<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Software Architecture</title><link>http://www.sei.cmu.edu/feeds/topic/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Software Architecture</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/topic/software-architecture/rss/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 19 Aug 2024 00:00:00 -0400</lastBuildDate><item><title>Building Quality Software: 4 Engineering-Centric Techniques</title><link>https://www.sei.cmu.edu/blog/building-quality-software-4-engineering-centric-techniques/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Why is it easier to verify the function of a software program rather than its qualities? This post outlines 4 engineering-centric techniques to creating quality software.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alejandro Gomez</dc:creator><pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/building-quality-software-4-engineering-centric-techniques/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>The OSATE Slicer: Fast Reachability Query Support for Architectural Models</title><link>https://www.sei.cmu.edu/blog/the-osate-slicer-fast-reachability-query-support-for-architectural-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Our post introduces the OSATE Slicer, a new extension to the Open Source AADL Tool Environment that adapts a concept called slicing to architectural models of embedded, critical systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sam Procter</dc:creator><pubDate>Mon, 13 Nov 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-osate-slicer-fast-reachability-query-support-for-architectural-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>How to Use Docker and NS-3 to Create Realistic Network Simulations</title><link>https://www.sei.cmu.edu/blog/how-to-use-docker-and-ns-3-to-create-realistic-network-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post provides a tutorial with code samples on using Docker and NS-3 to Create Realistic Network Simulations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alejandro Gomez</dc:creator><pubDate>Mon, 27 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-use-docker-and-ns-3-to-create-realistic-network-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Software Isolation: Why It Matters to Software Evolution and Why Everybody Puts It Off</title><link>https://www.sei.cmu.edu/blog/software-isolation-why-it-matters-to-software-evolution-and-why-everybody-puts-it-off/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses the practice of software isolation, which is one of the steps in large-scale refactoring efforts that most software development organizations go through.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mario Benitez</dc:creator><pubDate>Mon, 20 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/software-isolation-why-it-matters-to-software-evolution-and-why-everybody-puts-it-off/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category></item><item><title>Experiences Documenting and Remediating Enterprise Technical Debt</title><link>https://www.sei.cmu.edu/blog/experiences-documenting-and-remediating-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post provides examples of enterprise technical debt and the risk it represents taken from real-world projects.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stephany Bellomo</dc:creator><pubDate>Mon, 19 Dec 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/experiences-documenting-and-remediating-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Technical Debt</category></item><item><title>What Is Enterprise Technical Debt?</title><link>https://www.sei.cmu.edu/blog/what-is-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post provides examples of enterprise technical debt, and the risk it represents, taken from real-world projects on which SEI researchers served as architecture evaluators.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stephany Bellomo</dc:creator><pubDate>Mon, 05 Dec 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/what-is-enterprise-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Modeling Capabilities with Model-Based Systems Engineering (MBSE)</title><link>https://www.sei.cmu.edu/blog/modeling-capabilities-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post examines the role of capabilities in systems engineering—their purpose, how they are modeled and analyzed using MBSE and SysML, and how they can be associated with business requirements.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 28 Nov 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/modeling-capabilities-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Model-Based Systems Engineering</category></item><item><title>Tactics and Patterns for Software Robustness</title><link>https://www.sei.cmu.edu/blog/tactics-and-patterns-for-software-robustness/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Robustness, along with other quality attributes, such as security and safety, is a key contributor to our trust that a system will perform in a reliable manner.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rick Kazman</dc:creator><pubDate>Mon, 25 Jul 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/tactics-and-patterns-for-software-robustness/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>A Model-Based Tool to Assist in the Design of Safety-Critical Systems</title><link>https://www.sei.cmu.edu/blog/a-model-based-tool-to-assist-in-the-design-of-safety-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The design of critical systems—those used in aircraft, medical devices, etc.—is becoming increasingly challenging as they increase in sophistication and complexity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sam Procter</dc:creator><pubDate>Mon, 07 Mar 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/a-model-based-tool-to-assist-in-the-design-of-safety-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Two Categories of Architecture Patterns for Deployability</title><link>https://www.sei.cmu.edu/blog/two-categories-of-architecture-patterns-for-deployability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post, excerpted from the fourth edition of Software Architecture in Practice, discusses deployability and describes two categories of associated architecture patterns.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rick Kazman</dc:creator><pubDate>Mon, 14 Feb 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/two-categories-of-architecture-patterns-for-deployability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Devops</category><category>Quality Attributes</category><category>Agile</category></item><item><title>Six Acquisition Pathways for Large-Scale, Complex Systems</title><link>https://www.sei.cmu.edu/blog/six-acquisition-pathways-for-large-scale-complex-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>How to map technical reference frameworks (TRFs) to the pathways that compose the DoD’s Adaptive Acquisition Framework (AAF)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt, Nickolas Guertin</dc:creator><pubDate>Mon, 07 Feb 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/six-acquisition-pathways-for-large-scale-complex-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>System of Systems</category><category>Open Systems Architectures</category><category>Achieving Modular Open System Architectures in DOD Acquisition</category><category>Acquisition Transformation</category></item><item><title>Toward Technical Reference Frameworks to Support Large-Scale Systems of Systems</title><link>https://www.sei.cmu.edu/blog/toward-technical-reference-frameworks-to-support-large-scale-systems-of-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Strategies for creating architectures for large-scale, complex, and interoperable systems of systems that are composed of functions covering a broad range of requirements.