Subscribe

Cybersecurity
The history of hacking shows that bad actors use good technologies for bad purposes.  Machine learning is no different: it has never been easier for white hats and black hats to obtain and learn the tools of the machine learning trade. Software is readily available at little or no cost, and machine learning tutorials are just as easy to obtain.
Cybersecurity
Last month's ICIT Winter Summit hosted a packed house of cybersecurity thought leaders from the industry and the public sector. The summit convened with an opening keynote on Securing the Cyber Frontline from Brigadier General (Ret.) Greg Touhill, former Federal CISO.
Cybersecurity
We all know that the Internet of Things (IoT) is here. But IT professionals responsible for enterprise communications networks aren’t exactly sure where IoT resides on their networks or whether these devices are secured. Rogue devices are everywhere (although not all are out to steal the blueprints to the Death Star) but according to a survey sponsored by ForeScout Technologies, only 30% are confident that they know what IoT devices are on their network.
Digital Design
The role of the Army National Guard has expanded significantly since 9/11 and represents 40% of the U.S. Army’s total combat capability supporting Joint Commanders across the range of military operations around the globe.
Data
As federal, state and local agencies amass more and more structured and unstructured data, the use of data analytics can help save time and resources in making informed decisions based on that data. However, challenges remain as agencies struggle to find the right skill set and manage the complexity of implementations for multi-structured data platforms.
Digital Design
Over the last decade, BIM has radically transformed design and construction projects and is seeing increased adoption in the U.S. government sector.