• Blog
en English
ar Arabiczh-CN Chinese (Simplified)nl Dutchen Englishfr Frenchde Germanit Italianpt Portugueseru Russianes Spanish
  • About
    • Overview
    • Capability Statement
    • White Papers
    • Contract Vehicles
    • Corporate Citizenship
    • Certifications
    • Partnerships
    • Leadership
    • News
    • Employee Portal
  • Services
    • Cybersecurity
    • IT Modernization
    • Strategy & Governance
    • Data & Analytics
    • Professional Services
    • Application & Platform Development
  • Project Showcase
  • Careers
    • Current Opportunities
    • Candidate Referral Program
    • Employee Benefits
  • Contact Us
SD Solutions, LLC
SD Solutions, LLC
  • About
    • Overview
    • Capability Statement
    • White Papers
    • Contract Vehicles
    • Corporate Citizenship
    • Certifications
    • Partnerships
    • Leadership
    • News
    • Employee Portal
  • Services
    • Cybersecurity
    • IT Modernization
    • Strategy & Governance
    • Data & Analytics
    • Professional Services
    • Application & Platform Development
  • Project Showcase
  • Careers
    • Current Opportunities
    • Candidate Referral Program
    • Employee Benefits
  • Contact Us
Call us
Call us 540-860-0920
  1. Home /
  2. Technology
Homomorphic Encryption and Privacy
Collaboration, Cybersecurity, Technology  |   November 13, 2020

Homomorphic Encryption and Privacy

Encryption is used to protect everything sensitive, including website accounts, emails, video conferencing, health records, and all sorts of data transmitted over the internet. We touched on some of the
Read more
cryptographyencryptionhomomorphicIBMprivacy
Online Voting and Cybersecurity
Cybersecurity, Technology  |   September 11, 2020

Online Voting and Cybersecurity

The COVID-19 pandemic is a significant obstacle to participation in U.S. elections, especially the upcoming general election. Online voting could potentially minimize the spread of the coronavirus and allow citizens
Read more
blockchaincoronaviruscryptocurrencycryptographyDDoSmalwarevotingvulnerability
IT Asset Management and Cybersecurity
Collaboration, Cybersecurity, Technology  |   August 26, 2020

IT Asset Management and Cybersecurity

Most organizations rely on IT assets for their day-to-day business operations. IT assets can include the hardware, software, and data used for work. However, organizations may need to inspect their
Read more
GLBAHIPAAIT assetITAMlawslife cycleSaaSSAMSOX
Backup Operations and Strategies, Part 2
Collaboration, Cybersecurity, Technology  |   July 24, 2020

Backup Operations and Strategies, Part 2

This is the second article of a two-part series about operations and strategies for making backups. Backups are duplicates of important data necessary for one’s business or personal life. The
Read more
backupcloudHDDlocalSaaSSDDSTaaS
Backup Operations and Strategies, Part 1
Collaboration, Cybersecurity, Technology  |   July 10, 2020

Backup Operations and Strategies, Part 1

The data stored within your computer or server can be worth as much as (or more than) the hardware itself. However, access to data should never be taken for granted.
Read more
backupcontinuous data protectionransomware
Virtual Private Networks and Cybersecurity
Collaboration, Cybersecurity, Technology  |   June 25, 2020

Virtual Private Networks and Cybersecurity

If you work remotely, you might use a Virtual Private Network (VPN). If you don’t use a VPN, you might’ve at least seen this term before. When you use a
Read more
encryptioninternet protocolprivacyremote worksniffingsshteleworkingvirtual private networkvpn
COBOL and the CARES Act
Collaboration, Technology  |   April 24, 2020

COBOL and the CARES Act

The Coronavirus Aid, Relief, and Economic Security (CARES) Act was introduced to assist Americans affected by the economic fallout of the COVID-19 pandemic. According to Ian King of Bloomberg, this
Read more
CARES ActCOBOLcodecoronavirusCOVID-19DoDgovernmentinfrastructureIT Modernizationlegacy systemsmainframe
Blockchain: The Mathematics Behind the Basics
Collaboration, Cybersecurity, Technology  |   February 14, 2020

Blockchain: The Mathematics Behind the Basics

After reading our previous blog post, you might understand what cryptocurrencies are and what blockchain technology is. However, you might also want to know about the basics of how they
Read more
blockchaincryptocurrencycryptographyencryption
Blockchain: A Basic Overview
Collaboration, Cybersecurity, Technology  |   February 7, 2020

Blockchain: A Basic Overview

“Blockchain” is a term you may regularly encounter when reading news articles or exploring new business prospects. For example, in 2017, Timothy B. Lee of Ars Technica reported about an
Read more
blockchaincryptocurrencycryptography
IT Modernization with Cloud Computing
Collaboration, Technology  |   January 29, 2020

IT Modernization with Cloud Computing

IT Modernization is the process of replacing legacy systems of old hardware and software with the latest technology to improve performance. Legacy systems can be considered sunk costs, costs that
Read more
cloudIT Modernizationlegacy systems
  • Phone Number: 540-860-0920
  • Email: bizdev@sdsolutionsllc.com
  • Address:
    • Corporate Office: 8000 Tower Crescent Drive, Tysons VA 22182
    • Principal Office: 58 W. Main St., STE B Luray, VA 22835
Copyright © 2020 - SD Solutions, LLC.