 
Being Your Own Boss—Part V: Building Trust 3/1/08
Being Your Own Boss—Part V: Building Trust
 
Workshop Examines SOA Hard Problems and Potential Solutions 2/1/08
Workshop Examines SOA Hard Problems and Potential Solutions
 
User Network for Software Architecture Technology Is Growing Steadily 2/1/08
User Network for Software Architecture Technology Is Growing Steadily
 
Tackling the Growing Botnet Threat 2/1/08
Tackling the Growing Botnet Threat
 
Effective and Measurable Results from Combining CMMI and Six Sigma 1/1/08
Effective and Measurable Results from Combining CMMI and Six Sigma
 
Performance Improvement: It’s a Small World After All 1/1/08
Performance Improvement: It’s a Small World After All
 
Predictable Security: Security Analysis Extends Use of High-Performance Chip 1/1/08
Predictable Security: Security Analysis Extends Use of High-Performance Chip
 
Resources for Getting Started with Software Product Lines 1/1/08
Resources for Getting Started with Software Product Lines
 
CMMI with Agile, Lean, Six Sigma, and Everything Else 1/1/08
CMMI with Agile, Lean, Six Sigma, and Everything Else
 
Spider-Man 3 Developers to Discuss Process-Improvement Experience in SEPG Keynote 8/1/07
Spider-Man 3 Developers to Discuss Process-Improvement Experience in SEPG Keynote
 
Understanding Architectural Patterns in Terms of Tactics and Models 8/1/07
Understanding Architectural Patterns in Terms of Tactics and Models
 
Mitigating the Risk of Using Service-Oriented Architectures 7/1/07
Mitigating the Risk of Using Service-Oriented Architectures
 
Lessons Learned about Software Architecture 7/1/07
Lessons Learned about Software Architecture
 
Mexican Advocates See TSP as a Way to Establish Quality Reputation 6/1/07
Mexican Advocates See TSP as a Way to Establish Quality Reputation
 
Being Your Own Boss—Part III: Knowledge Work 6/1/07
Being Your Own Boss—Part III: Knowledge Work
 
CMMI for Acquisition—The First New Constellation 6/1/07
CMMI for Acquisition—The First New Constellation
 
Survivability Challenges for Systems of Systems 6/1/07
Survivability Challenges for Systems of Systems
 
The Double Challenge in Engineering Complex Systems of Systems 5/1/07
The Double Challenge in Engineering Complex Systems of Systems
 
OCTAVE Allegro Speeds Up the Risk Assessment Process 5/1/07
OCTAVE Allegro Speeds Up the Risk Assessment Process
 
ArchE-the Architecture Expert 5/1/07
ArchE-the Architecture Expert
 
Being Your Own Boss—Part II: The Autocratic Manager 5/1/07
Being Your Own Boss—Part II: The Autocratic Manager
 
Software Product Lines FAQs Part VI: Using Software Product Lines with Other Approaches 5/1/07
Software Product Lines FAQs Part VI: Using Software Product Lines with Other Approaches
 
Army Engineering Center Chooses SMART Approach to SOA Planning 4/1/07
Army Engineering Center Chooses SMART Approach to SOA Planning
 
Challenges of Establishing Network-Centric Operations I: Technical Research Challenges 4/1/07
Challenges of Establishing Network-Centric Operations I: Technical Research Challenges
 
CMMI: Beyond V1.2 Workshops 4/1/07
CMMI: Beyond V1.2 Workshops
 
Workshop to Present Best Practices in Software Architecture 3/1/07
Workshop to Present Best Practices in Software Architecture
 
Software Architecture: The Next Generation 3/1/07
Software Architecture: The Next Generation
 
Duties, Skills, and Knowledge of Software Architects, The 1/1/07
The Duties, Skills, and Knowledge of Software Architects
 
Being Your Own Boss—Part I: The Ideal Job 3/1/07
Being Your Own Boss—Part I: The Ideal Job
 
SEI Publishes Framework for Software Process Research 2/1/07
SEI Publishes Framework for Software Process Research
 
Large-Scale Work – Part VII: Process Discipline 2/1/07
Large-Scale Work – Part VII: Process Discipline
 
CMMI: Product Suite Expansion 2/1/07
CMMI: Product Suite Expansion
 
Protecting Against Insider Threat 2/1/07
Protecting Against Insider Threat
 
SEI Reaches Across Domains to Aid Health Care Industry 1/1/07
SEI Reaches Across Domains to Aid Health Care Industry
 
The Mexican TSP Initiative: Positioning the Mexican Software Industry through TSP/PSP 1/1/07
The Mexican TSP Initiative: Positioning the Mexican Software Industry through TSP/PSP
 
Large-Scale Work–Part VI: The Process 1/1/07
Large-Scale Work–Part VI: The Process
 
FAQs Part 5: Getting Started 1/1/07
FAQs Part 5: Getting Started
 
CMMI: A New Transition 1/1/07
CMMI: A New Transition
 
Claims You’ll Need to Justify to Assure That Your System Will Succeed 7/1/06
Claims You’ll Need to Justify to Assure That Your System Will Succeed
 
CERT Launches Secure Coding Standards Web Site 7/1/06
CERT Launches Secure Coding Standards Web Site
 
CMMI-DEV Version 1.2: What Else Has Changed? 7/1/06
CMMI-DEV Version 1.2: What Else Has Changed?
 
