Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Under sequestration, technology research has suffered disproportionately in the Defense Department. Leaders say those limited dollars need to be focused on making systems more affordable and taking advantage of commercial sector advancements.
New data from Govini, a market research firm, finds the number of lowest price, technically acceptable awards doubled from 2009 to 2013. Vendors also are seeing more and more agencies issue solicitations where price is the only or a major evaluation criterion. DoD, civilian agency official acquisition officials say LPTA is one tool in a large toolbox.
A self-described "hacktivist" will spend 10 years in prison for illegally accessing computer systems of law enforcement agencies and government contractors. Before hearing his sentence, an unrepentant Jeremy Hammond told a federal judge that his goal was to expose injustices by the private intelligence industry when he joined forces with Anonymous. "Yes I broke the law, but I believe sometimes laws must be broken in order to make room for change," he said. The Chicago computer whiz and college dropout insisted his hacking days are over but added, "I still believe in hacktivism as a form of civil disobedience."
Google is warning U.S. lawmakers that U.S. spying operations risk fracturing the open Internet into a "splinter net" that could hurt American business. In the first public testimony before Congress by a major technology company since former National Security Agency contractor Edward Snowden disclosed top secret surveillance programs, Google said it should be allowed to provide the public more information about government demands for user data.
After a Pentagon directive "with no escape clause" for all DoD components to migrate to a single email system, Navy and Marine Corps respond by studying the business case for doing so. Officials want to figure out the cost to move to the DISA-run service.
In this week's edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz in the acquisition and IT communities that you may have missed.
The Postal Service will kick off its pilot to provide identity management services in the cloud in early 2014. The IRS and DHS also are pursuing complimentary initiatives to authorize and authenticate users.
Dr. Theresa Cullen, chief medical informatics officer at the Veterans Health Administration, leads the program that allows the departments of Defense and Veterans Affairs to share data to improve the quality of health care they provide.
David Bray has been the FCC's chief information officer for about two months and already has six priorities to improve how the commission meets its mission.
November 14, 2013
The House Oversight and Government Reform Committee pressed federal Chief Information Officer Steve VanRoekel, federal Chief Technology Officer Todd Park, Department of Health and Human Services CIO Frank Baitman and Centers for Medicare and Medicaid Services deputy CIO Henry Chao to acknowledge the oversight failings, and for someone to declare they were in charge of the program.
The troubled HealthCare.gov website has been the subject of at least one attempted but unsuccessful cyber attack, according to one of the of the Homeland Security Department's top cyber officials. Lawmakers at a House Homeland Security Committee hearing said the consolidation of personal information and the glitch-prone website are cause for concern.
Defense officials say shifting gears to build new systems with a focus on open architecture is a challenge. Even tougher is grafting open interfaces on systems that were designed to be closed and proprietary.
Dwight Gibbs and Scott Keough from Contraqer will discuss how their company can help you manage the process of acquiring technology.
November 12, 2013
The Government Accountability Office looked at two initiatives that are supposed to help get information technology spending under control. GAO found that both initiatives are coming up short.
The Defense Information Systems Agency said it doesn't expect the demand to be as great as initially thought as it developed a contract worth $450 million.
Rep. Darrell Issa (R-Calif.) is compelling federal CTO Todd Park show up Wednesday for a hearing before the Oversight and Government Reform Committee on the IT oversight problems of the HealthCare.gov website.
Sebelius: health care website needed couple of hundred fixes when repair effort began
Federal News Radio wants to know how the technology being used by federal agencies today is affecting federal employees, agencies and government contractors. Take our brief, anonymous survey. is conducting a survey on the use of technology at government agencies. as part of our research and measurement of the impact of technology on federal employees, agencies and government contractors. We will present our findings starting Nov. 19.
On this week's Capital Impact show, Bloomberg Government analysts will examine NIST's preliminary cybersecurity framework, and Google's lobbying efforts.
November 7, 2013
When it comes to cybersecurity, one of the biggest challenges is verifying the identity of the end user, whether it's for an e-commerce site, or a secure government database. The challenge is multiplied by the explosive growth in the use of mobile devices in both the public and private sector. On this edition of AFCEA Answers, we'll look at government efforts in the realm of identity assurance with Ken Gantt, Acting Deputy Director of the Office of Biometric Identity Management (OBIM) with the Department of Homeland Security. And, we'll examine the work of the multi-institution Center for Identity Technology Research (CITeR), delving into "next-generation" solutions for identity assurance, with its director, Dr. Stephanie Schuckers, a professor at Clarkson University in Pottsdam, NY.