<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Software Architecture</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Software Architecture</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/software-architecture/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 20 Mar 2023 00:00:00 -0400</lastBuildDate><item><title>Software Isolation: Why It Matters to Software Evolution and Why Everybody Puts It Off</title><link>https://www.sei.cmu.edu/blog/software-isolation-why-it-matters-to-software-evolution-and-why-everybody-puts-it-off/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses the practice of software isolation, which is one of the steps in large-scale refactoring efforts that most software development organizations go through.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mario Benitez</dc:creator><pubDate>Mon, 20 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/software-isolation-why-it-matters-to-software-evolution-and-why-everybody-puts-it-off/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category></item><item><title>10 Years of Research in Technical Debt and an Agenda for the Future</title><link>https://www.sei.cmu.edu/blog/10-years-of-research-in-technical-debt-and-an-agenda-for-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post reviews the evolution of the field of technical debt and identifies open research questions that will drive future developments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Nord, Ipek Ozkaya</dc:creator><pubDate>Mon, 22 Aug 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/10-years-of-research-in-technical-debt-and-an-agenda-for-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Technical Debt</category></item><item><title>Networking at the Tactical and Humanitarian Edge</title><link>https://www.sei.cmu.edu/blog/networking-at-the-tactical-and-humanitarian-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post details networking challenges in edge environments that stem from uncertainty and solutions to overcome them.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marc Novakouski, Jacob Ratzlaff</dc:creator><pubDate>Mon, 08 Aug 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/networking-at-the-tactical-and-humanitarian-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Edge-Enabled Systems</category><category>Tactical Systems</category><category>Edge Computing</category></item><item><title>Containerization at the Edge</title><link>https://www.sei.cmu.edu/blog/containerization-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Containerization is a technology that addresses many of the challenges of operating software systems at the edge.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Pitstick, Jacob Ratzlaff</dc:creator><pubDate>Mon, 21 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/containerization-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Edge-Enabled Systems</category><category>Tactical Systems</category><category>Edge Computing</category></item><item><title>Two Categories of Architecture Patterns for Deployability</title><link>https://www.sei.cmu.edu/blog/two-categories-of-architecture-patterns-for-deployability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post, excerpted from the fourth edition of Software Architecture in Practice, discusses deployability and describes two categories of associated architecture patterns.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rick Kazman</dc:creator><pubDate>Mon, 14 Feb 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/two-categories-of-architecture-patterns-for-deployability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Devops</category><category>Quality Attributes</category><category>Agile</category></item><item><title>Systems Engineering and Software Engineering: Collaborating for the Smart Systems of the Future</title><link>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Convergence between systems engineering and software engineering is forging new practices for engineering the smart systems of the future.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Mon, 20 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category><category>Systems Engineering</category><category>Devops</category><category>Data Modeling and Analytics</category><category>Digital Engineering</category><category>Model-Based Systems Engineering</category><category>Continuous Deployment of Capability</category></item><item><title>The Latest Work from the SEI: Privacy, Ransomware, Digital Engineering, and the Solar Winds Hack</title><link>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-privacy-ransomware-digital-engineering-and-the-solar-winds-hack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>These publications highlight the latest work of SEI technologists in software architecture, digital engineering, and ransomware.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 05 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-privacy-ransomware-digital-engineering-and-the-solar-winds-hack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Vulnerability Analysis</category></item><item><title>8 Steps for Migrating Existing Applications to Microservices</title><link>https://www.sei.cmu.edu/blog/8-steps-for-migrating-existing-applications-to-microservices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, I describe a plan for how organizations that wish to migrate existing applications to microservices can do so safely and effectively.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 28 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/8-steps-for-migrating-existing-applications-to-microservices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category></item><item><title>Addressing Open Architecture in Software Cost Estimation</title><link>https://www.sei.cmu.edu/blog/addressing-open-architecture-software-cost-estimation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Identifying, estimating, and containing the cost of software is critical to the effective deployment of government systems....