Loading…
Monday, November 16
 

7:30am EST

8:30am EST

Architectural Implications of Cloud Computing

As defined by the National Institute of Standards and Technology, cloud computing is “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Cloud computing is being adopted by commercial, government, and Department of Defense organizations as a way to reduce the operational cost of information technology because resources are scalable and billed on a usage basis as opposed to acquired and maintained. However, for a software architect, cloud computing means that elements of a system or solution may reside outside the organization; therefore, systems must be designed and architected to account for lack of full control over important quality attributes. This half-day presentation starts by briefly defining cloud computing, service models, deployment models, drivers, and barriers for cloud computing adoption and the importance of architecting for the cloud. It then focuses on quality attributes that are critical for the cloud consumer, such security, interoperability, scalability, monitorability, and availability. The focus then turns to the cloud provider and critical quality attributes such as multitenancy, availability, scalability, and performance. Finally, it concludes with a discussion of the present and future of cloud computing.


Speakers
avatar for Grace Lewis

Grace Lewis

Carnegie Mellon Software Engineering Institute
Grace Lewis is a Principal Researcher at the SEI. She is deputy lead for the Advanced Mobile Systems Initiative and principal investigator for the Edge-Enabled Tactical Systems project. Her many publications include a book in the SEI Software Engineering Series. Grace is also a member... Read More →


Monday November 16, 2015 8:30am - 12:00pm EST
Adams

8:30am EST

DevOps and Continuous Delivery: Practices, Architecture, and Security

This half-day tutorial is designed for a broad range of stakeholders—including managers, architects, and developers—interested in adopting DevOps and continuous delivery principles and practices with a particular emphasis on challenges in large-scale, complex environments in industry, Department of Defense organizations, and other government agencies. The tutorial begins with an overview of continuous delivery practices followed by a discussion of DevOps security pitfalls and recommendations. Next, we will focus on designing software to enable continuous delivery and secure, resilient operations as well as engineering the infrastructure and tooling environments to enable continuous monitoring. We will close with an overview of approaches for successfully structuring development teams to enable rapid, confident deployment.


Speakers
avatar for Stephany Bellomo

Stephany Bellomo

Carnegie Mellon Software Engineering Institute
Stephany Bellomo is a Senior Member of the Technical Staff at the SEI. She teaches SEI courses in Service-Oriented Architecture, Migration of Legacy Components, and Software Architecture Principles and Practices. Bellomo is a member of the organizing committee for the International... Read More →


Monday November 16, 2015 8:30am - 12:00pm EST
Madison

8:30am EST

Scaled Agile Framework (SAFe), the Program Office Side

Agile software development methods are now well established in industry. How does the program office overseeing agile programs recognize good practice, and what new roles should we be prepared for? This tutorial will address those and other questions in the context of one of the most common frameworks we see in the Department of Defense setting: the Scaled Agile Framework (SAFe), from Scaled Agile, Inc. Senior staff at the Carnegie Mellon Software Engineering Institute who are supporting major programs will share their insights—including those from interactions with SAFe-implementing contractors—about how agile works, from the program office’s perspective. This tutorial will provide attendees with authentic information about SAFe and agile methods in government settings. Interactive sessions will give participants a chance to challenge common assertions made about agile methods and explore ways to manage risk in highly regulated settings.


Speakers
avatar for Bradley Bernard

Bradley Bernard

F-22 System Program Office (AFLCMC/WWUM)
Brad Bernard is a senior engineer in the F-22 System Program Office's Modernization Branch.  He currently serves as the Deputy Chief Avionics Engineer and is the Program Office lead for the F-22 Modernization's SAFe transition.
avatar for Will Hayes

Will Hayes

Carnegie Mellon Software Engineering Institute
Will Hayes is a Senior Member of the Technical Staff at the SEI. He works to support direct lifecycle management in major software-intensive programs in government and military organizations, performs research and consultation in the application of agile methods in highly regulated... Read More →
avatar for Suzanne Miller

Suzanne Miller

Carnegie Mellon Software Engineering Institute
SuZ Miller is a Principal Researcher in the Client Technical Solutions Directorate at the SEI. Her research focuses on adoption barriers faced by highly regulated organizations (like U.S. government organizations) that are taking up Agile and lean principles. She has also researched... Read More →


Monday November 16, 2015 8:30am - 12:00pm EST
Washington III

8:30am EST

Secure Coding

This tutorial describes common programming errors and how these errors are exploited by attackers to perform remote-execution denial-of-service attacks and steal sensitive information. Web-based, automotive, and mobile device vulnerabilities will all be described. Understanding how common programming errors are exploited helps attendees to “think like an attacker,” anticipate attacks that may result from architecture or design flaws, and evaluate the effectiveness of mitigation strategies. Strategies to mitigate these attacks—including software engineering, secure development, and secure coding practices—are described.


Speakers
avatar for David Svoboda

David Svoboda

Carnegie Mellon Software Engineering Institute
David Svoboda is a software security engineer in the CERT Division at SEI. He has co-authored or contributed to four books, including The CERT C Coding Standard and The CERT Oracle Secure Coding Standard for Java. He maintains the SEI CERT Coding Standard wikis and has taught secure... Read More →


Monday November 16, 2015 8:30am - 12:00pm EST
Washington I

10:00am EST

Morning Break
Monday November 16, 2015 10:00am - 10:30am EST
Ballroom Foyer

12:00pm EST

Lunch
Monday November 16, 2015 12:00pm - 1:00pm EST
Crystal Ballroom

1:00pm EST

Introduction to Best Practices for Service-Oriented Architecture

Before adopting service-oriented architecture (SOA) as a development and operational paradigm, an organization needs to gain a realistic understanding of its potentials and pitfalls. This introductory tutorial begins with a review of SOA implications for an organization and introduces the three basic components of service-oriented systems: services, service consumers, and service infrastructure. It then outlines the basic operations of service discovery, composition, and invocation and introduces common technologies. Web Services is presented in some detail as one approach for implementing SOA, with a description of the basic supporting technologies. The tutorial also addresses SOA development challenges from three perspectives: the service developer, the application developer, and the infrastructure developer. As SOA concepts are revealed, the potentials of cost-efficiency, agility, adaptability, and leverage of legacy investments will become clear. Common misconceptions about SOA are presented, such as the belief that SOA can be implemented “out of the box.”


Speakers
avatar for Patrick Donohoe

Patrick Donohoe

Carnegie Mellon Software Engineering Institute
Patrick Donohoe is a Senior Member of the Technical Staff at the SEI, working in the Software Engineering and Acquisition Practices Directorate. His current interests are service-oriented architecture and open systems architecture. He has participated in several product line technical... Read More →


Monday November 16, 2015 1:00pm - 4:30pm EST
Madison

1:00pm EST

Planning for Change: A New Era in Cost Estimation

Are you confident in the accuracy of your program cost estimate? Will your estimate withstand the scrutiny of an independent cost review? Would you sleep better knowing that your experts’ judgments were properly calibrated prior to the estimate? If so, QUELCE is for you! 

Cost overruns in Major Defense Acquisition Programs are common, and studies have implicated poor cost estimation as a contributor. MDAP programs expect several submissions to achieve independent cost-estimate approval, resulting in delays of 3 to 6 months or more. The GAO has reported that cost overrun growth in the DoD R&D portfolio amounts to $32 billion in past 5 years. Factors associated with poor cost estimates include

  • optimistic expectations about achievable program scope and technology that can be delivered on schedule and within budget
  • enormous amount of unknowns and uncertainty that exist at the time these estimates are made for large-scale, unprecedented systems that take years to develop and deploy

In this tutorial, we teach the steps of a novel cost estimation method called Quantifying Uncertainty in Early Lifecycle Cost Estimation (QUELCE). QUELCE synthesizes several future-scenario techniques into an estimation method that quantifies domain-specific uncertainties, allows subjective inputs by experts, visually depicts relationships among sources of uncertainty, plugs into the front end of existing cost models, and naturally produces a rich basis of estimate. Although QUELCE digests greater program execution information than traditional estimation tools, it leverages techniques to limit the explosion of complex, interacting, and cascading program change drivers for a more tractable cost estimate.


Speakers
avatar for Robert Stoddard

Robert Stoddard

Carnegie Mellon Software Engineering Institute
Robert Stoddard is a Principal Researcher at the SEI. He has been involved in research and customer work in topics such as elicitation of unstated requirements at scale, early lifecycle cost estimation, and security measurement and modeling for the CERT Division. Stoddard has many... Read More →


Monday November 16, 2015 1:00pm - 4:30pm EST
Monroe I & II

1:00pm EST

Scalable Big Data Systems: Behind the Buzzwords

The need to capture, query, and manage data in massive-scale repositories has become pervasive in DoD and other government agencies in diverse mission areas ranging from command and control to health care and business systems. This tutorial drills into the buzzwords "scalable" and "NoSQL."