Governance Issues for a Service-Oriented Architecture 6/1/06
Governance Issues for a Service-Oriented Architecture
 
Five Maxims about Emergent Behavior in Systems of Systems 6/1/06
Five Maxims about Emergent Behavior in Systems of Systems
 
The Hottest Issues in Software Product Lines: 6/1/06
The Hottest Issues in Software Product Lines:
 
Ultra-Large-Scale (ULS) Systems Roundtable 6/1/06
Ultra-Large-Scale (ULS) Systems Roundtable
 
Large-Scale Work–Part V: Building Team Ownership 5/1/06
Large-Scale Work–Part V: Building Team Ownership
 
The ROI of Security 8/1/07
Security Matters [2006 | 05]
 
Quality Attributes and Service-Oriented Architectures 5/1/06
Quality Attributes and Service-Oriented Architectures
 
Meet Ricky & Stick 5/1/06
Meet Ricky & Stick
 
CMMI: The New Architecture 5/1/06
CMMI: The New Architecture
 
System-of-Systems Navigator: An Approach for Managing System-of-Systems Interoperability 4/1/06
System-of-Systems Navigator: An Approach for Managing System-of-Systems Interoperability
 
FAQs Part 4: Product Lines in the Context of Acquisition 4/1/06
FAQs Part 4: Product Lines in the Context of Acquisition
 
A Methodology to Support Software-Release Decisions 4/1/06
A Methodology to Support Software-Release Decisions
 
A Unified Process Improvement Approach for Multi-Model Improvement Environments 4/1/06
A Unified Process Improvement Approach for Multi-Model Improvement Environments
 
Strategic Architecting 3/1/06
Strategic Architecting
 
Initiative Advocates Building Security In from the Start 3/1/06
Initiative Advocates Building Security In from the Start
 
Carnegie Mellon Software Engineering Institute Launches New PSP-Developer Certification 3/1/06
Carnegie Mellon Software Engineering Institute Launches New PSP-Developer Certification
 
Security Changes Everything 2/1/06
Security Changes Everything
 
New CERT “Virtual Training Environment” Provides Online Information Security Education 2/1/06
New CERT “Virtual Training Environment” Provides Online Information Security Education
 
SEI to Open West Coast Office 2/1/06
SEI to Open West Coast Office
 
How Much Security Is Enough? 2/1/06
How Much Security Is Enough?
 
CMMI V1.2: What’s Changing? (Part 4) 4/17/09
CMMI V1.2: What’s Changing? (Part 4)
 
Three Perspectives of Service-Oriented Architectures 1/1/06
Three Perspectives of Service-Oriented Architectures
 
FAQs Part 3: Exploring the Issues More Deeply 1/1/06
FAQs Part 3: Exploring the Issues More Deeply
 
Large-Scale Work–Part IV: The Management System 4/1/05
Large-Scale Work–Part IV: The Management System
 
Large-Scale Work—Part III: The People 4/1/05
Large-Scale Work—Part III: The People
 
Introducing a Guide to Interoperability 4/1/05
Within the Department of Defense (DoD), government, and corporate worlds, large-scale systems of systems (SoS) are increasingly being put together in an unprecedented way. Establishing interoperability between the constituent systems is increasingly a key for an organization to meet its critical goals. However, as organizations envision transparent net-centric operations spanning a large number of systems, we have found that successfully achieving such a vision requires a fundamental shift in traditional ways of thinking about system development, acquisition, and management.
 
Components of Software Architecture Design and Analysis, The 4/1/05
The Components of Software Architecture Design and Analysis
 
FAQs Part 2: Are Product Lines Right for My Organization? 4/1/05
FAQs Part 2: Are Product Lines Right for My Organization?
 
