Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Google
Los Angeles considering moving e-mail and applications to cloud. Proposal triggers security, privacy alarms.
Service CIO Lt. Gen. Jeff Sorenson details how the Army will judge and award $30,000 in prize money to soldiers and civilian employees under the Apps for the Army program. Up to 100 contestants can submit apps in one of eight categories. The Army will announce the winners in August.
Representatives of two of the biggest players on apps.gov weigh in on cloud computing, how their companies will help the federal government and what's next in the cloud.
The Securities and Exchange Commission has released new guidance for how companies should disclose cyberattacks. The guidance comes after Sen. Jay Rockefeller asked the SEC to issue it, so companies would be compelled to reveal any cyberattacks that lead to losses.
Host John Gilroy is joined by John Booth, director of Web and New Media services at the Center for Medicare and Medicaid Service.
October 11, 2011
Tags: technology , mymedicare.gov , john booth , center for medicare and medicaid services , web design , data collection , Microsoft , electronic health record , Personal Heath Records , John Gilroy , Federal Tech Talk
Host John Gilroy is joined by Jon Booth, director of Web and New Media Services at the Center for Medicare and Medicaid services.
October 11, 2011
Tags: technology , mymedicare.gov , website design , jon booth , new media , center for medicare and medicaid services , Medicare , Medicaid , Microsoft , electronic health records , personal health record , John Gilroy , Federal Tech Talk
It should come as no surprise to you that terrorists and criminals are adapting to exploit different technologies to achieve its goals. Now we're hearing that international drug trafficking networks are using Google Earth to locate the roadblocks and security forces so as to avoid them. Algerian police say Al Qaida in the land of the Mahgreb actually bragged about in a web posting. Authorities around the world have also noted more reliance on technology such as blue tooth to carry out criminal and terrorist deeds.
The internet Giant said Wednesday it will reshoot all photos in Japan for its Street View service after residents complained the 360-degree panoramic images provided a view over the fences around their homes. The service has triggered privacy complaints around the world, including most recently in Greece, where y the way it is banned. The photos currently on the Web site were taken by cameras mounted on a stick attached to a car roof. But it has drawn complaints from individuals and institutions that have been photographed, including the Pentagon.
Microsoft has admitted that its Internet Explorer was a weak link in the recent attacks on Google's systems that originated in China; and Conficker still out there.
US Topo maps provide technical advantages that support faster, wider public distribution and enable basic, on-screen geographic analysis for all users.