Participants will learn

  • how to characterize "scalability" for a big data system across several dimensions (Scalability means achieving dependability at scale and includes attributes like throughput, latency, availability, consistency, and security.)
  • approaches to building scalable systems, including both traditional vertical scaling and modern horizontal scaling
  • tradeoffs inherent in horizontally scaled systems, including the CAP theorem, which relates consistency, availability, and partition tolerance and the notion of eventual consistency
  • the four broad categories of NoSQL products (key value, document, wide column, and graph), including strengths, weaknesses, and examples of each category
  • an introduction to big data processing frameworks, such as MapReduce batch processing, Storm stream processing, and Spark in-memory processing
  • the Lightweight Evaluation and Prototyping for Big Data (LEAP4BD) method for technology selection

Speakers
avatar for John Klein

John Klein

Carnegie Mellon Software Engineering Institute
John Klein has over 20 years’ experience developing systems and software. He joined the Carnegie Mellon Software Engineering Institute (SEI) in 2008, where he is a Senior Member of the Technical Staff. Before joining the SEI, John was a chief architect at Avaya, Inc., where... Read More →


Monday November 16, 2015 1:00pm - 4:30pm EST
Adams

1:00pm EST

Security Risk Management Using the Security Engineering Risk Analysis (SERA) Method

The SERA method is a model-based approach for analyzing complex security risks in software-reliant systems and systems of systems across the lifecycle and supply chain. Security risk analysis can be employed to reduce design weaknesses in software-reliant systems. During the acquisition and development of software-reliant systems, the focus is primarily on meeting functional requirements within cost and schedule constraints, often deferring security to later lifecycle activities. Addressing design weaknesses as soon as possible is especially important because these weaknesses are not corrected easily after a system has been deployed. The SERA method provides systems engineers with a structure to connect desired system functionality with the underlying software to evaluate the sufficiency of requirements for software security.


Speakers
avatar for Carol Woody

Carol Woody

Carnegie Mellon Software Engineering Institute
Dr. Carol Woody has been a Senior Member of the Technical Staff at the SEI since 2001. Currently she is the technical manager of CERT Cybersecurity Engineering, which addresses security and survivability throughout the development and acquisition lifecycles. Her research focuses on... Read More →


Monday November 16, 2015 1:00pm - 4:30pm EST
Washington I

1:00pm EST

Strategic Management of Technical Debt

The technical debt metaphor acknowledges that development teams sometimes accept compromises in a system in one dimension (for example, modularity) to meet an urgent demand in some other dimension (for example, a deadline), and that such compromises incur a “debt.” If not properly managed, the interest on this debt may continue to accrue, severely hampering system stability and quality and impacting the team’s ability to deliver enhancements at a pace that satisfies business needs.

Although unmanaged debt can have disastrous results, strategically managed debt can help businesses and organizations take advantage of time-sensitive opportunities, fulfill market needs, and acquire stakeholder feedback. Because architecture has such leverage within the overall development lifecycle, strategic management of architectural debt is of primary importance.

During this session, we will discuss the technical debt metaphor and learn about techniques for measuring and communicating technical debt. We’ll compare strategies and share practices to help make these choices. We will conclude by raising awareness of efforts to move beyond the metaphor and provide software engineers a foundation for managing tradeoffs based on models of their economic impacts.


Speakers
avatar for Robert Nord

Robert Nord

Carnegie Mellon Software Engineering Institute
Dr. Robert Nord is a Senior Member of the Technical Staff at the SEI, where he develops effective methods and practices for software architecture. He also leads research on strategies for scaling agile development by incorporating architecture practices. Before joining the SEI, he... Read More →
avatar for Ipek Ozkaya

Ipek Ozkaya

Carnegie Mellon Software Engineering Institute
Ipek Ozkaya is a Senior Member of the Technical Staff at the SEI and deputy lead of the Architecture Practices Initiative. She develops effective methods for improving software development and system evolution by emphasizing software architecture practices, software economics, and... Read More →


Monday November 16, 2015 1:00pm - 4:30pm EST
Washington III

1:00pm EST

The Many Types of Testing

A surprisingly large number of testing types can and are being used during the development and operation of software-reliant systems. We have identified nearly 200 general types of testing, and there are many additional types that are application-domain specific. While most testers, test managers, and other testing stakeholders are quite knowledgeable about a relatively small number of testing types, many people know very little about most of them or are unaware that others even exist. 

Classifying testing types into a taxonomy that groups similar types together makes them easier to understand. One way to organize them is by the questions they answer: specifically, types of testing can be categorized by the five Ws and two Hs: what, when, why, who, where, how, and how well. Understanding the different types is important because different types of testing tend to uncover different types of defects, and projects need multiple testing types to achieve sufficiently low levels of residual defects. Not all of the types are relevant on all projects, and a complete taxonomy can be very useful for discovering the ones that are appropriate and ensuring that no relevant type is accidentally overlooked. Such a taxonomy can also be a useful a way to organize and prioritize your study of testing.

This tutorial introduces our taxonomy of testing types, clarifies the grand scope of testing, and enables you to better select the appropriate types of testing to perform.


Speakers
avatar for Don Firesmith

Don Firesmith

Carnegie Mellon Software Engineering Institute
Donald Firesmith is a Senior Member of the Technical Staff at the SEI, where for the last 11 years he been helping the U.S. Department of Defense and other governmental agencies acquire large, complex, software-intensive systems. His areas of expertise include requirements engineering... Read More →


Monday November 16, 2015 1:00pm - 4:30pm EST
Washington II

2:30pm EST

Afternoon Break
Monday November 16, 2015 2:30pm - 3:00pm EST
Ballroom Foyer
 
Tuesday, November 17
 

7:30am EST

8:15am EST

Welcome and Opening Remarks
Speakers
avatar for John Foreman

John Foreman

Carnegie Mellon Software Engineering Institute
avatar for Bill Pollak

Bill Pollak

Software Solutions Conference 2015 General Chair, Carnegie Mellon Software Engineering Institute


Tuesday November 17, 2015 8:15am - 8:30am EST
Madison/Keynote & Plenary Sessions

8:30am EST

Keynote: Operational Test and Evaluation: A View Toward Improved Software Development

The development and acquisition of modern weapons systems is an increasingly complex undertaking. Software-intensive systems, in particular, pose many challenges that developers and program managers must overcome. Operational Test and Evaluation’s role is the independent evaluation and validation of a system’s operational effectiveness, suitability, and survivability. This role is independent from, but not divorced from, developmental testing.

The systems engineering design and verification processes for software-intensive systems require approaches that address complexity and manage risk for the developer, the purchaser, and the user in a broadly integrated fashion. Mr. Duma’s keynote will address the importance of early user involvement in a software program’s lifecycle; the application of scientific test processes, tools and techniques to evaluate systems in complex environments; the value of automated software testing throughout a program’s lifecycle; and the imperative that cybersecurity be “baked in” from the start during the software design process.


Keynotes
avatar for David Duma

David Duma

Principal Deputy Director, Operational Test and Evaluation, U.S. Department of Defense
Mr. Duma is the Principal Deputy Director, Operational Test and Evaluation. He assumed this position in January 2002.  Prior to returning to government service, he worked in private industry managing a variety of projects involving test and evaluation; requirements generation; command... Read More →

Tuesday November 17, 2015 8:30am - 9:30am EST
Madison/Keynote & Plenary Sessions

9:30am EST

Designing the Infrastructure for an Enterprise IT System

Many government organizations are embarking on the development of enterprise-wide IT systems that will integrate and modernize a set of capabilities that even today are still being provided by a set of “siloed” legacy systems. The use of COTS business software and open standards should support better capabilities that can be integrated across the enterprise, while enhancing sustainability and reducing maintenance costs. Those who are contemplating, or even actively developing, such systems are grappling with a recurring set of issues that are independent of the system’s application domain. This presentation discusses five of these issues, describing the advantages and disadvantages of different ways of approaching them:

  • integrated COTS product suites and vendor lock-in vs. system integrator lock-in
  • integrating application components in a Software-as-a-Service (SaaS) context
  • the benefits and costs of using loose coupling and web services
  • the tradeoffs involved in trying to achieve a common look and feel across a system
  • making different levels of security services available across the enterprise
The presentation concludes with a brief discussion of how program offices can evaluate vendor solutions for enterprise IT systems with selection criteria that differentiate among the various approaches.

Speakers
avatar for William Novak

William Novak

Carnegie Mellon Software Engineering Institute
William E. Novak is a Senior Member of the Engineering Staff at the SEI. He is a researcher, consultant, and instructor in the acquisition and development of software-intensive systems. Novak has over 30 years of experience with government acquisition, real-time embedded software... Read More →
avatar for Patrick Place

Patrick Place

Carnegie Mellon Software Engineering Institute
Patrick Place is a Senior Member of the Technical Staff in the Client Technical Systems Directorate at the SEI. Recent projects at the SEI include direct customer support in a variety of technical areas including architecture assessments, use of SOA, and enterprise-level security... Read More →


Tuesday November 17, 2015 9:30am - 10:00am EST
Washington I

9:30am EST

Managing Product Development Flow: The Key to Large-Scale Agile Development

If you’ve heard consultants talking about the virtues of agile software development, you’ve probably heard their complaints about the “heavyweight” processes that have dominated the industry and all the excess documentation they require. What you don’t often hear is that it’s not really the amount of documentation that weighs you down, but rather the long wait for feedback about what you’re building that’s the source of the problem. In this presentation, you will learn about the sound principles and engineering-minded tradeoffs that occur when agile methods are applied successfully.


Speakers
avatar for Will Hayes

Will Hayes

Carnegie Mellon Software Engineering Institute
Will Hayes is a Senior Member of the Technical Staff at the SEI. He works to support direct lifecycle management in major software-intensive programs in government and military organizations, performs research and consultation in the application of agile methods in highly regulated... Read More →


Tuesday November 17, 2015 9:30am - 10:00am EST
Washington II

9:30am EST

Moving to the IC Cloud

In an era of sequestration and austerity, the federal government is seeking strategies for software reuse that will allow it to move away from stove-piped development toward open, reusable architectures. In this 30-minute talk, we’ll discuss up-and-coming cloud technologies used by members of the intelligence community along with some of the challenges and opportunities they present.


