Marketing in the Age of the IoT

At its most basic, The Internet of Things (IoT) describes the network of anything with a power switch that connects to the internet. Not just phones, laptops, and tablets, but also headphones, lamps, dryers, espresso machines, and more. The number of things that can connect to the IoT is growing daily, which is creating opportunities…

Summary: 2016 X-Force Intel Report

In their X-Force Threat Intelligence Report 2016, IBM tells us that some small improvements have been made in cybersecurity over the past year. After some estimates suggested that there had been more than one billion personally identifiable information (PII) leaks, 2015 saw areas of slowed growth, and even some areas of improvement. However, 2015 also…

Our Client Addresses EU Border Security Agency FRONTEX

Quintana Advisory Corp. client Disaster Solutions LLC has returned from successful presentations at the Headquarters of European Union’s border security agency FRONTEX (Frontières Extérieures). FRONTEX retains responsibility for coordinating the refugee crisis in Europe and is evaluating Disaster Solution’s flagship product Virtual Badge®. Disaster Solutions is among a select group of 12 companies from 9…

Disaster Solutions LLC’s Answer to Emergencies Abroad

United States’ citizens who experience emergencies while traveling abroad don’t have an easy, reliable way to communicate their status to the US State Department. As American tourism increases and global terrorism rises, we need a way for US Embassy personnel to quickly verify the location and status of US citizens in the event of an…

Washington Technology 2016 Insider Report

Navigating the trend and changes in the year ahead The Washington Technology 2016 Insider Report (download) offers us a quick reference guide to technology in 2016, divided into two sections – how the market is changing, and the changes your company must consider to remain relevant and successful. How the Market is Changing While last year…

Intelligence: Q3 2015 Security Threat Report

In its Q3 2015 Security Threat Report Cloudmark reveals that SoftLayer Technologies – a Dallas-based hosting and cloud computing company that is owned wholly by IBM – generated the largest amount of spam detected by Cloudmark’s Global Threat Network. A whopping 42% of all outbound e-mail from SoftLayer in Q3 was spam, up seven times…

Defense Federal Acquisition Regulation (DFAR) Download

The Federal Acquisition Regulation (FAR) is the principal set of rules in the Federal Acquisition Regulations System (Title 48 of the Code of Federal Regulations – 48 C.F.R. 1.101.) This is the Defense Supplement.  

Federal Acquisition Regulation (FAR) Download

The Federal Acquisition Regulation (FAR) is the principal set of rules in the Federal Acquisition Regulations System (Title 48 of the Code of Federal Regulations – 48 C.F.R. 1.101.)

Report: 2016 Telecom Predictions

RCR Wireless provides us a set of interesting predictions for the direction of telecom in the coming year. First, if they can overcome some difficult technical hurdles, the work that wireless companies have been doing on VoLTE and VoWi-Fi may finally come to full fruition this year, with VoLTE expected to become a standard offering….

Report: Grading Government Program & Contract Offices

As budgets have changed, so has the procurement process. Rather than program offices directing contract offices to develop procurements as they did in the past, the contracting offices have become more responsible for procurements. This shift is seen by many as being bad for the procurement process – with concerns about inexperienced and overwhelmed contracting officers, offices that…