Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
If you don’t know what data you have, how can you protect it, manage it and find value in it?
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. We recap our best Google search tricks. And we meet the father of the 3D transistor.
This content is provided by the IBM Center for the Business of Government. Mondays at 11:00 a.m. & Fridays at 1:00 p.m. The Business of Government Radio Hour, hosted by Michael J. Keegan, features a…
This content is provided by Kinetica.
This content is provided by Kinetica.
Gwen DeFilippi, Air Force assistant deputy chief of staff for manpower, personnel and services, said a new data lake will lead the service to having better personnel systems.
The need for long term care can happen at any time, not just in your later years, so making decisions about this type of care be difficult.
This content is provided by the IBM Center for the Business of Government. Mondays at 11:00 a.m. & Fridays at 1:00 p.m. The Business of Government Radio Hour, hosted by Michael J. Keegan, features a…
Patrick Sullivan, chief technology officer for security strategies at Akamai, recently joined Federal News Network to present options for increasing business continuity in a crushing environment of remote access and incredible traffic loads.
The National Association of Contract Management (NCMA) has recently released a white paper titled, “Preparing for the Future of Contracting,” that makes some bold predictions about the future.
The work being done today may feel like a scramble, but it is laying the foundation for the more telework friendly world that we all deserve (and, quite frankly, we need).
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Setting up a wi-fi printer. And we meet the developer of the computer algebra system Mathematica.
We’re committed to helping government agencies like yours address remote workplace productivity, connectivity, privacy and security in three distinct ways.
In order to leverage all that CDM has to offer, federal agencies must be prepared to apply a more agile, risk-based approach to their cybersecurity strategies using actionable data.