Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: IT
Learn more from a recent report done by TheLadders
With new guidance from the Office of Management and Budget for federal computer networks regarding IPv6 compliance, what should federal chief information officers and network administrators be doing now to prepare their networks? Some advice from a network expert trying to help both industry and federal officials with the transition.
This week, Roger Baker, Chief Information Officer at the Veterans Affairs Department, talks with host Jason Miller about turning around IT processes within the agency.
September 30, 2010
Troubled IT projects are getting top-level attention. The kind of attention CIOs would like to avoid. Interior's CIO Bernard Mazer gives us a progress report.
When the Office of Management and Budget released its hit list of 26 late and over-budget IT projects this week, not only federal agencies were affected. Trey Hodgkins, vice president for national security and federal procurement policy at TechAmerica, joins the Federal Drive with some answers.
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , Cyber , cyberspace , Michael Farber , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services
WFED's Jason Miller reports.
Jeffrey Zients has been the federal chief performance officer for a little over a year now.
The Office of Management and Budget is taking aim at approximately 30 agency financial management modernization systems. Part of the new oversight is a Financial Systems Advisory Board made up of CFOs and CIOs across the government. The administration's goals are lower costs and improve performance by addressing long standing project problems.
A new study that finds 80-percent of I-T managers expect network-born threats to increase over the next year. Perhaps even more troubling, more than half of managers told netForensics their organization was not budgeting enough, or recruiting enough new talent, to counter any added cyber-threats. Almost 25-percent of respondents said they saw a decrease in staff size in the last year.
More than half of the managers polled did however say their organization was more secure now than it was a year ago.