Speakers
avatar for Eric Werner

Eric Werner

Carnegie Mellon Software Engineering Institute
Eric Werner is the Technical Director and Chief Architect for the Emerging Technology Center at the SEI, where he sets the technical direction in software development, high-performance computing, cloud computing, and data analytics. Werner has more than 15 years of professional software... Read More →


Tuesday November 17, 2015 9:30am - 10:00am EST
Washington III

10:00am EST

10:30am EST

Tactical Cloudlets: Moving Cloud Computing to the Edge

Soldiers and frontline personnel operating in tactical environments increasingly make use of handheld devices to help with tasks such as face recognition, language translation, decision making, and mission planning. These resource-constrained edge environments are characterized by dynamic context, limited computing resources, high levels of stress, and intermittent network connectivity. Cyber-foraging is the leverage of external resource-rich surrogates to augment the capabilities of resource-limited devices. In cloudlet-based cyber-foraging, resource-intensive computation and data are offloaded to cloudlets. Forward-deployed, discoverable, virtual-machine-based tactical cloudlets can be hosted on vehicles or other platforms to provide infrastructure to offload computation, provide forward data staging for a mission, perform data filtering to remove unnecessary data from streams intended for dismounted users, and serve as collection points for data heading for enterprise repositories. This session presents the tactical cloudlet concept and an implementation targeted at promoting survivability of mobile systems. The goal is to demonstrate that cyber-foraging in tactical environments is possible by moving cloud computing concepts and technologies closer to the edge so that tactical cloudlets, even if disconnected from the enterprise, can provide capabilities that lead to enhanced situational awareness and decision making at the edge.


Speakers
avatar for Ben Bradshaw

Ben Bradshaw

Carnegie Mellon Software Engineering Institute
Ben Bradshaw holds a BS in computer science and an MBA from Baylor University. Ben works as part of the Edge Analytics team for the Advanced Mobile Systems Initiative at the SEI. Ben develops analysis algorithms and visualization capabilities for software systems.
avatar for Sebastián Echeverría

Sebastián Echeverría

Universidad de los Andes in Santiago, Chile, and Carnegie Mellon Software Engineering Institute
Sebastián Echeverría is a software engineer from Chile. He currently works at the Universidad de los Andes in Santiago, Chile, doing software development and research in diverse areas. Echeverría earned a Master of Software Engineering degree at Carnegie Mellon University in 2012... Read More →
avatar for Dan Klinedinst

Dan Klinedinst

Carnegie Mellon Software Engineering Institute
Dan Klinedinst is a vulnerability researcher in the CERT Program at the Carnegie Mellon Software Engineering Institute. His work includes performing vulnerability research and analysis on government and critical infrastructure assets. He is the author of the Gibson3D visualization... Read More →
avatar for Grace Lewis

Grace Lewis

Carnegie Mellon Software Engineering Institute
Grace Lewis is a Principal Researcher at the SEI. She is deputy lead for the Advanced Mobile Systems Initiative and principal investigator for the Edge-Enabled Tactical Systems project. Her many publications include a book in the SEI Software Engineering Series. Grace is also a member... Read More →
avatar for James Root

James Root

Carnegie Mellon Software Engineering Institute
James Root supports the research efforts of the Advanced Mobile Systems Initiative at the SEI with a large Android knowledge base and by developing prototypes. He holds a Bachelor of Science degree in software engineering from the Pennsylvania State University.
avatar for Keegan Williams

Keegan Williams

Carnegie Mellon Software Engineering Institute
Keegan Williams is a member of the Advanced Mobile Systems (AMS) initiative. He is working on many of the projects related to AMS including Tactical Cloudlets, Edge Analytics (EA), and Information Superiority to the Edge (ISE).


Tuesday November 17, 2015 10:30am - 11:00am EST
Washington II

10:30am EST

Taming the Complexity of Your Systems and Your Environment

The Carnegie Mellon Software Engineering Institute (SEI) is researching the definition of complexity to determine what characteristics of avionics systems can be measured to help evaluate whether a system is capable of being certified as safe. The Federal Aviation Administration (FAA) has asked the SEI to identify appropriate definitions of complexity for this purpose, then to identify possible measures and effects of complexity on aircraft safety. We are analyzing how complexity negatively affects avionics systems and aircraft safety so that we can focus on a small number of measures most important to the FAA. In this participatory session, we use what we have learned and help you learn

  • why you need to understand complexity and its effect on your system
  • what complexity really means for your type of system
  • how to measure complexity in a way that really affects your program
  • what steps you can take to reduce complexity

After this session, you will understand the breadth of meanings of the term complexity and determine for yourself which meanings to include in your complexity-reduction effort. You will also understand what makes a good complexity measurement and how you might change or adapt the results that the SEI is considering for the FAA to your organization. Finally, you will learn where in your program complexity can be reduced or managed, using the kinds of data collected for the measurements.


Speakers
avatar for Sarah Sheard

Sarah Sheard

Carnegie Mellon Software Engineering Institute
Dr. Sarah Sheard is a Senior Engineer in the Software Engineering and Acquisition Practices Directorate at the SEI. She has authored several publications on systems and software engineering in the sustainment phase and has helped the Air Force with their software engineering manual... Read More →


Tuesday November 17, 2015 10:30am - 11:30am EST
Washington III

10:30am EST

Open Systems Architecture: Progress and Challenges

Open Systems Architecture (OSA), an approach that integrates business and technical practices to create systems with interoperable and reusable components, has outstanding potential for creating resilient and adaptable systems, but the associated challenges make OSA one of the most ambitious endeavors in software architecture today. This panel discussion will focus on the progress made so far, the remaining challenges, and strategies for addressing those challenges.

Panel members will speak about OSA from several perspectives, including technical engineering, policy, contracting, and science and technology research. Participants will discuss their experiences with the practical trials of OSA and offer multiple perspectives—which might challenge one another—related to the technical, organizational, and business aspects of making it a reality.

Audience members from many different backgrounds will benefit from this discussion. OSA is a growing area of interest for the Department of Defense (DoD) as important DoD stakeholders recognize its significant potential. Federal workers who attend this panel will take away an understanding of where things really stand with OSA: How much is hype and how much is reality? General practitioners will also benefit from the lessons learned from the OSA adoption push, such as how software architecture can support reconfigurability, recomposability, and other -ilities.

OSA is a promising and important undertaking that deserves a broad, realistic treatment of what has been accomplished so far, how much of the underpinning is technical (especially architectural) versus organizational or business related, and how far we really have to go before its potential becomes reality.


Moderators
avatar for Harry Levinson

Harry Levinson

Carnegie Mellon Software Engineering Institute
Harry Levinson’s mission is to help developers use ever-evolving software engineering best practices in all facets of software development. This includes architecture, requirements engineering, coding, and testing. He has worked on various Air Force programs ranging from ERP and... Read More →
avatar for Forrest Shull

Forrest Shull

Carnegie Mellon Software Engineering Institute
Dr. Forrest Shull is Assistant Director for Empirical Research at the SEI. His role is to lead work with the U.S. Department of Defense, other government agencies, national labs, industry, and universities to advance the use of empirically grounded information in software engineering... Read More →

Speakers
avatar for Michael Bandor

Michael Bandor

Carnegie Mellon Software Engineering Institute
Michael Bandor is a senior engineer assigned to the Client Technical Solutions Directorate at the SEI. Since joining the SEI in May 2005, he has supported and functioned as the technical lead on various DoD programs across various domains, including space, airborne, command-and-control... Read More →
avatar for Thomas DuBois

Thomas DuBois

The Boeing Company
Thomas DuBois is the chief systems architect for the Sikorsky/Boeing Joint-Multi-Role/Future Vertical Lift (JMR/FVL) program, in which he provides technical leadership for introducing and integrating mission system technologies. Tom is also the co-principal investigator on the Sikorsky/Boeing... Read More →
avatar for Mike McLendon

Mike McLendon

Carnegie Mellon Software Engineering Institute
Michael McLendon is Associate Director of the Software Solutions Division at the SEI, where he leads the delivery of technical assistance to clients engaged in the acquisition and lifecycle support of software-reliant systems. Before this, McLendon served as Senior Advisor in the... Read More →
avatar for Doug Schmidt

Doug Schmidt

Vanderbilt University and Carnegie Mellon Software Engineering Institute
Dr. Douglas Schmidt is a Professor of Computer Science at Vanderbilt University and Visiting Scientist at the SEI. He was previously Chief Technology Officer at the SEI, a program manager at DARPA, and a member of the Air Force Scientific Advisory Board. His research focuses on software... Read More →


Tuesday November 17, 2015 10:30am - 12:00pm EST
Washington I

11:00am EST

Edge Analytics: Analysis of Social Media to Support Tactical Users

Social media, a type of open source information, has exploded in recent years. Our adversaries, particularly ISIS, routinely use social media to recruit, threaten, and advertise their actions. Social media is also used by people who innocently share information relevant to U.S. personnel. The need for improved U.S. capability to analyze social media is widely recognized, but analyzing social media streams to provide tactical warnings is challenging for several reasons:

  • High data volumes and rates: 10–20 English-language tweets per second mention “ISIS,” with peaks of 40–50 tweets per second for critical events.
  • Event and time-sensitivity and rapid decay: The value of information in tweets decays rapidly with time.
  • Signal-to-noise ratio: For each relevant tweet, many more are small talk, media hype, advertisements, or unrelated to the event of interest.
  • Trustworthiness: Much data transmitted via social media is untrustworthy by ignorance, error, or design.
  • Fusion with other data sources: For best effect, information gleaned from social media should be fused with information from other sources.

