Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness

John Gilroy
undefined
Feb 20, 2024 • 19min

Ep. 131 Exploring and Understanding Data

A recent study by Deloitte indicates that 67% of executives struggle with data analytics. The knight in shining armor that offers a rescue is artificial intelligence. Today’s interview pours the promise of artificial intelligence into both ends of the spectrum: qualifying data sets that are being used and, subsequently, producing explainable results. The headline overview of artificial intelligence involves writing a report by ChatGPT.  Although that may be true, the article will be derivative and will not move the ball intellectually. You will hear Kyle Rice discuss how Virtualitics can use artificial intelligence methods to look at data sets that are being investigated. Once those libraries are produced, then they can take artificial intelligence to look at making conclusions. When analysis is approached from that point, you eliminate the guess-and-test method. That is to say, there is a good chance that the hypotheses that are created by humans. In other words, you will not spend precious time trying to answer the wrong questions. Virtualitics poses that a rational way to generate data sets can give users the ability to form elusive data-derived decisions. During the interview, Kyle describes the approach as “intelligent data exploration.”   The added value of this approach is defensibility. For example, if a data scientist produces a conclusion, their sources can be questioned. Instead of pointing to a black box in the corner, a team can produce explainable artificial intelligence. Interested in reading more from Virtualitics?  Why AI’s Success Depends on Making it More Explainable and Conversational What’s your score? Take the Podcast Appearance Scorecard www.podscorecard.com Want to listen to other technology podcasts? www.Federaltechpodcast.com Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Got goin’ to Mars on your bucket list? Listen to Constellations Podcast https://www.kratosdefense.com/constellations/podcasts        
undefined
Feb 15, 2024 • 20min

Ep. 130 Reducing Risk in the Hybrid Cloud through Identification

We begin this episode with a shocking statistic:  80% of hybrid cloud breaches involve credential abuse. During the interview, Jimmy McNary from Semperis unpacks the whole concept of protecting identities in the hybrid cloud. The interview covers a wide range of topics. First, we start by taking a view of how large systems have evolved. Larger systems tend to have two or more identity processes, and Active Directory from Microsoft has a 90% share of that overall market. Secondly, some identity systems can use outdated Identification Access Management systems. Thirdly, we have employees and contractors who enter and leave systems. This can produce confusion in de-provisioning access. Putting all three together produces a perfect storm for malicious actors. They can use tools to scan systems for vulnerabilities in, for example, identification processes, and set up an attack. Semperis uses Active Directory as the starting point to orchestrate identification. They can stop malicious actors before they attack, during the attack, and help post-attack. In a poignant example, Jimmy McNary relates the story that some organizations spend significant amounts of money on backups, including immutable backups. Unfortunately, they forget about backing up Active Directory. We know that it is likely the attack vector included Active Directory, but it is not protected. This is a scenario where the system is restored, and the malicious actor has retained credentials to allow him back into the system. Jimmy McNary provides practical tips to avoid these frustrating situations. = = What’s your score? Take the Podcast Appearance Scorecard www.podscorecard.com Want to listen to other technology podcasts? www.Federaltechpodcast.com Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Got goin’ to Mars on your bucket list? Listen to Constellations Podcast https://www.kratosdefense.com/constellations/podcasts      
undefined
Feb 13, 2024 • 23min

Ep. 129 Bringing data to the hands of federal officers on the front line

The title of this podcast is “Federal Tech Podcast.”  For many people, this evokes an image of stacks and stacks of servers in a windowless data center. Today’s interview shows listeners how that data can be unlocked and put in the hands of front-line officers, whether they are federal or civilian. Bob Griffin from Siren has been involved in bringing data to online operators for decades. During the interview, he presents a challenge that many encounter. In one example he gives, a person drives up to a warehouse in the middle of the night and sees an unexpected car. The idea I to get as much information as you can in front of the officer. In years gone by, this has been done with desktop computers. An officer may have to communicate with an office where someone may run a search. There is no doubt that this is an effective method. Siren has been the leader in the unique ability to look at various data silos and search them for salient information. In this interview, Siren announced a breakthrough that takes the traditional ability of a desktop and puts it in the hand of a mobile device the officer. Finally, time is not wasted. An officer can approach a situation and be prepared with actionable insight into perpetrators and take appropriate action. Finally, data that fulfills the role it was designed for, making burdensome tasks faster and easier for users. Get any mileage out of your last podcast appeareance?  Take two minutes to complete the Podcast Appearance Scorecard      
undefined
Feb 8, 2024 • 27min

