Mike Corley is a R&D Associate of Quanterion Solutions. He supports a variety of customer-funded efforts with the Defense Technical Information Center (DTIC) via the Cyber Security and Information Systems Information Analysis Center (CSIAC), and the Air Force Research Laboratory (AFRL) in Rome NY. Recently, Mike has developed a new capability, specifically for CSIAC that helps to enhance the efficiency of Subject Matter Experts (SMEs) chartered with performing tasks associated with discovering, cataloging, and submitting Scientific and Technical Information (STI). The STI Retrieval & Cataloging Assistance Tool (STIRCAT) is a new tool that provides automation and assistance capabilities for enhancing STI workflows including: search and discovery, metadata extraction and cataloging, and submission. Mike has more than 20 years of professional experience in software architecture design and development.
Mike received his masters degree in Computer Engineering from Syracuse University in 2011. He recently taught Linux Systems and Network Programming as adjunct instructor at Syracuse for the Spring 2020 semester. His interests include Cloud enabled architectures, software development methodologies, and collaborating with other enthusiasts on programming language idioms, design patterns, and related ideas. Mike especially enjoys developing code in C++, C#, .Net core, and most recently, the Rust programming language.
Podcasts / Webinars
Modern networked computing systems are becoming increasingly more complex. The recent explosion of the Internet of Things (IoT), ranging from mobile embedded devices to large scale Cloud-orchestrated services has added significant challenges to the standard administration tasks associated with securing…
The CSIAC Podcast » CS Digest Roundtable #3: Tricking Neural Networks, CIA Impersonation, International Data Privacy, and Encrypted Malware Detection
In today’s episode the CSIAC takes the most important articles in a past CS Digest and discusses the articles’ importance in the world of technology and cyber security.
As software development methodologies have evolved the shortfalls and the inefficiencies of traditional software development methodologies have become increasingly apparent. The realization for the need to pursue better methodologies, tools, and architectural approaches has been a major motivation behind the…
CSIAC Webinars » BFAS – Binary File Application Scanner: A prototype for scanning, detecting and reporting PII in disparate binary formats
Large data volumes (aka “big data”) coupled with the use of new technologies can greatly increase the amount of Personally Identifiable Information (PII) data collected by an organization. Correspondingly, there has been an escalation of security breaches involving PII data…
This discussion between a moderator (Mr. Patch) and two software engineering subject matter experts (Mr. Corley and Dr. Fawcett), walks through a set of common functions, first implemented through C++ and then in Rust, to note initial speed, performance and security of memory access differences. This podcast covers the ground rules for the side-by-side comparison to ensure the methods used are thoroughly understood.
This discussion between a moderator (Mr. Patch) and two software engineering subject matter experts (Mr. Corley and Dr. Fawcett), walks through a set of common functions, first implemented through C++ and then in Rust, to note initial speed, performance and security of memory access differences. This episode describes how the comparison was conducted by using both Rust and C++ to perform the same function under the relatively same conditions.
The series ends by answering key questions and provides advice as to where to get started with this new language that is quickly being adapted by Fortune 500 companies.