Example Technical Inquiries (TIs)

Example TIs are samples of the wide range of technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Can CSIAC provide information on threat criticality and threat analysis tools to support a security assistance assessment visit?

Can information be provided on threat criticality and threat analysis tools to support a security assistance assessment visit?

What are the U.S. government, U.S. Department of Defense, or industry processes and best practices for end-to-end operations and maintenance of artificial intelligence services?

What are the U.S. government, U.S. Department of Defense, or industry processes and best practices for end-to-end operations and maintenance of artificial-intelligence services?

How are artificial intelligence models placed into production and then maintained in the U.S. Department of Defense?

How are artificial intelligence models placed into production and then maintained in the U.S. Department of Defense?

Can CSIAC provide a list of U.S. Department of Defense Cloud-computing resources capable of handling machine-learning-focused projects and large datasets?

Can CSIAC provide a list of U.S. Department of Defense Cloud-computing resources capable of handling machine-learning-focused projects and large datasets?

Are there any secured options for domains or applications to serve as a controlled unclassified information data repository/processing node for programming tools?

Are there any secured options for domains or applications to serve as a controlled unclassified information data repository/processing node for programming tools?

What information can external sources (hackers) obtain from a user on public Wi-Fi, and how does that information change from a nonsecure (http:) site to a secure (https:) site?

What information can external sources (hackers) obtain from a user on public Wi-Fi, and how does that information change from a nonsecure (http:) site to a secure (https:) site?

Ready to submit a technical inquiry?

Receive free information research on technical topics