The McHale Report Podcast
The Military Embedded Systems publications are the most complete resources for developers and integrators of embedded military systems. The Resource Guide, website, and the limited production magazine (this year mailed to 35,000 engineers, managers, decision makers, US DOD personnel, and other industry professionals) can be used as year-round resources for engineers, companies, and decision makers looking for embedded products ranging from software, development tools, hardware, systems, commercial off-the-shelf (COTS), technology insertion, end of life mitigation, and myriad other military-specific technical subjects
The McHale Report Podcast
Enabling network security in hostile environments
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Within Special Operations every solution starts with a nonnegotiable – cyber and security is never sacrificed for speed, because it doesn't really matter if the data moves fast but can't be trusted, said Peter O’Donoghue, CTO of Tyto Athene, during this SOF Week Show Daily version of the McHale Report Podcast. “Philosophically we believe that compromised intelligence is not intelligence at all,” he added. He and I covered how to enable network security in hostile environments and how artificial intelligence can help U.S. forces dominate the information space. We also discussed Tyto Athene’s TALON technology accelerator lab and how direct feedback from Special Operations Forces personnel aids in their system designs.