サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
ChatGPT
www.sei.cmu.edu
SEI Study Analyzes Applicability of Security and Zero Trust Principles to Weapon Systems October 27, 2025 • Article The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems. Read More AAAI Symposium to Present the Latest on Engineering Safety-Critical AI Systems October 16, 2025 • Article At the November event, co-organized by the
Recently, SuperFish and PrivDog have received some attention because of the risks that they both introduced to customers because of implementation flaws. Looking closer into these types of applications with my trusty CERT Tapioca VM at hand, I've come to realize a few things. In this blog post, I will explain The capabilities of SSL and TLS are not well understood by many.SSL inspection is much mo
Recently, Microsoft published a blog post called Moving Beyond EMET that appears to make two main points: (1) Microsoft EMET will no longer support EMET after July 31, 2018, and (2) Windows 10 provides protections that make EMET unnecessary. In this blog post, I explain why Windows 10 does not provide the additional protections that EMET does and why EMET is still an important tool to help prevent
As an Agile method, Scrum promotes frequent inspection and adaptation, teamwork, self-organization, and accountability. CMMI focuses on improving processes to improve performance. CMMI and Scrum complement each other in ways that enhance the other. Review some of these publications about how these two technologies have worked together successfully: Implementing Scrum (Agile) and CMMI Together, an
Transforming Software Quality Assessment 1991 The SEI's publication of the Capability Maturity Model for Software (Software CMM) in 1991 changed the view in government and industry about software quality. The model consisted of best practices in key process areas, giving organizations an objective standard for software development. By 1986, the DoD and defense contractors recognized that some soft
What is your definition of software architecture? The SEI has compiled a list of modern, classic, and bibliographic definitions of software architecture. Modern definitions come from Software Architecture in Practice and from ANSI/IEEE Std 1471-2000, Recommended Practice for Architectural Description of Software-Intensive Systems. Classic definitions appear in some of the more prominent or influen
div:first-child]:lg:!max-w-[1024px] [&_nav[data-id="sds-megamenu"]>div:first-child]:xl:!max-w-screen-xl [&_nav[data-id="sds-megamenu"]>div:first-child]:2xl:!max-w-screen-2xl [&_nav[data-id="sds-megamenu"]>div:first-child]:2xl:!px-8 ' > Transforming Software Quality Assessment 1991 The SEI's publication of the Capability Maturity Model for Software (Software CMM) in 1991 changed the view in governm
Several popular component-based standards have emerged recently, including JavaBeans and Enterprise JavaBeans from Sun Microsystems and the Component Object Model from Microsoft. These component models are being adopted for use in software development, as they eliminate opportunities for architectural mismatch and are supported by standard services. A highly touted property of component models is
このページの表には、読者の組織が改善のために用いることができるCMMIモデルが含まれている。表には、これらの文書に関連する情報も含まれている。 CMMI成果物に対して変更要求を提出する方法についての情報は、Submitting CMMI Change Requestsを参照のこと。 なお、翻訳に関わる変更要求の場合は、日本語翻訳版用の変更要求フォームを使用し、日本語で記入のこと。モデルの内容など英語版原典に関わる変更要求の場合は、通常の変更要求として英語版のフォームを使用し、英語で記入のこと。 文書名
Become a Performance Improvement Champion Earn your CMMI Practitioner Certification and expand your skillset. Learn More Build capability, Drive Performance High-performance organizations around the world have achieved demonstrable, sustainable business results with CMMI®. What is CMMI? For 30+ years, high-performing organizations have achieved clear, sustainable business results with ISACA®’s CMM
AMS Citation Dormann, W., 2008: The Dangers of Windows AutoRun. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed August 6, 2025, https://www.sei.cmu.edu/blog/the-dangers-of-windows-autorun/. Copy APA Citation Dormann, W. (2008, April 24). The Dangers of Windows AutoRun. Retrieved August 6, 2025, from https://www.sei.cmu.edu/blog/the-dangers-of-windows-autorun/
If a software architecture is a key business asset for an organization, then architectural analysis must also be a key practice for that organization. Why? Because architectures are complex and involve many design tradeoffs. Without undertaking a formal analysis process, the organization cannot ensure that the architectural decisions made—particularly those which affect the achievement of quality
What We Do CERT experts are a diverse group of researchers, software engineers, security analysts, and digital intelligence specialists working together to research security vulnerabilities in software products, contribute to long-term changes in networked systems, and develop cutting-edge information and training to improve the practice of cybersecurity. Our connection to the internationally know
CMMI 成果物チーム 技術報告書 CMU/SEI-2006-TR-008 PDF 版 Word版 『開発のためのCMMI® (CMMI-DEV) 1.2版』は、『CMMI-SE/SW/IPPD/SS 1.1版』の改良版である。CMMI 1.2版の改訂作業における焦点は、CMMI成果物の品質を改善すること、およびそれらが適用される方法における首尾一貫性を改善することにある。この報告書は、CMMI成果物一式の中のモデル部分を記述するものである。CMMI成果物一式の他の部分には、『SCAMPI-A評定手法』および『CMMI入門』トレーニングコースが含まれる。 CMMIには『関連要素群(constellation)』という概念が含まれることになった。関連要素群とはCMMI構成要素の集合であり、特定の対象領域のニーズを満たすように設計されたものである。一つの関連要素群からは、一つあるい
Architecture Analysis and Design Language (AADL) Created July 2019 • Updated February 2022 As software for avionics, cyber-physical, and autonomous systems becomes increasingly complex, the cost to assure these and other mission- and safety-critical systems is growing. Software attributes that impede analysis and concerns such as performance, safety, and security are responsible for this increase.
CERT/CC advisories are now part of the US-CERT National Cyber Awareness System. We provide these advisories, published by year, for historical purposes. This document discusses the background, description, impact, and solutions for 27 advisories.
div:first-child]:lg:!max-w-[1024px] [&_nav[data-id="sds-megamenu"]>div:first-child]:xl:!max-w-screen-xl [&_nav[data-id="sds-megamenu"]>div:first-child]:2xl:!max-w-screen-2xl [&_nav[data-id="sds-megamenu"]>div:first-child]:2xl:!px-8 ' >
CERT/CC advisories are now part of the US-CERT National Cyber Awareness System. We provide these advisories, published by year, for historical purposes. This report details the description, impact, and solutions for various vulnerabilities, including Denial-of-Service, malicious HTML tags, and the Love Letter worm.
The SEI: The Leader in Software Engineering, Cybersecurity, and AI Engineering At the SEI, we research complex software engineering, cybersecurity, and AI engineering problems; create and test innovative technologies; and transition maturing solutions into practice. We have been working with the Department of Defense, government agencies, and private industry since 1984 to help meet mission goals
This workbook provides a hands-on introduction to the basic discipline of software engineering, as expressed in the author's well-known Personal Software Process (PSP). By applying the forms and methods of PSP described in the book, you can learn to manage your time more effectively and to monitor the quality of your work, with enormous benefits in both regards. Format: Paperback
The SEI Digital Library provides access to more than 6,000 documents from four decades of research into best practices in software engineering. These documents include technical reports, presentations, webcasts, podcasts and other materials searchable by user-supplied keywords and organized by topic, publication type, publication year, and author.
このページを最初にブックマークしてみませんか?
『Software Engineering Institute』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く