CornerStone Knowledge Acquisition and Synthesis Framework

In general, and especially in the “big data” era, there is often a failure to collect sufficient data about the data (metadata). This lack of metadata drastically reduces the potential use of the data, and the attempt to rectify this situation after the fact is often difficult, if not impossible. The necessary metadata must first be located, and then organized and associated with the data. Often those who know about the metadata are no longer available. The proposed alternative is to prepare the data for long-term preservation based on currently accepted best-practices for long-term digital archives. This means that both the data and the metadata are simultaneously collected and prepared for the archive. This methodology provides the best chance that the necessary metadata will be available for future analysis, and ensures use of the data being collected and preserved.

Posted in: Briefs, Software

Middle-Out Graph Analytics

This software visually lays out trends and patterns for ease of analysis, and can be used on desktop or handheld devices.

Graph analytics is a way of facilitating guided graph exploration through visual and interactive means. Unlike many graph visualization research efforts that focus predominantly on layout algorithms and rendering techniques, graph analytics research strives to provide an engaging interactive journey that bridges the gap from data to information to knowledge. Graph visualization still plays an important role in building this analytical journey, as do database querying, graph mining, interactive interrogation, human judgment, and senses.

Posted in: Briefs, Software

NetEgg: Automated Code Generation for Software-Defined Networks

This software enables fast and easy network configuration.

Software-Defined Networking (SDN) usually requires network administrators to be skilled in programming languages such as C++, Python, or Ruby. Many IT operators tasked with installing routers or other network components may lack the skills to program SDN equipment. Due to a shortage of trained staff, implementing SDN across an entire enterprise can become very time-consuming and costly.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Human factors, Education, Education and training, Automation, Productivity

Robust Method for Data Protection and Change Detection

Methods exist for processing an original data sequence in order to generate information about the data for the purposes of integrity measurement, ownership demonstration, and authentication. The first category is digital watermarking, the second is data hashing, and the third is error detection coding. In the present context, watermarking is often used for ownership demonstration and authentication purposes; data hashing is often used for integrity measurement purposes; and as with data hashing, error detection coding is used to measure data integrity. However, the latter is normally done as part of data transmission protocol, and therefore addresses transmission errors rather than tampering.

Posted in: Briefs, Software, Finite element analysis, Computer software / hardware, Computer software and hardware, Cyber security, Computer software / hardware, Computer software and hardware, Cyber security, Data management, Identification

Developing Safety-Critical System & Software Requirements

Requirements: The foundation of every safety-critical system. But as systems complexity expands and product development schedules compress, the foundation must support them. Guest presenter Vance Hilderman, CEO of safety-critical systems and software engineering consultancy AFuzion, explains how to build, maintain and reuse a rock-solid requirements foundation.

Posted in: On-Demand Webinars, Software

Uncertainty Quantification and Management in Digital Engineering

This Webinar illustrates applications of Uncertainty Quantification (UQ) techniques that will be necessary for full implementation of model-based digital engineering. The role of UQ techniques and software, such as SmartUQ, in end-to-end system models, reduced order modeling and probabilistic analysis, the creation of an authoritative digital surrogate “truth source”, and the creation of uncertainty budgets will be discussed.

Posted in: On-Demand Webinars, Upcoming Webinars, Software

New Software Spots Eye Contact

Did you see? New software developed at Saarland University turns any camera into an eye-contact detector. Why is it so valuable to identify eye contact? We spoke with the inventor about new kinds of applications enabled by the technology.

Posted in: News, Cameras, Imaging, Software

High-Speed Network Protocol for Faster, More Reliable Emergency Response

Anew network protocol — the Multi Node Label Routing (MNLR) protocol — was developed to improve the information flow between emergency responders at the scene of an incident and decision-makers at the office of emergency management.

Posted in: Briefs, Software, Communication protocols, Communication protocols, Disaster and emergency management, Emergency management, Hazards and emergency management, Hazards and emergency operations

Custom Administration Reporting (gTracker)

A reporting tool was needed that could indicate the accuracy of search results by tracking the number of clicks required by users to find their desired search results. The application should also capture the number of times other links and like filtering components are clicked. The report should have the ability to display a specific date range. The application is configured to allow multiple interfaces to utilize the service, and can provide statistics per interface or across all interfaces for a consolidated view of search user behavior metrics.

Posted in: Briefs, Software, Big data, Data acquisition and handling, Internet, Big data, Data acquisition and handling, Internet


Android is the primary software platform for mobile, networked devices such as tablets and smartphones. These devices are increasingly used for safety-critical functions that require verification of correct and robust behavior of applications. Such software written for the Android operating system is hard to test because applications are inherently concurrent, applications are usually being driven by asynchronous user input and network events, the application model is not amenable to unit testing, and the availability of sources for many commercial applications is missing. Safety-critical applications require verification by means of systematic exploration of all possible software behaviors. Conventional testing does not guarantee sufficient coverage, especially for concurrent applications.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Cyber security, Internet of things, Safety critical systems, Computer software / hardware, Computer software and hardware, Cyber security, Internet of things, Safety critical systems, Test procedures

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.