Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
Federal News Countdown: DoD cyber strategy and departing tech leaders
Friday - 7/15/2011, 5:00pm EDT
-Tim Hoechst, chief technology officer, Agilex
-Jason Miller, executive editor, Federal News Radio
Tim Hoechst's stories
#3 Evidence Suggests that the Internet Changes How We Remember
From Technology Review:
The flood of information available online with just a few clicks and finger-taps may be subtly changing the way we retain information, according to a new study. But this doesn't mean we're becoming less mentally agile or thoughtful, say the researchers involved. Instead, the change can be seen as a natural extension of the way we already rely upon social memory aids—like a friend who knows a particular subject inside out.
In January 1874, early feminist icon Susan B. Anthony petitioned Congress to remit a fine she'd received for illegally voting in the 1872 presidential election, 47 years before the 19th Amendment gave women the franchise.
Until recently, anyone hoping to read that petition would have been limited to a few scanned pages from the original document posted on the National Archives website or would have had to travel to Washington to take a look at the source document itself.
#1 Tech experts exit White House
When President Barack Obama took office, he brought with him a pack of technology advocates with impressive résumés and ambitious visions. They wanted to improve the government through the use of Internet tools and iPhone apps and help shape communications policy to expand broadband.
But the core group of techies that launched big initiatives has left the White House over the past six months, raising questions about what will become of the administration's technology-focused goals.
Jason Miller's stories
#3 Federal Protective Service struggles with new management tools
From Government Executive:
The long-troubled Federal Protective Service, which some consider a "stepchild" within the Homeland Security Department, has made little progress in improving training of building security guards and has not fully implemented management tools for tracking assignments, witnesses told a House panel Wednesday.
#2 Agencies slowly moving to fixed-price contracts
From Federal News Radio:
Agencies spent a billion dollars less on time-and-materials and labor hours type contracts last year.
The Office of Federal Procurement Policy sent a report to Congress Monday detailing the decline to $28 billion from $29 billion in 2009.
#1 DoD cyber strategy aims at deterrence
From Federal News Radio:
The Defense Department's new cyberspace strategy is not a manual for how the Pentagon will attack adversaries in cyber wars of the future.
Rather, the document, two years in the making and released Thursday, focuses almost entirely on defense, save for the reassertion - also proclaimed in the White House's recent international strategy for cyberspace - that the United States reserves the right to respond militarily to acts perpetrated through computer networks.