bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
2:35 am, December 20, 2014

Search Result

Search Tags:  Frank Konieczny

Moving Agency Applications to the Cloud with PaaS

There has been little discussion of open source and application rationalization over the years. But a growing acceptance of open source is giving agencies the reason to look more closely at how cloud, open source and application rationalization efforts can be better integrated.

Tags: Red Hat , Carahsoft , cloud , PaaS , Joel Jackson , Jason Miller , Daniel Massey

Tuesday - 10/28/2014, 01:57pm EDT

Cut, consolidate, modernize: A new mantra for Air Force apps

The Air Force needs to cut the number of applications it has on its network.

Tags: Air Force , application rationalization , platform-as-a-service , Red Hat , Carahsoft , Inside the Reporters Notebook , Jason Miller

Friday - 10/17/2014, 04:55pm EDT

The 2014 Big Picture on Cyber Security

Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity.

This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.

Tags: TIBCO , technology , cyber security , Rod Turk , Matt Quinn

Wednesday - 02/19/2014, 11:19am EST
Listen

The Data Privacy Imperative: Safeguarding Sensitive Data

This discussion explores how agencies are protecting sensitive data, reducing risk and curtailing the costs associated with data breaches while ensuring compliance with expanding government data privacy policies.

Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss.

Tags: Informatica , technology , data privacy , The Data Privacy Imperative , Richard Spires , Kimberley Williams

Thursday - 10/17/2013, 10:13am EDT
Listen

Defense Cloud Computing - "Progress & Best Practices" 2013

Listen Wednesday November 13th @ 12pm
Program will discuss the following: Progress Report on Defense Cloud Computing Initiatives, Key Benefits with Cloud Computing, Key Challenges to Overcome, Addressing Security Concerns in a Cloud Strategy Environment, Lessons Learned & Best Practices, and A Vision for The Future.

Tags: Trezza Media Group , defense cloud computing , Juniper Networks , McAfee , HP Enterprise , Gary Blohm , David Bennett , Tim LeMaster , Ken Kartsen , Patricia Tracey

Thursday - 10/24/2013, 02:59pm EDT

Air Force wrestling with how best to define an IT 'enterprise'

As service transitions to Air Force and DoD enterprise IT models, defining what technology services should be shared is still on the to-do list. The service's AFNet program is the umbrella effort to centrally-manage many commodity IT functions.

Tags: DoD , Air Force , enterprise services , technology , Essye Miller , David Uhrich , Jared Serbu , AFCEA DC

Thursday - 10/04/2012, 05:40am EDT
Listen

Mobility In Government - "Progress & Best Practices"

Listen July 24th at 12pm

Program will discuss Current Status and Progress Made in Mobility Technologies & Solutions, Best Practices & Benefits, Challenges or major hurdles to still overcome, Security Issues in Mobility, and a Vision for The Future

Tags: Jennifer Carter , Adina Pantella , Thomas Roland , Federal Executie Forum , technology , Oliver Friedrichs , David Smith

Monday - 07/23/2012, 06:58pm EDT
Listen
  • 1
  •