Doing Business with DARPA
|
|
|
- Felicity Barton
- 10 years ago
- Views:
Transcription
1 Doing Business with DARPA Kathleen Fisher Program Manager Information Innovation Office (I2O)
2 Outline DARPA Today Personal Areas of Interest High Assurance Cyber Military Systems Program synthesis Domain-specific languages
3 A little about myself Kathleen Fisher Program Manager, Information Innovation Office (I2O) (office) Background: Starting in graduate school, I have done basic research in a wide variety of programming language topics, with most of my career spent at AT&T Labs.
4 Disclaimer This talk offers general guidance. Any statement in a BAA or other official document overrides anything I say here.
5 DARPA by Analogy A reasonable approximation of DARPA: The management of DoD s corporate research laboratory Annual budget of $3B Focused on DoD relevant technology Think of the DoD as the largest enterprise in the USA If an IT problem exists, the DoD probably suffers from it Actual research gets outsourced to you!
6 Doing Business with DARPA DARPA funds mission-focused research to Solve a DoD problem Enable a new DoD capability DARPA wants the best ideas from the best people fully devoted to the project Fund diverse collection of performers For profit Non-profit Foreign institutions (relatively rare) Give us a realistic budget
7 Funding Opportunities Most DARPA work solicited via a Broad Agency Announcement (BAA) - Program-specific BAA - Open Office BAA Also Research Announcements (RAs) There are bureaucratic differences in RAs, BAAs and RFPs, but they all solicit proposals See for more details
8 Program-Specific BAA DARPA management has identified an area in which DARPA would like to run a research program The BAA is the primary mechanism DARPA uses to solicit research proposals Typical: 45 day response period, but varies by BAA There s usually an optional, but highly recommended, Proposers Day meeting, either before or after the BAA comes out.
9 Open Office BAA DARPA has a funding mechanism available all the time Primarily for new study efforts You have a great idea that you want to explore Relatively small (< $1M), short (1 year) Should have the potential to turn into a program if successful You are encouraged to coordinate with DARPA before writing the proposal. You can talk to a PM or office director!
10 Proposal Preparation Format specified in the BAA, and varies by BAA You must follow it, or risk your proposal being deemed nonresponsive and not technically evaluated DARPA does not fund research for the sake of funding research Please do not try to do a lightweight re-spin of a failed proposal to another funding agency
11 Proposal Preparation Emphasis on clarity of presentation: Reviewers will have a thick stack of proposals to rank Have some people not involved in the writing give feedback on the proposal before it goes out If you re teaming, the prime contractor will usually lead the proposal effort
12 Proposed Options Your proposal can include options (sometimes subsequent phases will technically be options) An option is just that: something the government can fund or not at its choice Options are good for both sides If a project is going well, DARPA might want to give it a plus up Increases the contractual ceiling in general, so there may be room for other work under this funding vehicle Much faster to modify an existing contract than generate a new one
13 Talking to DARPA Early and often! We get excited when someone brings us a great idea More freedom before the BAA is published After BAA publication, all Q/A or discussion is done as a public FAQ
14 Typical Funding Types 6.1 Basic Research 6.2 Applied Research 6.3 Advanced Development
15 Publication Restrictions Sometimes DARPA requires publication preapproval If that doesn t work for you, the key words to look for in the BAA are Contracted Fundamental Research 6.1 money is usually Contracted Fundamental Research Contracted Fundamental Research does not have any publication restrictions Universities get somewhat more liberal definition of CFR than research labs/industry
16 Teaming Some programs have wide-ranging objectives beyond the capability of any individual performer DARPA values academic, small business, and large contractors Be strategic: Make synergy explicit Don t duplicate Look for a good impedance match Make sure it s a team you want to work with if you win
17 Overall Process BAA published (or response to Open Office BAA encouraged) Proposal sent to DARPA Source selection DARPA sends out notifications, and paperwork for selectees to contracting agent Government contracting agent negotiates contract with prime contractor Contract signed; research begins Only the government contracting agent can authorize you to spend money!
18 Work at DARPA DARPA rotates people through PM roles, so is usually hiring Either via Intergovernmental Personnel Act (IPA) Mobility Program or as a Government Employee If you or someone you know is interested in serving their country and research community, please point them at me
19 Personal Areas of Interest Disclaimer: these are technical areas that I m personally interested in. Programs are announced only by the publication of the BAA.