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nickolas Guertin, Douglas Schmidt</dc:creator><pubDate>Mon, 20 Dec 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/toward-technical-reference-frameworks-to-support-large-scale-systems-of-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>System of Systems</category><category>Open Systems Architectures</category><category>Achieving Modular Open System Architectures in DOD Acquisition</category><category>Acquisition Transformation</category></item><item><title>Integrating Safety and Security Engineering for Mission-Critical Systems</title><link>https://www.sei.cmu.edu/blog/integrating-safety-and-security-engineering-for-mission-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Critical systems must be safe from harm and secure, but safety and security practices have evolved in isolation. The SEI is improving coordination between safety and security engineering.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sam Procter, Sholom Cohen</dc:creator><pubDate>Mon, 10 May 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/integrating-safety-and-security-engineering-for-mission-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Safety-Related Requirements</category><category>Security-Related Requirements</category></item><item><title>Automating System Security with AADL: 11 Rules for Ensuring a Security Model</title><link>https://www.sei.cmu.edu/blog/automating-system-security-with-aadl-11-rules-for-ensuring-a-security-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post presents an approach for modeling and validating confidentiality using AADL, and 11 analysis rules for ensuring security model consistency.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aaron Greenhouse</dc:creator><pubDate>Mon, 26 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automating-system-security-with-aadl-11-rules-for-ensuring-a-security-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Architecture Analysis and Design Language (AADL)</category></item><item><title>When Your Software’s “Check Engine” Light Is On: Identifying Design Problems that Impact Software Failure</title><link>https://www.sei.cmu.edu/blog/when-your-softwares-check-engine-light-is-on-identifying-design-problems-that-impact-software-failure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post summarizes an effective roadmap for detecting design problems that can be used to improve software development and performance.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Judy Hwang</dc:creator><pubDate>Mon, 19 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/when-your-softwares-check-engine-light-is-on-identifying-design-problems-that-impact-software-failure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Requirements in Model-Based Systems Engineering (MBSE)</title><link>https://www.sei.cmu.edu/blog/requirements-in-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI blog post presents a comprehensive guide to effectively manage requirements in Model-Based Systems Engineering (MBSE) for better results.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 22 Feb 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/requirements-in-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Digital Engineering</category><category>Data Modeling and Analytics</category><category>Model-Based Systems Engineering</category></item><item><title>8 Steps for Migrating Existing Applications to Microservices</title><link>https://www.sei.cmu.edu/blog/8-steps-for-migrating-existing-applications-to-microservices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, I describe a plan for how organizations that wish to migrate existing applications to microservices can do so safely and effectively.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 28 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/8-steps-for-migrating-existing-applications-to-microservices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category></item><item><title>Addressing Open Architecture in Software Cost Estimation</title><link>https://www.sei.cmu.edu/blog/addressing-open-architecture-software-cost-estimation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Identifying, estimating, and containing the cost of software is critical to the effective deployment of government systems....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Gagliardi, Michael Konrad, Douglas Schmidt</dc:creator><pubDate>Mon, 06 Jul 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/addressing-open-architecture-software-cost-estimation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Cost Estimates</category><category>Software Architecture</category></item><item><title>Impacts and Recommendations for Achieving Modular Open Systems Architectures --Fifth Post in a Series</title><link>https://www.sei.cmu.edu/blog/impacts-and-recommendations-for-achieving-modular-open-systems-architectures-fifth-post-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this series of blog posts, adapted from a recently published paper, we sought to demonstrate how layered business and technical architectures can leverage modular component design practices....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nickolas Guertin, Douglas Schmidt</dc:creator><pubDate>Mon, 23 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/impacts-and-recommendations-for-achieving-modular-open-systems-architectures-fifth-post-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Achieving Modular Open System Architectures in DOD Acquisition</category><category>Acquisition Transformation</category></item><item><title>Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities</title><link>https://www.sei.cmu.edu/blog/why-software-architects-must-be-involved-in-the-earliest-systems-engineering-activities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Today's major defense systems rely heavily on software-enabled capabilities. However, many defense programs acquiring new systems first determine the physical items to develop....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sarah Sheard, Suzanne Miller, Bill Nichols, Donald Firesmith, Michael Phillips</dc:creator><pubDate>Mon, 12 Aug 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/why-software-architects-must-be-involved-in-the-earliest-systems-engineering-activities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Sustainment</category></item></channel></rss>