Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
"Inside the DoD Reporter's Notebook" is a biweekly feature focused on news about the Defense Department and defense community, as gathered by Federal News Radio DoD Reporter Jared Serbu. In this week's notebook, Sgt. Maj. Rodney Harris, Army Cyber Command's senior enlisted adviser said the Army's new dedicated career branch for cyber specialties could be up and running as soon as October
Dr. Reginald Brothers, the new Homeland Security Department undersecretary for science and technology, wants to revamp DHS' S&T portfolio by making its research projects more relevant to end users, building more connective tissue between headquarters and DHS components and rebuilding workforce morale.
Gino Magnifico, the chief information officer of the Army Contracting Command, said the move to a zero-client setup for its desktop computers and the development of lighter weight apps to be used anywhere in the world is a direct result of having a mature cloud infrastructure.
After years of acquisition planning, bid protests and then eventually a rolling process of migrating users from one contract to another, the Navy says all of its users will have moved to its new NGEN contract by the end of this month.
On this week's Women of Washington radio show, Anne Altman, head of IBM Federal, joins hosts Gigi Schumm and Aileen Black to discuss how successful companies bring new talent into their organizations.
Shrinking agency budgets and the widespread use of cloud computing is starting to address a longstanding problem for agencies, Shadow IT. Shadow IT is when employees deploy hardware and software without the permission or knowledge of the agency's CIO. Federal News Radio's Executive Editor Jason Miller explained how agencies are starting to shine the light on this rogue IT on the Federal Drive with Tom Temin. Read Jason's related article.
NASA CIO Larry Sweet has mandated enterprise services first for all commodity IT. Other agencies, such as GSA and Interior, are trying to find the right balance between giving field offices latitude and rigid IT requirements.
Every day, one federal agency simultaneously serves the global intelligence needs of the American military, the U.S. Intelligence Community, and, increasingly, domestic first responders. In this episode of AFCEA Answers, Ellen McCarthy, chief operating officer of the National Geospatial-Intelligence Agency (NGA), discusses how "managing through portfolios" makes sense during a new era of intelligence challenges and fiscal restraint. We'll also discuss how links with industry and academia are driving mission-focused innovations, like NGA's "Map of the World". And McCarthy talks about educating and recruiting the next generation of NGA innovators.
These days, it's only a matter of time before the next data breach occurs. Just ask Home Depot, it could also be your agency. Hackers recently breached HealthCare.gov and installed malicious software. Although the attack took place in July, it took the Health and Human Services Department more than a month to detect it. Claire Giordano is a senior director at Quantum. She joined Tom Temin on the Federal Drive to explain how network forensics can play a critical role in protecting agencies' data.
Rebecca Halstead, president of the local chapter of the International Institute of Business Analysis and David Pradko, vice president of Finance for the IIBA, will how their organization can help your agency with its software development projects.
September 9, 2014
Veterans Affairs Secretary Bob McDonald has pledged to put veterans first at the department. Maureen Ellenberger is one of his warriors in the battle. As director of veterans relationship management at the Veterans Benefits Administration, she is trying to standardize the customer service that veterans receive and make sure their experiences are positive.
Despite news to the contrary, the Homeland Security Department has not picked a vendor to provide the CDM dashboard. This post is part of Jason Miller's Inside the Reporter's Notebook feature.
Inside the Reporter's Notebook: Labor, GSA forced to buy systems from bankrupt vendor; dashboard fever strikes DHS
Executive Editor Jason Miller shares news tidbits, strongly-sourced buzz, and other items of interest that have happened or are happening in the federal IT and acquisition communities. In this edition of "Inside the Reporter's Notebook," the OASIS contract gets a green light, and GSA's CFO moves into a new role.
Hackers break into HealthCare.gov but officials say no consumer data compromised
Energy Department CIO Bob Brese is leaving government after almost 35 years of service. He said now is the right time to hand off the reigns because Energy is about to embark on an IT consolidation and centralization initiative.
Drones may wind up the future weapon of choice in cyber attacks. Some cybersecurity analysts discover a cheap unmanned drone can be very effective at breaching wireless networks. Greg Rayburn is a security analyst for Fluke Networks. On In Depth with Francis Rose, he said there are many different scenarios where a drone can pose a major cyber threat to your agency.
President Barack Obama filled two positions on his technology team: Google executive Megan Smith as the new chief technology officer and former Twitter general counsel Alexander Macgillivray as the deputy CTO.
The Navy has built an unmanned undersea vehicle that mimics the motions of the fish it resembles. The robotic fish is packed with acoustic sensors and cameras. Navy developers hope it will carry out a range full of missions like undersea mine detection or prolonged surveillance of ships, ports and submarines. Capt. Jim Loper is the concepts and innovation department head at the Navy Warfare Development Command in Norfolk, Virginia. He joined Tom Temin on the Federal Drive with details on Robo Tuna.
The U.S. and its allies have dominated the military technology landscape for decades, but the Defense Department now sees potential adversaries in its rearview mirror. The Pentagon is coming up with some coping strategies to maintain its technological advantage, including version 3 of Better Buying Power.
On this week's Women of Washington radio show, Lockheed Martin's Sondra Barbour explains how she and women like her broke the glass ceiling in the private sector.