20 Idea: Synthesize & Verify High-Assurance Systems Safety Policy Functional Specification Resource Constraints Security Policy Hardware Description Environment Description Proof: Generated executable implements functional specification, satisfies safety and security policies, and satisfies resource constraints when run on hardware satisfying the hardware description and in an environment satisfying the environmental description. Verified Libraries Synthesizer Code Proof Diagnostic Information If software always worked as specified or intended by its makers, only a small subset would be vulnerable to attack, and defenses would be much easier to implement. Felix Lindner, Recurity Labs, CACM, June 2006 High Assurance: Correctness, Safety, Security
21 High-Assurance Vehicle of the Future: Built from Synthesized Components Research Challenges GUI 3 rd Party Voice Synthesis of attack resilient control systems Scaling Proof engineering Attack/fault response V&V of complete system Composition Integration of synthesized and handwritten code Sandbox Authentication File System μkernel Network Protocol Stack Control Algorithms Communication Protocols RTOS Data Logging Control Algorithms RTOS Data Logging x86 ASIC ARM, etc A US automaker s cars have 1-2 complete computers. Specification languages: function, environment, hardware, resources A US automaker s cars have real-time controllers. Key:... Integration of control systems and operating systems Managing time: synchrony, asynchrony, concurrency Synthesis of operating systems code Specialization of reusable components Unassured modules Focus on vehicles, but techniques will apply to other domains. New assured modules Existing assured modules Hardware
22 Questions?
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Recruiting, Screening & Employee File Management
Recruiting, Screening & Employee File Management An Overview What is AppliTrack? AppliTrack, a collection of online HR solutions, helps districts automate the processes related to the employee lifecycle:
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Information Technology
September 11, 2002 Information Technology The Defense Advanced Research Projects Agency s Transition of Advanced Information Technology Programs (D-2002-146) Department of Defense Office of the Inspector
MODEL REQUEST FOR PROPOSALS (RFP) TEMPLATE Generalized for professional services. www.cdrfg.com
MODEL REQUEST FOR PROPOSALS (RFP) TEMPLATE Generalized for professional services www.cdrfg.com CDR Fundraising Group 2015 This sample RFP is made available by the CDR Fundraising Group as a public service.
i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
DARPA BAA 15 39 Defense Sciences Office (DSO) Office wide BAA Frequently Asked Questions (FAQs) as of 8/26/2015
DARPA BAA 15 39 Defense Sciences Office (DSO) Office wide BAA Frequently Asked Questions (FAQs) as of 8/26/2015 Q98: On the proposal cover page, what is the Proposal validity period and where would I find
Commercial Solutions Opening (CSO) Office of the Secretary of Defense Defense Innovation Unit (Experimental)
SECTION 1 - INTRODUCTION 1.1 Background and Authority Commercial Solutions Opening (CSO) Office of the Secretary of Defense Defense Innovation Unit (Experimental) The 2014 Quadrennial Defense Review (QDR)
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
SBIR/STTR PHASE II-EXPANDED CONTRACTING HANDBOOK
SBIR/STTR PHASE II-EXPANDED CONTRACTING HANDBOOK CONTENTS 1. General Information 2. Guidance on What Qualifies as Investment 3. Application Requirements 4. Exercising the Phase II Expanded Option 5. Time
Recruiting, Selection & HR File Management
Recruiting, Selection & HR File Management An Overview What is AppliTrack? AppliTrack, a collection of online HR solutions, helps districts automate the processes related to the employee lifecycle: from
Guidelines for Submitting Unsolicited Contract Proposals
Guidelines for Submitting Unsolicited Contract Proposals A Mandatory Reference for ADS Chapter 302 New Reference: 06/14/2007 Responsible Office: OAA/P File Name: 302map_061407_cd48 GUIDELINES FOR SUBMITTING
Aerospace Software Engineering
16.35 Aerospace Software Engineering Software Architecture The 4+1 view Patterns Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Why Care About Software Architecture? An architecture provides a vehicle
A Brief Overview of the Review of the Individual Support Plan System For Comprehensive Services
A Brief Overview of the Review of the Individual Support Plan System For Comprehensive Services Findings and Recommendations Prepared for the OREGON DEPARTMENT OF HUMAN SERVICES Seniors and People with
RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2015
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2015 CONTACT: James Briones TELEPHONE NUMBER: (304) 285-5229 E-MAIL: [email protected] ISSUING
Solicitation RFI-FTB-1415-SIEM Project. SIEM Project. Bid designation: Public. State of California
5 Solicitation RFI-FTB-1415-SIEM SIEM Bid designation: Public 6/19/2014 10:56 AM p. 1 6 SIEM 5 Bid Number Bid Title RFI-FTB-1415-SIEM SIEM Bid Start Date Jun 19, 2014 9:56:09 AM PDT Bid End Date Jul 7,
NetIQ Privileged User Manager
NetIQ Privileged User Manager Performance and Sizing Guidelines March 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Solicitation 1210-014. Web Hosting Services for the Disaster Volunteer Network. State of California
Solicitation 1210-014 Web Hosting Services for the Disaster Volunteer Network State of California Oct 12, 2012 4:28:36 PM PDT p. 1 Bid 1210-014 Web Hosting Services for the Disaster Volunteer Network Bid
CoreSHIELD Product Catalog
CoreSHIELD Product Catalog Revised - 6/23/15 Created by the National Center for Food Protection and Defense. CoreSHIELD is the information technology architecture underlying a suite of web-based portals
Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Lecture Manual
ATT9290 Lecture Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Lecture Manual ATT9290 NetIQ Training Services
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Request for Proposals
Request for Proposals Connected Responder: Public Safety and Emergency Response Community Connected Vehicle Interest, Context and Business Case Development RFP Schedule RFP Release Date: April 30, 2015
Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.
chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event
Request for Proposal. Contract Management Software
Request for Proposal Contract Management Software Ogden City Information Technology Division RETURN TO: Ogden City Purchasing Agent 2549 Washington Blvd., Suite 510 Ogden, Utah 84401 Attn: Sandy Poll 1
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Automation can dramatically increase product quality, leading to lower field service, product support and
QA Automation for Testing Medical Device Software Benefits, Myths and Requirements Automation can dramatically increase product quality, leading to lower field service, product support and liability cost.
PIERCE COUNTY LIBRARY SYSTEM. REQUEST FOR PROPOSAL (RFP) for. Telephone Service (Analog Phone Service)
PIERCE COUNTY LIBRARY SYSTEM REQUEST FOR PROPOSAL (RFP) for Telephone Service (Analog Phone Service) TABLE OF CONTENTS Part 1: Introduction & RFP Timeline... 1 Part 2: General Instructions and Conditions;
https://www.usajobs.gov/getjob/viewdetails/391530800
Page 1 of 6 Home Search Jobs My Account Resource Center SIGN IN OR CREATE AN ACCOUNT Keyword: Keywords, Job Title, Control #, Agency Location: City, State, ZIP Code, or Country Search Advanced Search >
REQUEST FOR PROPOSAL. Webbased Student Email with Student Safe Features
REQUEST FOR PROPOSAL Webbased Student Email with Student Safe Features (hereinafter referred to as the School District ), is requesting proposals from vendors to provide Web Based Student Email Service
Java and Real Time Storage Applications
Java and Real Time Storage Applications Gary Mueller Janet Borzuchowski 1 Flavors of Java for Embedded Systems Software Java Virtual Machine(JVM) Compiled Java Hardware Java Virtual Machine Java Virtual
Performance Testing Uncovered
Performance Testing Uncovered First Presented at: NobleStar Systems Corp. London, UK 26 Sept. 2003 Scott Barber Chief Technology Officer PerfTestPlus, Inc. Performance Testing Uncovered Page 1 Performance
Configuring and Managing Microsoft System Center Essentials 2010
Configuring and Managing Microsoft System Center Essentials 2010 50373: Configuring and Managing Microsoft System Center Essentials 2010 (2 Days) About this Course This two-day instructor-led course provides
Center For Private Security and Safety
Table of Contents Executive Summary 3 Introduction 4 Who manages the RFP process? 4 The Request for Proposal Process 4 Stage One: Contractor identifies and documents service delivery 5 Stage Two: Buyer
Enterprise Scheduler Rev. 0 Bid #24078582. Scope of Work
Scope of Work I. Scope of Solicitation II. Instructions to Offerors III. Scope of Work / Specifications IV. Terms and Conditions - Special V. Appendices to Scope of Work (if required) VI. Bidding Schedule
Microsemi Security Center of Excellence
Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat
SIGNIFICANT CHANGES DOCUMENT
SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation
Developing Business with the Federal Government through the GSA Schedules Program
Developing Business with the Federal Government through the GSA Schedules Program The Washington Management Group 1990 M Street NW Suite 400 Washington DC 20036 June 2008 hen traveling in a foreign country,
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
ENGG*4420 Real Time Systems Design Fall 2015
ENGG*4420 Real Time Systems Design Fall 2015 School of Engineering (Revision 0: September 10, 2015) 1 INSTRUCTIONAL SUPPORT 1.1 Instructor Instructor: Radu Muresan, Ph.D., P.Eng. Office: RICH 2509, ext.