Secure Coding in C and C++: C-Style Strings 3/1/05
Secure Coding in C and C++: C-Style Strings
 
New CERT Course and Handbook Detail Electronic Detective Work 4/1/05
New CERT Course and Handbook Detail Electronic Detective Work
 
Meeting the Challenge of Ultra-Large-Scale (ULS) Systems 3/1/05
Meeting the Challenge of Ultra-Large-Scale (ULS) Systems
 
Governing for Security: Protect Stakeholder Interests 4/1/05
Governing for Security: Protect Stakeholder Interests
 
Social Security Administration Reaps Rewards of Process Improvement 4/1/05
Social Security Administration Reaps Rewards of Process Improvement
 
CMMI V1.2: What’s Changing? (Part 2) 4/1/05
CMMI V1.2: What’s Changing? (Part 2)
 
Large-Scale Work—Part II: The Project 3/1/05
Large-Scale Work—Part II: The Project
 
Analyzing the Reuse Potential of Migrating Legacy Components to a Service-Oriented Architecture 3/1/05
Analyzing the Reuse Potential of Migrating Legacy Components to a Service-Oriented Architecture
 
Integrating Architecture Methods: The Case of the QAW and the ADD Method 3/1/05
Integrating Architecture Methods: The Case of the QAW and the ADD Method
 
FAQs: An Introduction to Software Product Lines 3/1/04
FAQs: An Introduction to Software Product Lines
 
The SEI Partner Network and the Code of Professional Conduct 3/1/05
The SEI Partner Network and the Code of Professional Conduct
 
Shifting Perspective to Achieve and Sustain Enterprise Security 3/1/05
Shifting Perspective to Achieve and Sustain Enterprise Security
 
CMMI V1.2: What’s Changing? 3/1/05
CMMI V1.2: What’s Changing?
 
Writing the Book on Process Improvement: An Interview with Watts Humphrey 3/1/05
Writing the Book on Process Improvement: An Interview with Watts Humphrey
 
Using Product Line Analysis to Get Started With Software Product Lines 3/1/05
Using Product Line Analysis to Get Started With Software Product Lines
 
Large-Scale Work—Part I: The Organization 2/1/05
Large-Scale Work—Part I: The Organization
 
Service-Oriented Architectures as an Interoperability Mechanism 2/1/05
Service-Oriented Architectures as an Interoperability Mechanism
 
Architecture Business Cycle Revisited: A Business Goals Taxonomy to Support Architecture Design and Analysis, The 2/1/05
The Architecture Business Cycle Revisited: A Business Goals Taxonomy to Support Architecture Design and Analysis
 
Only Leaders Need Apply 2/1/05
Only Leaders Need Apply
 
Governing for Enterprise Security: Security is a Requirement of Being in Business 2/1/05
Governing for Enterprise Security: Security is a Requirement of Being in Business
 
Using CMMI with Suppliers – The Acquirer’s Concerns 2/1/05
Using CMMI with Suppliers – The Acquirer’s Concerns
 
Using the People Capability Maturity Model with CMMI 2/1/05
In this 2005 article, Suzanne D. Couturiaux of the Software Engineering Institute (SEI) discusses how to use the People Capability Maturity Model (People CMM) with the CMMI model.
 
New Curriculum Fosters Adoption of Software Product Line Practices 2/1/05
New Curriculum Fosters Adoption of Software Product Line Practices
 
Model-Driven Architecture: Moving from Concept to Practice 2/1/05
Model-Driven Architecture: Moving from Concept to Practice
 
SEI Celebrates 20 Years of Software Engineering Excellence 2/1/05
SEI Celebrates 20 Years of Software Engineering Excellence
 
Software Acquisition Survival Skills: Helping the DoD and Government Program Offices Improve Acquisition of Software and Systems 2/1/05
Software Acquisition Survival Skills: Helping the DoD and Government Program Offices Improve Acquisition of Software and Systems
 
A Personal Quality Strategy 1/1/05
A Personal Quality Strategy
 
Nine Characteristics of a COTS and Reuse Management Plan 1/1/05
Nine Characteristics of a COTS and Reuse Management Plan
 
Three Perspectives Required of Service-Oriented Architectures 1/1/06
Three Perspectives Required of Service-Oriented Architectures
 
Integrating Architecture Methods: The Case of Extreme Programming 1/1/05
Integrating Architecture Methods: The Case of Extreme Programming
 
Pas de Deux: Making the Two-Part Organization Work 1/1/05
Pas de Deux: Making the Two-Part Organization Work
 
An Introduction to Governing for Enterprise Security 1/1/05
An Introduction to Governing for Enterprise Security
 
CMMI—A Progress Report 1/1/05
CMMI—A Progress Report
 
An Adoption Roadmap for Software Product Line Practice 1/1/05
An Adoption Roadmap for Software Product Line Practice
 
University Hubs Help SEI Spread Information Assurance Curricula and Methods 1/1/05
University Hubs Help SEI Spread Information Assurance Curricula and Methods
 
Enterprise Security Management: Refocusing Security’s Role 1/1/05
Enterprise Security Management: Refocusing Security’s Role
 
Improving Defense Software-Intensive Systems Acquisition with CMMI-AM 1/1/05
Improving Defense Software-Intensive Systems Acquisition with CMMI-AM
 
Benchmarking for Improvement in Army Acquisition 3/1/04
Benchmarking for Improvement in Army Acquisition
 
An Interview with Paul Nielsen, New Director of the SEI 3/1/04
An Interview with Paul Nielsen, New Director of the SEI
 
CMMI for Small Businesses: Initial Results of the Pilot Study 3/1/04
A frequent misconception about adopting Capability Maturity Model Integration (CMMI) is that it works only for large organizations—its cost and complexity appear to make it impractical for smaller organizations to implement. Jim Hendrix, a business systems engineer at Analytical Services Inc. (ASI), doesn’t believe that’s the case. His organization recently implemented three process areas (PAs) of CMMI as part of a pilot study with the Software Engineering Institute (SEI). He said CMMI might even be more beneficial to smaller businesses because it allows them to grow more consistently and to make changes when they are less costly, that is, "before growth demands them."
 
