Cyber Frontiers

The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes – CF046

This Week on Cyber Frontiers Christian and Jim jump back into the world of machine learning and AI — a comprehensive conversation started on show 045 for those who missed it. We jump back in time to 1950 with the introduction of the Turing Test and walk us through its evolutions into modern AI and machine learning. We also discuss some of the recent cyber buzz with Gmail privacy concerns and new security features coming to iOS 12. Oh, and, fortnite players get excited about llamas too.  Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future!   Christian Johnson will bring fresh and relevant topics to the show based on the current work he does.
Continue Reading »
Cyber Frontiers

Difference between AI and ML, and How Does IoT Fit In Again? – CF045

This week on Cyber Frontiers Christian and Jim explore the commercialization of artificial intelligence and machine learning. We explain the overlapping use of terms that the buzzword industry has created and separate fact from fiction. As ML and AI continue to drive businesses and the next frontier of technological innovation, we explore how the buzzwords of the past five years (I’m looking at you big data and IoT) have paved the framework for the buzzwords of 2018 and beyond. We lay the framework for where the frontier is defined today so that we can dive deep in future episodes. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future!   Christian Johnson will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at Full show notes and video at Tags: Podcast, Cyber Frontiers, AI, ML, Artificial Intelligence, Machine Learning, Boston Dynamics, TDL, Internet of Things, Big Data, MapReduce, IoT, Relational Database, Algorithms,  Deep Learning, DL But first… Today’s Cyber Humor: What’s the difference between ML and AI Anyways? Why the Internet of Things is an Enabler for AI… Dissecting the amazing awe of Boston Dynamics: AI/ML tools: Machine Learning in Practice: Contact Christian: Contact the show at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

2018 Frontier Trends in Cybersecurity and Data Science – CF041

This week on Cyber Frontiers Jim and Christian discuss the upcoming predictions for where the cybersecurity and data science communities trend in 2018. What trends are new on the horizon, and which will only naturally accelerate trends already started? Will passwords finally bite the dust as MFA rules the day? Will AI march closer to the takeover of mankind? Will the repeal of net neutrality impact the way we consume the internet?  We talk technology trends that impact security, data, and the technologies that intersect along the way as the new year is ushered in. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future!   Christian Johnson will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at Full show notes and video at   Maplegrove Hosting Holiday Offer: Use promo code “JINGLE” for Maplegrove Hosting Web and Email bundle package for 10% off your order. Through the holiday season! Ends on 1/31/18. 2018 Trends: “The decline of password-only authentication will increase” “IoT compromises will get worse” Who was Actually Behind the Mirai Botnet? Minecraft fans! Worst Passwords of 2017: Where does Net Neutrality Head From Here? #7f0641603ac3 Crypto Currencies in Bank Reserves! Some forecast Android turning the tide on phone security… But new malware will physically destroy your device… Machine Learning and AI Trends in 2018:   Contact Christian: Contact the show at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Mobile Security Matters: Dissecting the Dangers of Mobile Malware – CF040

Christian is joined by Jim and special guest Kevin Schoonover to talk about mobile device security. Which predominant platforms are winning over consumer trust and adding value? What design and marketplace considerations should be factored in when buying a device that is reliable to use? What can the average guy do to better protect these increasingly valuable assets? We explore the evolution of cell phone security over the last generation of mobile device platforms, and dive into wearables and other devices that have empowered these sensor-filled devices to be far more palatable targets than desktops have ever been. From “built-in” malware out of the box to undetected intrusions – we explore the main threats to the mobile device industry for consumers and ways to get smart about locking down your phone. With final remarks on cyber crime statistics and the recent Uber bombshell revelation, we cover a lot of ground and bring it straight to you the listener. Desktop security is old news, long live mobile device security. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at Full show notes and video at Is my phone/tablet spying on me? Bought a tablet from China, never heard of the brand. Could it be gathering info and sending it back to China: Can I check to see if my device is sharing with people/sites that I do not know? Are there tools that the average guy could use to test for this? In the enterprise, Mobile Device Management tools are used to manage devices. Could they watch for this? In fact, some companies have made a living out of selling device spyware: ES File Explorer File Manager – sending “too much” network data? #1372891 Android A-Conventional Ways to Detect Malware: ~atif/ Malware Stories Discussed Prevention IoT devices are popping up everywhere. They talk over ZigBee, Z-Wave, BlueTooth and WiFi. Ultimately, these devices talk over my home network. As with tablets and phones how can I be sure these devices are not sharing with someone they should not be? Are they a hacking target? Is Network Access Control the answer? Could it ever be functional for the home user? Breaking News Segment On the day of recording, the press reveals Uber’s concealment of a major cyber attack by paying off hackers to keep quiet. Americans State Cybercrime is Their Top Crime Worry Contact Christian: Contact the show at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Home Gadget Geeks

HDC15 in Omaha, Data Innovation with Big Data, PowerShell Benefits and Graph Databases – HGG231

