Applying the science of skill acquisition to working in the tech industry In this post for #ComputerScienceEducationWeek, I discuss how we can apply successful techniques from the study of skill acquisition to our own industry.
Best Practices for Federal Efficiency: Beyond the Headlines Government efficiency shouldn't be political theater. A better approach: Let agencies openly prefer proven contractors, establish nationwide secure remote work access, and embrace FedRAMP-approved AI. Real efficiency comes from implementation, not investigation.
The 2023 DoDIG CUI Audit As Explains by a Gen Alpha Yo squad, as you know its my new favorite thing to have LLMs break down important Department Docs using Gen Alpha Slang. Accordingly, here’s the lowdown on how the DoD’s trying (and sometimes failing) to handle “Controlled Unclassified Information” (CUI). Basically, they’re fumbling the bag a bit.
Inefficiencies in Federal Contracting In the federal contracting sphere, too often proposal teams discuss scope and capture based primarily on budget size rather than a deep understanding of the work required. This approach, while potentially lucrative, inevitably leads to inefficiencies, wasted resources, and, frankly, subpar outcomes. The root of the issue? A disconnect between
The world of PUP(s) and no, sadly, we are not talking puppies. Ransomware, which tries to get money from victims by taking over computer home pages. Source…
Strengthening Supply Chain Resilience: CISA’s Hardware Bill of Materials Framework In a rapidly evolving digital landscape, cyber supply chain security has become a paramount concern for both public and private sectors…
Additive Testing: An Approach to Software Quality In my last blog post, I discussed my favorite definition of “quality.” In it, I referred to Quality Assurance testers and some types of…
So, What Is Quality? I have been testing software for a lot of years: first as a power user of software that my company purchased, then as part of my job…
Binding Operational Directive 23-01: Improving Asset Visibility and Vulnerability Detection on Federal Networks How it applies to Industrial Automation and Control Systems (IACS) and Operational Technology (OT) Control Systems
AWS brings Control Tower to GovCloud (US) Big news in GovCloud came around last week as AWS announced Control Tower support in all GovCloud (US) regions. If this doesn’t seem that…
You may be sharing too much information and not even know it Today’s threat actors make use of a variety of information to tailor their attacks against organizations and individuals. By collecting…
ICS Antivirus Protection for computer systems on Level 3 and below When properly deployed and up-to-date, antivirus (AV) software is an important part of a defense-in-depth strategy to guard against…
Industrial Control Systems and Zero Trust Architecture Industrial Control Systems (ICS) and Operation Technology (OT) Control Systems are computer-based systems used to control physical…