Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Google
Los Angeles considering moving e-mail and applications to cloud. Proposal triggers security, privacy alarms.
Service CIO Lt. Gen. Jeff Sorenson details how the Army will judge and award $30,000 in prize money to soldiers and civilian employees under the Apps for the Army program. Up to 100 contestants can submit apps in one of eight categories. The Army will announce the winners in August.
Representatives of two of the biggest players on apps.gov weigh in on cloud computing, how their companies will help the federal government and what's next in the cloud.
The Securities and Exchange Commission has released new guidance for how companies should disclose cyberattacks. The guidance comes after Sen. Jay Rockefeller asked the SEC to issue it, so companies would be compelled to reveal any cyberattacks that lead to losses.
Host John Gilroy is joined by John Booth, director of Web and New Media services at the Center for Medicare and Medicaid Service.
October 11, 2011
Tags: technology , mymedicare.gov , john booth , center for medicare and medicaid services , web design , data collection , Microsoft , electronic health record , Personal Heath Records , John Gilroy , Federal Tech Talk
Host John Gilroy is joined by Jon Booth, director of Web and New Media Services at the Center for Medicare and Medicaid services.
October 11, 2011
Tags: technology , mymedicare.gov , website design , jon booth , new media , center for medicare and medicaid services , Medicare , Medicaid , Microsoft , electronic health records , personal health record , John Gilroy , Federal Tech Talk
It should come as no surprise to you that terrorists and criminals are adapting to exploit different technologies to achieve its goals. Now we're hearing that international drug trafficking networks are using Google Earth to locate the roadblocks and security forces so as to avoid them. Algerian police say Al Qaida in the land of the Mahgreb actually bragged about in a web posting. Authorities around the world have also noted more reliance on technology such as blue tooth to carry out criminal and terrorist deeds.
The internet Giant said Wednesday it will reshoot all photos in Japan for its Street View service after residents complained the 360-degree panoramic images provided a view over the fences around their homes. The service has triggered privacy complaints around the world, including most recently in Greece, where y the way it is banned. The photos currently on the Web site were taken by cameras mounted on a stick attached to a car roof. But it has drawn complaints from individuals and institutions that have been photographed, including the Pentagon.
Microsoft has admitted that its Internet Explorer was a weak link in the recent attacks on Google's systems that originated in China; and Conficker still out there.
US Topo maps provide technical advantages that support faster, wider public distribution and enable basic, on-screen geographic analysis for all users.