Podcast Episodes

Back to Search
Software for Soldiers who use Smartphones

Whether soldiers are on the battlefield or providing humanitarian relief effort, they need to capture and process a wide range of text, image, and ma…

13 years, 3 months ago

Short Long
View Episode
Managing Disruptive Events: Making the Case for Operational Resilience

Today's high-risk, global, fast, and very public business environment demands a more integrated approach to not be surprised by disruptive events. R…

13 years, 3 months ago

Short Long
View Episode
Architecting Service-Oriented Systems

A common misconception is that developers using a service-oriented architecture can achieve system qualities such as interoperability and modifiabili…

13 years, 4 months ago

Short Long
View Episode
The SEI Strategic Plan

In this podcast, Bill discusses the development of the long-term, technical strategic plan of the SEI to advance the practice of software engineering…

13 years, 5 months ago

Short Long
View Episode
Quantifying Uncertainty in Early Lifecycle Cost Estimation

By law, major defense acquisition programs are now required to prepare cost estimates earlier in the acquisition lifecycle, including pre-Milestone A…

13 years, 5 months ago

Short Long
View Episode
Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities

A network profile can help identify unintended points of entry, misconfigurations, and other weaknesses that may be visible to attackers. Listen on …

13 years, 5 months ago

Short Long
View Episode
Architecting a Financial System with TSP

The SEI recently worked with Bursatec to create a reliable and fast new trading system for Groupo Bolsa Mexicana de Valores, the Mexican Stock Exchan…

13 years, 5 months ago

Short Long
View Episode
The Importance of Data Quality

Organizations rely on valid data to make informed decisions. When data integrity is compromised, the veracity of the decision-making process is likew…

13 years, 6 months ago

Short Long
View Episode
How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them

Deploy vulnerability exploit prevention and mitigation techniques to thwart attacks and manage the arms race. Related Course Malware Analysis Appr…

13 years, 6 months ago

Short Long
View Episode
Misaligned Incentives

In this episode, Novak discusses misaligned incentives, misaligned people incentives in software acquisition programs, and how the wrong incentives c…

13 years, 6 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us