Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Federal News Radio Archives
Comptroller General Gene Dodaro discusses government management and projects on the high-risk list.
Ron Sanders, formerly with the intelligence community, explains the challenges to telework and how to overcome them.
The study by ISC(2) found there's a severe gap in the skills needed for cybersecurity professionals.
RSA Security Conference in San Francisco debates the possibility of warfare moving in to the cyber realm.
Josh Stephens, vice president of Technology and Head Geek for Solar Winds, told the DorobekINSIDER that agencies' tech shops need to embrace the change - not avoid it.
Joint Chiefs Chairman Admiral Mike Mullen is asking for your questions and concerns about the Pentagon.
These are the stories Federal News Radio reporters are working on today.
Laura Bailyn, the new senior director health initiatives at the Markle Foundation, discusses the ways the foundation is trying to improve health IT worldwide.
The poll relates to two amendments in the House that are proposing a freeze on step increases under the General Schedule.
The technology behind the IBM supercomputer Watson beating human contestants on Jeopardy! could drive Gov 2.0 initiatives and help agencies deliver services more efficiently.
Budget expert Stephen Ryan explains the likelihood of a government shutdown as budget talks continue.
The National Strategy for Trusted Identities in Cyberspace has come under fire due to the possible government overreach and added bureaucracy.
CNN's Brian Todd discusses how protests have emerged in the Arab world.
Bob Childs, chancellor at the National Defense University's iCollege, describes the new program.
The CD book disk with a secure operating system can convert a spyware-laden PC into a secure government machine.
The top stories reporters are working on today.
The groups have launched a website, asking for public input in an effort to improve the acquisitions process between government and industry.