Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: IT
ACT-IAC offers recommendations for improving large-scale IT acquisitions.
October 20th, 2010 at 11 AM
The application of knowledge discovery within the cloud is immensely powerful, but not inbuilt. We are collectively moving past the question of "what is cloud computing", and swiftly moving towards "how does the cloud enable advanced analysis against massive volumes of data?" With industry and government leveraging multiple clouds, how do we successfully share and search large collections of data across systems, departments, and geographies? Organizations will continue to discuss and better understand the analytic power and economies of cloud computing, in the sense of data storage, sharing, and management; but we are quickly discovering that creating knowledge from data is more than just a discussion of technology. It's a discussion of what can be accomplished when massive data and cloud computing efficiencies combine to make advanced analysis and innovation possible.
Tags: technology , Booz Allen Distinguished Speaker Series , cloud , cloud computing , Michael Byrne , Jeff Jonas , David Mihelcic , DISA , Chris Nissen , Mike Olson , Cloudera , MITRE , IBM , FCC , big data , Massive Data , data management , analytics , Chris Kelly , data models ,
Under the contract, the company will develop interior designs, perform equipment needs assessments, relocations, equipment installation, maintenance and employee training for the Army Corps of Engineers.
Learn more from a recent report done by TheLadders
With new guidance from the Office of Management and Budget for federal computer networks regarding IPv6 compliance, what should federal chief information officers and network administrators be doing now to prepare their networks? Some advice from a network expert trying to help both industry and federal officials with the transition.
This week, Roger Baker, Chief Information Officer at the Veterans Affairs Department, talks with host Jason Miller about turning around IT processes within the agency.
September 30, 2010
Troubled IT projects are getting top-level attention. The kind of attention CIOs would like to avoid. Interior's CIO Bernard Mazer gives us a progress report.
When the Office of Management and Budget released its hit list of 26 late and over-budget IT projects this week, not only federal agencies were affected. Trey Hodgkins, vice president for national security and federal procurement policy at TechAmerica, joins the Federal Drive with some answers.
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , cyber , cyberspace , Michael Farber , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services
WFED's Jason Miller reports.