Software Data & Analysis

Software and Data Analysis is defined as the process of inspecting, cleaning, transforming, and modeling data with the goal of highlighting useful information, suggesting conclusions, and supporting decision making.

Recent Inquiries

How can OneDrive files and e-mails be transferred from a us.af.mil account to a mail.mil account?

How can OneDrive files and e-mails be transferred from a us.af.mil account to a mail.mil account?

Can you provide information and a government point of contact for the ChatSurfer software?

Can you provide information and a government point of contact for the ChatSurfer software?

What is known about automated extraction of data and metadata from hand-written lab notebooks?

What is known about automated extraction of data and metadata from hand-written lab notebooks?

Articles

F

Pilot Is Paramount

The Single Appropriation Pilot for Software and Digital Technology Budget Activity (BA) 08 builds upon current and previous initiatives to align acquisition processes to the evolving and fast-paced technological and adversarial environment and the imperative…

F

NIST to Launch Competition for AI-Focused Manufacturing USA Institute

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) plans to announce an open competition for a new Manufacturing USA institute focused on using artificial intelligence (AI) to improve…

F

CISA Publishes Repository for Software Attestation and Artifacts

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) announces the availability of the Repository for Software Attestation and Artifacts that software producers who partner with the federal government can use to upload software attestation…

Webinars

Research Challenges for Large Pretrained Models

This webinar will highlight research challenges cutting across U.S. Army, Navy, and Air Force use cases for large pretrained models to include research on the following: multimodal models knowledge distillation for deployment at the edge…

The Digital Ecosystem and Project Linchpin

NOTE: This webinar start time has changed to 12:30 PM EDT. This webinar will provide a Project Linchpin overview – how we got here, who we are, what is missing, and what we are doing. …

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…

Events

The words "Cyber Security" hovering over several computer monitors.

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, MD, on Thursday, May 16, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks…

Man wearing virtual reality helmet with additional sensors attached to scalp.

GNSI Tampa Summit: AI in the Era of Strategic Competition

The revolution of Artificial Intelligence (AI) transforms the very nature of great power competition, conflict, and international cooperation. Competing effectively in this disruptive environment requires understanding how the People’s Republic of China (PRC) and other…