<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Software Architecture</title><link href="http://www.sei.cmu.edu/feeds/topic/software-architecture/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/topic/software-architecture/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/topic/software-architecture/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2024-08-19T00:00:00-04:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Software Architecture</subtitle><entry><title>Building Quality Software: 4 Engineering-Centric Techniques</title><link href="https://www.sei.cmu.edu/blog/building-quality-software-4-engineering-centric-techniques/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-08-19T00:00:00-04:00</published><updated>2024-08-19T00:00:00-04:00</updated><author><name>Alejandro Gomez</name></author><id>https://www.sei.cmu.edu/blog/building-quality-software-4-engineering-centric-techniques/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Why is it easier to verify the function of a software program rather than its qualities? This post outlines 4 engineering-centric techniques to creating quality software.</summary></entry><entry><title>The OSATE Slicer: Fast Reachability Query Support for Architectural Models</title><link href="https://www.sei.cmu.edu/blog/the-osate-slicer-fast-reachability-query-support-for-architectural-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-11-13T00:00:00-05:00</published><updated>2023-11-13T00:00:00-05:00</updated><author><name>Sam Procter</name></author><id>https://www.sei.cmu.edu/blog/the-osate-slicer-fast-reachability-query-support-for-architectural-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Our post introduces the OSATE Slicer, a new extension to the Open Source AADL Tool Environment that adapts a concept called slicing to architectural models of embedded, critical systems.</summary></entry><entry><title>How to Use Docker and NS-3 to Create Realistic Network Simulations</title><link href="https://www.sei.cmu.edu/blog/how-to-use-docker-and-ns-3-to-create-realistic-network-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-03-27T00:00:00-04:00</published><updated>2023-03-27T00:00:00-04:00</updated><author><name>Alejandro Gomez</name></author><id>https://www.sei.cmu.edu/blog/how-to-use-docker-and-ns-3-to-create-realistic-network-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post provides a tutorial with code samples on using Docker and NS-3 to Create Realistic Network Simulations.</summary></entry><entry><title>Software Isolation: Why It Matters to Software Evolution and Why Everybody Puts It Off</title><link href="https://www.sei.cmu.edu/blog/software-isolation-why-it-matters-to-software-evolution-and-why-everybody-puts-it-off/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-03-20T00:00:00-04:00</published><updated>2023-03-20T00:00:00-04:00</updated><author><name>Mario Benitez</name></author><id>https://www.sei.cmu.edu/blog/software-isolation-why-it-matters-to-software-evolution-and-why-everybody-puts-it-off/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post discusses the practice of software isolation, which is one of the steps in large-scale refactoring efforts that most software development organizations go through.</summary><category term="Software Architecture"/></entry><entry><title>Experiences Documenting and Remediating Enterprise Technical Debt</title><link href="https://www.sei.cmu.edu/blog/experiences-documenting-and-remediating-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-12-19T00:00:00-05:00</published><updated>2022-12-19T00:00:00-05:00</updated><author><name>Stephany Bellomo</name></author><id>https://www.sei.cmu.edu/blog/experiences-documenting-and-remediating-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post provides examples of enterprise technical debt and the risk it represents taken from real-world projects.</summary><category term="Technical Debt"/></entry><entry><title>What Is Enterprise Technical Debt?</title><link href="https://www.sei.cmu.edu/blog/what-is-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-12-05T00:00:00-05:00</published><updated>2022-12-05T00:00:00-05:00</updated><author><name>Stephany Bellomo</name></author><id>https://www.sei.cmu.edu/blog/what-is-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post provides examples of enterprise technical debt, and the risk it represents, taken from real-world projects on which SEI researchers served as architecture evaluators.</summary></entry><entry><title>Modeling Capabilities with Model-Based Systems Engineering (MBSE)</title><link href="https://www.sei.cmu.edu/blog/modeling-capabilities-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-11-28T00:00:00-05:00</published><updated>2022-11-28T00:00:00-05:00</updated><author><name>Nataliya Shevchenko</name></author><id>https://www.sei.cmu.edu/blog/modeling-capabilities-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post examines the role of capabilities in systems engineering—their purpose, how they are modeled and analyzed using MBSE and SysML, and how they can be associated with business requirements.