Tag Archives: Analytics

TTEK to Supply Altana Trade’s AI-Based Risk Mgmt Platforms to Agencies; Chris Thibedeau Quoted

TTEK will distribute Altana Trade’s artificial intelligence-based risk management and data fusion platforms and services to government agencies around the globe under an alliance agreement. Altana Trade will integrate TTEK's risk management workflow software and analytics with its platforms in support of multinationals, logistics and financial services companies, TTEK said Monday.

Read More »

PSC Foundation Report Looks at State of Federal AI Adoption; AFS’ Dominic Delmolino Quoted

The Professional Services Council Foundation has issued a report that assesses the federal government’s adoption of artificial intelligence and identifies the opportunities and challenges agencies face when it comes to AI implementation. The report highlighted opportunities that AI offers to the government including reduction in backlog; optimization of resource allocation; accelerated decision making; fraud prevention; and extraction of insights from large amounts of data.

Read More »

GBC Surveys Agency Leaders on AI Adoption, Priorities; ViON’s Rob Davies Quoted

A Government Business Council report says only 22 percent of federal government leaders said their organizations are in the process of adopting artificial intelligence, Nextgov reported Monday. GBC partnered with ViON on the study, which was underwritten by Dell EMC and based on an online survey of 668 federal, civilian and military agency leaders and decision makers conducted in February and March.

Read More »

Raytheon’s Jon Check: Agency CISOs Should Advance Optimization to Make Cyber Budget Go Further

Jon Check, senior director of cyber protection solutions at Raytheon’s intelligence, information and services business, said agency chief information security officers seeking to make their cybersecurity funds stretch further should look at their priorities. Check wrote in a GCN article published Thursday that agency CISOs should assess their hiring approach and determine whether their cyber tools are updated and capable to address the current security threats.

Read More »