Technology

A different view of technology in defence

A different view of technology in defence

on 2:43 pm in April/May 2019, CAF, Featured Slider, Innovation, Recent Posts, Technology | 0 comments

In one of my first Tech Watch columns in Vanguard published in 2014, which came out after the announced changes to the previous Industrial Regional Benefits policy in Canada. The changes, which would incentivized defence contractors to focus investments in Canadian technologies that would contribute to Canada’s long-term technology objectives, caused me to be exuberant and idealistic about the...

read more

Connecting data with AI and analytics

Connecting data with AI and analytics

on 1:30 pm in Featured Slider, IT, Recent Posts, Technology | 0 comments

Recently, J. Richard Jones, Executive Editor of Vanguard spoke with Steve Bennett, Director, Global Government Practice at SAS on CGE Radio Show. CGE (Canadian Government Executive) is the sister publication of Vanguard that reaches senior public service executives in Canada. Steve Bennett is a thought leader in decision science and the application of analytics in Government. He has a...

read more

Key government digitization trends to be explored at executive conference

Key government digitization trends to be explored at executive conference

on 11:40 am in Featured Slider, IT, Leadership, Recent Posts, Technology | 0 comments

Service delivery, change management, performance measurement, big data, transparency, digital transformation, transportation, and innovation, are all important digitization buzzwords in government today. Canadian Government Executive, a sister publication of Vanguard, is hosting its CGE Leadership and TechGov Summit, a two-day conference designed with the aim to provide a deeper insight into these important pillars within government. The public sector...

read more

The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology

The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology

on 4:26 pm in Columnist Valarie Findlay, Cyber, Featured Slider, February/March 2019, Recent Posts, Technology | 0 comments

Fluid, agile and accessible – the malicious use of technology can range from simple, uncoordinated attacks to complex, highly coordinated persistence. Figuring as tool in the commission of a crime or as a delivery system to exploit many vectors, ‘technology for bad’ is not new, but what we have seen recently is – and it’s troubling. When mixed with...

read more

Practical lessons in ISS: A roundtable with PAL Aerospace, Peraton Canada, and Thales

Practical lessons in ISS: A roundtable with PAL Aerospace, Peraton Canada, and Thales

on 1:40 pm in Featured Slider, February/March 2019, In Service Support, Procurement, Recent Posts, Technology | 0 comments

I founded OMX in 2012 as a collaborative platform to access opportunities at every stage of the procurement process. For most people, “procurement” simply means acquiring or building something. But for those of us in the defence sector, procurement extends to maintenance and upkeep – both in terms of physical parts and the training required to service the program....

read more

Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity

Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity

on 9:59 am in Columnist Valarie Findlay, Featured Slider, IT, Recent Posts, Technology | 0 comments

Whether it is a malicious attack or an inadvertent release on protected or classified data, a breach of government data can level a severe blow to integrity and reputation, leading to legal and legislative consequences that impact partners, allies and the public. For those reasons, cybersecurity and privacy practices for the protection of electronic information go hand-in-hand. The verification...

read more

How blockchain can strengthen the military supply chain

How blockchain can strengthen the military supply chain

on 3:07 pm in Dec/Jan 19, Featured Slider, Recent Posts, Technology, Transformation | 0 comments

It’s the stuff of nightmares: a counterfeit part makes its way into the military supply chain and is installed on a weapons system. This is discovered only after installation, upon failure of the weapons tests–or worse, in the field after a full weapons failure. How can such a scenario be prevented? Blockchain technology may be part of the solution....

read more

What Canada can learn from Israel and Estonia’s rise to cybersecurity royalty: It’s complicated

What Canada can learn from Israel and Estonia’s rise to cybersecurity royalty: It’s complicated

on 3:17 pm in Columnist Valarie Findlay, Cyber, Featured Slider, Recent Posts, Technology | 0 comments

A little over a year ago, I had the pleasure of presenting at CANARIE’s 2017 National Summit in Ottawa with my good friend, Roni Zehavi, CEO of Israel-based CyberSpark. A cross-section of scientists, practitioners, academics, entrepreneurs and professionals, the Summit showcased the interconnectedness of science, society and cyber–how it began, its evolutionary path, and what the future holds as this global convergence unfurls...

read more

Game Changer: Harry Page, President, Pleora Technologies

Game Changer: Harry Page, President, Pleora Technologies

on 1:48 pm in Featured Slider, Game Changers, Leadership, Recent Posts, Technology | 0 comments

Harry Page spent most of his professional life working in semiconductor and networking companies. “This has provided exposure to and awareness of how solutions can be built from the sensor up by combining the best elements of semiconductor, hardware, software and professional services to deliver compelling solutions to our customers’ applications and use cases,” he said. Harry Page, President,...

read more

Two critical factors in cyber mission assurance

Two critical factors in cyber mission assurance

on 12:02 pm in Command, Cyber, Featured Slider, Recent Posts, Technology | 0 comments

In the cyber domain, operating from the standpoint that everything is okay is a false assumption. With the daily increase of cyber attack capabilities and adversaries, the security of a nation is perpetually at risk. One way to mitigate such a risk is to have a cyber mission assurance program in place. Cyber mission assurance is basically a risk...

read more
Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Youtube