Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Amy Morris
WFED's Amy Morris continues to train for the Marine Corps Marathon coming up later this month.
Tags: Marine Corps Marathon
Federal News Radio's Amy Morris is training for the Marine Corps Marathon -- and finding that reaching the finish line is quite difficult.
The Smart Grid promises to transform the way we use and manage electricity.
You should be able to save power, save money, generate and store power for your own home, even sell power back to the utility... but when?
Scientists working on the Smart Grid say the promises are not only attainable, they're already underway.
80 percent of the electric grid is owned and operated by the private sector, but it's up to the federal government to get everyone updated, secure, and on the same page to make the Smart Grid a reality.
Security is a huge issue with the Smart Grid, but the threat doesn't come just from hackers, other nations, or even mother nature. Turns out, the Smart Grid relies very heavily on the GPS satellite system.
The Smart Grid is called that for many reasons. One reason: it will allow two-way communication between the consumer and the utility. That two way communication is just way too tempting for hackers, thieves and other criminals.