The Advanced Mobile Systems Initiative at the Carnegie Mellon Software Engineering Institute has developed the Edge Analytics system that ingests open-source social-media data streams and identifies significant events and emerging trends in time to inform and influence operations. We will discuss the architecture and implementation of Edge Analytics; present findings from analyzing Twitter data related to the 2012 attack on the U.S. Diplomatic Mission in Benghazi; discuss field trials with the Department of Defense, National Guard, and first responder communities; and demonstrate the system.


Speakers
avatar for Bill Anderson

Bill Anderson

Carnegie Mellon Software Engineering Institute
Bill Anderson holds a BSEE and an MS in industrial engineering. He is responsible for analysis of warfighter and first-responder needs and technology insertion activities for the Advanced Mobile Systems Initiative. Bill is the Initiative’s go-to person for identifying, arranging... Read More →
avatar for Ben Bradshaw

Ben Bradshaw

Carnegie Mellon Software Engineering Institute
Ben Bradshaw holds a BS in computer science and an MBA from Baylor University. Ben works as part of the Edge Analytics team for the Advanced Mobile Systems Initiative at the SEI. Ben develops analysis algorithms and visualization capabilities for software systems.
avatar for Edwin Morris

Edwin Morris

Carnegie Mellon Software Engineering Institute
avatar for Soumya Simanta

Soumya Simanta

Carnegie Mellon Software Engineering Institute
Soumya Simanta is part of the Advanced Mobile Systems Initiative at the SEI. Soumya is the lead architect for the Edge Analytics system. His focus is on identifying, improving, and transitioning emerging technologies with tactical applicability to warfighters and first responders... Read More →
avatar for Keegan Williams

Keegan Williams

Carnegie Mellon Software Engineering Institute
Keegan Williams is a member of the Advanced Mobile Systems (AMS) initiative. He is working on many of the projects related to AMS including Tactical Cloudlets, Edge Analytics (EA), and Information Superiority to the Edge (ISE).


Tuesday November 17, 2015 11:00am - 11:30am EST
Washington II

11:30am EST

Busting Silos and Red Tape: DevOps in Federal Government

All organizations face challenges in changing their culture and adopting DevOps philosophies. This is especially true in many federal government agencies. Through well-intentioned policies and procedures, many agencies have created siloed environments where change is slow and difficult. Finishing the last leg of large-scale software development project acquisitions can be particularly challenging and expensive. Barriers often impede getting hardware and software systems fully tested, transitioned, and running in production on schedule. Through our experience as a passionately DevOps-focused software development group within the Carnegie Mellon Software Engineering Institute—a federally funded research and development center that is creating, delivering, and transitioning cutting-edge software solutions to government organizations—we have struggled with and overcome challenges in helping the government adopt DevOps principles. Learn how we have conquered these challenges and helped shift our government stakeholders’ thinking by coaching and initiating DevOps in their operational and development environments.


Speakers
avatar for Aaron Volkmann

Aaron Volkmann

Carnegie Mellon Software Engineering Institute
Aaron Volkmann is a senior research engineer at the SEI, specializing in product and research-driven development. Since 2003, he has helped numerous organizations in the government—as well as health care, retail, software, and manufacturing industries—meet their business objectives... Read More →


Tuesday November 17, 2015 11:30am - 12:00pm EST
Washington III

11:30am EST

Providing Information Superiority to Small Tactical Units

Despite tremendous technological advances in handheld and wearable devices, warfighters often cannot get information they need when they need it. Causes include continued reliance on paper reports, one-way information flow, and lack of network bandwidth and handheld devices to access information. More bandwidth and new devices can improve reporting and increase the volume of information, and the Department of Defense (DoD) is increasingly interested in having soldiers carry handheld mobile computing devices to support their mission needs, but these advances will also create information overload.

This presentation will discuss and demonstrate the ISE system built by the Advanced Mobile Systems Initiative at the Carnegie Mellon Software Engineering Institute. The goal of ISE is information superiority via group-context-aware mobile applications that support integration of contextual information from individual soldiers, nearby soldiers operating as a unit, and the enterprise. This information can then be used to enhance the precision of information provided to warfighters. Specific innovations of this work include consideration of a wide range of contextual information, including the dynamics of unit operations, to achieve a common mission goal.

The presentation will cover several experiments and field trials performed using ISE, including

  • how ISE could have been used to provide better situational awareness to personnel during the attack on the U.S. Diplomatic Mission in Benghazi
  • an innovative strategy and experiment involving machine recognition of the actions of a small unit from data provided by worn and carried sensors
  • integration of the mission-oriented ISE capability with opportunistic data provided by the Group Context Framework developed by collaborators at Carnegie Mellon University, and experimentation with the integrated capability at a large music festival

Speakers
avatar for Jeff Boleng

Jeff Boleng

Carnegie Mellon Software Engineering Institute
Dr. Jeff Boleng is a retired Air Force Lt. Col. with a PhD in computer science. He is the SEI Advanced Mobile Systems Initiative Principal Investigator in several areas, including ISE and networking/communications. Jeff is also part of several research groups on the Carnegie Mellon... Read More →
avatar for Edwin Morris

Edwin Morris

Carnegie Mellon Software Engineering Institute
avatar for Marc Novakouski

Marc Novakouski

Carnegie Mellon Software Engineering Institute
Marc Novakouski is the lead architect on the ISE system at the SEI and is now working to transition the system to several government organizations. Prior to coming to the SEI, Marc worked at Raytheon, and he holds a master’s degree in software engineering from Carnegie Mellon U... Read More →


Tuesday November 17, 2015 11:30am - 12:00pm EST
Washington II

12:00pm EST

Lunch
Speakers
avatar for John Weiler

John Weiler

Co-Founder IT Acquisition Advisory Council, Executive Director, Interoperability Clearinghouse
Mr. Weiler is the Co-Founder and Executive Director of the Interoperability Clearinghouse (ICHnet.org), a public-private partnership (501 (c) (6)) formed to advance key elements of the Clinger Cohen Act by establishing collaborative mechanisms that tap commercial IT Acquisition best... Read More →


Tuesday November 17, 2015 12:00pm - 1:15pm EST
Madison/Keynote & Plenary Sessions

1:15pm EST

Keynote: Case Study of Toyota Unintended Acceleration and Software Safety

Investigations into potential causes of Unintended Acceleration (UA) for Toyota vehicles have made news several times in the past few years. Some blame has been placed on floor mats and sticky throttle pedals. But a jury trial verdict found that defects in Toyota's Electronic Throttle Control System (ETCS) software and safety architecture caused a fatal mishap. This verdict was based in part on a wide variety of computer hardware and software issues. This talk will outline key events in the still-ongoing Toyota UA story and pull together the technical issues that have been discovered by NASA and other experts. The results paint a picture that should inform not only future designers of safety-critical software for automobiles but also all computer-based system designers.


Keynotes
avatar for Philip Koopman

Philip Koopman

Associate Professor of Electrical and Computer Engineering, Carnegie Mellon University
Dr. Philip Koopman is an Associate Professor of Electrical and Computer Engineering at Carnegie Mellon University, where he has worked in the areas of wearable computers, software robustness, embedded networking, dependable embedded computer systems, and autonomous vehicle safety... Read More →

Tuesday November 17, 2015 1:15pm - 2:10pm EST
Madison/Keynote & Plenary Sessions

2:15pm EST

Engineering High-Assurance Software for Distributed Adaptive Real-Time Systems

Distributed Adaptive Real-Time (DART) systems are cyber-physical systems (CPS) with physically separated nodes that communicate and coordinate to achieve their goals and that self-adapt to their environment to improve likelihood of success. DART systems promise to revolutionize several areas of civilian and Department of Defense interest, such as robotics, transportation, energy, and health care. However, to fully realize this potential, the software controlling DART systems must be engineered to have high-assurance and certified to operate safely and effectively.

Achieving this goal is challenging—and infeasible with current testing-based approaches—due to complexity resulting from concurrency and coordination, environment uncertainty, and unpredictable system evolution caused by (self-)adaptation. In this talk, we present a sound engineering approach based on judicious use of domain-specific languages with precise semantics, rigorous analysis, and design constraints that leads to assured behavior of DART systems. Our approach uses a synergistic combination of analyses from different scientific domains. It is designed to assure, in a scalable manner, critical timing and functional and probabilistic requirements for systems with uncertain environments and coordination. We have implemented our approach in a workbench, and evaluated it on a model problem. As part of this research, we have combined architecture-based analysis with state-of-the-art verification algorithms for real-time schedulability of mixed-criticality systems, software model checking, and statistical model checking, along with proactive self-adaptation and middleware technology. The result is an evidence-based approach for producing high-assurance DART software involving multiple layers of the CPS stack. We conclude with open problems and directions for future work.


Speakers
avatar for Sagar Chaki

Sagar Chaki

Carnegie Mellon Software Engineering Institute
Dr. Sagar Chaki is a Principal Researcher at the SEI. He received a B.Tech. in computer science & engineering from the Indian Institute of Technology, Kharagpur, in 1999, and a PhD in computer science from Carnegie Mellon University in 2005. These days, he works mainly on model checking... Read More →
avatar for Mark Klein

Mark Klein

Carnegie Mellon Software Engineering Institute
Mark Klein is Senior Member of the Technical Staff at the SEI and the Technical Director of its Critical System Capabilities Directorate, which conducts research in cyber-physical systems and advanced mobile systems. His research has spanned various facets of software engineering... Read More →
avatar for Dioniso de Niz

Dioniso de Niz

Carnegie Mellon Software Engineering Institute
Dr. Dionisio de Niz is a Principal Researcher at the SEI, leading research in multicore real-time scheduling to address physical concurrency, shared memory and cache, and new application requirements such as mixed criticality. He has worked on various tools for model-driven development... Read More →


Tuesday November 17, 2015 2:15pm - 3:00pm EST
Washington II

2:15pm EST

Performance Metrics That Matter: Eliminating Surprises in Agile Projects

Agile projects can have issues with quality just as waterfall oriented projects. This talk will focus on how the government can experience true agility with quality. I will discuss the challenges that we faced and how we successfully overcame them.

