The guide is the first release in the Software Acquisition Go Bag series of resources for defense software programs seeking to advance acquisition practices.
The Software Engineering Institute (SEI) is operated and managed by Carnegie Mellon University (CMU) as a Federally Funded Research and Development Center (FFRDC) under Air Force (AF) contract number ...
Shevchenko, N., 2024: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Ozkaya, I., and Schmidt, D., 2024: Generative AI and Software Engineering Education. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 23 ...
This report describes 11 common vulnerabilities and 3 risks related to application programming interfaces, providing suggestions about how to fix or reduce their impact. Application programming ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Ozkaya, I., and O'Hearn, B., 2024: 5 Recommendations to Help Your Organization Manage Technical Debt. Carnegie Mellon University, Software Engineering Institute's ...
Novak, W., 2023: Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways. Carnegie Mellon University, Software Engineering Institute's ...
Alberts, C., Bandor, M., Wallen, C., and Woody, C., 2023: The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain. Carnegie Mellon ...
Groce, P., 2023: Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting. Carnegie Mellon University, Software Engineering Institute's Insights ...
Sarvepalli, V., 2023: UEFI: 5 Recommendations for Securing and Restoring Trust. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results