BLOG


In the future, UX designers will see a shift in their careers, as Artificial Intelligence (AI) takes over their jobs. The two main reasons why AI will take over UX design are: the process of interaction design will reach perfection and personality responsive design will begin. AI is a phenomenon that will have many socio-economic consequences in the work of designers...

The Good News from the CIA Hacks

March 23, 2017 by The GTech Operations Team

Although the ominous tone of the headlines about recent CIA hacks seems to provoke fear of the government in the public domain, many experts are quick to point out that the public's reaction should be just the opposite. Information released about the CIA's so-called "Vault 7" through WikiLeaks has some people fearing for their privacy. But these recent revelations prove something reassuring, according to Hackernoon: The CIA is doing its job...

2017 Ethics of Predictive Cyber Security

March 16, 2017 by The GTech Marketing Team

Predictive cyber security refers to the application of stochastic models to the cognitive analytics of safeguarding computerized information. Stochastic programming bases decisions on probability distributions, probabilistic decisions, and the optimization of random variables, but artificial intelligence dominated Dell's 2017 RSA cyber security conference. Artificial intelligence refers to the human aspects of intelligence...

Improving Cybersecurity for Weapons

March 14, 2017 by The GTech Marketing Team

Recently, Congress introduced the State Cyber Resiliency Act to better protect governments from cyber threats. In a past research brief, the RAND Corporation expressed that current policies are unsuitable for the complex and unpredictable reality of the cybersecurity environment. Peter Singer, strategist and senior fellow at the New America Foundation, believes that technology offers benefits and vulnerabilities...

In 2014, a report by the Government Accountability Office (GAO) revealed that of the 24 major federal agencies, 2 have comprehensive policies that define roles and authority for managing software license agreements, 18 have policies that are not comprehensive, and 4 have not implemented policies...

DOI Data Center Security and Chinese Cyber Espionage

March 6, 2017 by The GTech Operations Team

In 2015, federal data security was severely compromised when hackers obtained unauthorized access to Office of Personnel Management (OPM) records from host servers at a Department of Interior center. The NYT reports that the breach exposed the personnel data of 21.5 million federal employees...

Testing the Navy's New UAV Software

March 2, 2017 by The GTech Marketing Team

The Navy tested its new unmanned aerial vehicle UAV software in a "simulated beyond visual range combat scenario" (BVR). The purpose of the exercise was to see how the software worked with existing drone technology...

In 2015, the Precision Medicine Initiative (PMI) was introduced to the country as a way to "generate the scientific evidence needed to move the concept of precision medicine into clinical practice." The overarching idea is to personalize medicine by using large health data sets to more specifically categorize the inner workings of diseases and other health conditions in order to tailor treatment to the individual instead of using a singular...

To say that the transition to a new administration has been a bit of a bumpy ride may be the understatement of the year. As with any major change of this nature, whether from liberal to conservative or vice versa, few departments are spared from at least moderate upheaval...

The National Background Investigations Bureau (NBIB) replaced the Federal Investigative Services department in October of 2016 but has yet to make a full transition...