Most agile projects have sprints of less than 4 weeks, and monthly status reports are of limited value to track progress. In addition, many agile projects accumulate technical debt with every sprint. In many organizations, up to 80% of maintenance spending is for bug fixes.

Our agile teams consistently deliver substantially defect-free software on budget and on schedule. Our developers collect and report size, time, defects, and tasks precisely and accurately. The teams uses Earned Value Management at the individual and team levels with the ability to detect as little as one day of schedule slip weekly.  

Our teams avoid technical debt by not relying on testing alone for defect removal. The teams conduct team inspections and personal reviews for early effect removal and put the highest quality code into test. Individual developers strive for more than 80% of the components they develop to have zero defects in integration, system, and acceptance test, thereby minimizing and in many cases totally eliminating technical debt. We provide data from our projects to illustrate the use of these practices.

What this means to customers is a dramatically reduced number of security incidents attributable to poor quality software code. In addition to improved security, customers benefit from significantly reduced software operations and maintenance costs. Instead of investing time and money to fix bugs in the production software, customers can then reallocate spending on new features and enhancements.

The government and its contractors should make a commitment to quality from the boardroom on down. Quality should be the number one goal for every project. This means empowering software developers and teams with the proper skills and training needed to minimize the number of defects in their software and deliver products with fewer vulnerabilities the first time around. With quality at this level, the government can reasonably require contractors to provide a warranty against defects in production use.


Speakers
avatar for Girish Seshagiri

Girish Seshagiri

Vice President and CTO, ISHPI
Girish Seshagiri is a globally recognized expert in software assurance, quality management, process improvement, and knowledge management. He is a speaker, coach, and instructor, who has addressed CMMI and SEPG conferences around the world. Seshagiri is the executive sponsor of Ishpi’s... Read More →


Tuesday November 17, 2015 2:15pm - 3:00pm EST
Washington I

2:15pm EST

Technical Debt: Why You Should Care

The term technical debt describes an aspect of the tradeoff between short-term and long-term value in the software development cycle. For example, mistaking a heavy focus on rapid delivery of business features for agility may result in decreased focus on quality and architecture. Hence, the results of the tradeoffs may accumulate as technical debt. An ongoing focus on managing technical debt is critical to the development of high-quality systems that meet their customers’ needs in a timely manner. Left unmanaged, technical debt causes projects to face significant technical and financial problems, leading to increased maintenance, operation, and evolution costs. Agile practices of refactoring, test-driven development, and software craftsmanship are often mistakenly deemed sufficient to manage technical debt. For mission-critical, large-scale systems, there is more to consider with respect to technical debt; risks of accumulating debt are greater, practices (such as refactoring) start to break down, and technical debt becomes harder to find and fix because it is not as visible. In this session, we will explore common fallacies about technical debt and possible actions that development teams can take to better manage it.


Speakers
avatar for Robert Nord

Robert Nord

Carnegie Mellon Software Engineering Institute
Dr. Robert Nord is a Senior Member of the Technical Staff at the SEI, where he develops effective methods and practices for software architecture. He also leads research on strategies for scaling agile development by incorporating architecture practices. Before joining the SEI, he... Read More →
avatar for Ipek Ozkaya

Ipek Ozkaya

Carnegie Mellon Software Engineering Institute
Ipek Ozkaya is a Senior Member of the Technical Staff at the SEI and deputy lead of the Architecture Practices Initiative. She develops effective methods for improving software development and system evolution by emphasizing software architecture practices, software economics, and... Read More →


Tuesday November 17, 2015 2:15pm - 3:00pm EST
Washington III

3:00pm EST

3:30pm EST

Dashing All the Way: Defining the Best Dashboard for Your Program

Many Department of Defense programs today have a multitude of metrics data being reported by their contractors as well as those collected and tracked by the program office. However, how do you effectively aggregate and report the data at the program manager level (or higher) to get a complete picture of the health of a program? Often the data is reported too late to be useful or even actionable. This presentation will show a method of using a program dashboard representation to aggregate the data being reported as well as methods to provide some insight into schedule risk based on certain types of data. This approach has been implemented in various Air Force programs and is not limited to programs in development but can be implemented within sustainment efforts as well.


Speakers
avatar for Michael Bandor

Michael Bandor

Carnegie Mellon Software Engineering Institute
Michael Bandor is a senior engineer assigned to the Client Technical Solutions Directorate at the SEI. Since joining the SEI in May 2005, he has supported and functioned as the technical lead on various DoD programs across various domains, including space, airborne, command-and-control... Read More →
avatar for Robert Ferguson

Robert Ferguson

Carnegie Mellon Software Engineering Institute
Robert Ferguson works primarily on software measurement and estimation. He spent 30 years in industry as a software developer and project manager before coming to the SEI. His experience includes applications in real-time flight controls, manufacturing control systems, large databases... Read More →
avatar for Thomas Merendino

Thomas Merendino

Carnegie Mellon Software Engineering Institute
Tom Merendino is a Senior Member of the Engineering Technical Staff at the SEI. Tom’s areas of expertise include engineering of system software architectures. He is a trusted senior technical advisor to acquisition program office leadership and technical staff. His experience includes... Read More →


Tuesday November 17, 2015 3:30pm - 4:25pm EST
Washington III

3:30pm EST

SoS Architectures: Identifying Architecture, Engineering and Capability Challenges Early in the Lifecycle

For systems of systems (SoS), severe integration and operational problems can arise due to inconsistencies, ambiguities, and gaps in how the architectures address the quality attributes (nonfunctional requirements such as availability, predictability, and security). The problems are exacerbated in contexts where major system and software elements of the SoS are developed concurrently and independently. The Carnegie Mellon Software Engineering Institute (SEI) has developed an approach—called the Mission Thread Workshop (MTW)—for eliciting quality attribute considerations as augmentations to end-to-end mission threads early in the architecture development process and for evaluating SoS, constituent system, and software architectures against these mission threads to identify architecture risks. These mission threads can be used throughout a program’s lifecycle.

The SEI has applied the MTW on a variety of SoS architectures in Department of Defense (DoD) organizations, and this talk will present the MTW in the context of a DoD mission-critical SoS example. The example includes derivation of system- and software-specific scenarios to drive a System and Software Architecture Evaluation of a constituent legacy system in the SoS. It also includes lessons learned from real-world application of the methods. At the end of this session, attendees will understand

  • the benefits of applying these methods, including the points in the acquisition and development lifecycles where each method provides the most leverage
  • how to identify key stakeholders needed to make the methods successful
  • how to apply the results of these methods within their programs and organizations to reduce cost and risk and improve program success

Speakers
avatar for Mike Gagliardi

Mike Gagliardi

Carnegie Mellon Software Engineering Institute
Mike Gagliardi is a Principal Engineer at the Software Engineering Institute in the Client Technical Solutions Directorate (CTSD) part of the Software Solutions Division (SSD). Mike has more than 25 years of experience in real-time, mission-critical software architecture, engineering... Read More →
avatar for Tim Morrow

Tim Morrow

Carnegie Mellon Software Engineering Institute
Timothy Morrow is a Senior Member of the Technical Staff at the SEI. He develops and implements architecture-centric approaches to support acquisition, development, and analysis of system, systems of systems, and software architectures for DoD and non-DoD programs. His areas of expertise... Read More →
avatar for William Wood

William Wood

Carnegie Mellon Software Engineering Institute
William Wood has worked at the SEI for the past 25 years and has held various technical and managerial positions over this time period, performing a combination of research and customer-interactive activities. He currently works in the Software Engineering and Acquisition Practices... Read More →


Tuesday November 17, 2015 3:30pm - 4:25pm EST
Washington II

3:30pm EST

What Happens and How: Analyzing the Results of 13 Acquisition Program Assessments

Software-intensive acquisition programs continue to experience recurring cost, schedule, and quality issues despite long awareness of these problems, and their persistence indicates they are more difficult to resolve than one might think. As a result, since the 1990s the Carnegie Mellon Software Engineering Institute (SEI) has performed Independent Technical Assessments (ITAs) of mid- to large-sized software-intensive acquisition programs that have experienced problems, conducting interviews and reviewing documents to produce findings and recommendations for corrective action.

To better understand the persistent nature of the problems they encountered, SEI researchers analyzed data collected from 13 unclassified ITAs conducted over five years in a variety of systems. This analysis revealed that while almost all programs face both technical and programmatic issues, the most significant software-related challenges that Department of Defense (DoD) programs face are due to management and oversight concerns. This presentation reviews these “top 10” findings and compares results with prior DoD analyses to examine trends over time.

To explore these problems further, the SEI also looked at those underlying program dynamics that recur across acquisition programs to help identify root causes. Many of the behaviors contributing to the problems could be explained by the presence of “misaligned incentives” (e.g., trading off long-term value for short-term payoff or undermining group objectives to get individual gains) that drive decision making and create poor program outcomes. This presentation explains a set of recurring dynamics that drive the key high-level findings of the ITA analysis and provides qualitative models of each adverse behavior.