The Quality Attitude 3/1/04
The Quality Attitude
 
Emergent Issues in Interoperability 3/1/04
Emergent Issues in Interoperability
 
Integrating Architecture Methods: The Case of the Rational Unified Process 3/1/04
Integrating Architecture Methods: The Case of the Rational Unified Process
 
Marathon Man 3/1/04
Marathon Man
 
Install and Use Those Anti-Virus Programs 3/1/04
Install and Use Those Anti-Virus Programs
 
CMMI—V1.2 and Beyond 3/1/04
CMMI—V1.2 and Beyond
 
Making the Use of the DoDAF Easier for DoD Organizations 3/1/04
Making the Use of the DoDAF Easier for DoD Organizations
 
SEPG 2004 Showcases Enterprise Process Improvement in Orlando 2/1/04
SEPG 2004 Showcases Enterprise Process Improvement in Orlando
 
CERT/CC Instrumental in National Security Effort 2/1/04
CERT/CC Instrumental in National Security Effort
 
Calculating Return on Investment for Software Product Lines 2/1/04
Calculating Return on Investment for Software Product Lines
 
Microsoft's Pilot of TSP Yields Dramatic Results 2/1/04
Microsoft's Pilot of TSP Yields Dramatic Results
 
Guiding Principles for Interoperability 2/1/04
Guiding Principles for Interoperability
 
The Recovery of Runtime Architectures 2/1/04
The Recovery of Runtime Architectures
 
Tiptoe Carefully or Dive Right In? 2/1/04
Tiptoe Carefully or Dive Right In?
 
The Goal of Computer Security or What's Yours is Yours Until You Say Otherwise! 2/1/04
The Goal of Computer Security or What's Yours is Yours Until You Say Otherwise!
 
Choosing a Supplier: Due Diligence and CMMI Levels1 2/1/04
Choosing a Supplier: Due Diligence and CMMI Levels1
 
Defective Software Works 1/1/04
Defective Software Works
 
TSP Accelerates Software Quality Improvements at NAVAIR 1/1/04
TSP Accelerates Software Quality Improvements at NAVAIR
 
Using Six Sigma in Software Development 1/1/04
Using Six Sigma in Software Development
 
The SEI Partner Network: Providing Authentic SEI Services and Training 1/1/04
The SEI Partner Network: Providing Authentic SEI Services and Training
 
ISIS and the Goal of Interoperability 1/1/04
ISIS and the Goal of Interoperability
 
Integrating Architecture Methods: The Case of the ATAM and the CBAM 1/1/04
Integrating Architecture Methods: The Case of the ATAM and the CBAM
 
Lunching and Institutionalizing 1/1/04
Lunching and Institutionalizing
 
What is a Distributed Denial of Service (DDoS) Attack and What Can I Do About It? 1/1/04
What is a Distributed Denial of Service (DDoS) Attack and What Can I Do About It?
 
Myths about SCAMPI Appraisals 1/1/04
Myths about SCAMPI Appraisals
 
Some Programming Principles: People 12/1/03
Some Programming Principles: People
 
3rd International Conference on COTS-Based Software Systems 12/1/03
3rd International Conference on COTS-Based Software Systems
 
New Credentials Program Developed by SEI Education and Training 12/1/03
New Credentials Program Developed by SEI Education and Training
 
Strategic Technology Transition: A New Kind of Partnership 12/1/03
Strategic Technology Transition: A New Kind of Partnership
 
CERT's Function Extraction Project: Exploring Program Behavior for Security Analysis 12/1/03
CERT's Function Extraction Project: Exploring Program Behavior for Security Analysis
 
Integrating Analysis and Design Methods for the Software Life Cycle 12/1/03
Integrating Analysis and Design Methods for the Software Life Cycle
 
It Takes Two 12/1/03
It Takes Two
 
CMMI Adoption Trends 12/1/03
CMMI Adoption Trends
 
There IS an Intruder in My Computer—What Now? 12/1/03
There IS an Intruder in My Computer—What Now?
 
CMMI – Continuously Improving! 12/1/03
In this article, Mike Phillips of the Software Engineering Institute (SEI) provides an update regarding the adoption of CMMI Version 1.1 during 2003.
 
