Software Data & Analysis

Software and Data Analysis is defined as the process of inspecting, cleaning, transforming, and modeling data with the goal of highlighting useful information, suggesting conclusions, and supporting decision making.

Recent Inquiries

Can common access card certificates be extracted via application programming interface calls?

Can common access card certificates be extracted via application programming interface calls?

What are the use cases of intent-based networking in U.S. Department of Defense tactical networks?

What are the use cases of intent-based networking in U.S. Department of Defense tactical networks?

How can OneDrive files and e-mails be transferred from a us.af.mil account to a mail.mil account?

How can OneDrive files and e-mails be transferred from a us.af.mil account to a mail.mil account?

Articles

F
A quantum chip developed by Oak Ridge National Laboratory scientists could help move a quantum internet closer to reality. Credit: Getty Images

ORNL Entanglement Study Connects Quantum Essentials on New Chip

Quantum information scientists at the Department of Energyโ€™s Oak Ridge National Laboratory successfully demonstrated a device that combines key quantum photonic capabilities on a single chip for the first time. The study published in Opticaโ€ฆ

F
graphic of soldiers walking toward a mountain in the background with digital lines going past them

ARCYBER Data Management and Analytics Directorate

FORT EISENHOWER, GA โ€“ Army Cyber Command (ARCYBER), the Armyโ€™s premier force for data-centric operations, is committed to implementing the Armyโ€™s Data Management and Analytics Strategy. In May 2024, Lt. Gen. Maria Barrett, Commanding Generalโ€ฆ

F
CISA Secure by Design logo

Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) recognize that memoryโ€ฆ

Webinars

city with cloud computing icon over it

Overview of CISAโ€™s SCuBA Project

The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assetsโ€ฆ

shield

Responsible Artificial Intelligence (RAI) Toolkit DAGR and SHIELD

The Responsible Artificial Intelligence (RAI) Toolkit provides a voluntary process to identify, track, and improve alignment of AI projects to RAI best practices and the U.S. Department of Defenseโ€™s (DoDโ€™s) AI ethical principles while capitalizingโ€ฆ

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understoodโ€ฆ

Events

A hand overlayed by a virtual padlock and the words "Cyber security".

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGAโ€™s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, andโ€ฆ

Illustration silhouetting the image of a person overlayed with circuit leads.

Big Data for Intelligence Symposium

Defense Strategies Instituteโ€™s (DSIโ€™s) 12th Annual Big Data for Intelligence Symposium will convene senior leaders from across the intelligence community, Department of Defense, federal government, academia, and industry to discuss the prioritization of data asโ€ฆ

city-skyline-network

IAEM Annual Conference & EMEX 2024

The Annual International Association of Emergency Managers (IAEM) conference & EMEX is tailored toward first responder and emergency management organizations to inform on best practices and lessons learned with Big Data, modeling and simulation capabilities,โ€ฆ