Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: smart phones
The Supreme Court says smart phones are protected from police searches without a warrant because it's following the guidance of a federal agency. The Court turned to the National Institute of Standards and Technology to learn more about mobile technology. Supreme Court Justice John Roberts cites the NIST Guidelines on Mobile Device Forensics three times in the court's opinion. The Court learned police can just turn off a cellphone while it obtains a warrant to stop someone from destroying its records.
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Tags: technology , cloud computing , identity management , Jim Williams , Daon , Conor White , X factor , information technology , NIST , identity theft , passwords , mobile technology , face recognition technology , John Gilroy , Federal Tech Talk
Glenn Schoonover from Koolspan will discuss mobile security with host John Gilroy.
February 19, 2013
Tags: technology , mobile device management , mobile security , iPhone , Glenn Schoonover , Koolspan , micro SD card , encryption , mobile software , passwords , NIST , Federal Tech Talk , John Gilroy
Steven Sprague, CEO of Wave Systems joins host John Gilroy to talk about advanced password management and other IT issues.
November 20, 2012
Tags: technology , passwords , IT security , mobile devices , mobile security , iPads , Wave Systems , Steven Sprague , trusted platform module , embassy trust server , John Gilroy , Federal Tech Talk
Tony Ayaz, vice president of Federal for Splunk, joins host John Gilroy to talk about how his company can help you manage your log files.
February 28, 2012
Host John Gilroy is joined by Michael Beckley, chief technology officer, at Appian. They will talk about how business process management has changed and what you can do to stay ahead of those changes.
July 19, 2011(Encore presentation August 30, 2011),
Tags: contracting , business process management , cloud computing , enterprise architecture , collaboration , Appian , Michael Beckley , iPhone , iPad , ipod touch , BlackBerry , Android , John Gilroy , Federal Tech Talk , mobile technology , tempo
Host John Gilroy is joined by John Bordwine, public sector CTO at Symantec. They will discuss "Endpoint" security and how it applies to mobile technology.
June 7, 2011