Podcast Episodes

Back to Search
Capturing the Expertise of Cybersecurity Incident Handlers

In this podcast, Dr. Richard Young, a professor with Carnegie Mellon's Tepper School of Business, teams with Sam Perl, a member of the CERT Division'…

10 years, 7 months ago

Short Long
View Episode
Improving Quality Using Architecture Fault Analysis with Confidence Arguments

In this podcast, Peter Feiler discusses a case study that demonstrates how an analytical architecture fault-modeling approach can be combined with co…

10 years, 8 months ago

Short Long
View Episode
A Taxonomy of Testing Types

A surprisingly large number of different types of testing exist and are used during the development and operation of software-reliant systems. While …

10 years, 8 months ago

Short Long
View Episode
Reducing Complexity in Software & Systems

Systems are increasingly software-reliant and interconnected, making design, analysis and evaluation harder than in the past. While new capabilities …

10 years, 9 months ago

Short Long
View Episode
Designing Security Into Software-Reliant Systems

Software is a growing component of modern business- and mission-critical systems. As organizations become more dependent on software, security-relate…

10 years, 9 months ago

Short Long
View Episode
Agile Methods in Air Force Sustainment

For several years, the Software Engineering Institute has researched the viability of Agile software development methods within Department of Defense…

10 years, 10 months ago

Short Long
View Episode
Defect Prioritization With the Risk Priority Number

Most software systems have some "defects" that are identified by users.  Some of these are truly defects in that the requirements were not properly i…

10 years, 10 months ago

Short Long
View Episode
SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers

As the number of sensors on smart phones continues to grow, these devices can automatically track data from the user's environment, including geoloca…

10 years, 11 months ago

Short Long
View Episode
An Introduction to Context-Aware Computing

As the number of sensors on smart phones continues to grow, these devices can automatically track data from the user's environment, including geoloca…

10 years, 11 months ago

Short Long
View Episode
Data Driven Software Assurance

Software vulnerabilities are defects or weaknesses in a software system that, if exploited, can lead to compromise of the control of a system or the …

11 years ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us