Speakers
avatar for William Novak

William Novak

Carnegie Mellon Software Engineering Institute
William E. Novak is a Senior Member of the Engineering Staff at the SEI. He is a researcher, consultant, and instructor in the acquisition and development of software-intensive systems. Novak has over 30 years of experience with government acquisition, real-time embedded software... Read More →
avatar for Forrest Shull

Forrest Shull

Carnegie Mellon Software Engineering Institute
Dr. Forrest Shull is Assistant Director for Empirical Research at the SEI. His role is to lead work with the U.S. Department of Defense, other government agencies, national labs, industry, and universities to advance the use of empirically grounded information in software engineering... Read More →


Tuesday November 17, 2015 3:30pm - 4:25pm EST
Washington I

4:30pm EST

Keynote: Kevin Fall, SEI Chief Technology Officer

As one of the DoD's two R&D FFRDCs, the SEI conducts a research program spanning areas including software development, vulnerability discovery, digital forensics, malware analysis, embedded systems, formal methods, cyber training, and risk management. R&D projects are awarded using an internal competitive process that takes into account intellectual merit, potential government mission impact, collaborators, and potential to transition to practice.

The primary theme of our projects is "capabilities with confidence," generally provided by software.  A particular emphasis is being placed on quantifiable evidence in support of assurance—not just in the security sense, but in the sense of assurance for acquisition, performance, testing, and sustainment. In this talk I will briefly introduce SEI as part of Carnegie Mellon University, discuss how the complexity of and dependence on today's software systems drive the need for tools and methods for greater assurance and security, and discuss several multi-year projects that have had significant ongoing impacts on our government clients and the larger community.

...

Keynotes
avatar for Kevin Fall

Kevin Fall

Chief Technology Officer, Carnegie Mellon Software Engineering Institute
Kevin Fall is the Deputy Director and Chief Technology Officer of the SEI, where he directs the research and development portfolio of the SEI’s technical programs in cybersecurity, software architecture, process improvement, measurement and estimating, and unique technical support... Read More →

Tuesday November 17, 2015 4:30pm - 5:30pm EST
Madison/Keynote & Plenary Sessions

5:30pm EST

SSC Welcome Reception
Tuesday November 17, 2015 5:30pm - 7:30pm EST
Crystal Ballroom
 
Wednesday, November 18
 

7:30am EST

8:15am EST

Opening Remarks
Speakers
avatar for Bill Pollak

Bill Pollak

Software Solutions Conference 2015 General Chair, Carnegie Mellon Software Engineering Institute


Wednesday November 18, 2015 8:15am - 8:30am EST
Madison/Keynote & Plenary Sessions

8:30am EST

Keynote: Gaps in Science and Technology Activities for the IT Acquisition of Business Systems

Congress and others have expressed concern over the Department of Defense’s ability to develop and deploy major IT acquisition programs. This year’s National Defense Authorization Act highlights this issue, noting that gaps include lack of support for business process reengineering, for lowering costs of customization of commercial software, for lowering maintenance costs, for open architectures, for engagement with management schools and small businesses, and for the conversion of legacy software to modern systems. In this talk, Mr. Seraphin will  summarize congressional concerns that such gaps in science and technology activities related to IT acquisition of business systems, if left unaddressed, could severely hamper the DoD’s ability to field a modern and efficient IT enterprise that meets the current and future needs of the Department.


Keynotes
avatar for Arun Seraphin

Arun Seraphin

Member of Congressional Staff, Senate Armed Services Committee
Dr. Arun Seraphin is a Professional Staff Member for the Senate Armed Services Committee. Prior to working on information technology and acquisition policy issues for the Senate Armed Services Committee, Dr. Seraphin was the Assistant Director for Defense Programs at the White House... Read More →

Wednesday November 18, 2015 8:30am - 9:25am EST
Madison/Keynote & Plenary Sessions

9:30am EST

A Defect Prioritization Method Based on the Risk Priority Number

Most software systems have some “defects” that are identified by users. Some of these are truly defects in that the requirements were not properly implemented; some are caused by changes made to other systems; still others are requests for enhancement to improve the users’ experience. All of these are recorded as defects and generally stored in a database so that they can be worked off in a series of incrementally delivered updates. For most systems, it is not financially feasible to fix all of the concerns in the near term, and indeed some issues may never be addressed. The government program office has an obligation to choose wisely among a set of competing defects to be implemented, especially in a financially constrained environment. This presentation presents a defect-prioritization method based on a risk priority number. This method will help program offices establish priorities for updating systems.


Speakers
avatar for Julie Cohen

Julie Cohen

Carnegie Mellon Software Engineering Institute
Julie Cohen recently returned from a three-year Individual Personal Act assignment to the Transformational Satellite Program, where she served as Deputy Program Manager for the Mission Operations Systems segment. Julie has worked mainly in Air Force programs, including the Global... Read More →
avatar for Robert Ferguson

Robert Ferguson

Carnegie Mellon Software Engineering Institute
Robert Ferguson works primarily on software measurement and estimation. He spent 30 years in industry as a software developer and project manager before coming to the SEI. His experience includes applications in real-time flight controls, manufacturing control systems, large databases... Read More →
avatar for Will Hayes

Will Hayes

Carnegie Mellon Software Engineering Institute
Will Hayes is a Senior Member of the Technical Staff at the SEI. He works to support direct lifecycle management in major software-intensive programs in government and military organizations, performs research and consultation in the application of agile methods in highly regulated... Read More →


Wednesday November 18, 2015 9:30am - 10:00am EST
Washington I

9:30am EST

Architectural Insights into Planning a Legacy System Modernization

Many legacy systems were built decades ago using the technologies available at the time and have been operating successfully for many years. But they suffer from being built from components that are becoming obsolete, high licensing costs for COTS components, awkward user interfaces, and business processes that evolved based on expediency rather than optimality. In addition, new software engineers familiar with current technology are unfamiliar with the domain; documentation is scarce and outdated; the business rules are likely to be embedded in the code, which is written in an obsolete language using obsolete data structures; and the cadre of aging domain experts maintaining it is unfamiliar with newer technologies.

There are a number of optional large-grained approaches to modernizing a legacy system. We propose a rational way of using system architectural concepts to develop architectural options, create a scorecard, apply the scorecard, and present the results with recommendations to decision makers. The approach includes the following steps:

  1. Determine and score the options, and make decisions.
  2. Explore implementation alternatives.
  3. Build an end-state target architecture.
  4. Build a roadmap to move through multiple phases to the target architecture.

The presentation will describe how this approach was applied to a large-scale IT modernization effort.


Speakers
avatar for Phil Bianco

Phil Bianco

Carnegie Mellon Software Engineering Institute
Philip Bianco is a Senior Member of the Technical Staff at the SEI. He provides direct support for DoD and DHS in the area of software architecture as part of the Software Solutions Division. His research interests include tools to assist architects, such as ArchE; service-oriented... Read More →
avatar for Mike Gagliardi

Mike Gagliardi

Carnegie Mellon Software Engineering Institute
Mike Gagliardi is a Principal Engineer at the Software Engineering Institute in the Client Technical Solutions Directorate (CTSD) part of the Software Solutions Division (SSD). Mike has more than 25 years of experience in real-time, mission-critical software architecture, engineering... Read More →
avatar for William Wood

William Wood

Carnegie Mellon Software Engineering Institute
William Wood has worked at the SEI for the past 25 years and has held various technical and managerial positions over this time period, performing a combination of research and customer-interactive activities. He currently works in the Software Engineering and Acquisition Practices... Read More →


Wednesday November 18, 2015 9:30am - 10:00am EST
Washington II

9:30am EST

Government as the Integrator: Why, Why Not, and How?

The Lead System Integrator (LSI) approach to building and integrating large, complex systems has resulted in the failure of numerous high-visibility programs, leading Congress to pass legislation limiting its use and giving renewed interest to the idea of government acting as its own systems integrator, or Government as the Integrator (GATI).

The use of GATI promises a number of benefits over the use of an LSI, including government control of the design of the system and software architectures, better visibility into program status and progress, and the development of technical expertise within the government acquisition workforce. However, the steady growth of interest in GATI has come with its own set of issues, most notably the results of downsizing and loss of technical expertise within the defense acquisition workforce over the past 20 years—and GATI efforts have not always gone well.

This presentation identifies many of the factors that determine whether GATI is more likely to be successful in certain domains and circumstances. It then covers the issues that can impede the successful use of GATI and offers specific guidance that has been used in GATI contexts to help with contractual vehicles and language, architectural approaches to facilitate GATI, and managing the technical staffing issues that challenge most GATI efforts. Different organizational implementation approaches and their advantages and disadvantages are presented and analyzed.


Speakers
avatar for William Novak

William Novak

Carnegie Mellon Software Engineering Institute
William E. Novak is a Senior Member of the Engineering Staff at the SEI. He is a researcher, consultant, and instructor in the acquisition and development of software-intensive systems. Novak has over 30 years of experience with government acquisition, real-time embedded software... Read More →


Wednesday November 18, 2015 9:30am - 10:00am EST
Washington III

10:00am EST

10:30am EST

Contracting Officer Representative (COR) Desk Guide Wiki for Software-Intensive Systems

Software-intensive systems present several challenges to the contracting officer (CO) and contracting officer representative (COR). These include what questions to ask at each stage of the contracting process (i.e., Initial Concept Study and contract execution) and how to interpret and evaluate the contractors’ answers. Currently, guidance is scattered among numerous references, directives, and instructions; the COR has to sift through this documentation to find the relevant information. The COR Desk Guide Wiki solves this problem through the creation of a single point of reference, consisting of a curated set of Department of Defense and local documents, templates, and checklists to aid the COR in addition to the general benefits of information sharing and collaboration provided by a Wiki. Built on SharePoint 2013, the initial prototype—though incomplete—demonstrates the potential of this approach. The Wiki can be accessed remotely, through the Carnegie Mellon Software Engineering Institute’s External Collaboration Environment, or it can be imported into an existing SharePoint 2013 instance and be up and running in less than a day.


