Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Federal Drive
ManTech, a defense contractor, is looking to fill more than 400 jobs, many being moved as a result of BRAC.
Threats to employees top IRS challenges, IG: SSA facing IT management problems, EADS solicits for tanker facility designs
Randolph Hite with GAO says his experience over the last 30 years in looking at large-scale IT projects across more federal departments and agencies than I can name has shown that this self-evident truth has been long and widely recognized and adopted when it comes to how IT projects are developed or acquired.
The military's use of personal identifiable information places service members at a higher risk of identity theft than the population at large.
The National Institute of Standards and Technology and the Homeland Security Department's Science and Technology directorate are teaming up with the private sector to improve the cybersecurity of financial services.
At one conference, the Government Contract Management Conference, we learn about plans for a NEW conference from NASA's Joanne Woytek.
Between budget and acquisition reform, things are changing fast in procurement at the Defense Department. Dayton Aerospace's Gary Poleskey gives us his view.
The USPS OIG has completed a new report to determined if contracting officers issued letters to contracting officer's representatives detailing their responsibilities and limitations and if invoices were properly certified. To explain what the means for us is the Postal Service's Judy Leonhardt.
The Merit Systems Protection Board is well know for its workforce research studies, but how does it decide what to study? We learn more about it from MSPB's Laura Shugrue.
Issa to chair Oversight and Government Reform, Technology is good for federal recruitment, VA announces innovation challenge