Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Tips on how to avoid phishing scams and we meet the Dutch computer programmer who is best known as the author of the "Python" programming language.
Dana Laake and her special guest Dr. Sam Pappas will examine an integrative and traditional physicians approach to diet, lab tests, cardiac heart, liver screening and men's health.
There’s another kind of intelligence gathering, just as important to commercial, military, diplomatic and political operations: open source intelligence, or OSINT for short. OSINT is gathered from publicly available information sources like the news, government documents and social media reports, among others. But in order to be effective, OSINT analysts have to be just as careful about concealing their online identities as clandestine operatives.
Before drones can be used for commercial delivery, the Federal Aviation Administration has to integrate them safely into an already crowded airspace.
This program will provide a progress report on data center optimization in government.
The enterprise landscape of protecting the network is continuously changing and advisories are constantly evolving to meet the changing landscape. Hackers have become more sophisticated, both in their methods and in the data they target.
This content is provided by KPMG The supply chain is the backbone of operations for the military and defense agencies. From the initial request for required equipment, to transporting it anywhere in the world, and then…
Dana Laake and her special guest Dr. Judy Seeger will discuss a 3-step strategy for detoxification and using ozone therapy for optimal health results.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. How make sure your wi-fi is not vulnerable at a hotel. And we meet the father of the cell phone.
Traditional development processes like waterfall just don’t cut it anymore. That’s why Lockheed Martin reached out to Red Hat for help updating the processes and culture around application development for the F-22 Raptor fighter jet.
In this exclusive executive briefing, federal data practitioners discuss the importance of having a chief data officer to make data work for agencies.
The supply chain is the backbone of operations for the military and defense agencies. From the initial request for required equipment, to transporting it anywhere in the world, and then actually deploying it in a timely fashion only happens because of a complex set of processes at every stage along the way.
The only way to address this ever-growing cyber worker skillset is to get the next generation of employees interested and excited about cybersecurity.
This content is provided by Cancer Treatment Centers of America No longer a silent disease It can be difficult to know what to say to someone with cancer. Unless you’ve been there yourself, you can’t…
What is the mission of the Center for Democracy and Technology? How is it advancing federal privacy law to protect our digital rights? What is the Center for Democracy and Technology doing in the area of cybersecurity? Join host Michael Keegan as he explores these questions and more with Nuala O’Connor, President and CEO of the Center for Democracy and Technology.