Podchaser Logo
Home
SEI Shorts

Carnegie Mellon University Software Engineering Institute

SEI Shorts

A weekly Technology and Software How-To podcast
Good podcast? Give it some love!
SEI Shorts

Carnegie Mellon University Software Engineering Institute

SEI Shorts

Episodes
SEI Shorts

Carnegie Mellon University Software Engineering Institute

SEI Shorts

A weekly Technology and Software How-To podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of SEI Shorts

Mark All
Search Episodes...
In this SEI Cyber Minute, Alex Corn discusses how to protect systems using Secure Shell (SSH). SSH supports keys, which provide efficiency and security benefits.
In this SEI Cyber Minute, Bobbie Stempfley explains how in our increasingly complex world, the SEI is redefining approaches to security to address the transformative technologies being adopted throughout government and industry.
In this SEI Cyber Minute, Suzanne Miller explains a pitfall that can occur when trying to use Agile and Lean methods when developing and implementing complex, embedded systems. In such projects, development traditionally proceeds in a model sh
September 2019 has been designated “National Insider Threat Awareness Month.” A number of federal agencies—including the FBI, Office of the Under Secretary of Defense for Intelligence, and Department of Homeland Security—have chosen September
Static analysis (SA) alerts about software code flaws require costly manual effort to validate (e.g., determine True or False) and repair.  As a result, organizations often severely limit the types of alerts they manually examine to the types
In this SEI Cyber Minute, Ebonie McNeil explains how the Source Code Analysis Integrated Framework Environment or (SCAIFE) prototype is intended to be used by developers and analysts who manually audit alerts. SCAIFE provides automatic alert
Threat-modeling methods provide an approach for identifying possible threats to a system and mitigating them. In this SEI Cyber Minute, Chris Alberts discusses the Security Engineering Risk Analysis (SERA) Method and the threats and risks that
Chuck Weinstock introduces confidence maps and explains how they work to determine how much confidence someone can have in a claim. Confidence maps collect arguments or doubts about a claim, to which one can then apply a process of elimination
Elli Kanal describes the work that the SEI does to train computers to learn about stored content and find pertinent information without the help of an analyst. The Software Engineering Institute (SEI) works on projects that help computers (1) l
At the SEI, we built an implementation of tactical cloudlets that we call KD-Cloudlet. Soldiers, emergency workers, field researchers, medics – really anyone who needs to be a cyber forager for computing resources -- can now use KD-Cloudlet to
The SEI has conducted research on the issues associated with sustaining legacy systems and migrating them, such as trying to sustain a system when there is a lack of documentation and minimal Infrastructure as Code. This SEI Cyber Minute descri
Suzanne Miller discusses why the use of Agile methods can vary so much from one contractor to another. Because the Agile methodology is based on a set of principles, contractors sometimes apply Agile methods differently depending on the scope a
Mary Catherine Ward explains the unique work that the SEI does for the Department of Defense as a federally funded research and development center (FFRDC). Federally funded research and development centers (FFRDCs) perform research to meet the
Self-driving cars, drones, or missiles that use computer systems to interact with the physical world are examples of cyber-physical systems. As these systems become more complex and unpredictable, establishing confidence that they work correctl
Eileen Wrubel discusses getting your agile program started. Agile relies on small batches of work and fast learning cycles, instead of specifying extensive big-batch requirements up front. Programs need to extend this thinking beyond the softwa
Alex Corn discusses how cross-origin resource sharing (CORS) works to resolve network problems caused by same-origin policy, and how it should be configured. Same-origin policy is a feature of modern web browsers that restricts scripts hosted o
Watch Mark Sherman in this SEI Cyber Minute as he discusses "Influence Attacks on Machine Learning".
Shane Ficorilli explains some of the requirements for successfully implementing DevOps in your organization, including how to establish a complete deployment pipeline.
Watch SEI Researcher Andrew Kotov respond to "What does a software architect do?"
Watch Bob Schiela and Jeff Boleng discuss "Where dynamic and static code analysis merge".
Watch Bob Schiela discuss "Why aren’t DoD Programs using static analysis as commercial firms do?"
Eliezer Kanal explains deep learning, a subfield of artificial intelligence, and how the SEI is conducting research to learn how it might be used to advance cybersecurity.
Watch SEI Researchers Andrew Kotov and John Klein respond to "Should a software architect be concerned with risk analysis?"
Watch SEI Researcher Ipek Ozkaya respond to "Do all systems have technical debt?"
Watch Bob Schiela and Jeff Boleng discuss "How can automated code repair help DoD with legacy code vulnerability analysis?
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features