Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Tech Views – Data as a Critical Service in Acquisition

We all understand the importance of data to manage any program, whether it is estimated data for planning purposes or…

Implementing Open Standards in Open Source

Industry standards morph into functional computer software. I use the word “morph” on purpose to avoid any term that can…

Military Open Source Community Growing

Open source software (OSS) usage is growing across the Department of Defense (DoD), not surprisingly so is the community of…

Tech Views

It has been three and a half years since Software Tech News addressed the topic of Open Source Software (OSS)….

Running Open Technology Development Projects

How to get started” is a question continually asked. This article lays out the basic framework for running an open…

Evaluating Open Source Software

There is an overwhelming amount of open source software (OSS) available today that can be used throughout the software development…

Software is a Renewable Military Resource

“The United States cannot retreat behind a Maginot Line of firewalls or it will risk being overrun.  Cyberwarfare is like…

Open Source Software Is Commercial

Nearly all publicly-available open source software (OSS) is commercial software.  Unfortunately, many government officials and contractors fail to understand this. …

Publicly Releasing Open Source Software Developed for the U.S. Government

This article summarizes when the U.S. federal government or its contractors may publicly release, as open source software (OSS), software…

Application Specific Abstractions: A Research

The success of modern computing can be largely attributed to abstractions. By abstracting away the intricate details of how lower…

Physics of Information Assurance

Information Assurance (IA) is the application of this directive in the cyber domain. IA activities include measures that protect and…

Networking Modeling and Simulation: Bridging the Gap from Theory to Field Tests

The use of live field testing for new data links, protocols, waveforms, radios, and algorithms is the traditional best-practice. With…