Rethinking the Software Life Cycle 9/1/03
Rethinking the Software Life Cycle
 
Changing Focus 9/1/03
Changing Focus
 
The Man with the Plan 9/1/03
The Man with the Plan
 
A Life-Cycle Approach to Technology Transition 9/1/03
A Life-Cycle Approach to Technology Transition
 
New Acquisition Conference a Hit with Attendees 9/1/03
New Acquisition Conference a Hit with Attendees
 
New Software Architecture Curriculum Developed 9/1/03
New Software Architecture Curriculum Developed
 
e-RA Method Simplifies Decision Making for Authentication Requirements 9/1/03
e-RA Method Simplifies Decision Making for Authentication Requirements
 
Using CMMI: How Is it Progressing? 9/1/03
Using CMMI: How Is it Progressing?
 
Use Care When Reading Email with Attachments 9/1/03
Use Care When Reading Email with Attachments
 
Some Programming Principles: Projects 9/1/03
Some Programming Principles: Projects
 
Introducing Predictable Assembly from Certifiable Components (PACC) 6/1/03
Introducing Predictable Assembly from Certifiable Components (PACC)
 
CMMI and BSCC 6/1/03
CMMI and BSCC
 
What's the Difference Between Product Line Scope and Product Line Requirements? 6/1/03
What's the Difference Between Product Line Scope and Product Line Requirements?
 
Use Care When Downloading and Installing Programs 6/1/03
Use Care When Downloading and Installing Programs
 
Improving Workforce Capabilities with the People Capability Maturity Model 6/1/03
Improving Workforce Capabilities with the People Capability Maturity Model
 
New CERT Certification to Train Computer Security Incident Handlers 6/1/03
New CERT Certification to Train Computer Security Incident Handlers
 
Using CMMI Appraisals in Acquisition—a Primer 4/17/09
Using CMMI Appraisals in Acquisition—a Primer
 
SEPG 2003 Attendance Tops 1,500 6/1/03
SEPG 2003 Attendance Tops 1,500
 
Second International Conference on COTS-Based Software Systems 6/1/03
Second International Conference on COTS-Based Software Systems
 
Documenting Software Architectures 6/1/03
Documenting Software Architectures
 
Assumption Management 3/1/03
Assumption Management
 
The Good News About COTS 3/1/03
The Good News About COTS
 
Components As Products 3/1/03
Components As Products
 
Can You Prove It? 3/1/03
Can You Prove It?
 
Cruisin' the CMMI Web Site 4/17/09
Cruisin' the CMMI Web Site
 
Taking the Road Less Traveled: The CMMI Continuous Approach 3/1/03
Taking the Road Less Traveled: The CMMI Continuous Approach
 
OCTAVE Users Forum: Helping to Build a Community of Practice 3/1/03
OCTAVE Users Forum: Helping to Build a Community of Practice
 
The Acquisition Support Program 3/1/03
The Acquisition Support Program
 
Some Programming Principles: Products 6/1/03
Some Programming Principles: Products
 
Some Programming Principles—Requirements 3/1/03
Some Programming Principles—Requirements
 
Defining the Terms Architecture, Design, and Implementation 1/1/03
Defining the Terms Architecture, Design, and Implementation
 
Enterprise Integration 12/1/02
Enterprise Integration
 
Modernizing Legacy Systems 12/1/02
Modernizing Legacy Systems
 
Messages from the Field 3/18/09
Messages from the Field
 
CMMI Myths and Realities 12/1/02
CMMI Myths and Realities
 
Managing Risks in Modernizing Legacy Systems 12/1/02
Managing Risks in Modernizing Legacy Systems
 
SEI Hosts Software Product Line Conference 12/1/02
SEI Hosts Software Product Line Conference
 
OCTAVE Developers Reach Out to Smaller Organizations with OCTAVE-S 12/1/02
OCTAVE Developers Reach Out to Smaller Organizations with OCTAVE-S
 
E Pluribus Unum 12/1/02
E Pluribus Unum
 
Installing and Using a Firewall Program 12/1/02
Installing and Using a Firewall Program
 
Learning from Hardware: Design and Quality 12/1/02
Learning from Hardware: Design and Quality
 
Evolution of Quality Attribute Workshops as an Architecture-Evaluation Technique, The 9/1/02
The Evolution of Quality Attribute Workshops as an Architecture-Evaluation Technique
 
Building Systems from Commercial Components Using EPIC 9/1/02
Building Systems from Commercial Components Using EPIC
 
CMMI and Process Improvement Themes 3/18/09
CMMI and Process Improvement Themes
 
New Book Helps Organizations Take Charge of Information Security 9/1/02
New Book Helps Organizations Take Charge of Information Security
 
Software Architecture Book Provides Practical Guidance about Documentation 9/1/02
Software Architecture Book Provides Practical Guidance about Documentation
 
Carnegie Mellon Educates Next Generation of Information-Security Experts 9/1/02
Carnegie Mellon Educates Next Generation of Information-Security Experts
 