Speakers
avatar for Andrew Boyd

Andrew Boyd

Carnegie Mellon Software Engineering Institute
avatar for James Smith

James Smith

Carnegie Mellon Software Engineering Institute
James Smith is a Principle Engineer at the SEI, with over 25 years’ experience in software-intensive systems-of-systems acquisition, test, deployment, and sustainment. He has authored numerous papers, reports, and presentations and co-developed the SEI’s SoS Navigator process... Read More →


Wednesday November 18, 2015 10:30am - 11:00am EST
Washington I

10:30am EST

Eliciting Unstated Requirements

Have you ever worked on a software project that didn’t result in what the users ultimately wanted? Stakeholders, especially end users, often have requirements in mind that they aren’t aware of. Uncovering them can be quite challenging and involves a way of thinking not found in more traditional elicitation approaches. It requires probing interviews and expanded use of context information to break through the confines of what the requirements engineer typically achieves with a specification-driven process. It requires a method that transforms stakeholders’ tacit knowledge into explicit statements so that insightful and innovative requirements can emerge.

The Elicitation of Unstated Requirements at Scale (EURS) research team at the Carnegie Mellon Software Engineering Institute developed and validated a method for determining the unstated needs of the varied stakeholders typical of today’s large, diverse programs (e.g., sociotechnical ecosystems). This method, called KJ+, is scalable to address the needs of multiple categories of stakeholders; usable by a diverse, noncollocated team performing requirements analysis; and results in a more complete set of requirements as the basis for subsequent system design, implementation, and continued sustainment.

This participatory session will include presentations and short exercises. The presentations cover the KJ method as initially practiced 20 years ago, as well as extensions that allow KJ to be used in a virtual environment (KJ+). The results of a KJ+ case study conducted in 2014 will also be presented. Two brief exercises will be conducted to give participants an opportunity to exercise their interviewing and affinitization skills.


Speakers
avatar for Mary Beth Chrissis

Mary Beth Chrissis

Carnegie Mellon Software Engineering Institute
Mary Beth Chrissis has 30 years of experience in software development and sustainment, organizational improvement, strategic planning, and related fields. She currently works for the SEI Client Technical Solutions Division and focuses on improving performance in government and civil... Read More →
avatar for Michael Konrad

Michael Konrad

Carnegie Mellon Software Engineering Institute
Dr. Michael Konrad is a Principal Researcher at the SEI currently working on developing analytic support for architecture modeling using AADL. Since 2013, Konrad has contributed to research in requirements engineering, software assurance, and engaging stakeholders in system and software... Read More →
avatar for Nancy Mead

Nancy Mead

Carnegie Mellon Software Engineering Institute
Dr. Nancy Mead is a Fellow and Principal Researcher at the SEI. Mead is also an adjunct professor of software engineering at Carnegie Mellon University. She is currently involved in the study of security requirements engineering and the development of software assurance curricula... Read More →
avatar for Robert Stoddard

Robert Stoddard

Carnegie Mellon Software Engineering Institute
Robert Stoddard is a Principal Researcher at the SEI. He has been involved in research and customer work in topics such as elicitation of unstated requirements at scale, early lifecycle cost estimation, and security measurement and modeling for the CERT Division. Stoddard has many... Read More →


Wednesday November 18, 2015 10:30am - 11:30am EST
Washington III

10:30am EST

Common System and Software Testing Pitfalls

In spite of many great testing “how-to” books, the people involved with system and software testing (such as testers, requirements engineers, system/software architects, system/software engineers, technical leaders, managers, and customers) continually make many different types of testing-related mistakes. These commonly occurring human errors can be thought of as system and software testing pitfalls, and when projects unwittingly fall into them, these pitfalls make testing less effective at uncovering defects, make people less productive at performing testing, and harm project morale. Donald Firesmith has created a repository of 167 of these testing anti-patterns, analyzed and organized them into a taxonomy consisting of 23 categories, and documented each pitfall in terms of its name, description, potential applicability, characteristic symptoms, potential negative consequences, potential causes, recommendations for avoiding it and mitigating its harm, and related pitfalls. This presentation builds on Firesmith’s book by the same name, which documented 92 pitfalls in 14 categories.


Speakers
avatar for Don Firesmith

Don Firesmith

Carnegie Mellon Software Engineering Institute
Donald Firesmith is a Senior Member of the Technical Staff at the SEI, where for the last 11 years he been helping the U.S. Department of Defense and other governmental agencies acquire large, complex, software-intensive systems. His areas of expertise include requirements engineering... Read More →


Wednesday November 18, 2015 10:30am - 12:00pm EST
Washington II

11:00am EST

The Joint Fire Science Program (JFSP) and the Integrated Fuels Treatment Decision Support System (IFTDSS)

This session describes how the interagency Joint Fire Science Program (JFSP) developed and assessed the Interagency Fuel Treatment Decision Support System (IFTDSS) to meet the needs of the wildland fire community for fuel-treatment planning for wildland fire. The past decade saw a dramatic proliferation of software systems intended to help fire and fuels managers. These systems were created by many developers and funded by a variety of sources. The systems were developed without any central control or vision and deployed without a governance process for transitioning developmental or research-grade software applications to operationally ready, supported applications. While this resulted in an increase in problem-solving capability, it also resulted in a fuels management environment with numerous stand-alone tools, system and data access problems, inconsistent fuels management planning, minimal and fragmented security, and ad hoc training. It also resulted in a frustrated fire and fuels management community.

To address this self-described “software chaos,” JFSP worked extensively with users to incorporate a set of existing tools into the IFTDSS using a services-based approach. Prior to the deployment decision, JFSP continued their user outreach by conducting an independent assessment of IFTDSS focused on four key areas: alignment with enterprise architecture guidance, impact of the SOA approach on software development by the community, usability by both novice and expert users, and impact on training and knowledge management. The assessment concluded that IFTDSS could be a major step toward meeting the wildland fire community’s strategic goals if fielded as part of a cohesive governance strategy.


Speakers
avatar for John Cissel

John Cissel

Joint Fire Science Program
John H. Cissel is the Program Manager of the Joint Fire Science Program, Boise, ID. Prior to that he was the Research Coordinator, Oregon BLM; the HJ Andrews Experimental Forest Director, Oregon State University; the Research Liaison at the HJ Andrews ExperiForest, Central Cascades... Read More →
avatar for Steve Palmquist

Steve Palmquist

Carnegie Mellon Software Engineering Institute
M. Steven Palmquist is a Principal Engineer in the Civil Sector of the Client Technical Solutions Directorate of the SEI. He is a licensed Professional Engineer (PE), a Project Management Professional (PMP), and a PMI Agile Certified Practitioner (PMI-ACP). Prior to joining the SEI... Read More →


Wednesday November 18, 2015 11:00am - 11:30am EST
Washington I

11:30am EST

A Case Study: Experiences with Agile and Lean Principles

This case study tells the story of the development of a critical IT system within a department of the U.S. federal government. This study focuses on the successes and challenges resulting from applying Agile and Lean methods in a government software development environment. The study is based on interviews, observations, documentation, program guidance, and examination of work products. The case study is written so that other government entities can benefit from the implementation experiences.


Speakers
avatar for Jeff Davenport

Jeff Davenport

Carnegie Mellon Software Engineering Institute
Jeff Davenport is a software engineer with 25 years of experience, encompassing all phases of the software development lifecycle. For the past 7 years, he has worked as a senior engineer at the SEI, where he has provided assistance to federal clients in their pursuit of software engineering... Read More →


Wednesday November 18, 2015 11:30am - 12:00pm EST
Washington I

11:30am EST

Building Secure Software for Mission Critical Systems

The role of software in critical missions continues to expand. As new technologies evolve that depend on the flexibility of software, attack surfaces increase and new vulnerabilities emerge. This talk explores the expanding landscape of vulnerabilities that accompanies the increasing reliance on software and examines key steps to help mitigate the increased risk. Topics include the development of appropriate requirements for the mission, system, and software; development and testing practices for increasing confidence in software assurance; and evaluation approaches for existing systems. The talk will conclude with a view of emerging approaches to further improve the delivery and sustainment of mission critical software.


Speakers
avatar for Mark Sherman

Mark Sherman

Carnegie Mellon Software Engineering Institute
Dr. Mark Sherman is the technical director of the Cyber Security Foundations Group in the CERT Division of the SEI. His team focuses on foundational research related to the life cycle for building secure software and the human element in cyber security. Before coming to the SEI, Sherman... Read More →


Wednesday November 18, 2015 11:30am - 12:00pm EST
Washington III

12:00pm EST

Lunch
Wednesday November 18, 2015 12:00pm - 1:15pm EST
Madison/Keynote & Plenary Sessions

1:15pm EST

Keynote: Speed With Discipline
There is a tension between the need to release capabilities rapidly and the length of time needed to acquire capabilities, which includes the time needed to complete accreditation processes. To accomplish both requires an increased attention to operational requirements, effective use of architecture, ability to release smaller software components, and a major shift from monolithic, after-the-fact information assurance to mission assurance.

This presentation describes an approach and provides examples showing how software security assurance can be achieved while keeping the desired pace of releasing new capabilities.  It concludes with a challenge to the audience to adopt and adapt the approach so mission assured software capabilities are released at the pace needed by the warfighter rather than a pace dictated by accreditation processes.

