A guide to Rooting your Android phone

By Ryan Kamauff One of the constant discussions between Android users is why/if you should “root.” Rooting is a term that describes the ability to grant programs “superuser” access. This allows programs to operate at the root level of the operating system, enabling full phone backups, changing certain parameters (CPU/GPU speeds) and changing the entireRead… Read more »

The Cyber Working Group Packs a Punch

by Steve Charles, Co-founder and Executive Vice President It may sound dull ⎯ Executive Order 13636 DOD-GSA Section 8(e) Working Group ⎯ but it’s a group with a lot of leverage. It could dramatically change the complexion of federal IT procurement. The Working Group is drafting a request for information from industry for how toRead… Read more »

After Boston: Terrorism and the Technology Gap

By Bryan Ware The Boston Marathon bombing, subsequent manhunt and current investigation are unprecedented – not only due to the nature of the attack but because of how much information has been available to law enforcement, the public and the suspects. Unlike any previous large-scale attack, data came in at a staggering velocity within secondsRead… Read more »

This is why I heart my agency – #PSRW

I don’t mean to brag, but I work for a pretty neat agency. Sorry, I know. But it’s Public Service Recognition Week! I wanted to share this awesome blog post with the GovLoop community because I think it really hits at the core of who we are and what we do. I am very happyRead… Read more »

Invincea: An update for the enterprise technology professional

By Bob Gourley For disclosure: I am on the Invincea advisory board. I’m incredibly proud of to be associated with those guys and I’m hoping my pleasure with them comes through in this post. Invincea delivers an enterprise grade breach prevention platform. Capabilities they field include an ability to run software in a totally virtualizedRead… Read more »