search menu icon-carat-right cmu-wordmark

Software Solutions Conference (SSC) 2015 Presentations

Presentations from the program of SSC 2015 (November 16-18, 2015, in Arlington, VA)

Publisher:

Software Engineering Institute

This collection was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.

The three-day SSC 2015 technical program included tutorials, presentations, panel discussions, and keynote addresses by distinguished experts in government. The conference offered attendees the opportunity to learn about emerging technologies and technical strategies for assuring quality, timeliness, trust, and affordability in systems that rely on software.


Agile Acquisition and FITARA

November 2015

This presentation describes the FITARA Roadmap for Sustainable IT Reform, a decision analytics maturity model for measuring business value and risk of commercial IT.

Building Secure Software for Mission Critical Systems (2015)

November 2015

This presentation explores the expanding landscape of vulnerabilities that accompanies an increasing reliance on software and examines key steps to help mitigate the increased risk.

Busting Silos & Red Tape: DevOps in Federal Government

November 2015

In this presentation, the authors describe how they helped shift a government stakeholder's thinking through coaching and initiating DevOps in the organization's operational and development environments.

A Case Study: Experiences with Agile and Lean Principles

November 2015

This case study tells the story of the development of a critical IT system in the U.S. Federal Government and is written so that other government entities can benefit from the implementation experiences.

Common System and Software Testing Pitfalls

November 2015

This presentation discusses a taxonomy of 167 testing anti-patterns that the author analyzed and fully documented, describing each pitfall and providing recommendations for avoiding them and mitigating their harm.

Contracting Officer’s Representative (COR) Interactive SharePoint Wiki

November 2015

This presentation shows the creation of a single point of reference consisting of a curated set of DoD and local documents, templates, and checklists to aid the COR and promote information sharing and collaboration.

Dashing All the Way: Defining the Best Dashboard for Your Program

November 2015

This presentation shows a program dashboard representation used in some Air Force programs to aggregate the data being reported and includes methods that provide some insight into schedule risk.

A Defect Prioritization Method Based on the Risk Priority Number

November 2015

This presentation presents a defect-prioritization method based on a risk priority number, which will help program offices establish priorities for updating systems.

Designing the Infrastructure for an Enterprise IT System

November 2015

This presentation discusses five issues faced by government organizations embarking on the development of enterprise-wide IT systems that integrate and modernize legacy system functions.

Edge Analytics: Analysis of Social Media to Support Tactical Users

November 2015

This presentation explores the architecture and implementation of Edge Analytics, discusses field trials, and presents findings from analyzing Twitter data related to the 2012 attack on the U.S. Diplomatic Mission in Benghazi.

Elicitation of Unstated Needs

November 2015

This presentation covers the KJ method and additional extensions that allow KJ to be used in a virtual environment (KJ+). The results of a KJ+ case study and two brief exercises are included.

Engineering High-Assurance Software for Distributed Adaptive Real-Time Systems

November 2015

This presentation describes an evidence-based approach for producing high-assurance DART software involving multiple layers of the CPS stack.

Experiences in Migrations of Legacy Systems

November 2015

This presentation describes a rational way for modernizing a legacy system using system architectural concepts to develop architectural options, create a scorecard, apply the scorecard, and present the results with recommendations to decision makers.

From Virtual System Integration to Incremental Lifecycle Assurance

November 2015

This presentation discusses problems associated with the increasing complexity of software systems that are threatening industry's ability to build the next generation of safety-critical embedded systems.

Government As the Integrator: Why, Why Not, and How?

November 2015

This presentation identifies many of the factors that determine whether government as the integrator (GATI) is more likely to be successful in certain domains and circumstances.

Implementing Product Development Flow: The Key to Managing Large Scale Agile Development

November 2015

In this presentation, you will learn about the sound principles and engineering-minded tradeoffs that occur when agile methods are applied successfully.