Ep. 128 Understanding Risks in the Hybrid Cloud

Today, we look at the proper way to manage the hybrid cloud for federal projects. Our guest is the Chief Technology Officer for Thundercat Technology, Kurt Steege. Kurt has an extensive background that includes a stint as the Chief Enterprise Architect at the FBI. An argument can be made that the move to the hybrid cloud can increase flexibility and reduce cost; an equally valid argument can be made that the increasing complexity of the hybrid cloud can cause poor visibility, insecure data transmission, and compliance issues. We see federal agencies not getting boxed into a corner by using more than one cloud service provider. This may be great for financial reasons, but the hybrid cloud, by definition, is going to be much more difficult to observe. The risks are always changing, some cybersecurity experts say that Application Program Interfaces are the new attack vector; a multi-cloud system makes accounting for all of them hard. Another obvious fact, if your agency moves to the “XYZ” cloud, there is a transmission of data. If they go ahead and send another application to the “ABC” cloud, there is another communications port. Each one adds to the attack surface for an agency. Finally, each cloud service provider has diverse ways of offering compliance. At the end of the day, a federal official must sign off on the compliance. Understanding the subtilities of these differences may cause excessive delays. Thundercat Technology has a white paper that could help. It is titled “Cloud Transformation Leads to Better Outcomes for Government Agencies.”         
undefined
Feb 6, 2024 • 22min

Ep. 125 Overcoming Challenges in Federal Technology Leadership

If you do a Google search on “Leadership” you get five billion results. Seems like a topic that has been given tons and tons of attention. A better way to gain an understanding of leadership is to seek out examples of poor leadership and try to avoid them. Enter, How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders. The latest book from Dr. Chase Cunningham This is an interview with Dr. Chase Cunningham where he gives his reasons for authoring the book and the origin of many of his stories. He has a fascinating background that includes being raised on a farm in Texas, working in sensitive military areas, and completing a Ph.D. Some of the chapter titles look like a setup from a professional comedian. He has chapter titles like Do not be a Dumpster Chicken Go Slow to Be Fast Beware the Brilliant Jerk Do not be a mushroom farmer. Do not chase unicorns. Yes, the chapter titles are brash and so are Chase’s recommendations. Let us one tiny aspect of the book:  the idea of starting a company, getting investors, and becoming a millionaire.  That certainly is the goal of millions and millions of entrepreneurs. Chase has seen investors and innovators in action. He has seen naïve startups get dazzled with investment dollars give up control of companies, and become employees to a demanding task master. Wait a minute, one of the reasons for starting a company was to become independent. Chase tells the untold part of the “rags to riches” story of technology startups. An innovator may produce an idea and surround themselves with a core group that develops and makes the company grow. Many are hired with the promise of riches when the company goes public. What can happen is the founder falls for the trap where the company’s value gets diluted, and the promises made to the initial group have been cast aside. When you buy and read this book you will be drawn into memorable stories about roping cattle, small boar maintenance, and keyboard warriors. Buy this book today to help you become a successful entrepreneur, a better leader, and a decent human being.
undefined
Feb 1, 2024 • 23min

Ep. 126 Herding Containers with Rancher Government Solutions

Over the years some technical terms are easy to understand for mere mortals – data centers, high-speed internet, and even identity management. However, when you mention the term “Kubernetes,” a normal professional eye would glaze over. Some technical professionals may have to revert to making up some applications. Well, the wait is over. Today, world-famous Paul Smith from Rancher Government Services will give a working definition of Kubernetes and show how efficiently using this technology can reduce costs and improve security for federal systems. We begin the interview from 40,000 feet with a general guide to open-source software and Paul Smith gives an overview of Linux and Red Hat. That parallel seems to ring some chords. Next, the concept of “container” was expounded upon. A container is merely a bundle of software, this is portable. It can be used as plastic blocks children use. You can pick up the container and run it anywhere. When it comes to three-year-olds, the blocks end up all over the house! Now that the foundation is set, Paul Smith indicates that in and of itself, the open-source Kubernetes provides high availability and scaling; on the other hand, it can be difficult to install, complicated, and needs to be monitored. Today’s federal hybrid clouds need a way to manage these containers. Enter, Rancher Government Solutions. During the interview, Paul Smith presents some of the challenges in a multi-cloud world. He includes comments on legacy systems, edge computing, and orchestration. If you would like more information on Rancher Government Solutions, please download the free whitepaper titled Pioneering Secure by Default Open-Source Kubernetes Solutions If you would like to attract customers to your company on your next podcast appearance, then should fill out the Podcast Appearance Scoreard.  See where you stand and get some pracical tips and suggestions so you can leverage that next podcast appearance. 
undefined
Jan 30, 2024 • 22min

