Nextgov's Critical Update explores the future of government technology. Each episode, we dive into how the government is using the latest tech and more importantly, you’ll hear from some of the people who are trying to make change possible.
don't worry if you don't have an account with us, we'll create one
[{"meta":{"author":"Critical Update","authorlink":""},"src":"https:\/\/traffic.libsyn.com\/secure\/ngcriticalupdate\/S15E04_CriticalUpdate.mp3?dest-id=683451","thumb":{"src":"https:\/\/images.lystnfm.com\/tr:n-app_thumbnail_medium\/podcastsnw-202303\/043df0-25ff-a6cb-28811c_800.jpg"},"title":"Critical Update: A Technical Farewell and the \u2018Emergiest\u2019 News of 2022","link":"javascript:;","id":"item-47902815"},{"meta":{"author":"Critical Update","authorlink":""},"src":"https:\/\/traffic.libsyn.com\/secure\/ngcriticalupdate\/S15E03_CriticalUpdate.mp3?dest-id=683451","thumb":{"src":"https:\/\/images.lystnfm.com\/tr:n-app_thumbnail_medium\/podcastsnw-202303\/043df0-25ff-a6cb-28811c_800.jpg"},"title":"Critical Update: Safeguarding Data From Outside Intrusion","link":"javascript:;","id":"item-45351723"},{"meta":{"author":"Critical Update","authorlink":""},"src":"https:\/\/traffic.libsyn.com\/secure\/ngcriticalupdate\/S15E02_CriticalUpdate.mp3?dest-id=683451","thumb":{"src":"https:\/\/images.lystnfm.com\/tr:n-app_thumbnail_medium\/podcastsnw-202303\/043df0-25ff-a6cb-28811c_800.jpg"},"title":"Critical Update: How Data Analytics and AI Algorithms Can Prioritize Trust","link":"javascript:;","id":"item-44155404"}]