Isolated user spaces known as containers have become a popular standard for packaging and distributing software applications at the tactical edge. However, devices in this environment have limited ...
Hardware inefficiencies pose major limitations to U.S. Department of Defense (DoD) applications; current processors simply cannot keep up with the large and complex machine learning (ML) workloads ...
SEI Publications Annual Reviews 2024 Research Review Schedule ¦ 2024 Research Review ...
This project focuses on creating a foundational model for all container reproducibility efforts (open-source, commercial, U.S. Department of Defense (DoD), etc.). The lack of build reproducibility is ...
Detecting malicious code is a challenge, particularly when it’s implanted in otherwise legitimate software. If undetected, malware injected into legitimate software can result in costly compromises of ...
AI engineering is an emergent discipline focused on developing tools, systems, and processes to enable the application of artificial intelligence in real-world contexts. In contrast to the prevalent ...
Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in C and C++ ...
The CERT Division is a leader in cybersecurity. We partner with government, industry, law enforcement, and academia to improve the security and resilience of computer systems and networks. We study ...
The SEI Year in Review spotlights projects and initiatives that demonstrate the SEI's value to its sponsors and customers in government and industry. These projects demonstrate the ways in which the ...
Linda Northrop has more than 45 years of experience in the software development field as a practitioner, researcher, manager, consultant, and educator. She retired from full-time employment at the ...
Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in Java programming.
Software-reliant systems need to evolve over time to meet new requirements, take advantage of new technology, or accommodate changes in everything from the deployment environment to business ...