Topics Listing Index Page | The CMU Software Engineering Institute (original) (raw)
icon-carat-right menu search cmu-wordmark
- Home
- Publications
- Blog
- Topics
Agile
With a focus on speeding the delivery of software capability to warfighters, the SEI has conducted research on Agile software approaches in the Department of Defense and other government settings since 2009.
Agile
With a focus on speeding the delivery of software capability to warfighters, the SEI has conducted research on Agile software approaches in the Department of Defense and other government settings since 2009.
Cloud Computing
The SEI studies cloud computing to help organizations develop and operate secure and cost-effective systems and deliver scalable capability to the network edge.
Cloud Computing
The SEI studies cloud computing to help organizations develop and operate secure and cost-effective systems and deliver scalable capability to the network edge.
Continuous Deployment of Capability
Continuous deployment of capability enables the development, security, and delivery of software systems to streamline implementation of new capabilities and to provide continuous integration and continuous delivery (CI/CD) of resilient software deployment.
Continuous Deployment of Capability
Continuous deployment of capability enables the development, security, and delivery of software systems to streamline implementation of new capabilities and to provide continuous integration and continuous delivery (CI/CD) of resilient software deployment.
Cyber-Physical Systems
In cyber-physical systems (CPS), physical and software components are deeply intertwined. Our work in this area involves virtual integration and research and development to enable the rapid, scalable automatic verification of CPS systems.
Cyber-Physical Systems
In cyber-physical systems (CPS), physical and software components are deeply intertwined. Our work in this area involves virtual integration and research and development to enable the rapid, scalable automatic verification of CPS systems.
Cybersecurity Engineering
The SEI’s research in cybersecurity engineering (CSE) builds knowledge, methods, patterns, and practices to help organizations acquire, develop, validate, and sustain software and systems so they can meet today’s cybersecurity challenges.
Cybersecurity Engineering
The SEI’s research in cybersecurity engineering (CSE) builds knowledge, methods, patterns, and practices to help organizations acquire, develop, validate, and sustain software and systems so they can meet today’s cybersecurity challenges.
Cyber Workforce Development
The SEI has 20 years of experience delivering cutting-edge solutions through the development of innovative technologies and approaches that result in elite learning experiences and equip cybersecurity professionals with the skills to face emerging challenges.
Cyber Workforce Development
The SEI has 20 years of experience delivering cutting-edge solutions through the development of innovative technologies and approaches that result in elite learning experiences and equip cybersecurity professionals with the skills to face emerging challenges.
Edge Computing
In traditional computing, processing is mainly performed on local servers and in the cloud. Edge computing pushes applications, data, and computing power to the edge of the Internet—to mobile devices, sensors, and end users. Moving compute to the edge has many benefits: faster response times, data privacy and security, and resiliency if the cloud becomes unavailable. Enabling operations at the edge is relevant in a growing number of systems ranging from battle operations to improve intelligence, surveillance, and reconnaissance to those in other domains, such as field research, field medicine, transportation, and environmental analysis.
Edge Computing
In traditional computing, processing is mainly performed on local servers and in the cloud. Edge computing pushes applications, data, and computing power to the edge of the Internet—to mobile devices, sensors, and end users. Moving compute to the edge has many benefits: faster response times, data privacy and security, and resiliency if the cloud becomes unavailable. Enabling operations at the edge is relevant in a growing number of systems ranging from battle operations to improve intelligence, surveillance, and reconnaissance to those in other domains, such as field research, field medicine, transportation, and environmental analysis.
Insider Threat
The SEI conducts research, modeling, analysis, and outreach to develop data-driven, socio-technical solutions that help organizations reduce the impact and likelihood of insider threats.
Insider Threat
The SEI conducts research, modeling, analysis, and outreach to develop data-driven, socio-technical solutions that help organizations reduce the impact and likelihood of insider threats.
Model-Based Systems Engineering
Model-based systems engineering (MBSE) is a formal methodology for supporting the requirements, design, analysis, verification, and validation for developing complex systems. Organizations that efficiently use MBSE will improve communication, productivity, and ultimately the quality of systems. Optimally leveraging MBSE requires a coordinated effort across an organization, sometimes making it difficult to adopt and apply.
Model-Based Systems Engineering
Model-based systems engineering (MBSE) is a formal methodology for supporting the requirements, design, analysis, verification, and validation for developing complex systems. Organizations that efficiently use MBSE will improve communication, productivity, and ultimately the quality of systems. Optimally leveraging MBSE requires a coordinated effort across an organization, sometimes making it difficult to adopt and apply.
Securing AI
As our nation increasingly develops, integrates, and deploys AI for use in defense and national security, the SEI helps ensure that AI systems are hardened to mitigate threats.
Securing AI
As our nation increasingly develops, integrates, and deploys AI for use in defense and national security, the SEI helps ensure that AI systems are hardened to mitigate threats.
Security Vulnerabilities
SEI researchers reduce cybersecurity risk by conducting and promoting coordinated vulnerability disclosure, researching and publishing vulnerability discovery tools and techniques, and improving vulnerability data and information systems.
Security Vulnerabilities
SEI researchers reduce cybersecurity risk by conducting and promoting coordinated vulnerability disclosure, researching and publishing vulnerability discovery tools and techniques, and improving vulnerability data and information systems.
Situational Awareness
Situational awareness establishes the methods and tools for organizations to successfully assess and monitor their assets and activities to protect against threats and attacks.
Situational Awareness
Situational awareness establishes the methods and tools for organizations to successfully assess and monitor their assets and activities to protect against threats and attacks.
Technical Debt
Most software projects carry technical debt. We develop tools and techniques that identify it and provide a complete view of the debt that you need to manage.
Technical Debt
Most software projects carry technical debt. We develop tools and techniques that identify it and provide a complete view of the debt that you need to manage.