Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: Technology
Seven people were arrested in the U.S., accused of operating the New York cell of what prosecutors said was a network that carried out thefts at ATMs in 27 countries from Canada to Russia.
President Barack Obama issued an Executive Order and OMB released a new policy requiring agencies to make data machine-readable and use open standards. Agencies must develop an inventory of information and make it publicly available. Good government groups praised the changes but had some concerns around the administration's decision to apply the policy only to structured data.
Tags: technology , open data , Steve VanRoekel , OMB , Patrice McDermott , OpenTheGovernment.org , Digital Government Strategy , John Wonderlich , Sunlight Foundation , Kevin Richards , TechAmerica , Jason Miller
President Barack Obama issued a new policy and signed an Executive Order requiring data to be open, machine-readable and safeguarded.
Three Department of Homeland Security components are testing how ongoing authorizations work. The Office of Management and Budget is drafting a memo to require agencies to change from approving the cybersecurity of systems every three years to a more regular oversight schedule.
Tags: technology , DHS , Jeff Eisensmith , OMB , Coast Guard , Mark Powell , Larry DeNayer , Citizenship and Immigration Services , cybersecurity , continuous monitoring , ongoing authorizations , ACT-IAC , Jason Miller
Jose Domingos and Matthew Hughes from the Accreditation Commission for Health Care, join host John Gilroy to talk about how their company is helping federal agencies improve their healthcare services.
May 7, 2013
Tags: Matthew Hughes , accreditation , Accreditation Commission for Health Care , healthcare mandates , fiduciary responsibility , Centers for Medicare & Medicaid Services , Jose Jose Domingos , technology , Healthcare IT , John Gilroy , Federal Tech Talk , Centers for Medicare & Medicaid Services
As we near critical health policy deadlines, it is essential for the federal sector to understand how secure, interoperable health data exchange can improve the quality, cost-effectiveness, access, and safety of care. Laws, such as the Affordable Care Act, are influencing how IT must be harnessed by providers and payers in the public & private sectors.
The Homeland Security Department released a draft performance work statement to vendors. The draft PWS details DHS' needs to use HSPD-12 cards for computer network and building access.
The Pentagon's mobile plan includes device approvals that will involve some up-front costs. The expectation is those costs will be quickly offset by eliminating the inefficiency of the slow, stovepiped and outdated approaches that have characterized DoD mobility up until now.
On the one-year anniversary of the Digital Government Strategy, the CIO Council and DHS are expected to issue a security baseline and reference architecture for mobile computing. The goal of the document is not to give agencies new requirements but to focus on those security standards that are mobile-centric.
Tags: technology , TechAmerica , CIO survey , Simon Szykman , Commerce , Kevin Cox , CIO Council , Brian Teeple , DoD , mobile computing , cybersecurity , George DelPrete , Grant Thornton , Daren Ash , NRC , Jason Miller
On this week's Capital Impact show, Bloomberg Government analysts will examine the reasons for the shortage of skilled worker visas, and the differences between U.S. and European approaches to cybersecurity.
May 2, 2013
Tags: acquisition , technology , visas , H-1B visa , European Union , cybersecurity , Cybersecurity executive order , Allen Scott , Caroline Savello , Sanford Reback , Allan Holmes , Bloomberg Government , Capital Impact