ASMC The Business of Defense

  • Wireless mouse troubleshooting, Windows XP after support ends, mixed HTTP/HTTPS warnings, homepage hijacking, deleting information on LastPass cloud servers, Profiles in IT(Edward E. Iacobucci, co-founder Citrix and force behind IBM PC architecture), Website of the Week (www.coffitivity.com, ambient cafe noise to enhance productivity), effective tech interviewing (behavioral questions coupled with audition project), mobile phones dominate payments in Africa (cash is almost obsolete, mobile phone payments more sophisticated than US, huge market penetration), DARPA Robotics Challenge (uses open source simulation software Gazebo from Open Source Robotics Foundation, provides 5-foot-10, 240 pound robot from Boston Dynamics, top prize $2M).

    May 29, 2013
  • Comparison(FIOS vs Cable vs Satellite), disk cleanup utilities, using TreeSize to analyze disk usage, configuring wireless guest accounts, wirelesss speakers for iPad (Phillips Sounshooter vs JBL Micro), Profiles in IT (Andrew Ng, co-founder Coursea), NSA datamining (PRISM includes nine large US firms, Stellar Wind grabs raw data from Internet connections), Oxford English Dictionary adds treet, GPS tracking used to locate stolen phone, computers in the stock market (high frequency trading causes market swings, enabled by SEC regulations released in 1998 and 2005).

    May 29, 2013
  • Best of Tech Talk replaying segments from previous shows.

    May 29, 2013
  • Best of Tech Talk replaying segments from previous shows.

    May 29, 2013
  • Google Internet location detection techniques (cell phone GPS, Streetview data, IP address location), cell phone number valuable for account recovery, installing multiple browsers, DHCP revisited, configuring a POP account (leaving emails on main server), Profiles in IT (Scott Heiferman, co-founder and CEO of Meetup), Intel releases Harwell processor (50% more battery life without performance loss, hope to capture mobile market), nude view scanners removed from airport (TSA personnel pouting), Justice seeks user data from Google (claims national security, may be unconstitutional), big data and politics (the use of big data to target likely voters and contributors credited with Obamas win), India likely source of multinational cyberspying (origin of advanced persistent threats), iPhone hacker hired by Google (after being fired by Apple), and tracking stolen laptop using webcam pictures (Hidden app in iMac used to track laptop to Iraq).

    May 29, 2013
  • This week on AFGE's "Inside Government" J. David Cox Sr., president of AFGE, urges furloughed federal employees to file appeals with the Merit Systems Protection Board while Field Services and Education Director Dave Cann discusses furlough resources available to members. AFGE Assistant General Counsel Matt Milledge addresses employee appeal rights and Defense Conference Chair Don Hale analyzes sequestration's impact on military readiness.

    May 29, 2013
  • The Pentagon is responding to a Washington Post article claiming key weapons systems have been compromised by Chinese espionage. Spokesman George Little says, "We maintain full confidence in our weapons platforms." Little also says, "The Department of Defense takes the threat of cyber espionage and cyber security very seriously, which is why we have taken a number of steps to increase funding to strengthen our capabilities, harden our networks, and work with the defense industrial base to achieve greater visibility into the threats our industrial partners are facing." He says, "suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect."

    May 29, 2013
  • Jon Adler, national president of the Federal Law Enforement Officers Association and Ton Vergnetti, president of Federal Employee Defense Services will discuss legislation affecting those in federal law enforcement. May 24, 2013

    May 24, 2013
  • After the President's major speech on drones and GITMO, the intelligence community responded. DNI James Clapper welcomed "the effort to strengthen the process for reviewing and approving counterterrorism operations." He said "a consistent and regularized interagency coordination process that involves policymakers, intelligence professionals and the legal community is essential to preventing and responding to terrorism while ensuring the freedoms that are the bedrock of our democracy."

    May 24, 2013
  • On this week's Capital Impact show, Bloomberg Government analysts discuss the billions of dollars spent on intelligence operations by the federal government, and the latest jobs report. May 23, 2013

    May 23, 2013