an email newsletter released every 3 weeks highlighting the latest articles, events, technical inquiries, and voices from the community
Summer 2015: Volume 3 Issue 2

Published: August 9, 2015
Early Prevention & Best Practices
This issue begins with an article by Rick Murphy describing how to represent type safety in a technical architecture, providing four examples from a type safe technical architecture in UML and one example of compile-time type checking. Then, John Lawson III examines why the Department of Defense has difficulty keeping up with the technical achievements and commercial success of the gaming industry. This Journal then provides two Best Practices articles by authors at the Software Engineering Institute, focusing on Agile at Scale and Managing Operational Resilience.
In This Issue
Increasing Assurance Levels Through Early Verification with Type Safety
Today defense, intelligence and civilian agencies are focused on cyber security challenges. An informal analysis of emerging capabilities in the DARPA Open Catalog indicates that type safety is a common requirement for increased assurance levels…
Increasing Assurance Levels Through Early Verification with Type Safety – Unabridged Version
Today defense, intelligence and civilian agencies are focused on cyber security challenges. Early results seem conflicting. While media reports are surfacing of unhackable drones, government programs report shortages of qualified applicants to fill cyber security…
Looking at M&S Education Through the Prism of the Video Game Industry
Let’s discuss what DOD Modeling & Simulation (M&S) can learn about education from the commercial gaming world. There are occasions when we in DOD look at the commercial gaming industry as if we’re kids with…
Agile at Scale (AAS)
There are four parts to our discussion of Agile at scale. First, we set the context by providing an answer to the question, “Why is AAS challenging?” The ten AAS primary technical best practices follow….
Managing Operational Resilience
A search at your favorite news aggregator for keywords such as “malware,” “computer virus,” or “data breach” will return results in the tens of thousands. For most organizations it’s not a question of if a…