Find additional Electroblogs using the search box below.
by Emily Zhang
Back in the 1990s, traditional software developers would use a programming language such as C++ to build software applications. The source code was highly technical and consisted of pointers, event handlers, and memory allocation and deallocation.
Then…
by Ismail Mellouli
Today, I want to introduce everyone to Docker, a powerful tool for software engineers that has revolutionized the way we build and deploy applications. Docker is an open-source platform that allows developers to create and run applications in containers. These…
by Eric Wesley
On more than one occasion our Security Operations Center (SOC) teams have been told that the Electrosoft-managed SOC is among the most advanced in the federal agencies they serve. They are often viewed as the most competent SOCs, especially in agencies that…
by Dave Silver
Identity management is at the forefront of efforts to implement zero trust (ZT) across the federal government. Under ZT, no identity, device, network, application, or data is deemed trustworthy. This shift in thinking puts the onus on government agencies to assure…
by Clayton J. Barnette
We all have smartphones today. So, scrolling social media sites is a normal part of our everyday life. For most people, this level of internet exposure is enough, but we all know the internet universe is much bigger than the small phone screens on which we…