Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: IT
ACT-IAC offers recommendations for improving large-scale IT acquisitions.
October 20th, 2010 at 11 AM
The application of knowledge discovery within the cloud is immensely powerful, but not inbuilt. We are collectively moving past the question of "what is cloud computing", and swiftly moving towards "how does the cloud enable advanced analysis against massive volumes of data?" With industry and government leveraging multiple clouds, how do we successfully share and search large collections of data across systems, departments, and geographies? Organizations will continue to discuss and better understand the analytic power and economies of cloud computing, in the sense of data storage, sharing, and management; but we are quickly discovering that creating knowledge from data is more than just a discussion of technology. It's a discussion of what can be accomplished when massive data and cloud computing efficiencies combine to make advanced analysis and innovation possible.
Tags: technology , Booz Allen Distinguished Speaker Series , cloud , cloud computing , Michael Byrne , Jeff Jonas , David Mihelcic , DISA , Chris Nissen , Mike Olson , Cloudera , MITRE , IBM , FCC , big data , Massive Data , data management , analytics , Chris Kelly , data models ,
Under the contract, the company will develop interior designs, perform equipment needs assessments, relocations, equipment installation, maintenance and employee training for the Army Corps of Engineers.
Learn more from a recent report done by TheLadders
With new guidance from the Office of Management and Budget for federal computer networks regarding IPv6 compliance, what should federal chief information officers and network administrators be doing now to prepare their networks? Some advice from a network expert trying to help both industry and federal officials with the transition.
This week, Roger Baker, Chief Information Officer at the Veterans Affairs Department, talks with host Jason Miller about turning around IT processes within the agency.
September 30, 2010
Troubled IT projects are getting top-level attention. The kind of attention CIOs would like to avoid. Interior's CIO Bernard Mazer gives us a progress report.
When the Office of Management and Budget released its hit list of 26 late and over-budget IT projects this week, not only federal agencies were affected. Trey Hodgkins, vice president for national security and federal procurement policy at TechAmerica, joins the Federal Drive with some answers.
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , cyber , cyberspace , Michael Farber , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services
WFED's Jason Miller reports.