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Gagliardi, Michael Konrad, Douglas Schmidt</dc:creator><pubDate>Mon, 06 Jul 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/addressing-open-architecture-software-cost-estimation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Cost Estimates</category><category>Software Architecture</category></item><item><title>Data-Driven Management of Technical Debt</title><link>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the SEI's work on technical debt analysis techniques and practices to help software engineers manage its impact on projects in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Robert Nord</dc:creator><pubDate>Mon, 16 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Software Sustainment</category><category>Machine Learning</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Artificial Intelligence</category><category>Software Architecture</category><category>Technical Debt</category><category>Software Quality</category></item><item><title>Three Architecture Recommendations for Sustainment Organizations</title><link>https://www.sei.cmu.edu/blog/three-architecture-recommendations-for-sustainment-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In a March 2019 report, the Defense Innovation Board (DIB) noted that the United States faces threats that are evolving at an ever-increasing pace....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Susan Cox</dc:creator><pubDate>Mon, 01 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/three-architecture-recommendations-for-sustainment-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Software Sustainment</category></item><item><title>The Latest Research from the SEI in DevSecOps, Threat Modeling, and Insider Threat</title><link>https://www.sei.cmu.edu/blog/the-latest-research-from-the-sei-in-devsecops-threat-modeling-and-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, and presentations highlighting our work in DevSecOps, insider threat....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Tue, 28 May 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-latest-research-from-the-sei-in-devsecops-threat-modeling-and-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Software Architecture</category><category>Devops</category></item><item><title>The AADL Error Library: 4 Families of System Errors</title><link>https://www.sei.cmu.edu/blog/the-aadl-error-library-4-families-of-system-errors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Classifying the way that things can go wrong in a component-based system is a hard challenge since components--and the systems that rely on them--can fail in myriad, unpredictable ways....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sam Procter</dc:creator><pubDate>Mon, 20 May 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-aadl-error-library-4-families-of-system-errors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Architecture Analysis and Design Language (AADL)</category><category>Software Architecture</category></item><item><title>Managing the Consequences of Technical Debt: 5 Stories from the Field</title><link>https://www.sei.cmu.edu/blog/managing-the-consequences-of-technical-debt-5-stories-from-the-field/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>If you participate in the development of software, the chances are good that you have experienced the consequences of technical debt....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Robert Nord</dc:creator><pubDate>Mon, 13 May 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/managing-the-consequences-of-technical-debt-5-stories-from-the-field/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Technical Debt</category></item><item><title>Rapid Software Composition by Assessing Untrusted Components</title><link>https://www.sei.cmu.edu/blog/rapid-software-composition-by-assessing-untrusted-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Today, organizations build applications on top of existing platforms, frameworks, components, and tools; no one constructs software from scratch....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rick Kazman</dc:creator><pubDate>Mon, 26 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/rapid-software-composition-by-assessing-untrusted-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Software Architecture</category><category>System Verification and Validation</category></item><item><title>Analysis: System Architecture Virtual Integration Nets Significant Savings</title><link>https://www.sei.cmu.edu/blog/analysis-system-architecture-virtual-integration-nets-significant-savings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The size of aerospace software, as measured in source lines of code (SLOC), has grown rapidly. Airbus and Boeing data show that SLOC have doubled every four years....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Peter Feiler</dc:creator><pubDate>Mon, 07 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/analysis-system-architecture-virtual-integration-nets-significant-savings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Architecture Analysis and Design Language (AADL)</category><category>Software and Information Assurance</category><category>Software Architecture</category></item><item><title>Automating Design Analysis</title><link>https://www.sei.cmu.edu/blog/automating-design-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog presents a rubric to distinguish design rules from non-design rules in software quality tools, helping users detect software design problems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Neil Ernst</dc:creator><pubDate>Mon, 01 May 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automating-design-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Technical Debt</category></item><item><title>Security Modeling Tools</title><link>https://www.sei.cmu.edu/blog/security-modeling-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post highlights the importance of security modeling tools and their role in software security, along with a review of available tools.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Julien Delange</dc:creator><pubDate>Mon, 31 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-modeling-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category></item><item><title>Data Science, Blacklists, and Mixed-Critical Software: The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover recently released SEI publications in early lifecycle cost estimation, host protection strategies, AADL, and more in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 05 Sep 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Software Architecture</category><category>Architecture Analysis and Design Language (AADL)</category></item><item><title>The Future of Managing Technical Debt</title><link>https://www.sei.cmu.edu/blog/the-future-of-managing-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses managing technical debt in software engineering and explores new approaches and tools for effective management.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Nord</dc:creator><pubDate>Mon, 29 Aug 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-future-of-managing-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Technical Debt</category></item></channel></rss>