More stories

  • Fresh Insights into the NSA’s Cyber Capabilities

    It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American allies. A recent report from Russian researchers has provided more specific […] More

  • Cyber Attacks Likely to Increase (Part 2)

    The blurring lines between physical and cyber systems, accusations of data monitoring from Snowden revelations, and the the deluge of cyber attacks in 2014 have resulted in new levels of American interest in cybersecurity and digitalization. A few examples of this attention are the speculations around the implementation of Stuxnet, the government’s creation of Cyber […] More

  • Pew: Cyber Attacks Likely to Increase

    The blurring lines between physical and cyber systems, coverage of data monitoring from the Edward Snowden revelations, and the deluge of cyber attacks in 2014 have resulted in new levels of American interest in cybersecurity. A few examples of this attention are the speculations around the implementation of Stuxnet, the government’s creation of Cyber Command, and […] More

  • 2014 Analyst Forum: Cyber Security Panel Recap

    On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensive approach to investigating how we can better extract knowledge from information. See our overall event recap here The […] More

  • Photograph Leak Demonstrates Importance of Good Hygiene

    Over the Labor Day weekend, a heap of sensitive pictures of celebrities found their way onto online forums 4chan and Reddit, and the leak has since made headlines across the country. The Washington Post, The New York Times, and The Wall Street Journal have dedicated front-page links to the story, in a press wave that […] More

  • Data Analytics 2014: Jeff Jonas and the Advantages of More Data

    On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensive approach to investigating how we can better extract knowledge from information. The event was the 2014 Analyst […] More

  • UPS Data Breach

    Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far from over. In a recent report, the company actually lowered its earnings […] More

  • Pew Report: Robotics, A.I., and Jobs

    Scientists, programmers, and engineers work ceaselessly to develop improvements in robotics and artificial intelligence, which constitute some of the most impressive technological feats ever accomplished. Impressive personal assistants like Apple’s Siri and Microsoft’s Cortana can interpret voice commands, provide useful information, and even tell jokes, while incredible supercomputers like IBM’s Watson can make hypotheses and literally learn. […] More

  • Tesla Co-Founder Makes Surprising A. I. Comment

    Elon Musk, co-founder of Tesla Motors and SpaceX, is considered something of a visionary by many technologists. Few have failed to notice the recent rise of Tesla Motors – an auto company that has jumped into the public eye with its green technologies and commercial success. SpaceX, another of Musk’s projects, is another technological wonder, […] More

  • The Importance of Compatibility: Microsoft Shifting to Single Operating System

    We love technology trends at CTO Vision. Trends like user empowerment, the convergence of the cyber and physical worlds, enhanced cloud computing, advances in managing big data, and a persistent environment of cyber insecurity shape the present and future of technology in complex and consequential ways. One little discussed trend is the tendency of today’s […] More

  • App Usage Continues to Rise

    In the last few years, the potential for mobile productivity has increased dramatically. Sending emails, checking calendars, receiving important notifications, and surfing the web are no longer impressive mobile feats – they are commonplace. For most, the inability to conduct such tasks is more surprising than the ability to do so. Consumer and enterprise technology […] More

  • Net Threats: The Glut of Information

    Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “Net Threats”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security. The study targeted thousands of Internet experts to measure their thoughts and concerns about the future of the Internet. […] More

Load More
Congratulations. You've reached the end of the internet.