• Home
  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

header-right

Main navigation

  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Topic Tags
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Software Cost

Topic: Software Cost

Journal Article

Software productivity progress during the first decade of the 21st Century: Quantifying productivity

Published in Journal of Cyber Security and Information Systems
Volume: 1 Number: 2 - Secure Systems and Software Productivity

Author: Donald J. Reifer
Posted: 07/14/2017 | Leave a Comment

This paper summarizes the progress various industries have made in software productivity during the first decade of the 21st century. It begins by summarizing the productivity gains that occurred from 2000 and 2010 using data from 1,000 completed projects, none of which is over ten years old. Next, it categorizes the project data that were used to make Read More

Journal Article

History is the Key to Estimation Success

Published in Software Tech News
Volume: 15 Number: 1 - Cost Estimation & Systems Acquisition

Author: Kate Armel
Posted: 03/14/2016 | Leave a Comment

It was late afternoon in April of 1999 when the phone in my office rang. The conversation went something like this: “This software estimate just landed on my desk and I need to finish it by close of business today to support a fixed price bid.” “What can you tell me about this project?” “We’re rewriting an existing mainframe billing system developed in Read More

Pages: Page 1 Page 2 Page 3 Page 4 Page 5
Journal Article

Selling Your Software Estimate

Published in Software Tech News
Volume: 15 Number: 1 - Cost Estimation & Systems Acquisition

Author: Arlene Minkiewicz
Posted: 03/14/2016 | Leave a Comment

In many instances the software industry continues to flounder when it comes to understanding how to properly plan and manage software development project. One need not look far to find evidence that software project planning and management is a complicated challenge. Software estimating is indeed a hard thing to do. But often the problem goes deeper than Read More

Pages: Page 1 Page 2 Page 3 Page 4
Journal Article

An Innovative Approach to Quantifying Uncertainty in Early Lifecycle Cost Estimation

Published in Software Tech News
Volume: 15 Number: 1 - Cost Estimation & Systems Acquisition

Author: Robert Ferguson
Posted: 03/14/2016 | Leave a Comment

The inaccuracy of cost estimates for developing major Department of Defense (DoD) systems is well documented, and cost overruns have been a common problem that continues to worsen. Because estimates are now prepared much earlier in the acquisition lifecycle, well before concrete technical information is available, they are subject to greater uncertainty than Read More

Pages: Page 1 Page 2 Page 3 Page 4
Journal Article

DACS Software & Systems Cost and Performance Analysis Toolkit

Published in Software Tech News
Volume: 15 Number: 1 - Cost Estimation & Systems Acquisition

Author: Qi Li
Posted: 03/14/2016 | Leave a Comment

The goal of Data and Analysis Center for Software (DACS) Software & Systems Cost and Performance Analysis Toolkit (S2CPAT) is to capture and analyze software and software engineering data from completed software projects that can be used to improve a) the quality of software –intensive systems and b) the ability to predict the development of software Read More

Pages: Page 1 Page 2 Page 3 Page 4
Reference Document

Agile at Scale (AAS)

Posted: 03/11/2016 | 1 Comment

There are four parts to our discussion of Agile at scale. First, we set the context by providing an answer to the question, “Why is AAS challenging?” The ten AAS primary technical best practices follow. We then briefly address how an organization can prepare for and achieve effective results from these best practices. We conclude with a listing of selected Read More

Pages: Page 1 Page 2 Page 3 Page 4
Journal Article

Agile at Scale (AAS)

Published in Journal of Cyber Security and Information Systems
Volume: 3 Number: 2 - Early Prevention & Best Practices

Authors: Robert L. Nord and Ipek Ozkaya
Posted: 02/09/2016 | Leave a Comment

There are four parts to our discussion of Agile at scale. First, we set the context by providing an answer to the question, “Why is AAS challenging?” The ten AAS primary technical best practices follow. We then briefly address how an organization can prepare for and achieve effective results from these best practices. We conclude with a listing of selected Read More

