US Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. Build Security In. Setting a higher standard for software assurance.

John Goodenough

photo of John Goodenough

John Goodenough leads the Software Engineering Institute’s Performance Critical Systems initiative, which aims to develop and transition techniques for increasing a software engineer’s ability to predict and control the performance and dependability properties of software systems.

Until 2001, Goodenough was the chief technical officer of the SEI; at that time, he decided to resume his focus on technical project work. He was named a fellow of the Association for Computing Machinery (ACM) in 1995. He is the former leader of the Rate Monotonic Analysis for Real-Time Systems Project. He was a Distinguished Reviewer for the Ada 95 language revision effort and served as head of the U.S. delegation to the ISO Working Group on Ada. He was the principal author of the document specifying the revision requirements for Ada 95 and served as chair of the group responsible for recommending interpretations of the Ada language.

Before joining the SEI, Goodenough was manager of the research and development department of SofTech, Inc. His work focused on the Ada programming language. He was the principal designer of one of the candidate languages leading to Ada. He later supported the Ada development effort as a distinguished reviewer for the Department of Defense, led the Ada Compiler Validation effort, and helped develop Ada training materials.

Goodenough has worked at the Wang Institute of Graduate Studies as a visiting scholar, where he lectured on software reusability and testing and led seminars on object-oriented languages. He also has worked at the Air Force Electronic Systems Division in Bedford, Mass. There, he was responsible for formulating contract and in-house research and development, and he sponsored the first research work on software maintenance.

Goodenough has an MA and a PhD in applied mathematics from Harvard University.

Articles

Namesort descending Content Areas
Arguing Security - Creating Security Assurance Cases Knowledge/Assurance Cases
Back to Top