bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
5:11 am, July 30, 2014

Search Result

Search Tags:  Twitter

GAO uses Web 2.0

Tags: technology , Web 2.0 , government 2.0 , GAO , Gene Dodaro , Chuck Young

Friday - 07/10/2009, 03:14pm EDT
Listen

DoD and Web 2.0: A blogger's take

Tags: technology , Web 2.0 , Facebook , DoD , David Recordon

Wednesday - 08/19/2009, 05:03pm EDT
Listen

GSA signs agreement to let agencies use YouTube, Flickr, other Web 2.0 sites

The General Services Administration today announced completion of its long-awaited agreement to make it easier for agencies to use commercial social media tools.

Tags: technology , Paul Prouty , Martha Dorris , GSA , HUD , NASA , YouTube , Flickr , Vimeo , blip.tv , Web 2.0 , social networking

Wednesday - 03/25/2009, 01:19pm EDT
Listen

Social media in the public sector

Market Connections President and CEO Lisa Dezzuti joins host Mark Amtower to talk about how government and contractors are using social media to do their jobs.
October 10, 2011

Tags: technology , contracting , acquisition , Lisa Dezzutti , Market Connections , social media , Web 2.0 , Mark Amtower , Amtower Off Center , blogs , webinars , LinkedIn , Facebook , mobile technology

Monday - 10/10/2011, 10:17pm EDT
Listen

Bounty offered to cyber-bug hunters

Chrome offers $1,337 to help feed the geek inside.

Tags: Cybersecurity Update , cybersecurity , Google , Chrome , Chromium , CSIS , Kaspersky Lab

Monday - 02/01/2010, 08:34am EST

H1N1 inspires palm-vein biometrics

Palm-vein biometrics uses near-infrared light to capture palm-vein patterns in a person's hand, which serves as their identity to the systems. A user would hold his hand over a small scanning device attached to his computer that reads the pattern and matches it to a database of preregistered users. Unlike fingerprint scanning, palm vein is contactless, meaning the user doesn't touch any devices and risk leaving behind a "footprint" fingerprint that could be accessed or stolen.

Tags: Cybersecurity Update , cybersecurity , tech , Adobe , I Fund , Fujitsu , H1N1 ,

Monday - 12/21/2009, 08:36am EST

Wormy attack could spread via PDF

National Security cyberattack concerns are high, Report: China-based hackers stole India secrets

Tags: Cybersecurity Update , cybersecurity , security , Google , Yahoo , China , dali lama , Adobe , technology

Wednesday - 04/07/2010, 08:30am EDT
  •  
  • 6
  •