Listen Mobile:   We are live from the Heartland Developer Conference in Omaha, Nebraska or HDC15. Join Jim for show #231 of Home Gadget Geeks brought to you by the Average Guy Network, part of community. Please leave a REVIEW (iPhone or iPad) at ;type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: or if you are in Canada, use WANT TO SUBSCRIBE? Join us for the show live each Thursday at 8pmC/9E/1UTC at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at Matthew Renze – Renze Consulting Session Overview: As software grows more complex we need to manage this complexity by using various architectural patterns, practices, and principles. In this session, we will learn about several of these practices including the Hexagonal Architecture, the Onion Architecture, and the Screaming Architecture. In addition, we’ll also learn about DDD (Domain-driven Design) architectures, database-centric architectures, (CQRS) Command-Query Responsibility Separation, and more. You can expect to hear practical advice and see real-world examples from over 15 years of architectural experience.   Trevor Sullivan -Deliveron Consulting Services Session Overview: Are you a fan of dynamic languages and the PowerShell Adaptive Type System? If you’ve been using these features to build custom object types in PowerShell, you’ll certainly want to become familiar with the new support for user-defined classes in PowerShell version ! Come to this session to learn about building object models using PowerShell, syntax delivered by Microsoft MVP Trevor Sullivan!   Adrian Kosciak – Pariveda Solutions Session Overview: A connected world deserves a way of storing connected data. Lead by Facebook, Google, LinkedIn and other tech companies graph database popularity is exploding! Forrester predicts that 25% of all enterprises will be using them by 2017. We’ll provide everything you need to understand the full graph stack, exploring what they are, when to use them, and how to use them. Additionally, we’ll present industry trends, headlines, and cases that highlight their growth and value to our clients. We’ll wrap it up with a live demo of a graph db driven app built on Neo4j.   is powered by Maplegrove Partners web hosting. Get secure, reliable, high-speed hosting from people you know and trust. For more information visit Catch all the subscription links at Facebook Group: Jim’s Twitter: #!/jcollison Contact the show at Find this and other great Podcasts from the Average Guy Network at
Continue Reading »
Cyber Frontiers

Where is Big Data Headed Next on the Information Superhighway – CF021

This week on Cyber Frontiers Kevin Schoonover joins us again to cover part two of our series investigating how up and coming technologies are being incorporated into enterprise IT environments. In particular, we look at where we’ve been with data infrastructure in the last five years, and what the future holds in store. With discussions around the rapidly changing infrastructure and hardware design for data analytics, as well as the security and reliability of information that has become an increasingly valuable commodity, we quickly pick up where we left off in episode 20 for a jam packed hour of insight and conversation. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at Listen Mobile:   Hadoop has been good, but what is next? What about KROLL E-discovery division? Lexis/Nexis seem to be getting in the game? Are Cloudera, HortonWorks and Pivotal all locked on Hadoop? EMC made a big splash with GreenPlum: We will move from “big data” to firehose-sized signals processing HDFS/GFS had a focus on the JBOD cluster, these types of techniques will still be important for “archival” based big data. Signals processing will most certainly be all in-memory. Other topic, the impact of IoT on Big Data and intern programs for Data Scientists.   Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Cyber Legislation, Education, and A Healthy Dose of Realism with Special Guest Dr. Jim Purtilo – CF017

This week on Cyber Frontiers Christian, Ashton, and Jim catch up with Dr. Jim Purtilo (guest from Episode 3) to discuss historical and trending topics in cyber legislation, as well as many of the central issues surrounding cyber education in industry and academia. We explore some of the driving factors behind changes in mentality on where cyber legislation should be developed (and/or curtailed) – and where the disconnects are in understanding the current state of affairs in cyber legislation, education, and privacy matters that impact the average guy Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at Listen Mobile:     Announcements: Cyber Frontier Labs is now publishing security alerts for public consumption. These alerts are designed to help web hosts, security analysts, and industry protect their network and encourage threat intelligence sharing and information security research. Visit for more information on our latest alert from our Bro IDS system. Cyber Legislation The Patriot Act – How did it get us to the policy decisions we are making today? ;src=typd International Cooperation between Executive powers on cybersecurity matters. We’re not asking for back doors. We have – we believe in very clear front doors through legal processes that should help to keep our country safe. — Agree or disagree? New cybersecurity legislation on the horizon Cybersecurity is an inherently shared mission between the government and the private sector. No single agency within the government can undertake cybersecurity alone, but even more importantly, the federal government cannot address the cybersecurity threat by itself. We must truly collaborate with the private sector on many levels in order to make our cybersecurity efforts effective.  — Do you agree or disagree? Ask yourself: Why is the government seeking authorization to do something it already claims authority to do? What game changer technologies might influence our cyber legislation in the future? —Autonomous vehicles, drones, Flying the real planes – FAA legislation (or lack thereof) —Netflix (already in the works) w/ FCC —Virtual Reality? How to get messages to prisoners? (radio) This article really hits home on a topic we talk about throughout the show – does subverting encryption techniques really benefit us in the long run? After reading how they sent the secret message to soldiers using a radio commercial, the phrase “if there’s a will there’s a way” seems very applicable to the debate. Cyber Education —Why is this really important? —What are we teaching technologists about these types of issues? —What is the difference between a cyber guy and a Computer Scientist? —How do we define what cyber really is? Is cyber just the cool word on the block – and if so how does it compare/contrast to the scholastic goals of forming scholars in computer science? ( rational thinkers who can solve problems) Are people being trained to enter the workforce in cybersecurity being productized? –Historically Black Colleges receiving $25 million in funding as per new Cybersecurity policies   Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »