<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Data Modeling and Analytics</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Data Modeling and Analytics</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/data-modeling-and-analytics/atom/" rel="self"/><language>en-us</language><lastBuildDate>Tue, 22 Oct 2024 00:00:00 -0400</lastBuildDate><item><title>An Introduction to Model-Based Systems Engineering (MBSE)</title><link>https://www.sei.cmu.edu/blog/an-introduction-to-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Revisit our most popular post of the last four years, which introduces model-based systems engineering, a methodology to support the requirements, design, analysis, verification, and validation associated with the development of complex systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Tue, 22 Oct 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/an-introduction-to-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Digital Engineering</category><category>Data Modeling and Analytics</category><category>Model-Based Systems Engineering</category></item><item><title>How Can Causal Learning Help to Control Costs?</title><link>https://www.sei.cmu.edu/blog/how-can-causal-learning-help-to-control-costs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post describes how to apply causal-modeling algorithms and tools to project data to identify, measure, and test causality.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Konrad</dc:creator><pubDate>Mon, 22 May 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-can-causal-learning-help-to-control-costs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Cost Estimates</category><category>Measurement and Analysis</category><category>Data Modeling and Analytics</category></item><item><title>Systems Engineering and Software Engineering: Collaborating for the Smart Systems of the Future</title><link>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Convergence between systems engineering and software engineering is forging new practices for engineering the smart systems of the future.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Mon, 20 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category><category>Systems Engineering</category><category>Devops</category><category>Data Modeling and Analytics</category><category>Digital Engineering</category><category>Model-Based Systems Engineering</category><category>Continuous Deployment of Capability</category></item><item><title>Requirements in Model-Based Systems Engineering (MBSE)</title><link>https://www.sei.cmu.edu/blog/requirements-in-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI blog post presents a comprehensive guide to effectively manage requirements in Model-Based Systems Engineering (MBSE) for better results.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 22 Feb 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/requirements-in-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Digital Engineering</category><category>Data Modeling and Analytics</category><category>Model-Based Systems Engineering</category></item><item><title>An Introduction to Model-Based Systems Engineering (MBSE)</title><link>https://www.sei.cmu.edu/blog/introduction-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post introduces model-based systems engineering, a methodology to support the requirements, design, analysis, verification, and validation associated with the development of complex systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 21 Dec 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/introduction-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Data Modeling and Analytics</category><category>Digital Engineering</category><category>Model-Based Systems Engineering</category></item><item><title>Model-Based Analysis of Agile Development Practices</title><link>https://www.sei.cmu.edu/blog/model-based-analysis-of-agile-development-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Applications of Agile development practices in government are providing experience that decision makers can use to improve policy, procedure, and practice....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Andrew Moore, Bill Nichols, William Novak, David Zubrow</dc:creator><pubDate>Mon, 17 Jun 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/model-based-analysis-of-agile-development-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Agile Adoption in Government</category><category>Data Modeling and Analytics</category><category>Agile</category></item><item><title>Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018</title><link>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December 31, 2018....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 07 Jan 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category><category>Cloud Computing</category><category>Data Modeling and Analytics</category><category>Mission Assurance</category><category>Software and Information Assurance</category></item><item><title>Performing Text Analytics for Insider Threat Programs: Part 3 of 3</title><link>https://www.sei.cmu.edu/blog/performing-text-analytics-for-insider-threat-programs-part-3-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog series reviews topics in performing text analytics to support insider threat mitigation. This post presents a procedural framework for operationalizing this capability....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Carrie Gardner</dc:creator><pubDate>Tue, 20 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/performing-text-analytics-for-insider-threat-programs-part-3-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Data Modeling and Analytics</category></item><item><title>Foundational Research Behind Text Analytics for Insider Threat: Part 2 of 3</title><link>https://www.sei.cmu.edu/blog/foundational-research-behind-text-analytics-for-insider-threat-part-2-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog series, I review topics related to deploying a text analytics capability for insider threat mitigation. In this segment, I continue the conversation by disambiguating terminology related to text analysis....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Carrie Gardner</dc:creator><pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/foundational-research-behind-text-analytics-for-insider-threat-part-2-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Data Modeling and Analytics</category></item><item><title>Considerations for Deploying a Text Analytics Capability for Insider Threat Mitigation: Part 1 of 3</title><link>https://www.sei.cmu.edu/blog/considerations-for-deploying-a-text-analytics-capability-for-insider-threat-mitigation-part-1-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog series I cover topics related to deploying a text analytics capability for insider threat mitigation. A text analytics capability is a means of measuring the risk employees may pose to an organization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Carrie Gardner</dc:creator><pubDate>Fri, 27 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/considerations-for-deploying-a-text-analytics-capability-for-insider-threat-mitigation-part-1-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Mission Assurance</category><category>Data Modeling and Analytics</category></item><item><title>How to Identify Key Causal Factors That Influence Software Costs: A Case Study</title><link>https://www.sei.cmu.edu/blog/how-to-identify-key-causal-factors-that-influence-software-costs-a-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>DoD programs continue to experience cost overruns; the inadequacies of cost estimation were cited by the Government Accountability Office (GAO) as one of the top problem areas....