Keynotes
avatar for Tim Rudolph

Tim Rudolph

Chief Technology Officer, Air Force Life Cycle Management Center’s (AFLCMC)
Tim Rudolph is a member of the Senior Executive Service (SL).  He is the Air Force-wide Technical Advisor, Integrated Information Capabilities (IIC).  He serves as the Air Force Life Cycle Management Center’s (AFLCMC) Chief Technology Officer (CTO), stationed at Hanscom Air Force... Read More →

Wednesday November 18, 2015 1:15pm - 2:10pm EST
Madison/Keynote & Plenary Sessions

2:15pm EST

Intellectual Property Rights: Why You Should Care and How To Manage Them

Intellectual property (IP) rights are an important part of almost every acquisition strategy, but planning for and managing IP rights have special concerns for software and system acquisition. Your program must develop an IP strategy early in the lifecycle to ensure that the proper rights are available throughout the entire lifecycle. Understanding why IP rights are important throughout the lifecycle is vital to determining which IP rights to include in the acquisition. You then need strategies to ensure that your program includes the proper language in its acquisition documents and that the program and its contractors take the proper steps during execution to ensure compliance with the required IP rights.


Speakers
avatar for Julie Cohen

Julie Cohen

Carnegie Mellon Software Engineering Institute
Julie Cohen recently returned from a three-year Individual Personal Act assignment to the Transformational Satellite Program, where she served as Deputy Program Manager for the Mission Operations Systems segment. Julie has worked mainly in Air Force programs, including the Global... Read More →
avatar for Eileen Wrubel

Eileen Wrubel

Carnegie Mellon Software Engineering Institute
Eileen Wrubel is the SEI representative on the Air Force Strategic Software Improvement Program Working Group, supporting development and implementation of software policy and guidance to improve the acquisition, management, and sustainment of software components in Air Force systems... Read More →


Wednesday November 18, 2015 2:15pm - 3:00pm EST
Washington II

2:15pm EST

Measurement and Analysis in the Real World: Tools for Cleaning Messy Data

The process of gathering and summarizing operational data to produce clear and interpretable displays of metrics can sometimes resemble the process of making sausage, especially if you have no tools to help you. This presentation will provide a brief demonstration of tools created by staff at the Carnegie Mellon Software Engineering Institute that help scan, analyze, and prepare data to be used on a weekly metrics report for one of our customers. The tools, and the process we’ve devised for using them, allow us to produce a weekly metrics report on behalf of a government program office. The data come directly from the contractor’s database, and the metrics report allows the government to have information derived by a neutral third party to help trigger productive conversations during status meetings. These government-owned metrics supplement what the contractor provides (rather than being redundant) and provide an independent basis for analyzing trends and patterns highlighted by the contractor-reported metrics.


Speakers
avatar for Rhonda Brown

Rhonda Brown

Carnegie Mellon Software Engineering Institute
Rhonda Brown joined the SEI in 2004 following 15 years in industry as a software engineer, where she developed microprocessor-based embedded system software for nuclear power plant instrumentation and control projects and real-time software for nuclear power plant simulators used... Read More →
avatar for Julie Cohen

Julie Cohen

Carnegie Mellon Software Engineering Institute
Julie Cohen recently returned from a three-year Individual Personal Act assignment to the Transformational Satellite Program, where she served as Deputy Program Manager for the Mission Operations Systems segment. Julie has worked mainly in Air Force programs, including the Global... Read More →
avatar for Bruce Grant

Bruce Grant

Carnegie Mellon Software Engineering Institute
Bruce Grant joined the SEI in 2013 following 29 years in industry as a software engineer, where he developed and tested real-time embedded software for complex systems such as Satellites, Ground Stations, Surveillance and Military and Commercial Avionics systems. Bruce assists in... Read More →
avatar for Will Hayes

Will Hayes

Carnegie Mellon Software Engineering Institute
Will Hayes is a Senior Member of the Technical Staff at the SEI. He works to support direct lifecycle management in major software-intensive programs in government and military organizations, performs research and consultation in the application of agile methods in highly regulated... Read More →


Wednesday November 18, 2015 2:15pm - 3:00pm EST
Washington I

2:15pm EST

Paying Due Diligence to Software Architecture in Acquisition

Acquiring systems that provide the necessary capability and functionality to warfighters is at the heart of all system acquisition efforts. But what significantly impacts much of the development, integration, operation, and maintenance costs and risks are the nonfunctional drivers of the system, also called quality attributes. Examples of quality attributes include availability, security, openness, maintainability, reusability, performance, testability, and usability. Many quality attributes are embodied in the system and software architectures, and the supporting architectural approaches must be analyzed and traded off against each other to successfully achieve the mission and business drivers of the system. All too often, systems’ acquisition strategies and associated artifacts (e.g., RFI, RFP, SOO, SOW) do not adequately address the architecture and quality attribute drivers for the system. As a result, the program office has little control of or visibility into the architecture and design solutions provided by the contractor. When architecture and design issues eventually arise, it is often late in the lifecycle (e.g., during integration, operations, or maintenance), resulting in costly rework. Due diligence must be paid to the software architecture and quality attributes as early in the lifecycle as possible.

This presentation will describe approaches that the Carnegie Mellon Software Engineering Institute has used with program offices to adopt software architecture and quality attribute practices in acquisition contexts to give program offices better specificity, visibility, and management of the software architecture and the quality attributes of the system. The talk will also discuss lessons learned in the application of the approaches.


Speakers
avatar for Mike Gagliardi

Mike Gagliardi

Carnegie Mellon Software Engineering Institute
Mike Gagliardi is a Principal Engineer at the Software Engineering Institute in the Client Technical Solutions Directorate (CTSD) part of the Software Solutions Division (SSD). Mike has more than 25 years of experience in real-time, mission-critical software architecture, engineering... Read More →
avatar for Tim Morrow

Tim Morrow

Carnegie Mellon Software Engineering Institute
Timothy Morrow is a Senior Member of the Technical Staff at the SEI. He develops and implements architecture-centric approaches to support acquisition, development, and analysis of system, systems of systems, and software architectures for DoD and non-DoD programs. His areas of expertise... Read More →


Wednesday November 18, 2015 2:15pm - 3:00pm EST
Washington III

3:00pm EST

3:30pm EST

A Systematic Method for Big Data Technology Selection

When the DOD-VA Interagency Program Office (IPO) needed to make architecture tradeoffs for their Integrated Electronic Health Record (iEHR) architecture, they asked the Army Telemedicine and Advanced Technology Research Center (TATRC) and the SEI to evaluate the suitability of NoSQL technology for this big data application. The SEI created the Lightweight Evaluation and Prototyping for Big Data (LEAP4BD) method and worked with TATRC's Advanced Concepts Team to perform a technology evaluation.

This talk discusses why prototyping is necessary for evaluating big data technology and how the LEAP4BD method provides a systematic framework for technology evaluation, and it presents a sample of the results we delivered to the IPO.


Speakers
avatar for John Klein

John Klein

Carnegie Mellon Software Engineering Institute
John Klein has over 20 years’ experience developing systems and software. He joined the Carnegie Mellon Software Engineering Institute (SEI) in 2008, where he is a Senior Member of the Technical Staff. Before joining the SEI, John was a chief architect at Avaya, Inc., where... Read More →


Wednesday November 18, 2015 3:30pm - 4:15pm EST
Washington I

3:30pm EST

From Virtual System Integration to Incremental Lifecycle Assurance
Challenging problems associated with the increasing complexity of software systems are threatening industry’s ability to build the next generation of safety-critical embedded systems. Using the current best practice of building and then testing software-reliant mission- and safety-critical systems, 80% of requirements and architecture design flaws are discovered after unit testing. This late discovery of design flaws can result in rework cost that exceeds 50% of the total system cost. Contributors to these problems include the growth of software, system integration, and interaction complexity exacerbated by ambiguous, missing, incomplete, and inconsistent requirements.

Speakers
avatar for Peter Feiler

Peter Feiler

Carnegie Mellon Software Engineering Institute
Dr. Peter Feiler is a 29-year veteran and Senior Member of the Technical Staff at the SEI, working in the Architecture Practices Initiative. His current research interest is in improving the quality of safety-critical software-intensive systems through architecture-centric virtual... Read More →


Wednesday November 18, 2015 3:30pm - 4:15pm EST
Washington II

3:30pm EST

Scaling Agile Methods for Major Defense Programs: Frameworks and Methods in Use Today

Most discussions of agile software development in the past focused on team management concepts and the implications of the Agile Manifesto for a single (small) team. The focus now includes scaling these concepts for a variety of applications. The context in which you employ agile methods drives important choices in how you work. Published frameworks and commercial training available in the market offer a variety of solutions for scaling agile. This talk addresses what is meant by scaling, contextual drivers for implementation choices, and the frameworks available for use today.


Speakers
avatar for Will Hayes

Will Hayes

Carnegie Mellon Software Engineering Institute
Will Hayes is a Senior Member of the Technical Staff at the SEI. He works to support direct lifecycle management in major software-intensive programs in government and military organizations, performs research and consultation in the application of agile methods in highly regulated... Read More →
avatar for Mary Ann Lapham

Mary Ann Lapham

Carnegie Mellon Software Engineering Institute
Mary Ann Lapham, a Principal Engineer at the SEI, is the technical lead for SEI’s research on Agile in acquisition, focused on identifying and addressing barriers to adopting Agile practices in the Department of Defense and other government settings. She is also the Space Sector... Read More →


Wednesday November 18, 2015 3:30pm - 4:15pm EST
Washington III

4:20pm EST

 
Filter sessions
Apply filters to sessions.