The SEI Digital Library provides access to more than 3,500 documents from three decades of research into best practices in software engineering. These documents include technical reports, presentations, webinars, podcasts and other materials searchable by user-supplied keywords and organized by topic, publication type, publication year, and author.
This presentation reports experiences implementing Risk- and Cost-Driven Architecture (RCDA) at a major European transportation infrastructure organization.
This talk proposes several ways to evaluate the security readiness of an architecture: vulnerability-, tactics-, and pattern-based architectural analysis techniques.
This talk discusses the Architecture Valuation Framework, the approach to implementing it, and its applicability to the target architecture definition process.
This talk presents a case study of identifying architecture debts in a large-scale industrial software project by modeling software architecture as design rule spaces.
This presentation introduces a program called the Application Wellness Clinic that organizations can use to strengthen an application's stability and longevity.
In this podcast, Matt Butkovic and John Haller discuss approaches for more effectively managing supply chain risks, focusing on risks arising from “external entities that provide, sustain, or operate Information and Communications Technology (ICT)."
In this podcast, the tenth in a series by Suzanne Miller and Mary Ann Lapham exploring the application of Agile principles in the Department of Defense, the two researchers discuss the application of the eleventh principle:
This podcast summarizes the inaugural Measuring What Matters Workshop conducted in November 2014, and the team's experiences planning and executing the workshop and identifying improvements for future offerings.
Sound cyber intelligence practices can help organizations prevent or mitigate major security breaches. For several years, researchers at the SEI have been examining methodologies, processes, technology, and training to help organizations.
This webinar presents the tactical cloudlet concept and experimentation results for five different cloudlet provisioning mechanisms.
This webinar will explain the component used in RPN and how it can help a program select between competing defects to best utilize constrained resources to help lower overall system risk.