In this webcast, Brigid O’Hearn, Christina Rhylander, and Julie Cohen provide you with the practical insight you need to develop a Capability Needs Statement (CNS) that will be effective for your ...
In this webcast, Justin Novak and Christopher Ian Rodman discuss how AI can be leveraged to build out and enable your security operations center (SOC) by covering gaps in tools, workforce, and ...
Management of IT secrets, such as passwords and application programming interface (API) keys, has become an area of increased importance as the number of systems that use such secrets has grown in ...
Palat, J., 2022: A Hitchhiker’s Guide to ML Training Infrastructure. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed March 18 ...
When designing autonomous systems, specifically uncrewed vehicle platforms (UxVs), a system-level approach is essential for integrating AI components. These components offer new opportunities that ...
This newsletter compiles the latest SEI releases and news about new guidance on creating Capability Needs Statements (CNS) for programs on the Software Acquisition Pathway, the feasibility and ...
Longstaff, T., 2019: What Engineers Need to Know About Artificial Intelligence. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Since our foundation in 1984, we have helped the Department of War (DoW), government agencies, and private industry meet mission goals and gain strategic advantage by innovating and advancing the ...
Linda Northrop has more than 45 years of experience in the software development field as a practitioner, researcher, manager, consultant, and educator. She retired from full-time employment at the ...
We create curricula and offer courses, training, and certificate programs that explore insights from our cutting-edge research and the solutions we’ve developed for the Department of War, other ...
Like many organizations, the Department of Defense (DoD) uses a variety of software and tools produced by various supply chains, all of which can be compromised by an adversary. This is a risk that ...