Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Fred Burton, a former Special Agent with the Department of State's Diplomatic Security Service, joins host Derrick Dortch for a discussion on congressional security.
January 28, 2011
Union membership has declined across the board in 2010 despite a substantial rise in public sector union workers compared to their private sector counterparts.
As the mission in Iraq winds down, a federal civilian effort increases. We get the latest details from Brig. Gen. Jeffrey Buchanan, spokesman for U.S. Forces in Iraq.
When it comes to reducing costs and wasteful spending at agencies, IT managers are being leaned on heavily to get the job done. The Navy is moving ahead with its technology efficiency and consolidation initiative by putting the brakes on spending for new servers, server upgrades and data centers. “We are reevaluating what all of [...]
Joint Chiefs Chairman addresses "our way forward in Afghanistan" for foreign media.
Several departments are out ahead of the OMB mandate to consolidate data facilities over the next four years. Energy is starting small to show business owners they will get the same level of service under the new setup. Other agencies see green in cutting back on the centers-both money and energy efficiency.
A preview of Federal Security Spotlight with HHS' Tom Shankweiler.
The collaborative tool is an example of how agencies can share information securely. Chris Bronk, a fellow for information technology policy at the James Baker Institute for Public Policy at Rice University, explains how Diplopedia works.
Agency's policy head discusses the first-ever four-year review of the Department's operations, future budgets.
The lawyer who represented the New York Times in the Pentagon Papers case writes about the differences between the two document leaks.
The Washington Post reports on the vast amount of data contained in Net-Centric, whether it belonged there or not.
The New York Times reports on U.S. diplomats' efforts to market U.S. items, such as jets, to foreign countries, revealed by the WikiLeaks cables.
With the report now completed, what changes are in store for the nation's development and diplomacy missions? Jon Allen and Cheryl Steele, senior associates at Booz Allen Hamilton share their insights
The company will provide engineering, security and operations and maintenance services under the Vanguard program. The 10-year contract is one piece of a larger IT consolidation effort State is in the middle of completing.
The State Department's Office of the Coordinator for Cyber Issues will focus on cybersecurity.
Secretary of State Hillary Rodham Clinton on Wednesday unveiled a reorganization plan for the State Department that include a new coordinator for cyber security.
The New York Times and the Economist report on the U.S. government's ability to keep a secret after the WikiLeaks dumps of classified information.
Lawmakers have urged President Obama to expand the State Department's cyber authority.
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that the WikiLeaks cable reveal locations that are of national security interest.