Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Cybersecurity has become a data-driven activity. Predicting, responding to, mitigating and post-facto analysis of cybersecurity events all rely on having the applicable data available at the right time. Data itself originates in a variety of…
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. The best mouse we have ever used. And we tell you about the computer developer whose life story is a cautionary tale about protecting your intellectual property.
Matt Mandrgoc, the head of US public sector at Zoom, said the pandemic showed three things: Incumbent technologies were not necessarily scalable to satisfy the needs of the mass remote work environment; the culture change brought on by mass telework will be permanent; and cloud services were critical to all of these successes.
The Air Force and the Defense Department writ large are expecting 5G to be a game changer in the way it delivers information and connects platforms.
Dr. Robert Blumofe, the executive vice president and chief technology officer at Akamai Technologies, cited performance acceleration, Transport Layer Security (TLS) connection offloading, caching, and hosting the security stack itself, as candidates for edge computing.
During this webinar, you will learn how top government technology executives from the Department of the Air Force, Small Business Administration and the Defense Intelligence Agency are addressing the challenges and opportunities around data analytics at the edge.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Why it isn’t possible to save money by building a laptop instead of buying one at retail. And we tell the story of the English engineer who designed and built Colossus, the world's first programmable electronic computer.
End points – smart phones, tablets, notebook PCs, even desktop PCs – form employees’ entry points to networks, applications and data. The rise in remote working and teleworking has made end points particularly attractive to cyber hackers, especially using ransomware attacks delivered through phishing campaigns.
The federal government is coming around to the importance of data, and is in the process of making a significant amount of policy around how to fully leverage it. Not least among this new policy is the Defense Department’s five new “data decrees,” set out in a memo signed by Deputy Defense Secretary Kathleen Hicks in May. The memo, among other things, creates a data council for all DoD components to coordinate their activities, and to increase data sharing among the components.
This content is provided by the Government Contract Pricing Summit team at ProPricer. The Defense Department is changing the way it’s contracting with industry. Whether it’s through new, faster contracting vehicles or through emergency authorizations…
This week, hosts Mark Masselli and Margaret Flinter speak with Dr. Garth Graham, Director, and Global Head of Healthcare and Public Health Partnerships at Google/YouTube overseeing the creation of credible health content – in partnership with multiple health institutions. They discuss their efforts to disrupt and remove health misinformation from their platform which receives 2 billion visitors per month. They talk about the partnership with the Biden Administration, the CDC, Harvard and England’s National Health Service to remove false information from the platform and drive visitors to credible health information about COVID-19 and all other health topics of interest.
Ransomware and cyber ransom attacks are gaining attention as they continue to wreak havoc on critical infrastructure and important networks. The attacks are likely part of the new normal when it comes to living in an increasingly connected cyber world, but that doesn’t mean that businesses and government agencies are helpless.
This exclusive e-book highlights some of these different ways agencies are taking more advantage of AI and ML tools to help exceed mission expectations.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. How to recover saved passwords from Safari on iPhone. And we remember the American engineer most notable for the invention of the laser printer.