Published:  August 9, 2015

Early Prevention & Best Practices

This issue begins with an article by Rick Murphy describing how to represent type safety in a technical architecture, providing four examples from a type safe technical architecture in UML and one example of compile-time type checking. Then, John Lawson III examines why the Department of Defense has difficulty keeping up with the technical achievements and commercial success of the gaming industry. This Journal then provides two Best Practices articles by authors at the Software Engineering Institute, focusing on Agile at Scale and Managing Operational Resilience.

In This Issue

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Increasing Assurance Levels Through Early Verification with Type Safety

Today defense, intelligence and civilian agencies are focused on cyber security challenges. An informal analysis of emerging capabilities in the DARPA Open Catalog indicates that type safety is a common requirement for increased assurance levels…

Increasing Assurance Levels Through Early Verification with Type Safety – Unabridged Version

Today defense, intelligence and civilian agencies are focused on cyber security challenges. Early results seem conflicting. While media reports are surfacing of unhackable drones, government programs report shortages of qualified applicants to fill cyber security…

Looking at M&S Education Through the Prism of the Video Game Industry

Let’s discuss what DOD Modeling & Simulation (M&S) can learn about education from the commercial gaming world. There are occasions when we in DOD look at the commercial gaming industry as if we’re kids with…

Agile at Scale (AAS)

There are four parts to our discussion of Agile at scale. First, we set the context by providing an answer to the question, “Why is AAS challenging?” The ten AAS primary technical best practices follow….

Managing Operational Resilience

A search at your favorite news aggregator for keywords such as “malware,” “computer virus,” or “data breach” will return results in the tens of thousands. For most organizations it’s not a question of if a…