Accelerating CMMI Implementation with Technology Adoption Tools 9/1/02
Accelerating CMMI Implementation with Technology Adoption Tools
 
Product Lines Are Everywhere 9/1/02
Product Lines Are Everywhere
 
File Cabinets and Pig Latin: Guards for Information Assets 9/1/02
File Cabinets and Pig Latin: Guards for Information Assets
 
Learning from Hardware: Planning 9/1/02
Learning from Hardware: Planning
 
Aligning Business Models, Business Architectures, and IT Architectures 6/1/02
Aligning Business Models, Business Architectures, and IT Architectures
 
Risk/Misfit Redux 6/1/02
Risk/Misfit Redux
 
CERT/CC and Secret Service Collaborate on Security 6/1/02
CERT/CC and Secret Service Collaborate on Security
 
First International Conference on COTS-Based Software Systems a Success 6/1/02
First International Conference on COTS-Based Software Systems a Success
 
TIDE: Promoting Technology Adoption Through Technology Collaboration 6/1/02
TIDE: Promoting Technology Adoption Through Technology Collaboration
 
Preventing Security-Related Defects 6/1/02
Preventing Security-Related Defects
 
Is There an Intruder in My Computer? 6/1/02
Is There an Intruder in My Computer?
 
Surviving Failure 6/1/02
Surviving Failure
 
Architectures for Adaptive Mobile Systems 3/1/02
Architectures for Adaptive Mobile Systems
 
Building Systems from Commercial Components: Classroom Experiences 3/1/02
Building Systems from Commercial Components: Classroom Experiences
 
The Software Technology Review 3/1/02
The Software Technology Review
 
Information Security Training 3/1/02
Information Security Training
 
Cost-Benefit Analysis Method 3/1/02
Cost-Benefit Analysis Method
 
SEI Architecture Practices Propel Successful Startup 3/1/02
SEI Architecture Practices Propel Successful Startup
 
The Internet—Friend or Foe? 3/1/02
The Internet—Friend or Foe?
 
The Future of Software Engineering: V 3/1/02
The Future of Software Engineering: V
 
Automating Design Search 12/1/01
Automating Design Search
 
TransPlant: Helping Organizations to Make the Transition 12/1/01
TransPlant: Helping Organizations to Make the Transition
 
The Internet Security Alliance: Leadership in Information Security 12/1/01
The Internet Security Alliance: Leadership in Information Security
 
A Process for Evaluating COTS Software Products 12/1/01
A Process for Evaluating COTS Software Products
 
At the Heart of the Revolution: The International Conference on COTS-Based Software Systems 12/1/01
At the Heart of the Revolution: The International Conference on COTS-Based Software Systems
 
Attack Scenarios: How to Get There from Here 12/1/01
Attack Scenarios: How to Get There from Here
 
The Future of Software Engineering: IV 12/1/01
The Future of Software Engineering: IV
 
Economic Modeling of Software Architectures 9/1/01
Economic Modeling of Software Architectures
 
Design and Search 9/1/01
Design and Search
 
Using Easel to Study Complex Systems 9/1/01
Using Easel to Study Complex Systems
 
Transitioning to CMMI 9/1/01
Transitioning to CMMI
 
Building Systems from Commercial Components 9/1/01
Building Systems from Commercial Components
 
Software Product Line Practice Patterns 9/1/01
Software Product Line Practice Patterns
 
Everyone's a System Administrator 9/1/01
Everyone's a System Administrator
 
The Future of Software Engineering: III 9/1/01
The Future of Software Engineering: III
 
Using Quality Attribute Workshops to Evaluate Early-Stage Architecture Design Decisions 6/1/01
Using Quality Attribute Workshops to Evaluate Early-Stage Architecture Design Decisions
 
Building Systems from Commercial Components Using Model Problems 6/1/01
Building Systems from Commercial Components Using Model Problems
 
Overcoming the Challenges of COTS 6/1/01
Overcoming the Challenges of COTS
 
Software Architecture Evaluation: A Key to System Success 6/1/01
Software Architecture Evaluation: A Key to System Success
 
SEIR Reaches 10,000 Users 6/1/01
SEIR Reaches 10,000 Users
 
The TIDE Program: Strengthening the Defense Manufacturing Base 6/1/01
The TIDE Program: Strengthening the Defense Manufacturing Base
 
Securing Information Assets 6/1/01
Securing Information Assets
 
CERT System and Network Security Practices 6/1/01
CERT System and Network Security Practices
 
The Future of Software Engineering: II 6/1/01
The Future of Software Engineering: II
 
Architecture Mechanisms 3/1/01
Architecture Mechanisms
 
Advancing the State of Software Product Line Practice 3/1/01
Advancing the State of Software Product Line Practice
 
Improving Technology Adoption Using INTRo 3/1/01
Improving Technology Adoption Using INTRo
 
