Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Attackers uploaded malware-laden copies of popular apps, such as Angry Birds. While Google removed the apps from its online store, more than 14,000 users downloaded them.
Dan Saaty of Decision Lens joins host John Gilroy to discuss how prioritization software can help your agency.
December 13, 2011(Encore presentation December 27, 2011)
The high-profile issues of mobility and cloud computing are interconnected and reflect a shifting landscape not only at federal agencies but on a much wider scale, said EmeSec founder and CEO Maria Horton in an interview on Industry Chatter with Francis Rose.
The goal of the revised FIPS-201-2 will detail at a high level how agencies can integrate secure smart cards with mobile devices. NIST is considering five options for making HSPD-12 cards work with tablets and smart phones.
The bureau hired Agilex under a four-year, $6.4 million contract to provide application development and technical support for field workers to use tablet computers. Census field workers will receive one of three different tablets for conducting actual surveys for the bureau and other federal agencies.
Eight companies are headed to court over their use of Carrier IQ software, Computerworld reports. The lawsuit says the companies have violated federal wiretap laws because Carrier IQ's services, which provides analytics, are intrusive and infringe on users' privacy.
Phil Cirrulli, the chief information officer for the managing and operations contractor for the site, is improving the national lab's infrastructure to support widespread wireless access. He also is shutting down legacy mainframe systems after implementing a new ERP system.
December 1, 2011
Agency technology managers looking to implement a "bring-your-own-device" mobile strategy, should expect a culture shift along with the technological update said Rex Greer, the president of OVATION Wireless Management, and Richard Russell, the deputy of the Senior National Intelligence Service in an interview on In Depth with Francis Rose.
Bradley Anstis is the vice president of technical strategy at M86 Security, joined In Depth with Francis Rose to discuss the network threats, why the Android platform is an increasing target and what agencies can do protect themselves.
Host John Gilroy is joined by AirPatrol Corporation CTO Tom Kellermann. They will discuss how to control data leakage from mobile devices.
November 22, 2011
The Android operating system developed by Google is expected to win approval for use on military networks by April.
Host John Gilroy will talk cloud computing, health IT, and mobile technology with Tracey Graves-Stevens, President and CEO of Innoviss.
November 15, 2011
Jen Modarelli, CEO and principal of White Horse, has been studying federal government apps and joins In Depth with tips to make the most of mobile apps.
GPO's Chief Technology Officer Ric Davis talks about launching the agency's first mobile app. Users will be able to access information about members of Congress on their mobile devices.
Web 2.0 guru Steve Lunceford, joins host Mark Amtower to talk about how contractors are using, Twitter, LinkedIn and other social networking tools.
November 14, 2011
Darren Ash, deputy executive director of corporate management at the Nuclear Regulatory Commission, will talk about how the agency is using youtube and other social media.
November 8, 2011
Tim Hoechst is chief technology officer at Agilex.
A growing number of cyber criminals are targeting Android, iPhone and BlackBerry smartphones through apps. Even reputable apps have Trojan copies — which criminals can use to take over a phone, according to ProductReviews.net.
As MilCom conference gets underway, Roger Krone, president of Boeing Network and Space Systems, discusses challenges of taking broadband communications mobile.
A smartphone application — released by the Defense and Veterans Affairs Departments in the spring — leverages the power of mobile technology to help veterans better manage post-traumatic stress disorder.