11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The <strong>SEI</strong> Role<br />

The <strong>SEI</strong> works with diverse organizations within <strong>the</strong> DoD—and also in o<strong>the</strong>r agencies and in <strong>the</strong><br />

DoD supply chain—to leverage <strong>the</strong> rapid changes in s<strong>of</strong>tware technology to support diverse facets<br />

<strong>of</strong> <strong>the</strong> mission at all stages <strong>of</strong> <strong>the</strong> lifecycle, including development, assurance, and sustainment for<br />

cyber-enabled missions. In its FFRDC role, <strong>the</strong> <strong>SEI</strong> develops methods to manage risk, cost,<br />

schedule, quality, security, and complexity <strong>of</strong> s<strong>of</strong>tware-reliant systems. The <strong>SEI</strong> works throughout<br />

<strong>the</strong> s<strong>of</strong>tware supply chain, including with prime government contractors, <strong>the</strong>ir subcontractors,<br />

supporting vendors, open-source foundations, government labs, o<strong>the</strong>r FFRDCs, and researchers.<br />

Through <strong>the</strong>se relationships, <strong>the</strong> <strong>SEI</strong> learns how <strong>the</strong> DoD can both make <strong>the</strong> best use <strong>of</strong> and also<br />

facilitate <strong>the</strong> advance <strong>of</strong> DoD-essential technologies that are emerging in <strong>the</strong> commercial sector,<br />

as well as <strong>the</strong> new technologies that are still being evaluated in <strong>the</strong> lab.<br />

A key challenge in <strong>the</strong> shifting s<strong>of</strong>tware landscape is that advances in s<strong>of</strong>tware technology and<br />

practice consist <strong>of</strong> much more than incremental enhancements to established existing practices<br />

and tools. We must also focus on advancing and redefining <strong>the</strong> practice to support new techniques<br />

that are better suited to delivering <strong>the</strong> capability, flexibility, and assurance necessary for modern<br />

systems. We call this s<strong>of</strong>tware producibility—<strong>the</strong> capacity to design, produce, assure, and evolve<br />

innovative s<strong>of</strong>tware-intensive systems in a predictable manner, while effectively managing risk,<br />

cost, schedule, and complexity.<br />

Looking Ahead<br />

In this section, we look forward in s<strong>of</strong>tware engineering, in related topics in cybersecurity, and in<br />

potential roles for <strong>the</strong> <strong>SEI</strong> as an institution. There are significant changes underway in <strong>the</strong> ways<br />

we develop, assure, and sustain s<strong>of</strong>tware-reliant systems. There are also significant changes in <strong>the</strong><br />

technologies and practices associated with s<strong>of</strong>tware, including languages, tools, models, and analyses,<br />

as well as supporting hardware and communications infrastructure. This visionary exercise<br />

reflects an activity that is ongoing at <strong>the</strong> <strong>SEI</strong>, which is to continually look forward with respect to<br />

both <strong>the</strong> mission context and <strong>the</strong> advancement <strong>of</strong> technology and practice. This forward-looking<br />

process involves direct engagement with stakeholders across a spectrum from basic researchers in<br />

universities to mission-focused operators and sustainment managers. The process involves identifying<br />

and assessing potentially important points <strong>of</strong> technical advancement that can provide meaningful<br />

leverage on a wide range <strong>of</strong> challenges associated with developing and sustaining s<strong>of</strong>twarereliant<br />

systems.<br />

In <strong>the</strong> past, an active forward-looking research and planning effort has led to <strong>the</strong> many advancements<br />

documented throughout this volume, such as CMM/CMMI, TSP, <strong>the</strong> scalable conops <strong>of</strong> <strong>the</strong><br />

CERT/CC, 71 real-time scheduling <strong>the</strong>ory and practice, and <strong>the</strong> emergence <strong>of</strong> architecture practice.<br />

71 W. L. Scherlis, S. L. Squires, R. D. Pethia, “Computer Emergency Response,” in P. Denning (ed.)<br />

Computers Under Attack: Intruders, Worms, and Viruses, Addison-Wesley, 1990.<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 286<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!