<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Java</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Java</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/java/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 08 Dec 2014 00:00:00 -0500</lastBuildDate><item><title>Java Zero Day Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/java-zero-day-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Examining a Java zero-day vulnerability that affected Macintosh computers, this SEI Blog explores how adherence to secure coding rules could have prevented the exploit.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 08 Dec 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/java-zero-day-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Java</category><category>Secure Coding</category></item><item><title>The Latest Research from the SEI - November 2013</title><link>https://www.sei.cmu.edu/blog/latest-research-sei4/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover recently released SEI technical reports on cybersecurity, insider threat, network awareness, and more in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 18 Nov 2013 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/latest-research-sei4/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Java</category></item><item><title>The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/latest-research-sei5/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover our latest SEI technical reports covering Secure Java and Android Coding, Cybersecurity Capability Measurement, and Managing Insider Threat.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 18 Nov 2013 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/latest-research-sei5/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Java</category></item><item><title>The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the SEI's latest research on architecting service-oriented systems, operational resilience, and standards-based automated remediation.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 05 Sep 2011 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Insider Threat</category><category>Malware</category><category>Agile</category><category>Software Architecture</category><category>CMMI</category><category>Software Assurance</category><category>Smart Grid Maturity Model</category><category>Team Software Process (TSP)</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cloud Computing</category><category>System of Systems</category><category>Systems Engineering</category><category>Java</category><category>Acquisition Transformation</category></item></channel></rss>