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform
Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management
Solicitation Information February 26, 2016
Solicitation Information February 26, 2016 RFP#7550347 TITLE: SEARCH FOR AFFORDABLE CARE ACT TAX REPORTING SOLUTION Submission Deadline: Monday, March 21, 2016 @ 11:30 AM (Eastern Time) Questions concerning
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Continuing Education Larimer Campus
Continuing Education Larimer Campus Community Partner Policies and Guidelines 2015 Welcome and Purpose Thank you for your interest in teaching with the Continuing Education Department at Front Range Community
Contract Compliance and the Federal Acquisition Regulation (FAR)
Contract Compliance and the Federal Acquisition Regulation (FAR) ORA CERTIFICATE PROGRAM (MODULE 11) 27 MAY 2015 Learning Objectives Participants will learn about the history of the Federal Acquisition
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
C. HIRING PROCESS FOR FACULTY AND ACADEMIC PROFESSIONALS
C. HIRING PROCESS FOR FACULTY AND ACADEMIC PROFESSIONALS This document details the process for hiring faculty and academic professionals. Under the process, deans have the discretion to delegate approval
Lessons Learned CIP Reliability Standards
Evidence for a requirement was not usable due to a lack of identifying information on the document. An entity should set and enforce a "quality of evidence" standard for its compliance documentation. A
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Samsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
Audit Management Software Solution
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Scope of Work I. Scope of Solicitation II. Instructions to Offerors III. Scope of
Enhance State IT Contract Expertise
Enhance State IT Contract Expertise Chris Estes State Chief Information Officer Office of Information Technology Services March 2015 1 P a g e Table of Contents 1. Legislative Request... 3 2. Introduction...
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide September 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND
Washington County School District Request for Proposal School Bus Fleet Tracking System RFP #TD 1011
Request for Proposal I. GENERAL A. Intent of Request for Proposal (RFP) The purpose of this Request for Proposal is to solicit sealed, competitive proposals from vendors qualified and experienced to provide
Virtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
Cost Estimation Strategies COST ESTIMATION GUIDELINES
Cost Estimation Strategies Algorithmic models (Rayleigh curve Cost in week t = K a t exp(-a t 2 ) Expert judgment (9 step model presented later) Analogy (Use similar systems) Parkinson (Work expands to
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS Oracle Application Management Suite for Oracle E-Business Suite delivers capabilities that helps to achieve high levels of application
Getting software security Right
Getting software security Right Haiyun Xu, Theodoor Scholte April 24 2015 Table of contents 2 I 23 1. Who is SIG? 2. SIG software maintainability model 3. Getting software security Right: security by design
FAQS Veterans Preference
FAQS Veterans Preference Q: Who now qualifies for Veterans Preference? Effective July 1, 2014, several new groups of individuals are eligible for Veterans Preference. The groups now eligible for Veterans
Procedure Guide: Daily Use Cyber Recruiter 6.6 December 2007
Procedure Guide: Daily Use Cyber Recruiter 6.6 December 2007 Visibility Software Procedure Guide: Daily Use Page 1 of 17 Table of Contents PURPOSE...3 FLOW CHART...4 REQUISITION POSTING PROCEDURE (R)...5
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
MULTI-SOURCE RECORDING, PERFORMANCE EVALUATION, AND ANALYTICS FOR THE CONTACT CENTER
MULTI-SOURCE RECORDING, PERFORMANCE EVALUATION, AND ANALYTICS FOR THE CONTACT CENTER S T R A T E G I C P A R T N E R S www.higherground.com HigherGround, Inc. is a developer of recording, data integration
I m visualizing large datasets to generate
GRADUATE SCHOOL 2015-2016 I m visualizing large datasets to generate new insights Graduate program Computer Science * This major is formally part of the Computer Science & Engineering Bachelor program
Introduction. 1.1 Motivation. Chapter 1
Chapter 1 Introduction The automotive, aerospace and building sectors have traditionally used simulation programs to improve their products or services, focusing their computations in a few major physical
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS Oracle Application Management Suite for Oracle E-Business Suite is a robust application management solution that helps you achieve
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
IT Security and Compliance Program Plan for Maxistar Medical Supplies Company
IT Security and Compliance Program Plan for Maxistar Medical Supplies Company IT Security and Compliance Program Plan for Maxistar Medical Supplies Company IT Security and Compliance Program for PCI, HIPAA
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
