Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Federal Drive
Threats to employees top IRS challenges, IG: SSA facing IT management problems, EADS solicits for tanker facility designs
Randolph Hite with GAO says his experience over the last 30 years in looking at large-scale IT projects across more federal departments and agencies than I can name has shown that this self-evident truth has been long and widely recognized and adopted when it comes to how IT projects are developed or acquired.
The military's use of personal identifiable information places service members at a higher risk of identity theft than the population at large.
The National Institute of Standards and Technology and the Homeland Security Department's Science and Technology directorate are teaming up with the private sector to improve the cybersecurity of financial services.
At one conference, the Government Contract Management Conference, we learn about plans for a NEW conference from NASA's Joanne Woytek.
Between budget and acquisition reform, things are changing fast in procurement at the Defense Department. Dayton Aerospace's Gary Poleskey gives us his view.
The USPS OIG has completed a new report to determined if contracting officers issued letters to contracting officer's representatives detailing their responsibilities and limitations and if invoices were properly certified. To explain what the means for us is the Postal Service's Judy Leonhardt.
The Merit Systems Protection Board is well know for its workforce research studies, but how does it decide what to study? We learn more about it from MSPB's Laura Shugrue.
Issa to chair Oversight and Government Reform, Technology is good for federal recruitment, VA announces innovation challenge
GCMC is an annual conference which provides premier professional development and networking opportunities to the greatest minds in the contracting, acquisition, and procurement fields. We learn more from conference chair Terry Raney.