Corporate Blog

October Pink

October Pink

  October. Tenth month of the year. True beginning of fall. Changing colors. Orange. Pink? For the majority of my...

Monitoring Options for MongoDB

Monitoring Options for MongoDB

  In this age of Big Data, there is a need to scale the database horizontally across many nodes with...

Who’s that knocking at my port?  Or, how do I secure these cyber doors?

Who’s that knocking at my port? Or, how do I secure these cyber doors?

  What if someone knocked on your door every fifteen minutes? What if they just tried the knob and walked...

Why Stream Processing?

Why Stream Processing?

    In today’s world of data processing, everyone is talking about the cloud and the latest tools for processing...

Network Penetration Testing 101, It’s Black and White

Network Penetration Testing 101, It’s Black and White

  There has been a lot of press covering recent high profile security breaches.  The criminals behind these attacks may...

How IT Candidates Get Noticed – Part 2: Preparing for opportunities, adapting expectations and creating options for growth

How IT Candidates Get Noticed – Part 2: Preparing for opportunities, adapting expectations and creating options for growth

  Candidates currently looking for interesting government contracting work are faced with an unfamiliar environment: where there was once a...

How IT Candidates Get Noticed – Part 1: Events Reshaping the Government Contracting Work-force

How IT Candidates Get Noticed – Part 1: Events Reshaping the Government Contracting Work-force

In the current era of increasing competition for interesting IT work in the government contracting industry, candidates need to set...

Getting to know our employees: How can a moustache make a difference?

Getting to know our employees: How can a moustache make a difference?

Blog 2 in a series of “Getting to Know Our Employees”.  We’re a company of techie’s but what we do...

Machine Learning for Cybersecurity

Machine Learning for Cybersecurity

The amount of data collected by computer systems on a daily basis is staggering.  Making sense of all this data...

Securing your Collaborative Environment

Securing your Collaborative Environment

  As the government struggles to reduce costs, we have seen an increased interest in improving efficiencies and reducing costs...

1 2