Intellectual Property Rights: Why You Should Care and How to Manage Them

November 2015

This presentation discusses strategies and language for addressing IP rights throughout the acquisition lifecycle.

The Joint Fire Science Program (JFSP) and the Interagency Fuels Treatment Decision Support System (IFTDSS)

November 2015

This presentation describes how the interagency Joint Fire Science Program developed and assessed the Interagency Fuel Treatment Decision Support System to meet the needs of the wildland fire community for fuel-treatment planning.

Keynote: A Case Study of Toyota Unintended Acceleration and Software Safety

November 2015

This talk will outline key events in the still-ongoing Toyota unintended acceleration story and pull together the technical issues that have been discovered by NASA and other experts.

Keynote: Gaps in Science and Technology Activities for the IT Acquisition of Business Systems

November 2015

In this presentation, Mr. Seraphin summarizes congressional concerns about gaps in science and technology activities related to the IT acquisition of business systems.

Keynote: SEI Research Program

November 2015

This presentation summarizes the SEI's research program, including topics in software development, vulnerability discovery, digital forensics, malware analysis, embedded systems, formal methods, cyber training, and risk management.

Keynote: Speed with Discipline

November 2015

This presentation describes an approach for achieving software security assurance while keeping the desired pace of releasing new capabilities.

Managing Software and System Complexity

November 2015

This presentation discusses the research the SEI is doing to determine what characteristics of avionics systems can be measured to help evaluate whether a system is capable of being certified as safe.

Measurement and Analysis in the Real World: Tools for Cleaning Messy Data

November 2015

This presentation includes a brief demonstration of tools created by SEI staff that help scan, analyze, and prepare data to be used on a weekly metrics report.

Moving to the IC Cloud

November 2015

This presentation explores up-and-coming cloud technologies used by members of the intelligence community along with some of the challenges and opportunities they present.

Open Systems Architecture: Progress and Challenges

November 2015

Panel members discussed OSA from several perspectives, including technical engineering, policy, contracting, and science and technology research.

Paying Due Diligence to Software Architecture in Acquisition

November 2015

This presentation describes approaches that the SEI has used with program offices to adopt software architecture and quality attribute practices in acquisition contexts.

Performance Metrics That Matter: Eliminating Surprises in Agile Projects

November 2015

This presentation focuses on how the government can experience true agility with quality. It describes the challenges the author's organization faced using agile and how they were successfully overcome.

Providing Information Superiority to Small Tactical Units

November 2015

This presentation discusses the Information Security to the Edge (ISE) system built by the Advanced Mobile Systems Initiative at the Carnegie Mellon Software Engineering Institute.

Scaling Agile Methods for Major Defense Programs: Frameworks and Methods in Use Today

November 2015

This presentation addresses what is meant by scaling, contextual drivers for implementation choices, and the agile frameworks available for use today.

SoS Architectures - Identifying Architecture, Engineering and Capability Challenges Early in the Lifecycle

November 2015

The SEI has applied its Mission Thread Workshop (MTW) approach on a variety of system of systems (SoS) architectures in DoD organizations. This talk presents the MTW in the context of a DoD mission-critical SoS example.

A Systematic Method for Big Data Technology Selection

November 2015

This talk discusses why prototyping is necessary for evaluating big data technology and how the LEAP4BD method provides a systematic framework for technology evaluation.

Tactical Cloudlets: Moving Cloud Computing to the Tactical Edge

November 2015

This presentation explains the tactical cloudlet concept and describes an implementation targeted at promoting the survivability of mobile systems.

Technical Debt: Why Should You Care?

November 2015

This presentation explores common fallacies about technical debt and includes possible actions that development teams can take to better manage it.

What Happens and How: Analyzing the Results of 13 Acquisition Program Assessments

November 2015

This presentation explains a set of recurring dynamics that drive the key high-level findings of independent technical assessments and provides qualitative models of each adverse behavior.