You Should Run R On Your Computer: Not just for stats, but to know what all the excitement is about

R-on-my-mac

“R” is a freely available language for interacting with your computer that is designed for a wide variety of functions. It is most frequently associated with statistical computing and graphics. R runs on a wide variety of systems, including Mac, Windows, Linux and Unix. Every analyst who deals with data should have a copy of […]

Obama Administration Chose Cooperation over Counterattacks

cyber-time-magazine

Throughout 2012, Iran targeted United States banks and companies with a series of distributed denial-of-services cyber attacks. The attacks doubled and sometimes tripled the amount of traffic that the American websites were capable of handling. Many considered the attacks retaliation, revenge for the destruction wrought by Stuxnet on Iran’s nuclear program. The cyber attacks presented […]

HawkEye-G: Addressing key enterprise security technology needs

cybersecuritylock

We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. The following are some key technology considerations from an enterprise technology perspective: Over the years, CIOs, CTOs, CISOs and world class best cyber defense professionals have collaborated on the […]

USMC and DoD Rapid Reaction Technology Office Seeks Info On Six Categories of Technology: Please review and engage

Usmc

Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away. The threat of improvised explosive devices (IED) has proven very difficult to mitigate. This strategic threat poses […]

Domestic “Drones” Are the Latest Object of Threat Inflation

domesticdrones

Recently, several news outlets reported on a supposed plot by a Moroccan national to use remote controlled model airplanes as flying bombs. The story seems to lend credibility to speculation that model airplanes could be the next terrorist threat. In reality, however, these fears are part of a larger pattern of threat inflation about domestic […]

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

2012_osdbu_prospect

Editor’s note: Chris Scott has deep insights into how government works. Let us know if you would like more info on any of this.-bg With this post I’ll provide some of my personal observations and insights from the the 24th Annual Government Procurement Conference. The conference was held this week at the Walter E. Washington […]