Software based on the Unified Extensible Firmware Interface (UEFI) standard makes up the firmware of most modern desktop computers and servers. This software is largely invisible to users, critical to ...
Dormann, W., 2016: The Risks of Google Sign-In on iOS Devices. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed January 9, 2026 ...
Mehravari, N., and Allen, J., 2016: Structuring the Chief Information Security Officer (CISO) Organization. Carnegie Mellon University, Software Engineering Institute ...
Ozkaya, I., Carleton, A., Robert, J., and Schmidt, D., 2023: Application of Large Language Models (LLMs) in Software Engineering: Overblown Hype or Disruptive Change ...
In this webcast, Joseph Yankel, Vaughn Coates, and David Shepard discuss how right-sizing DevSecOps restores velocity and reliability.
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals. The Architecture Tradeoff ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Scanlon, T., 2018: 10 Types of Application Security Testing Tools: When and How to Use Them. Carnegie Mellon University, Software Engineering Institute's Insights ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results