Capitology Blog

Radio: Still Essential After All These Years

February 13, 2019
Read More

Machine Learning: The Cost of Decisions

February 13, 2019
By Jason M. Pittman, DSc
Read More

Capitol Tech launches new doctoral program in aviation

February 12, 2019
Are you an aviation professional with sights set on a doctoral degree? Have you been unable to enroll in a PhD program due to time constraints or professional responsibilities?
Read More

What is it like to be an ethical hacker?

February 11, 2019
Cybersecurity professionals pursuing a career as an ethical hacker describe it as challenging but also rewarding and fun. Nathan Wray, an ethical hacker and Cybersecurity Professor at Capitol Tech, fills in some of the details.
Read More

Smart glasses and VR: Boeing engineer’s PhD research explores horizons in aviation industry tech

February 8, 2019
Read More

What is digital forensics?

February 6, 2019
Cybersecurity and cyber analytics professionals focusing on digital forensics careers investigate breaches and cyber-attacks using tools that capture data for analysis before it disappears.
Read More

Capitol Tech’s Project Aether team launches science payload into space

February 5, 2019
A student team from Capitol Technology University is back in the United States after its science payload was successfully flown into space aboard a rocket launched out of Andøya, Norway.
Read More

CapTech Talks: explore frontiers of data science with Dr. Herman Felder

February 1, 2019
What is data science, and where is it going?
Read More

Cybersecurity explained in five functions

January 31, 2019
The National Institute of Standards and Technology (NIST) defines “Five Functions of Cybersecurity” that should be used to manage cyber risks. Take a look and see what cybersecurity jobs are really about.
Read More

Report: training, education needed to address industrial cybersecurity threat

January 30, 2019
Industries across the United States, as well as power plants and other critical infrastructure, face a burgeoning security risk as more and more IP-enabled devices and features are incorporated into their operations.
Read More