Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: In Depth
In Depth host Francis Rose gets analysis of the changes from Travis Sharp, research associate at the Center for a New American Security, and Danielle Pletka, vice president on Foreign and Defense Policy Studies at the American Enterprise Institute.
George Mason University researchers are calling on the government to declassify details about cyber threats. Jerry Brito is one of the researchers behind the call.
The Commission on Wartime Contracting in Iraq and Afghanistan is relying on the Government Accountability Office to offer actionable information about contracting in war zones.
Mackenzie Eaglen of the Heritage Foundation is here to offer some insight on the DoD-CIA swapping.
Pat Tamburrino is DoD's Chief Human Capital Officer. He's my guest to discuss how things are going for the Defense Department.
Command Sergeant Major Bernard C. McPherson, command sergeant major of PEO Soldier, explains how budget cuts will affect his organization's ability to fund research and development for the equipment needed by troops.
Some people think the agencies are "measured enough"and some think your agency is overmeasured.
The government's approach to cybersecurity is shifting from the historical emphasis on the hardware and network layers to a focus on securing software. The National Defense Authorization Act represents this change.
The recent crash of Amazon's cloud computing services has left a dark spot in the minds of some feds and contractors.
Martha Dorris, deputy associate administrator of the Office of Citizen Services at the General Services Administration, explains how her agency has used e-gov initiatives to improve the customer experience.