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bill Nichols</dc:creator><pubDate>Mon, 23 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-identify-key-causal-factors-that-influence-software-costs-a-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Cost Estimates</category><category>Measurement and Analysis</category><category>Data Modeling and Analytics</category></item><item><title>Big-Data Malware: Preparation and Messaging</title><link>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Part one of this series of blog posts on the collection and analysis of malware and storage of malware-related data in enterprise systems reviewed practices for collecting malware, storing it, and storing data about it....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 18 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category><category>Data Modeling and Analytics</category></item><item><title>Big-Data Malware: Collection and Storage</title><link>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The growth of big data has affected many fields, including malware analysis. Increased computational power and storage capacities have made it possible for big-data processing systems to handle the increased volume of data being collected....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 04 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category><category>Data Modeling and Analytics</category></item><item><title>Virtual Integration, Blockchain Programming, and Agile/DevOps: The Latest Work from the SEI</title><link>https://www.sei.cmu.edu/blog/virtual-integration-blockchain-programming-and-agiledevops-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, and presentations highlighting our work in virtual integration, blockchain programming....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 28 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/virtual-integration-blockchain-programming-and-agiledevops-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Blockchain</category><category>Cyber Missions</category><category>Data Modeling and Analytics</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Automated Code Generation for Future Compatible High-Performance Graph Libraries</title><link>https://www.sei.cmu.edu/blog/automated-code-generation-for-future-compatible-high-performance-graph-libraries/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>For many DoD missions, our ability to collect information has outpaced our ability to analyze that information. Graph algorithms and large-scale machine learning algorithms are a key to analyzing the information agencies collect....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Scott McMillan</dc:creator><pubDate>Mon, 14 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automated-code-generation-for-future-compatible-high-performance-graph-libraries/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Artificial Intelligence</category><category>Mission Assurance</category><category>Data Modeling and Analytics</category><category>Advanced Computing</category></item><item><title>Why Does Software Cost So Much?</title><link>https://www.sei.cmu.edu/blog/why-does-software-cost-so-much/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Cost estimation was cited by the Government Accountability Office (GAO) as one of the top two reasons why DoD programs continue to have cost overruns. How can we better estimate and manage the cost of systems that are increasingly software intensive?...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Stoddard</dc:creator><pubDate>Mon, 16 Apr 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/why-does-software-cost-so-much/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence</category><category>Data Modeling and Analytics</category><category>Artificial Intelligence Engineering</category></item><item><title>A Fighting Chance: Arming the Analyst in the Age of Big Data</title><link>https://www.sei.cmu.edu/blog/a-fighting-chance-arming-the-analyst-in-the-age-of-big-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The 2017 SEI Year in Review highlights the work of the institute undertaken from October 1, 2016, to September 30, 2017. This blog post, which was published in the 2017 Year in Review, highlights the work of three SEI researchers....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 26 Mar 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/a-fighting-chance-arming-the-analyst-in-the-age-of-big-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Big Data</category><category>Data Modeling and Analytics</category><category>Static Analysis</category></item><item><title>Why You Should Apply Agile-DevOps Earlier in the Lifecycle</title><link>https://www.sei.cmu.edu/blog/why-you-should-apply-agile-devops-earlier-in-the-lifecycle/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>DevOps is a set of development practices that emphasizes collaboration, communication, and automation throughout the application lifecycle....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Hasan Yasar, Suzanne Miller</dc:creator><pubDate>Mon, 05 Feb 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/why-you-should-apply-agile-devops-earlier-in-the-lifecycle/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Agile</category><category>Devops</category><category>Data Modeling and Analytics</category></item><item><title>Video Summarization: Using Machine Learning to Process Video from Unmanned Aircraft Systems</title><link>https://www.sei.cmu.edu/blog/video-summarization-using-machine-learning-to-process-video-from-unmanned-aircraft-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As the use of unmanned aircraft systems (UASs) increases, the volume of potentially useful video data that UASs capture on their missions is straining the resources of the U.S. military that are needed to process and use this data....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Pitstick</dc:creator><pubDate>Mon, 22 Jan 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/video-summarization-using-machine-learning-to-process-video-from-unmanned-aircraft-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence</category><category>Cyber Missions</category><category>Data Modeling and Analytics</category><category>Machine Learning</category><category>Artificial Intelligence Engineering</category></item><item><title>Technical Detection of Intended Violence: Workplace Violence as an Insider Threat</title><link>https://www.sei.cmu.edu/blog/technical-detection-of-intended-violence-workplace-violence-as-an-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the CERT Insider Threat Center's research on detecting harm to self and others in insider threat incidents in this informative SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tracy Cassidy</dc:creator><pubDate>Mon, 11 Dec 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/technical-detection-of-intended-violence-workplace-violence-as-an-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Data Modeling and Analytics</category></item></channel></rss>