
Explore Posts






Applying the science of skill acquisition to working in the tech industry
In this post for #ComputerScienceEducationWeek, I discuss how we can apply successful techniques from the study of skill acquisition to our own industry.

Best Practices for Federal Efficiency: Beyond the Headlines
Government efficiency shouldn't be political theater. A better approach: Let agencies openly prefer proven contractors, establish nationwide secure remote work access, and embrace FedRAMP-approved AI. Real efficiency comes from implementation, not investigation.



The world of PUP(s) and no, sadly, we are not talking puppies.
Ransomware, which tries to get money from victims by taking over computer home pages. Source…

Strengthening Supply Chain Resilience: CISA’s Hardware Bill of Materials Framework
In a rapidly evolving digital landscape, cyber supply chain security has become a paramount concern for both public and private sectors…

What’s Exploratory Testing?
and Why Should we Use It?