Pages: Page 1 Page 2 Page 3
Air Force Research Laboratory (AFRL) Army Research Laboratory (ARL) Artificial Intelligence (AI) Better Buying Power (BBP) Biometric Cloud Computing Critical Infrastructure Protection (CIP) Cryptography Cyber Crime Cyber Legislation Cybersecurity Cybersecurity Training Cyber Warfare Data Breach Data Security Defense Technical Information Center (DTIC) Did You Know? DISA DoD Acquisition Lifecycle Encryption Hacking Insider Threat Internet of Things (IoT) Intrusion Detection IT Security Machine Learning Malware Mobile Security Modeling & Simulation National Institute of Standards and Technology [NIST] Network Security Open Source Software Operational Technology (OT) Password Security Phishing Protecting Controlled Unclassified Information (CUI) Quantum Computing Ransomware Risk Management Framework (RMF) Secure Software Software Assurance Software Engineering Vulnerability Wargaming Workplace Security

sidebar

Blog Sidebar

Featured Content

CSIAC Journal - Serious Games to Enhance Defense Capabilities

CSIAC Journal Cover Volume 5 Number 4

This 2017 special edition of the CSIAC Journal focuses on wargames and the many uses of Modeling and Simulation (M&S) that support decision making needed at the various levels of combat.

Read the Journal

CSIAC Report - Defense Acquisition University Secure Systems Design Course Experiment

CSIAC developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of this exercise was to study the techniques & strategies used to provide cybersecurity-based training, in an effort to educate the entire acquisition workforce on cybersecurity best practices & techniques.

Read the Report

CSIAC Journal - Design and Development Process for Assured Software

CSIAC Journal Cover Volume 5 Number 2

This is Volume 1 of 2 special edition issues on Software Assurance. This edition explores different aspects of developing, deploying and training on how to build assured software.

Read the Journal

CSIAC Journal - Tools & Testing Techniques for Assured Software

CSIAC Journal Cover Volume 5 Number 3

This is Volume 2 of 2 special edition issues on Software Assurance. This edition explores different aspects of software assurance competencies that can be used to improve software assurance functions and how to develop/deploy assured software throughout the lifecycle acquisition process.

Read the Journal

Recent Video Podcasts

  • CS Digest Roundtable #2: Meltdown/Spectre, NIST Framework, GDPR Policy, and Romanian Hackers Series: The CSIAC Podcast
  • CS Digest Roundtable #1: Emotet Trojan, Cryptojacking, and User Data Exposure Series: The CSIAC Podcast
  • Cybersecurity of DOD Critical Infrastructure Series: CSIAC Webinars
  • Challenges to Critical Infrastructure Series: Cyber Awareness Videos
  • Emerging Concepts to Critical Infrastructure Series: Cyber Awareness Videos
View all Podcasts

Resource Topic Tags

Critical Infrastructure Protection (CIP) Data Security Internet of Things (IoT) Ransomware Cybersecurity Network Security Insider Threat Mobile Security Cyber Warfare Quantum Computing Workplace Security Cloud Computing Phishing Artificial Intelligence (AI) Cyber Legislation Protecting Controlled Unclassified Information (CUI) Risk Management Framework (RMF) Modeling & Simulation Software Assurance Software Engineering Password Security Encryption Hacking IT Security Malware DISA Air Force Research Laboratory (AFRL) Intrusion Detection National Institute of Standards and Technology [NIST] Open Source Software

Upcoming Events

Fri 20

RSA® Conference 2018

April 16 - April 20
San Francisco CA
United States
Fri 20

RSA Conference 2018

April 16 - April 20
San Francisco CA
United States
Organizer: The EMC Corporation
508-435-1000
Tue 24

MODSIM World 2018

April 24 - April 26
Norfolk VA
United States
May 01

SANS Automotive Cybersecurity Summit

May 1 - May 8
Chicago IL
United States
Organizer: SANS
May 14

Northsec

May 14 - May 20
Old Montreal Quebec
Canada
View all Events

Recently Active Members

Profile picture of nrea13
Profile picture of rydilly17
Profile picture of jhughes
Profile picture of deya
Profile picture of drwhitlock
Profile picture of rnettles
Profile picture of kalidragon11
Profile picture of jahughes
Profile picture of pgrasso
Profile picture of awebb19
Profile picture of ebedli
Profile picture of jaccal20
Profile picture of jreade
Profile picture of mgzbytni
Profile picture of turtleron
Profile picture of rtmoran
Profile picture of eebrileyjr52
Profile picture of zijad94

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form
  • CSIAC Store

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information