Ep. 184 Managing Microservices in a Complex Federal Environment
Release Date: 10/08/2024
Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? A recent study showed that the federal government has identified 1700 use cases for Artificial Intelligence. Today, we examine some challenges and solutions for unlocking the power of AI represented in these examples. Our guest, Joel Krooswyk from GitLab, examines Software Bills of Material, repatriation, and what efficiency might look like in the future. SBOM. For years, software developers have recommended using a Software Bill of Material. Today, its value has become so apparent that it is...
info_outline Ep 210 Software Development and the Shift LeftFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? “Efficiency” seems like the new buzzword for federal technology in the next few years. When writing software sense, efficiency can mean writing code once and moving on to regular maintenance. However, we see security initiatives being mandated that cause developers to go back to previous stable systems and add code alterations to comply with new cyber threats. Even beginner efficiency experts will tell you the time and cost of operating in this manner can be expensive. Further, recording can add new...
info_outline Ep. 209 AI & and Proposal Development in 2025Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? People are getting comfortable with Generative AI and applying it to many business areas. This widespread adoption shows many of the weaknesses of individuals misusing technology. It is one thing to settle a baseball statistics argument with GenAI; another complete application when competing for a million-dollar federal contract that includes management of sensitive information. These include biased outputs, lack of creativity, and misinformation, to name a few. Today, we offer a solution. Vishwas Lele is...
info_outline Ep 208 Innovation with OSCAL, Federal Cloud, and ComplianceFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Everyone reading this knows that April 15 is the dreaded day that one must pay federal income taxes. Big business has hordes of tax accountants and lawyers who do tax planning to accommodate federal deadlines. Sometimes, the deadline could be better known. Are you familiar with the OMB’s M-24-15? This will require companies to submit compliance information in a machine-readable format. Today, we sat down with Valinder Mangat from DRTConfidence. Valinder describes technology, deadlines, and approaches...
info_outline Ep 207 Federal Data, Fast Access, SecurityFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Ep 206 Federal Data, Fast Access, Security Connect to John Gilroy on LinkedIn Want to listen to other episodes? When it comes to technology, the founders of VAST Data can be described as “prescient.” In 2015, they looked at the problem of data management from a unique perspective. They did not want to call their company VAST “storage” but VAST “Data” because the problem they tried to solve was not the amount of storage but how to get instant and fast access to that data. The wave they rode was a combination of nVidia investing in graphic processing units and...
info_outline Ep 206 An Argument for Enterprise DesignFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Complex environments exist in commercial organizations and the federal government. In a typical fashion, humans resist change until an incident force restructuring. In this case, the change of design will be costly. During today’s interview, Nick Pesce says that today’s systems are burdened to such an extent that structural change should start now, when it is easy and less expensive, and then wait for an incident that will cause change. Both guests, Nick Pesce and Don Lamb, have experience in federal...
info_outline Ep 205 AI = Data + Compute + AlgorithmFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Cybersecurity professionals like to talk about data “at rest” and data “in transit.” They never mention how exactly this concept of “in transit” takes place. Once upon a time, in a data center far, far away, one could take a database and move it easily. Kind of like taking a suitcase in your car and driving across town. Today, federal agencies are deluged with so much data, is it more like dragging your entire house across town? Moving data today involves concepts like data tiring. This...
info_outline Ep 204 Understanding of the Landscape of Your NetworkFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? We all know that in 1492, Columbus sailed the ocean blue. A couple of years later, a map maker named Americo Vespucci made quite a splash with a new map. This has a direct parallel with today’s information technology. Columbus really did not “discover” anything—it was there all along. When you look at an enterprise system, be it a bank in Houston or a federal agency, you may have only a hint of what is on your network. Who knows what kind of “ghost IT” has been added to your system? It could be...
info_outline Ep 203 Dangers that Lurk inside Your PhoneFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? We have all heard that the phones we carry around have more computing power than was used in the Apollo moon mission. Breaking news: these powerful devices in our pockets are vulnerable to attacks of which we cannot dream. We can just pick up our phones and read the headlines. Brian Krebs reports federal charges against SMS attacks, Salt Typhoon getting into our phone systems, even the FBI telling us to use encryption on our phones. Today, we sat down with Jim Coyle from Lookout to unpack the concept of...
info_outline Ep 202 Innovation in Handling Complexities of AIFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Malicious actors are taking advantage of AI and the federal government. As a result, we are in a strange Wack-a-Mole game in which applying AI for defense has become so complex that each application seems to require specific skill sets. Today, we sit down with two leaders of NRLabs to discuss their unique approach to applied AI. NRLabs leverages the founders' diverse aerospace engineering and cybersecurity backgrounds to provide innovative solutions, including penetration testing and red team activities. ...
info_outline
John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
If you read federal mandates, “continuous monitoring” is becoming popular. If you type the phrase into Google Trends, you will see a drastic rise in the past five years.
However, very few people can detail ways to implement this noble policy.
Today, we sit down with Branden Wood from Tetrate to explore an option that can assist federal leaders in taking a strong step toward the elusive goal of Zero Trust and continuous monitoring.
The answer involves understanding something called the service mesh. This is a concept of a service layer whose entire purpose is to monitor communication between services in an application. Many benefits accrue from using this sophisticated form of communication.
For example, one can execute load balancing, encrypt data, and discover other running services. The discovery process may have the most impact on cybersecurity.
In today’s complicated software development world, automated processes may generate unexpected activity. Even an experienced software developer may not be able to recognize the impact of the code he has released.
Service mesh architecture begins with providing observability, reliability, and security in today’s large-scale microservices architecture.
During the interview, Branden Wood references Air Force’s Platform One as a federal organization that has embraced Tetrate to provide secure code in this increasingly dangerous world.