Software Data & Analysis

Software and Data Analysis is defined as the process of inspecting, cleaning, transforming, and modeling data with the goal of highlighting useful information, suggesting conclusions, and supporting decision making.

Recent Inquiries

How can OneDrive files and e-mails be transferred from a us.af.mil account to a mail.mil account?

How can OneDrive files and e-mails be transferred from a us.af.mil account to a mail.mil account?

Can you provide information and a government point of contact for the ChatSurfer software?

Can you provide information and a government point of contact for the ChatSurfer software?

What is known about automated extraction of data and metadata from hand-written lab notebooks?

What is known about automated extraction of data and metadata from hand-written lab notebooks?

Articles

F

NIST to Launch Competition for AI-Focused Manufacturing USA Institute

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) plans to announce an open competition for a new Manufacturing USA institute focused on using artificial intelligence (AI) to improve…

F

CISA Publishes Repository for Software Attestation and Artifacts

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) announces the availability of the Repository for Software Attestation and Artifacts that software producers who partner with the federal government can use to upload software attestation…

F
nrl

NRL Research Physicists Explore Fiber Optic Computing Using Distributed Feedback

WASHINGTON  –  U.S. Naval Research Laboratory (NRL) researchers deliver a novel contribution to fiber optics computing. The Fiber Optic Computing Using Distributed Feedback paper recently published in Communications Physics Journal, brings the Navy one step closer to faster, more…

Webinars

The Digital Ecosystem and Project Linchpin

This webinar will provide a Project Linchpin overview – how we got here, who we are, what is missing, and what we are doing.  The goal of Project Linchpin is to deliver trusted artificial intelligence/machine-learning…

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…

Open-Source Security and Generative AI: Navigating Concerns While Enhancing Development

This webinar will explore the impact of OpenAI’s ChatGPT, GitHub CoPilot, and other generative artificial intelligence (AI) tools on open-source software and security. With over 100 million users within its first two months of public…

Events

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, MD, on Thursday, May 16, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks…

Man wearing virtual reality helmet with additional sensors attached to scalp.

GNSI Tampa Summit: AI in the Era of Strategic Competition

The revolution of Artificial Intelligence (AI) transforms the very nature of great power competition, conflict, and international cooperation. Competing effectively in this disruptive environment requires understanding how the People’s Republic of China (PRC) and other…

Military Personnel operating computer next to military aircraft

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…