Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Jared Serbu
Twenty-two commanding officers were removed from their positions in 2011. The offenses of relieved commanders run the gamut, and they run across all of the Navy's mission areas. The Navy wants its incoming commanders to be wary of the "intoxicating" aspects of leadership.
The Defense Department aims to spend $60 million in new procurements to sort out its data deluge. The Pentagon already spends $250 million annually on research projects under the heading of "big data."
Information sharing is critical but insufficient, White House cyber chief says. Howard Schmidt said the federal government's responsibility is broader than its own systems and that is why any cyber bill needs stronger oversight of critical networks.
A contest sponsored by the State Department mobilized people online to find and photograph three individual (fictional) criminal suspects in five global cities in just 12 hours.
The Defense Department says it's fast-tracking the construction of an infrastructure that will support future mobile devices in the military. A network that can securely support Apple and Android devices should be fully up and running by next year, while a secure app store will be online within a couple months.
Federal CIO Steven VanRoekel wants agencies to cut spending and invest in new capabilities at the same time. Savings from outdated or inefficient IT projects can be plowed into new innovations, he said.
Federal News Radio's Jared Serbu tagged along for a tour of the Navy's new Laboratory for Autonomous Systems Research, where robots get to interact with the real world without going outside the Beltway.
Sequestration would kill hundreds of thousands of defense industry jobs, the Pentagon warns. Frank Kendall told senators during his nomination hearing to be the DoD acquisition chief that personnel accounts would be shielded so lower-tiered contractors would feel the brunt of cuts.
The Army has released the implementation plan for how it will get its networked systems to a state it calls the "common operating environment." The strategy is designed to phase out stovepiped systems and begin building technologies to a common set of open standards.
Military services still struggle to track hazing incidents, but insist incidents that harm or demean servicemembers won't be tolerated.