Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University
SEI Podcast Series
March 23, 2017

10 At-Risk Emerging Technologies

 Jeffrey Smith (Microsoft)

Christopher King

"Although autonomous machines are 5-to-10 years away from mainstream adoption, the devices could be compromised through networked back-end servers that provide some of the automation, or through the robot itself, which is networked and communicates across the Internet to the manufacturer for diagnostic information and software updates."

"Although autonomous machines are 5-to-10 years away from mainstream adoption, the devices could be compromised through networked back-end servers that provide some of the automation, or through the robot itself, which is networked and communicates across the Internet to the manufacturer for diagnostic information and software updates."
February 27, 2017

Technical Debt as a Core Software Engineering Practice

 Jeffrey Smith (Microsoft)

Ipek Ozkaya

"It is actually very interesting, because when you are talking about something like technical debt, there is a positive and a negative aspect of it. The positive aspect is it resonates with everybody. It resonates with the manager who may not be as competent in understanding the details of the particular technology they have been developing in.  "

"It is actually very interesting, because when you are talking about something like technical debt, there is a positive and a negative aspect of it. The positive aspect is it resonates with everybody. It resonates with the manager who may not be as competent in understanding the details of the particular technology they have been developing in.  "

Categories:

February 23, 2017

DNS Best Practices

 Jeffrey Smith (Microsoft)

Mark Langston

"One of the interesting things that I’ve seen over time is that many people, usually for performance reasons, will disable logging on their name servers. It is unfortunate because DNS logging is one of the primary ways you would notice somebody doing something untoward with your DNS infrastructure."

"One of the interesting things that I’ve seen over time is that many people, usually for performance reasons, will disable logging on their name servers. It is unfortunate because DNS logging is one of the primary ways you would notice somebody doing something untoward with your DNS infrastructure."

Categories:

January 26, 2017

Three Roles and Three Failure Patterns of Software Architects

 Jeffrey Smith (Microsoft)

John Klein

"Different system lifecycle phases require different skills from a software architect. Rare is the architect who can seamlessly transition through all three phases, and software architects, developers, and program managers must be aware of these limitations moving forward."

"Different system lifecycle phases require different skills from a software architect. Rare is the architect who can seamlessly transition through all three phases, and software architects, developers, and program managers must be aware of these limitations moving forward."

Categories: Software Architecture

January 12, 2017

Security Modeling Tools

 Jeffrey Smith (Microsoft)

Julien Delange

"We started to develop these tools a year ago to see how you can present your vulnerabilities; how you can see how a fault propagates within the architecture."

"We started to develop these tools a year ago to see how you can present your vulnerabilities; how you can see how a fault propagates within the architecture."

Categories: Software Architecture