Tech Views – Data as a Critical Service in Acquisition
We all understand the importance of data to manage any program, whether it is estimated data for planning purposes or…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
We all understand the importance of data to manage any program, whether it is estimated data for planning purposes or…
Industry standards morph into functional computer software. I use the word “morph” on purpose to avoid any term that can…
Open source software (OSS) usage is growing across the Department of Defense (DoD), not surprisingly so is the community of…
It has been three and a half years since Software Tech News addressed the topic of Open Source Software (OSS)….
How to get started” is a question continually asked. This article lays out the basic framework for running an open…
There is an overwhelming amount of open source software (OSS) available today that can be used throughout the software development…
“The United States cannot retreat behind a Maginot Line of firewalls or it will risk being overrun. Cyberwarfare is like…
Nearly all publicly-available open source software (OSS) is commercial software. Unfortunately, many government officials and contractors fail to understand this. …
This article summarizes when the U.S. federal government or its contractors may publicly release, as open source software (OSS), software…
The success of modern computing can be largely attributed to abstractions. By abstracting away the intricate details of how lower…
Information Assurance (IA) is the application of this directive in the cyber domain. IA activities include measures that protect and…
The use of live field testing for new data links, protocols, waveforms, radios, and algorithms is the traditional best-practice. With…