</summary><category term="Model-Based Systems Engineering"/></entry><entry><title>Tactics and Patterns for Software Robustness</title><link href="https://www.sei.cmu.edu/blog/tactics-and-patterns-for-software-robustness/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-07-25T00:00:00-04:00</published><updated>2022-07-25T00:00:00-04:00</updated><author><name>Rick Kazman</name></author><id>https://www.sei.cmu.edu/blog/tactics-and-patterns-for-software-robustness/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Robustness, along with other quality attributes, such as security and safety, is a key contributor to our trust that a system will perform in a reliable manner.</summary></entry><entry><title>A Model-Based Tool to Assist in the Design of Safety-Critical Systems</title><link href="https://www.sei.cmu.edu/blog/a-model-based-tool-to-assist-in-the-design-of-safety-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-03-07T00:00:00-05:00</published><updated>2022-03-07T00:00:00-05:00</updated><author><name>Sam Procter</name></author><id>https://www.sei.cmu.edu/blog/a-model-based-tool-to-assist-in-the-design-of-safety-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The design of critical systems—those used in aircraft, medical devices, etc.—is becoming increasingly challenging as they increase in sophistication and complexity.</summary></entry><entry><title>Two Categories of Architecture Patterns for Deployability</title><link href="https://www.sei.cmu.edu/blog/two-categories-of-architecture-patterns-for-deployability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-02-14T00:00:00-05:00</published><updated>2022-02-14T00:00:00-05:00</updated><author><name>Rick Kazman</name></author><id>https://www.sei.cmu.edu/blog/two-categories-of-architecture-patterns-for-deployability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post, excerpted from the fourth edition of Software Architecture in Practice, discusses deployability and describes two categories of associated architecture patterns.</summary><category term="Software Architecture"/><category term="Devops"/><category term="Quality Attributes"/><category term="Agile"/></entry><entry><title>Six Acquisition Pathways for Large-Scale, Complex Systems</title><link href="https://www.sei.cmu.edu/blog/six-acquisition-pathways-for-large-scale-complex-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-02-07T00:00:00-05:00</published><updated>2022-02-07T00:00:00-05:00</updated><author><name>Douglas Schmidt, Nickolas Guertin</name></author><id>https://www.sei.cmu.edu/blog/six-acquisition-pathways-for-large-scale-complex-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">How to map technical reference frameworks (TRFs) to the pathways that compose the DoD’s Adaptive Acquisition Framework (AAF)</summary><category term="Software Assurance"/><category term="System of Systems"/><category term="Open Systems Architectures"/><category term="Achieving Modular Open System Architectures in DOD Acquisition"/><category term="Acquisition Transformation"/></entry><entry><title>Toward Technical Reference Frameworks to Support Large-Scale Systems of Systems</title><link href="https://www.sei.cmu.edu/blog/toward-technical-reference-frameworks-to-support-large-scale-systems-of-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-12-20T00:00:00-05:00</published><updated>2021-12-20T00:00:00-05:00</updated><author><name>Nickolas Guertin, Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/toward-technical-reference-frameworks-to-support-large-scale-systems-of-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Strategies for creating architectures for large-scale, complex, and interoperable systems of systems that are composed of functions covering a broad range of requirements.</summary><category term="Software Assurance"/><category term="System of Systems"/><category term="Open Systems Architectures"/><category term="Achieving Modular Open System Architectures in DOD Acquisition"/><category term="Acquisition Transformation"/></entry><entry><title>Integrating Safety and Security Engineering for Mission-Critical Systems</title><link href="https://www.sei.cmu.edu/blog/integrating-safety-and-security-engineering-for-mission-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-05-10T00:00:00-04:00</published><updated>2021-05-10T00:00:00-04:00</updated><author><name>Sam Procter, Sholom Cohen</name></author><id>https://www.sei.cmu.edu/blog/integrating-safety-and-security-engineering-for-mission-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Critical systems must be safe from harm and secure, but safety and security practices have evolved in isolation. The SEI is improving coordination between safety and security engineering.</summary><category term="Safety-Related Requirements"/><category term="Security-Related Requirements"/></entry><entry><title>Automating System Security with AADL: 11 Rules for Ensuring a Security Model</title><link href="https://www.sei.cmu.edu/blog/automating-system-security-with-aadl-11-rules-for-ensuring-a-security-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-04-26T00:00:00-04:00</published><updated>2021-04-26T00:00:00-04:00</updated><author><name>Aaron Greenhouse</name></author><id>https://www.sei.cmu.edu/blog/automating-system-security-with-aadl-11-rules-for-ensuring-a-security-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post presents an approach for modeling and validating confidentiality using AADL, and 11 analysis rules for ensuring security model consistency.