Ep. 125 The Secure Hybrid Edge

When people think of Amazon Web Services, they normally think of a data center. This was certainly top of mind when AWS hosted 10,000 at its Public Sector Summit in 2023. Today, we go in a different direction. Dave Rubal is a well-known innovator in the Washington DC technical community. He has decided to throw his hat into the ring with something called the Secure Tactical Edge. It makes sense. If you look at how storage and computing are changing. In a recent study, IDC predicts that in the future 75% of data will be collected at the “edge.”  The federal government has a myriad of ways to manage this “edge” concept. Civilian agencies may have one approach, and the DoD has another. In addition to being on the edge, they need to be able to deploy this concept in a tactical as well as secure method. During today’s interview, Dave Rubal sketches out one aspect of that movement to the edge. He talks about how the DoD can securely use edge cases. In other words, the Secure Tactical Edge. Let us take a small task as an example, storage of video feeds. The DoD has facilities all over the world and needs physical security. It would be ridiculous to store these feeds in a data center across the globe. Further, there are retention policies that are in place to reduce the burden of storage. Another example may be unstructured data being collected all over the earth, and even above. Agencies must be able to architect a solution that takes advantage of innovation on the edge to reduce cost, improve flexibility, and provide data rapidly so warfighters can make decisions quickly. Here is a hashtag summary: #TacticalEdge  #OperationalEdge #HybridCloud  #EdgeComputing This is the episode that introduces the tried and true, “Up close and personal” Dave’s avocation is to volunteer at his local fire station. He is a licensed EMT and has saved lives with his skills. Follow John Gilroy on LinkedIn  https://www.linkedin.com/in/john-gilroy/ Listen to past episodes of Federal Tech Podcast  www.federaltechpodcast.com
undefined
Jan 25, 2024 • 20min

Ep. 124 Is Digital Transformation Evolution or Revolution?

James Eselgroth will lead a discussion about innovation and change in federal technology. Normally, one would think about solutions to problems. Traditionally, develop a list of changes, check each off the list, list, and move on. That may be a fantastic way to build a house, not that it simply does not work in today’s dynamic software environment.  In today’s fast-moving technical climate, one approach is to use something called an MVP. No, not the National Football League kind of MVP, not Most Valuable Player, but a “Minimal Viable Product.” A “Minimal Viable Product” is a concept that originated in agile software development. The idea was not to submit a complete, finished product but to present the essence, framework, or basics of a product and get feedback. This initial offering had to include working elements but omitted many of the details like user interface concerns and complex integration projects. During the interview, Jim explains how this concept applies to the federal audience. He references a quote from Federal CTO Clare Martorana who said “Demos, no memos.”    This temporary solution would be presented to stakeholders and see if it was a good fit. Alterations are made and the next iteration is presented. Listen to the interview to hear how Jim provides an overview of his innovation lab. This results in the MVP approach allowing for solutions to be built in two to four weeks. Highlight has a new offering called EdgeWerx. Look for announcements at  https://highlighttech.com/
undefined
Jan 23, 2024 • 21min

Ep. 123 Is Artificial Intelligence limiting the Value of Process Mining?

AI? Process mining? We owe it to the listeners to put the strange title into perspective. Some will argue that a federal agency is a collection of business processes. For example, a company turns in its taxes; a laboratory applies for a grant; and even federal agencies must comply with cybersecurity requirements. Some will label this process management. Because the federal government deals in billions of dollars these processes can be quite complex. Experts have evolved who can examine these processes and determine ways to improve the process. Because there are stacks and stacks of petabytes of data to be concerned with, the term “mining” has become popular to describe this kind of examination. OK. Step Two. We all know that artificial intelligence is trying to be applied to as many aspects of federal technology as possible. Many are talking about potential savings. However, this may be true with simple tasks like creating reports; however, complicated processes may present a challenge to artificial intelligence. If someone arbitrarily slaps an AI Process into a system, it could wreak havoc. Please remember that AI is derivative, and can absorb previous systems but not necessarily offer anything new. During this interview, Christopher Radich breaks down some concepts that Celonis uses to gain a deep understanding of complicated processes before AI gets a chance to work. For example, they have pioneered applying the concept of digital twins to processes. This is a way that a process can be evaluated to discover the implications of process change. Follow John Gilroy on LinkedIn  https://www.linkedin.com/in/john-gilroy/ Listen to past episodes of Federal Tech Podcast  www.federaltechpodcast.com Process Mining for Dummies  https://www.celonis.com/ebook/process-mining-for-dummies/        
undefined
Jan 18, 2024 • 21min

Ep. 122 Safe & Secure Artificial Intelligence

In today’s interview, Guarv “GP” Pal from stackArmor presents a warning call to let people know that a sudden jump into any technology can present unintended consequences. He offers suggestions to make AI meaningful, safe, and dependable. Everyone remembers Bill Murray on Groundhog Day having the same experience over and over. After a few years of experience in federal technology, we are looking at something similar. First, the commercial sector I dazzled. Next, federal technology leaders feel like they must get in the same boat. A few years ago, many agencies jumped headfirst into the cloud, and then FedRAMP had to come along to put some guides on the cloud experience. Fast forward to 2024, today’s Artificial Intelligence is falling into the standard pattern. Federal technology leaders can feel left out and make a quick adaptation, then later guidance emerges to rectify some of the unintended consequences of artificial intelligence. Researchers are seeing security vectors that are unique to AI. What security principles should be considered when putting together a Large Language Model? Can a bias be introduced? What controls do you have in place today that you can apply to your agency’s AI journey? To bring in a diverse set of opinions to offer guidance, GP discusses his company’s development of an AI Risk Intelligence Center of Excellence. They have assembled a high-power group of leaders with federal experience to provide training models and actionable steps for making a safe and secure transition to AI.  

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app