bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
2:56 pm, October 21, 2014

Search Result

Search Tags:  technology

Navy joins effort to track moving oil slick in the Gulf

The Naval Oceanographic Office has deployed sensor systems to monitor surface currents and measure physical properties of the deeper Gulf waters.

Tags: Must Reads , DorobekInsider , Navy

Tuesday - 06/01/2010, 03:03pm EDT

DHS promotes tech from workbench to market

In speech after speech, officials talk about the need for government and industry to work together to solve cybersecurity challenges. But for the past five years, a government-industry partnership has actually been making good on the promise of collaboration in the cybersecurity arena.

Tags: Cybersecurity Update , ISC2 , Security Innovation Network , Robert Rodriguez , DHS , Doug Maughan , Ironkey , Microsoft , McAfee , Max Cacas

Tuesday - 06/01/2010, 12:56pm EDT
Listen

How, and why, to modernize the legacy of COBOL

An estimated 80% of the world's business ran on COBOL by 1997, but it might be time for your agency to explore some options. ResQSofts' Tom Bragg explains.

Tags: Federal Drive , COBOL , ResQSoft , Tom Bragg , Dorothy Ramienski

Tuesday - 06/01/2010, 09:31am EDT
Listen

New tool helps lift FAA collaboration

An online knowledge management system has led to better collaboration at the Federal Aviation Administration, according to a government official.

Tags: Collaboration Center , collaboration , Federal Aviation Administration , FAA , Aircrew Resource Center

Tuesday - 06/01/2010, 06:00am EDT

DOD Implements Suspicious Activity Reporting System

The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI's Joint Terrorism Task Force.

Tags: Meeting Mission Goals Through Technology , DoD , FBI , terrorism , security , Scott Carr

Monday - 05/31/2010, 11:52pm EDT

NOAA Ocean Observing System Improves Safety and Efficiency of Ships

A new ocean observing system from the National Oceanic and Atmospheric Administration now offers mariners free real-time information on water level, wind, and weather conditions for the Sabine-Neches Waterway of Beaumont and Port Arthur, Texas. The so-called PORTS system provides observations of tides, currents, water and air temperature, barometric pressure, and wind speed, gusts and direction through an easy-to-use Web portal and by phone. NOAA officials say the system will significantly reduce the risk of vessel groundings and increase the amount of cargo moved though the waterway by enabling mariners to safely use nearly every inch of a channel. The system also allows big ships to time their arrivals and departures more efficiently. There are 19 such other PORTS systems located throughout the nation. A new ocean observing system from the National Oceanic and Atmospheric Administration now offers mariners free real-time information on water level, wind, and weather conditions for the Sabine-Neches Waterway of Beaumont and Port Arthur, Texas. The so-called PORTS system provides observations of tides, currents, water and air temperature, barometric pressure, and wind speed, gusts and direction through an easy-to-use Web portal and by phone. NOAA officials say the system will significantly reduce the risk of vessel groundings and increase the amount of cargo moved though the waterway by enabling mariners to safely use nearly every inch of a channel. The system also allows big ships to time their arrivals and departures more efficiently. There are 19 such other PORTS systems located throughout the nation.

Tags: Meeting Mission Goals Through Technology , NOAA , Scott Carr

Monday - 05/31/2010, 11:49pm EDT

FDA and NIH Launch Electronic Safety Reporting Portal

The Food and Drug Administration and the National Institutes of Health have launched a new Web site that, when fully developed, will provide a mechanism for the reporting of pre- and post-market safety data to the federal government. Currently, the Web site can be used to report safety problems related to foods, including animal feed, as well as adverse events that might happen in relation to human gene transfer trials. Consumers can also use the site to report problems with pet foods and pet treats. The new site, called the Safety Reporting Portal, is meant to provide greater and easier access to online reporting. FDA officials say it's a first step toward a common electronic reporting system that will offer one-stop shopping, allowing people to file a single report that may be of interest to several agencies.

Tags: Meeting Mission Goals Through Technology , FDA , NIH , Scott Carr

Monday - 05/31/2010, 11:49pm EDT

How to Jumpstart Your Desktop Virtualization Initiative

June 16th

According to Forester, desktop virtualization is no longer a trend; it's the future of the PC. The question now facing federal IT managers is no longer whether or not to virtualization, but which approach best accommodates both end-users' demands and IT's need for greater manageability and security. Federal agencies are already reaping the benefits of desktop virtualization, effectively delivering anytime, anywhere computing to an increasingly mobile and distant workforce. They're significantly reducing TCO, lowering energy consumption to sustain Green IT initiatives, creating a more agile infrastructure and opening the way for cloud computing. But for many the explosion of new virtualization technologies seems overwhelming. How do you make sense of the changing desktop landscape, and arrive at a solution that boosts workforce productivity while improving management efficiencies? Where do you get started?

Tags: Virtualization , GTSI , HP , Microsoft , Citrix , ITT , Tom Temin , Susie Adams , Miguel Sian , David Smith , Dennis Tolliver

Monday - 05/31/2010, 10:42pm EDT
Listen

Identification Technology and Citizen Privacy

June 15th

The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver's licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.

Tags: Center for Innovation in Government , Identification , privacy , security , Unisys , Mark Cohn , Bryan Ichikawa , Dr. Larry Ponemon , Ponemon Institute

Monday - 05/31/2010, 09:14pm EDT
Listen

Don't Let Tab-Nappers Catch You Napping

Dubbed tab-napping, a new type of attack has been using Java script to secretly change the content of open, but idle, tabbed browser windows.

Even hours after opening them, users may see familiar-looking log-in windows for their online shopping or e-mail accounts. But, credential information used to log-on may actually be sent to hackers. Analysts caution, all of the major browsers for Windows 7 and Mac Operating Systems are potentially vulnerable.

Tags: Cybersecurity Report , cybersecurity , Scott Carr

Monday - 05/31/2010, 07:55pm EDT
  •  
  • 565
  •