Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

Executive Order Promotes Responsible AI Use January 09, 2024

by Sarbari Gupta

On October 30, 2023, The White House released Executive Order 14110 on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, a long and long-awaited document. At over 100 pages, EO 14110 details actions and deadlines required of…

read more
Blog
Excel and Data Enabling: Leveraging the Power of Oracle Database December 19, 2023

by Erik Lung

Excel, despite being around for decades, continues to hold its relevance in the realm of data management and analysis. When coupled with powerful tools like Oracle and Power BI, Excel becomes an integral part of a comprehensive data enablement strategy, ensuring a…

read more
Blog
How Low-Code Platforms Gave Rise to Today's Citizen Developers November 27, 2023

by Emily Zhang

Back in the 1990s, traditional software developers would use a programming language such as C++ to build software applications. The source code was highly technical and consisted of pointers, event handlers, and memory allocation and deallocation.

Then…

read more
Blog
Docker ‒ A Powerful Tool for Building and Deploying Applications October 11, 2023

by Ismail Mellouli

Today, I want to introduce everyone to Docker, a powerful tool for software engineers that has revolutionized the way we build and deploy applications. Docker is an open-source platform that allows developers to create and run applications in containers. These…

read more
Blog
Building on Success: A Replicable Security Operations Center August 23, 2023

by Eric Wesley

On more than one occasion our Security Operations Center (SOC) teams have been told that the Electrosoft-managed SOC is among the most advanced in the federal agencies they serve. They are often viewed as the most competent SOCs, especially in agencies that…

read more
Blog
Using Attribute Pairings to Control Access Authorization: The ABAC Model August 16, 2023

by Dave Silver

Identity management is at the forefront of efforts to implement zero trust (ZT) across the federal government. Under ZT, no identity, device, network, application, or data is deemed trustworthy. This shift in thinking puts the onus on government agencies to assure…

read more
Blog
Top