Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: National Defense University
National Defense University's iCollege professor Andy Gravatt explains the lessons on his course syllabus, from communication to risk management.
Harnessing the power of e-mail and the Web, STAR-TIDES has been working since 2007 to pull together some of the best minds in the world to help people and nations during times of natural disaster and crisis. Now, a National Defense University professor said the group is trying to overcome some geo-political limitations to its work.
The war of public opinion has invaded social media, and the Defense Department and other civilian agencies are coming out guns blazing.
Let's face it, meetings are a necessary evil for the federal workforce. But what if you could use a collaboration tool that lets you participate digitally? The next generation of virtual collaboration tools are almost the next best thing to being there.
Hear all about it during this installment of the Best of In Depth.
Professor at National Defense University teaches the basics of leadership to future government leaders.
Coast Guard wants to set up separate network to use social media sites. CIO Council looking at cybersecurity implications of these tools.
Prof. Robert Young
National Defense University
August 20, 2009