Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Technology Special Reports
Two big forces are about to converge on the federal technology community. For the first time in 2014, agencies are expected to spend less on IT than the year before. For both government and industry that's a sea change, forcing everyone to think differently. Secondly, the government is about to reach a tipping point where the third generation of business computing will revolutionize how people work, who they work with, and how agencies buy and operate their IT infrastructure. Federal News Radio's special report, A New Era in Technology, delivers a field guide to program and acquisition managers about aligning spending, the IT infrastructure and the people skills needed to ensure success.
The Veterans Affairs Department is under pressure from Congress to improve its cybersecurity. A recent hearing found VA's networks have been breached several times by nation states. VA also has struggled to fix long-standing cyber vulnerabilities. Federal News Radio was first to report in June 2013 allegations that a former senior IT executive at the agency was bullied into signing deficient security certifications. All of this is leading lawmakers and others to ask, how safe is the data of more than 20 million veterans? We explore VA's cyber issues in our ongoing special report, VA Cyber Efforts in the Hot Seat.
The mobile revolution isn't new to many agencies. Laptops and BlackBerrys have been standard issue for many government executives for the last decade. What is different, however, is the widespread use of smartphones and tablet computers. Both agencies and citizens hold new and more immediate expectations, and the government must adapt to this technololgy. In our special report, Gov 3.0: It's Mobile, Federal News Radio explores how some agencies are meeting the demand internally and externally for mobile devices and apps. The challenge, like any new technology, is ensuring these devices actually help meet mission goals and don't become just another shiny toy.
Two events in 2006 changed the way federal agencies and contractors viewed and understood cybersecurity. In January, the Defense Department's Joint Task Force-Global Network Operations gave military services and DoD agencies six months to implement smart card readers for all computer systems and networks, and required employees to log onto those systems using their Common Access Cards. In May, an employee of the Veterans Affairs Department had a laptop stolen out of the trunk of his car containing the data on 26 million veterans.
The Obama administration launched TechStat in 2010 with the goal of fixing IT projects that were in trouble. As of December 2011, the Office of Management Budget said agencies ran 294 TechStat sessions, and from that saved or avoided spending $932 million. Those review sessions led to agencies stopping six programs and reducing the scope of four others. But over the last two-plus years, TechStat has evolved. Agencies now use the reviews to reinforce plans to fix troubled programs, to change the contracting model and to speed up the delivery of new functionalities.
Each host or computer on the Internet requires an Internet Protocol address in order to communicate. The growth of the Internet has created a need for more addresses than are possible with the current system, IPv4. Federal News Radio follows the government's implementation of IPv6.
The Smart Grid will completely overhaul our current electricity infrastructure. Some say it could completely change the world while others worry about security and privacy. Federal News Radio's Amy Morris takes an in-depth look at the Smart Grid - what it is and how it's being developed - in her week-long series, Smart Grid, Smart Future?
The series examines how the Homeland Security Department's Science and Technology Directorate advances through funding and other cutting-edge technology to address some of the biggest problems in the public sector.