Intrusion Detection Systems 3/1/01
Intrusion Detection Systems
 
Finding Errors Using Model-Based Verification 3/1/01
Finding Errors Using Model-Based Verification
 
Pursue Better Software, Not Absolution for Defective Products 3/1/01
Pursue Better Software, Not Absolution for Defective Products
 
How the FBI Investigates Computer Crime 3/1/01
How the FBI Investigates Computer Crime
 
The Future of Software Engineering: I 3/1/01
The Future of Software Engineering: I
 
Wheels Within Wheels: Model Problems in Practice 6/1/00
Wheels Within Wheels: Model Problems in Practice
 
Quality Attribute Workshop 3/1/00
Quality Attribute Workshop
 
Information Security Training and Education 6/1/00
Information Security Training and Education
 
Change Request Flow Chart 6/1/00
Change Request Flow Chart
 
CMMI: Getting to Version 1.0 6/1/00
CMMI: Getting to Version 1.0
 
Identifying Quality Attributes 6/1/00
Identifying Quality Attributes
 
Evaluating Risks in COTS Acquisition Programs 6/1/00
Evaluating Risks in COTS Acquisition Programs
 
Cybersleuthing: Means, Motive, and Opportunity 6/1/00
Cybersleuthing: Means, Motive, and Opportunity
 
Moving the Goal Posts 6/1/00
Moving the Goal Posts
 
Attribute-Based Architectural Styles 6/1/00
Attribute-Based Architectural Styles
 
Just In Time Component Competence 3/1/00
Just In Time Component Competence
 
Quality Attribute Workshops 3/1/00
Quality Attribute Workshops
 
An Architectural Approach to Software Cost Modeling 3/1/00
An Architectural Approach to Software Cost Modeling
 
COTS and Risk: Some Thoughts on How They Connect 6/11/09
The COTS Spot - Volume 3 | Issue 1 | March 2000
 
Probing Product Line Practices 3/1/00
Probing Product Line Practices
 
Countering the Threat of Internet Denial of Service Attacks 3/1/00
Countering the Threat of Internet Denial of Service Attacks
 
Component-Based Systems 3/1/00
Component-Based Systems
 
Putting the Team Software Process into Practice 3/1/00
Putting the Team Software Process into Practice
 
A Practical Approach to Improving Pilots 3/1/00
A Practical Approach to Improving Pilots
 
A Discussion of Open Source Software 3/1/00
A Discussion of Open Source Software
 
Software Engineering Measurement and Analysis 3/1/00
Software Engineering Measurement and Analysis
 
Removing Roadblocks to Cyber Defense 3/1/00
Removing Roadblocks to Cyber Defense
 
Survivability Blends Computer Security With Business Risk Management 3/1/00
Survivability Blends Computer Security With Business Risk Management
 
Survivability Blends Computer Security 3/1/00
Survivability Blends Computer Security
 
Making the Tactical Case for Process Improvement 3/1/00
Making the Tactical Case for Process Improvement
 
Justifying a Process Improvement Proposal 3/1/00
Justifying a Process Improvement Proposal
 
NCC IN Y2K 12/1/99
NCC IN Y2K
 
Pathways to Process Maturity: The Personal Software Process and Team Software Process 12/1/99
Pathways to Process Maturity: The Personal Software Process and Team Software Process
 
Continuous and Staged, a Choice of CMMI Representations 12/1/99
Continuous and Staged, a Choice of CMMI Representations
 
Roundtable Interview on CMMI 12/1/99
Roundtable Interview on CMMI
 
CMMI: The Evolution of Process Improvement 12/1/99
CMMI: The Evolution of Process Improvement
 
The Elusive Search for Categories 12/1/99
The Elusive Search for Categories
 
Software Architecture Evaluation in the DoD Systems Acquisition Context 12/1/99
Software Architecture Evaluation in the DoD Systems Acquisition Context
 
Protecting Critical Systems in Unbounded Networks 12/1/99
Protecting Critical Systems in Unbounded Networks
 
Making the Strategic Case for Process Improvement 12/1/99
Making the Strategic Case for Process Improvement
 
The Net Effects of Product Lines 9/1/99
The Net Effects of Product Lines
 
Who's in Charge Here? 9/1/99
Who's in Charge Here?
 
