Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: Federal Drive
"We want to protect the end user and we don't want them to care if it was antivirus or personal firewall; you want to protect them in a broader scheme," says ISCA Labs.
Defense revises contracting rule, Troops opting for liposuction over discharge, Army Knowledge Online gets Gutsy
The Pentagon, even while looking for ways to trim the budget and reduce deficit pressure, tells contractors profit margins should stay intact. We get details from Jim McAleese.
A bill passed by the U.S. Senate requires the Army to report whether graves at Arlington National Cemetery are correctly marked and come up with a plan to fix any errors that are found.
The U.S. Army has awarded Oshkosh $255 million to build 250 Mine Resistant Ambush Protected All-Terrain Vehicle (M-ATV) ambulances for Afghanistan.
Demand for vendor-furnished information security products and services by the U.S. federal government will increase from $8.6 billion in 2010 to $13.3 billion in 2015 at a compound annual growth rate (CAGR) of 9.1%. INPUT's John Slye explains why.
Several of the most promising technological research projects at University System of Maryland-related labs are getting a strategic infusion of federal cash to help them through the most difficult phase of development, and toward the commercial market. Maryland's Jacques Gansler explains.
Tags: DoD Report , UMd , Jacques Gansler , Center for Public Policy and Private Enterprise , Army , Maryland Proof of Concept Alliance , National Council for Entrepreneurial Technology Tr , technology , contracting
Computer networks and social networks depend on interaction between individuals -- whether it's individual machines or human beings. The science of these complex interactions shares some common underlying themes, and a team of Army researchers hopes that examining these networks will provide feasible solutions.
The Administration on Aging's Senior Medicare Patrol program has been awarded the National Health Care Anti-Fraud Association 2010 Excellence in Public Awareness Award. Kathy Greenlee, Assistant Secretary for Aging, Health and Human Services explains.