Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Federal Drive
Demand for vendor-furnished information security products and services by the U.S. federal government will increase from $8.6 billion in 2010 to $13.3 billion in 2015 at a compound annual growth rate (CAGR) of 9.1%. INPUT's John Slye explains why.
Several of the most promising technological research projects at University System of Maryland-related labs are getting a strategic infusion of federal cash to help them through the most difficult phase of development, and toward the commercial market. Maryland's Jacques Gansler explains.
Tags: DoD Report , UMd , Jacques Gansler , Center for Public Policy and Private Enterprise , Army , Maryland Proof of Concept Alliance , National Council for Entrepreneurial Technology Tr , technology , contracting
Computer networks and social networks depend on interaction between individuals -- whether it's individual machines or human beings. The science of these complex interactions shares some common underlying themes, and a team of Army researchers hopes that examining these networks will provide feasible solutions.
The Administration on Aging's Senior Medicare Patrol program has been awarded the National Health Care Anti-Fraud Association 2010 Excellence in Public Awareness Award. Kathy Greenlee, Assistant Secretary for Aging, Health and Human Services explains.
IBM has a new tool to spot security vulnerabilities even while they're being written.
There's more to making it through an office holiday party than just remembering to keep your clothes on. We get tips from The Creative Group's Barry Downs.
TSP returns were down last month. Pay freeze talk heats up. Certified Financial Planner Arthur Stein offers some advice.
The Senate has sent a stopgap spending bill to President Barack Obama that's needed to prevent a government shutdown. Negotiators in the lame-duck Congress now have two more weeks to try to pass a bill funding the government through September 30. Chuck Marr, with the Center for Budget and Policy Priorities, explains what's next.
Congress is now expected to pass whistleblower legislation that would give employees in the intelligence community a way to report corruption and waste. Attorney Debra Roth explains the ramifications.