Perils and Joys of Reconstructing Architectures, The 4/23/09
The Perils and Joys of Reconstructing Architectures
 
Eight Key Factors for Successful Technology Collaborations 9/1/99
Eight Key Factors for Successful Technology Collaborations
 
A Scenario for Using the Product Line Practice Framework 9/1/99
A Scenario for Using the Product Line Practice Framework
 
A Framework for Software Product Line Practice 9/1/99
A Framework for Software Product Line Practice
 
Product Lines in Practice at Three Major Corporations 9/1/99
Product Lines in Practice at Three Major Corporations
 
Software Product Lines: A New Paradigm for the New Century 9/1/99
Software Product Lines: A New Paradigm for the New Century
 
From Y2K to Security Improvement: A Critical Transition 9/1/99
From Y2K to Security Improvement: A Critical Transition
 
Getting Management Support for Process Improvement 9/1/99
Getting Management Support for Process Improvement
 
The Net Effects of MP3 6/1/99
The Net Effects of MP3
 
Delivering on the Promise of Process Improvement 6/1/99
Delivering on the Promise of Process Improvement
 
Roundtable Interview on PSP/TSP 6/1/99
Roundtable Interview on PSP/TSP
 
Introduction: Checking In on a Process Improvement Revolution 6/1/99
Introduction: Checking In on a Process Improvement Revolution
 
Requirements and COTS-Based Systems: A Thorny Question Indeed 6/1/99
Requirements and COTS-Based Systems: A Thorny Question Indeed
 
Using Scenarios in Architecture Evaluations 6/1/99
Using Scenarios in Architecture Evaluations
 
Software Strategy for Technology Collaborations 6/1/99
Software Strategy for Technology Collaborations
 
Were You Ready for the Melissa Virus? 6/1/99
Were You Ready for the Melissa Virus?
 
Doing Disciplined Work 6/1/99
Doing Disciplined Work
 
Bugs or Defects? 3/1/99
Bugs or Defects?
 
An Example of Erratic Effort Estimation 3/1/99
An Example of Erratic Effort Estimation
 
Requirements Engineering Roundtable 3/1/99
Requirements Engineering Roundtable
 
Introduction 3/1/99
Introduction
 
Requirements Engineering 3/1/99
Requirements Engineering
 
COTS Product Evaluation and System Design 3/1/99
COTS Product Evaluation and System Design
 
Analyzing Quality Attributes 3/1/99
Analyzing Quality Attributes
 
Meeting the Challenges of Requirements Engineering 3/1/99
Meeting the Challenges of Requirements Engineering
 
Avoiding the Trial-by-Fire Approach to Security Incidents 3/1/99
Avoiding the Trial-by-Fire Approach to Security Incidents
 
What Messages Are You Sending to Vendors? 12/1/98
What Messages Are You Sending to Vendors?
 
Making Team Plans 12/1/98
Making Team Plans
 
Distance Learning Grows by Degrees 12/1/98
Distance Learning Grows by Degrees
 
COTS Evaluation in the Real World 12/1/98
COTS Evaluation in the Real World
 
Representing Software Architecture 12/1/98
Representing Software Architecture
 
Interview with Richard D. Pethia 12/1/98
Interview with Richard D. Pethia
 
CERT Coordination Center Celebrates Ten Years 12/1/98
CERT Coordination Center Celebrates Ten Years
 
Security of the Internet 12/1/98
Security of the Internet
 
Your Date or Mine? 9/1/98
Your Date or Mine?
 
Life in the Digital Subscriber Lane 9/1/98
Life in the Digital Subscriber Lane
 
Discussion with Members of the CMM Integration (CMMI) Steering Group 9/1/98
Discussion with Members of the CMM Integration (CMMI) Steering Group
 
Introduction: Capability Maturity Model Integration 9/1/98
This 1998 article by the Software Engineering Institute (SEI) provides an introduction to the Capability Maturity Model Integration (CMMI) model.
 
CMM Integration (CMMI) Framework 9/1/98
CMM Integration (CMMI) Framework
 
Evaluation of COTS Products: Some Thoughts on the Process 9/1/99
Evaluation of COTS Products: Some Thoughts on the Process
 
Capability Maturity Model Process Improvement 9/1/98
Capability Maturity Model Process Improvement
 
Are Software Architects Like Building Architects? 9/1/98
Are Software Architects Like Building Architects?
 
Security Matters – Doesn't It? 9/1/98
Security Matters – Doesn't It?
 
Why Does Software Work Take So Long? 6/1/98
Why Does Software Work Take So Long?
 
The Era of Net-Centric Computing 6/1/98
The Era of Net-Centric Computing
 
Discussion with Members of the SEI COTS-Based Systems Initiative 6/1/98
Discussion with Members of the SEI COTS-Based Systems Initiative
 
COTS Software Evaluation 6/1/98
COTS Software Evaluation
 
The Opportunities and Complexities of Applying Commercial-Off-the-Shelf Components 6/1/98
The Opportunities and Complexities of Applying Commercial-Off-the-Shelf Components

Find Us Here

Find us on Youtube  Find us on LinkedIn  Find us on twitter  Find us on Facebook

Share This Page

Share on Facebook  Send to your Twitter page  Save to del.ico.us  Save to LinkedIn  Digg this  Stumble this page.  Add to Technorati favorites  Save this page on your Google Home Page 

For more information

Contact Us

info@sei.cmu.edu

412-268-5800

Help us improve

Visitor feedback helps us continually improve our site.

Please tell us what you
think with this short
(< 5 minute) survey.