bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
4:44 pm, November 26, 2014

Search Result

Search Tags:  Technology

FDA and NIH Launch Electronic Safety Reporting Portal

The Food and Drug Administration and the National Institutes of Health have launched a new Web site that, when fully developed, will provide a mechanism for the reporting of pre- and post-market safety data to the federal government. Currently, the Web site can be used to report safety problems related to foods, including animal feed, as well as adverse events that might happen in relation to human gene transfer trials. Consumers can also use the site to report problems with pet foods and pet treats. The new site, called the Safety Reporting Portal, is meant to provide greater and easier access to online reporting. FDA officials say it's a first step toward a common electronic reporting system that will offer one-stop shopping, allowing people to file a single report that may be of interest to several agencies.

Tags: technology , Meeting Mission Goals Through Technology , FDA , NIH , Scott Carr

Monday - 05/31/2010, 11:49pm EDT

How to Jumpstart Your Desktop Virtualization Initiative

June 16th

According to Forester, desktop virtualization is no longer a trend; it's the future of the PC. The question now facing federal IT managers is no longer whether or not to virtualization, but which approach best accommodates both end-users' demands and IT's need for greater manageability and security. Federal agencies are already reaping the benefits of desktop virtualization, effectively delivering anytime, anywhere computing to an increasingly mobile and distant workforce. They're significantly reducing TCO, lowering energy consumption to sustain Green IT initiatives, creating a more agile infrastructure and opening the way for cloud computing. But for many the explosion of new virtualization technologies seems overwhelming. How do you make sense of the changing desktop landscape, and arrive at a solution that boosts workforce productivity while improving management efficiencies? Where do you get started?

Tags: technology , Virtualization , GTSI , HP , Microsoft , Citrix , ITT , Tom Temin , Susie Adams , Miguel Sian , David Smith , Dennis Tolliver

Monday - 05/31/2010, 10:42pm EDT
Listen

Identification Technology and Citizen Privacy

June 15th

The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver's licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.

Tags: technology , Center for Innovation in Government , Identification , privacy , security , Unisys , Mark Cohn , Bryan Ichikawa , Dr. Larry Ponemon , Ponemon Institute

Monday - 05/31/2010, 09:14pm EDT
Listen

Don't Let Tab-Nappers Catch You Napping

Dubbed tab-napping, a new type of attack has been using Java script to secretly change the content of open, but idle, tabbed browser windows.

Even hours after opening them, users may see familiar-looking log-in windows for their online shopping or e-mail accounts. But, credential information used to log-on may actually be sent to hackers. Analysts caution, all of the major browsers for Windows 7 and Mac Operating Systems are potentially vulnerable.

Tags: technology , Cybersecurity Report , cybersecurity , Scott Carr

Monday - 05/31/2010, 07:55pm EDT

Scientist Infected with Computer Virus

A British scientist claims to be the first human to have been infected (so to speak) with a computer virus after he contaminated an electronic chip which was inserted into his hand. Dr Mark Gasson, of the University of Reading, says the device was programmed with a virus which could transfer itself to other electronic systems that it came in contact with, raising the possibility that in the future, advanced medical devices like pacemakers could become vulnerable to cyber attack.

Tags: technology , Cybersecurity Report , cybersecurity , Mark Gasson , University of Reading , Scott Carr

Monday - 05/31/2010, 07:52pm EDT

Homespun advice for the home office teleworker

A lot goes in to setting up an effective home office.

Tags: technology , TANDBERG Telework Center , telework , Cecelia Jernegan , Dorobek Insider , Suzanne Kubota

Monday - 05/31/2010, 07:40pm EDT

Feds, industry collaborate on cybersecurity

There's a government-industry partnership that's trying to make good on the need for collaboration in cybersecurity innovation.

Tags: technology , cybersecurity , Cybersecurity Update , ISC(2) , innovation , Max Cacas

Friday - 05/28/2010, 05:57pm EDT
Listen

Joint Chiefs: Cyber will change the way we fight

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider

Friday - 05/28/2010, 05:38pm EDT

Dynamics of federal cybersecurity management changing

Former e-gov administrators Karen Evans and Mark Forman give their insight as to how federal cybersecurity management is changing now that President Obama's 60 Day Cyber Security Review is over a year old. Is FISMA a thing of the past? Find out by reading more.

Tags: technology , management , cybersecurity , FISMA , cloud computing , GISRA , Karen Evans , Mark Forman , Francis Rose , Dorothy Ramienski

Friday - 05/28/2010, 05:07pm EDT
Listen

Software remembers passwords for you

Create one, then you're done! We get details from GCN lab director John Breeden.

Tags: technology , cybersecurity , Cybersecurity Update

Friday - 05/28/2010, 02:42pm EDT
Listen
  •  
  • 572
  •