Capitology Blog

Capitol hosts IEEE workshop on software-defined devices

December 31, 1969
Once, engineers talked about software-defined radios. Now many are talking about “software-defined everything.”
Read More

Considering a doctoral degree program? Attend a virtual information session!

December 31, 1969
It’s a major milestone in a professional career, demonstrating advanced expertise and credentials: a doctoral degree.
Read More

The “Digital Pearl Harbor” Has Happened. How Will You Respond?

December 31, 1969
By Dr. William Butler, Chair, Cybersecurity Program, Capitol Technology University
Read More

Faculty Profile: Eric Sabbah, PhD

December 31, 1969
Not many small children would willingly forego birthday parties, but that’s exactly what Eric Sabbah did in exchange for his first computer.
Read More

Capitol again earns recognition as military-friendly

December 31, 1969
The annual Military-Friendly Schools list is out, and Capitol Technology University is again on the list.
Read More

The Hope for Cactus-1

December 31, 1969
10…9…8…
Read More

At annual tournament, golfers showcase skills – and support Capitol students

December 31, 1969
Capitol Technology University is celebrating the tenth anniversary of its scholarship golf tournament this year, with the annual outing scheduled for October 16 at The Woodlands, in Windsor Mil
Read More

Capitol Scholars Program opens doors of opportunity

December 31, 1969
A STEM education yields opportunities and rewards, but not all students have the financial ability to pursue a degree in such fields.
Read More

A Match for Da Vinci?

December 31, 1969
As a former teacher in the Maryland public schools, I helped to administer the annual IQ tests to hundreds of children in my 14-year-career.  “Administered” is somewhat of a misnomer, because I simply monitored the 120 or so 4t
Read More

Meltdown and Spectre: What To Expect

December 31, 1969
It is not known whether Meltdown and Spectre, the two major security vulnerabilities announced on January 3, have been already exploited by hackers.
Read More