
In this episode, host Ken Miller talks with Dana Goward, president of the Resilient Navigation and Timing Foundation, about the pervasive reliance on GPS and other GNSS for everything from military targeting to financial transactions and everyday timing. Goward explains how GPS’s free, ultra‑precise timing signal has become a single point of failure, making civilian and defense systems vulnerable to jamming and spoofing, which are increasingly used in conflicts like Ukraine and by actors such as Iran. The discussion highlights the difficulty of detecting and mitigating interference, the lack of coordinated U.S. response infrastructure, and the need for alternative navigation, timing, and positioning solutions.

In this episode, senior fellow Jessica Rose discusses her forthcoming paper on the shortcomings of the U.S. Vaccine Adverse Event Reporting System (VAERS) and proposes a modernization framework. She highlights structural issues such as poor data quality, under‑reporting, lack of...

In this episode of the Tyler Tech Podcast, accounts payable specialist Holly Poole explains how Pickens County, Georgia transitioned from fragmented document‑management and accounting systems to a unified, cloud‑based ERP (ERP Pro) enhanced with AI‑driven invoice capture and AP automation. The new...

The episode examines President Trump's new President's Council of Advisors on Science and Technology (PCAST), which now includes tech titans like Mark Andreessen, Jensen Huang, Mark Zuckerberg, and Larry Ellison. Host Ed Elson and guest Liz Hoffman discuss how this...

The panel discussed how federal agencies are modernizing legacy IT systems to improve safety, efficiency, and resilience. Ankur Saini detailed the FMCSA’s new MODIS platform, a cloud‑based, one‑stop registration system that reduces fraud and streamlines trucking compliance. Rick Miner described...

In this episode, host Seth Holhouse talks with investigative journalist John Fleetwood about how governments use crises—first COVID‑19, now fuel shocks and the looming bird‑flu threat—to expand surveillance, enforce travel and fuel restrictions, and embed digital health certificates into permanent...

In this episode, Leah Wood and Nick Nader of ISOS Technology discuss modernizing fragmented federal IT Service Management (ITSM) environments using Atlassian’s Jira Service Management (JSM). They explain how legacy ITSM setups—often a patchwork of tools like ServiceNow, spreadsheets, and...

The episode explores the massive security breach known as Salt Typhoon, which gave China access to U.S. cellular networks, and discusses how the Navy and a startup called CAPE are building a resilient, secure mobile infrastructure that can operate over...

In this episode of the Wireless Threat Series, Adrian Sanabria and John Bundy examine the security and privacy implications of modern smart glasses, tracing their evolution from Google Glass to today's Meta Ray‑Ban and Oakley models. They categorize smart glasses...

In this episode, Adam Wormuth, CEO of Chariot Defense, and Army CTO Alex Miller discuss the critical "missing power layer" needed for modern, distributed electronic warfare. They explain how today’s soldiers rely on 30‑60 watts continuously, and how existing diesel...

In this episode of the Business of Government Hour, host Michael Keegan talks with Jason Wild, co‑author of *Genius at Scale*, about how leaders can drive innovation across organizational and sector boundaries. Wild explains the book’s ABC framework—Architects who build...

In this episode, Pat Tsen, Deputy Executive Director for Consumer Policy, Transportation, and Enforcement at the California Public Utilities Commission (CPUC), explains how the CPUC regulates autonomous vehicle (AV) passenger services, detailing the permit process, data collection requirements, and enforcement...

In this episode, former Uber executive Emil Michael, now a senior official at the Department of Defense, discusses the challenges of integrating AI into the world’s largest bureaucracy, the strategic push to back innovative defense startups, and the critical need...

In this inaugural episode of the Wireless Threat Detection series, Adrian Sanabria and John Bundy examine the security implications of smartwatches, highlighting how Wi‑Fi, Bluetooth, cellular, NFC and built‑in sensors expand the attack surface for both consumers and enterprises. They...

In this episode, host Chris interviews broadband veteran Doug Dawson to dissect recent industry shifts, including the Astound‑Google Fiber merger and New Mexico's new state‑level affordable connectivity program. They explore how consolidation drives economies of scale for fiber deployment, the...