</summary><category term="Security-Related Requirements"/><category term="Architecture Analysis and Design Language (AADL)"/></entry><entry><title>When Your Software’s “Check Engine” Light Is On: Identifying Design Problems that Impact Software Failure</title><link href="https://www.sei.cmu.edu/blog/when-your-softwares-check-engine-light-is-on-identifying-design-problems-that-impact-software-failure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-04-19T00:00:00-04:00</published><updated>2021-04-19T00:00:00-04:00</updated><author><name>Judy Hwang</name></author><id>https://www.sei.cmu.edu/blog/when-your-softwares-check-engine-light-is-on-identifying-design-problems-that-impact-software-failure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post summarizes an effective roadmap for detecting design problems that can be used to improve software development and performance.</summary></entry><entry><title>Requirements in Model-Based Systems Engineering (MBSE)</title><link href="https://www.sei.cmu.edu/blog/requirements-in-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-02-22T00:00:00-05:00</published><updated>2021-02-22T00:00:00-05:00</updated><author><name>Nataliya Shevchenko</name></author><id>https://www.sei.cmu.edu/blog/requirements-in-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI blog post presents a comprehensive guide to effectively manage requirements in Model-Based Systems Engineering (MBSE) for better results.</summary><category term="Digital Engineering"/><category term="Data Modeling and Analytics"/><category term="Model-Based Systems Engineering"/></entry><entry><title>8 Steps for Migrating Existing Applications to Microservices</title><link href="https://www.sei.cmu.edu/blog/8-steps-for-migrating-existing-applications-to-microservices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-09-28T00:00:00-04:00</published><updated>2020-09-28T00:00:00-04:00</updated><author><name>Brent Frye</name></author><id>https://www.sei.cmu.edu/blog/8-steps-for-migrating-existing-applications-to-microservices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In this blog post, I describe a plan for how organizations that wish to migrate existing applications to microservices can do so safely and effectively.</summary><category term="Software Architecture"/></entry><entry><title>Addressing Open Architecture in Software Cost Estimation</title><link href="https://www.sei.cmu.edu/blog/addressing-open-architecture-software-cost-estimation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-07-06T00:00:00-04:00</published><updated>2020-07-06T00:00:00-04:00</updated><author><name>Michael Gagliardi, Michael Konrad, Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/addressing-open-architecture-software-cost-estimation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Identifying, estimating, and containing the cost of software is critical to the effective deployment of government systems....</summary><category term="Software Cost Estimates"/><category term="Software Architecture"/></entry><entry><title>Impacts and Recommendations for Achieving Modular Open Systems Architectures --Fifth Post in a Series</title><link href="https://www.sei.cmu.edu/blog/impacts-and-recommendations-for-achieving-modular-open-systems-architectures-fifth-post-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-09-23T00:00:00-04:00</published><updated>2019-09-23T00:00:00-04:00</updated><author><name>Nickolas Guertin, Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/impacts-and-recommendations-for-achieving-modular-open-systems-architectures-fifth-post-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In this series of blog posts, adapted from a recently published paper, we sought to demonstrate how layered business and technical architectures can leverage modular component design practices....</summary><category term="Achieving Modular Open System Architectures in DOD Acquisition"/><category term="Acquisition Transformation"/></entry><entry><title>Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities</title><link href="https://www.sei.cmu.edu/blog/why-software-architects-must-be-involved-in-the-earliest-systems-engineering-activities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-08-12T00:00:00-04:00</published><updated>2019-08-12T00:00:00-04:00</updated><author><name>Sarah Sheard, Suzanne Miller, Bill Nichols, Donald Firesmith, Michael Phillips</name></author><id>https://www.sei.cmu.edu/blog/why-software-architects-must-be-involved-in-the-earliest-systems-engineering-activities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Today's major defense systems rely heavily on software-enabled capabilities. However, many defense programs acquiring new systems first determine the physical items to develop....</summary><category term="Software Sustainment"/></entry></feed>