While most people are familiar with 3D printing as something your engineer neighbor messes around with in their basement to produce small models, the applications of the technology can be much more significant than a hobbyist's weekend activity. The technology is being used in some mission critical and massive scale projects across government.
An early, small-scale application of 3D printing in the construction industry was recreating historical fixtures for renovations. Historical buildings, many of which house government agencies and government-run museums, have light fixtures, molding, door knobs, etc. that may need replacing. Finding actual replacements for centuries old materials is incredibly difficult and building them from traditional materials is time consuming and costly. 3D printing has proven to be a valuable solution to maintaining the historical look quickly and at a much reduced cost.Continue reading →
In-person events are back in force, but we're all a little rusty at networking. Anyone who has attended an in-person event recently has likely had the conversation with fellow attendees, "Wow, I'm not sure how to do this anymore." To help us all get back in our groove, we wanted to pull together a list of tried and true as well as some new tips to make your attendance at the next government networking event feel a bit more natural.Continue reading →
Today's organizations know that stopping 100% of cyber-attacks is not a realistic goal. Rather, the focus has shifted to cyber resilience, "the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources."
A critical pillar in becoming resilient is communication and collaboration. The Cyber EO focused on improving the nation's cybersecurity and highlighted the need to improve collaboration with threat intelligence sharing between public and private organizations as well as the creation of cross-government cyber boards. In recent months, key strides have been made in facilitating information sharing around cyber best practices, resource availability, as well as process and policy.Continue reading →