Podcast Episodes
Back to SearchCapturing the Expertise of Cybersecurity Incident Handlers
In this podcast, Dr. Richard Young, a professor with Carnegie Mellon's Tepper School of Business, teams with Sam Perl, a member of the CERT Division'…
10 years, 7 months ago
Improving Quality Using Architecture Fault Analysis with Confidence Arguments
In this podcast, Peter Feiler discusses a case study that demonstrates how an analytical architecture fault-modeling approach can be combined with co…
10 years, 8 months ago
A Taxonomy of Testing Types
A surprisingly large number of different types of testing exist and are used during the development and operation of software-reliant systems. While …
10 years, 8 months ago
Reducing Complexity in Software & Systems
Systems are increasingly software-reliant and interconnected, making design, analysis and evaluation harder than in the past. While new capabilities …
10 years, 9 months ago
Designing Security Into Software-Reliant Systems
Software is a growing component of modern business- and mission-critical systems. As organizations become more dependent on software, security-relate…
10 years, 9 months ago
Agile Methods in Air Force Sustainment
For several years, the Software Engineering Institute has researched the viability of Agile software development methods within Department of Defense…
10 years, 10 months ago
Defect Prioritization With the Risk Priority Number
Most software systems have some "defects" that are identified by users. Some of these are truly defects in that the requirements were not properly i…
10 years, 10 months ago
SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers
As the number of sensors on smart phones continues to grow, these devices can automatically track data from the user's environment, including geoloca…
10 years, 11 months ago
An Introduction to Context-Aware Computing
As the number of sensors on smart phones continues to grow, these devices can automatically track data from the user's environment, including geoloca…
10 years, 11 months ago
Data Driven Software Assurance
Software vulnerabilities are defects or weaknesses in a software system that, if exploited, can lead to compromise of the control of a system or the …
11 years ago