bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
7:22 am, August 27, 2014

Search Result

Search Tags:  Federal Tech Talk

Handling business process management

Host John Gilroy is joined by Michael Beckley, chief technology officer, at Appian. They will talk about how business process management has changed and what you can do to stay ahead of those changes.
July 19, 2011(Encore presentation August 30, 2011),

Tags: contracting , business process management , cloud computing , enterprise architecture , collaboration , smart phones , Appian , Michael Beckley , iPhone , iPad , ipod touch , BlackBerry , Android , John Gilroy , mobile technology , tempo

Tuesday - 07/19/2011, 08:07pm EDT
Listen

Justice offers tips for transitioning to the cloud

When the Recovery Act passed, the Justice Department knew it would need to upgrade its IT infrastructure to keep up with the demand that was about to be placed on its systems. “We knew we could not support the transactions that would hit us, so we had to look at a solution,” said Angel Santa, [...]

Tags: Angel Santa , cloud computing , John Gilroy , Justice , Recovery Act

Sunday - 01/23/2011, 07:13pm EST

Recovery.gov discusses cloud success

In 2009, Recovery.gov was created as a way to follow the money being handed out through the American Recovery and Reinvestment Act. Michael Wood, director of Recovery.gov, told Federal News Radio using the cloud has been a major contributing factor to the website’s success, starting with the redesign of Recovery.gov. Amazon’s Elastic Compute Cloud was [...]

Tags: Amazon , cloud computing , John Gilroy , Michael Wood , RAT Board , Recovery.gov , transparency

Sunday - 12/19/2010, 08:27pm EST

Transparency and the SEC

This week, host John Gilroy talks with Mark Story of the SEC
September 7, 2010

Tags: John Gilroy , SEC , Mark Story , open government

Monday - 09/06/2010, 01:46pm EDT
Listen

Sending health information in a timely manner

Dr. Seth Foldy, director of the Public Health Informatics and Technology Program Office at the Centers for Disease Control, joins host John Gilroy to talk about distributing health information in a secure environment.
July 12, 2011

Tags: technology , Centers for Disease Control , dr. seth foldy , public health informatics and technology program o , public health , John Gilroy ,

Tuesday - 07/12/2011, 09:35pm EDT
Listen

Moving to the cloud

Host John Gilroy will talk cloud computing with Van Risau and David Blakenhorn, executives at DLT Solutions.
July 5, 2011

Tags: technology , cloud computing , dlt solutions , van ristu , van ristau , David Blankenhorn , data migration , data center consolidation , data loss , data privacy , sun microsystems , John Gilroy , ARMATURE

Tuesday - 07/05/2011, 07:23pm EDT
Listen

Making the transition to a mobile web environment

Gwynne Kostin, GSA's Director of the Mobile Office of Citzen Services and Sitework President and founder Tim McLaughlin join host John Gilroy to talk about emerging mobile technologies and how they can make your job easier.
June 28, 2011

Tags: technology , mobile technology , GSA , Siteworx , Gwynne Kostin , Tim McLaughlin , apps.gov , apps , HTML 5.O , Flash , John Gilroy , mobile devices

Tuesday - 06/28/2011, 07:25pm EDT
Listen

Breaking down enterprise data collection

Peter Smith, COO at American Systems joins host John Gilroy to talk about enterprise data collection.
June 21, 2011

Tags: technology , data management , John Gilroy , enterprise architecture , enterprise data collection

Wednesday - 06/22/2011, 01:22am EDT
Listen

Enterprise architecture at the Defense Department

Dennis Wisnosky, chief architect and CTO of the Defense Department's Business Mission Area, joins host John Gilroy to talk about data storage.
June 14, 2011

Tags: technology , data management , DoD , Dennis Wisnosky , Business Mission Area , John Gilroy , enterprise architecture

Tuesday - 06/14/2011, 08:57pm EDT
Listen

How to protect your agency's mobile devices from hackers

Host John Gilroy is joined by John Bordwine, public sector CTO at Symantec. They will discuss "Endpoint" security and how it applies to mobile technology.
June 7, 2011

Tags: technology , mobile technology , smart phones , iPads , endpoint security , encryption , two factor authentication , Symantec , John Bordwine , ARMATURE

Tuesday - 06/07/2011, 07:26pm EDT
Listen
  •  
  • 16
  •