Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
In the national and homeland security sectors, there are numerous resources and theory. But when it comes down to actually protecting the country in an ever-changing threat environment, how do professionals prepare for future risks?
GDIT’s Janek Claus, DevOps capability lead and Jay Olsen, director of application services discuss how the correct methodology can complete tasks quickly and with appropriate compliance.
Diversity and inclusion are a primary goal in all federal agencies. Guided by Management Directive 715 (MD-715), a set of guidelines provided by EEOC outlining how to implement equal employment opportunity programs under Section 717 of Title VII of the Civil Rights Act of 1964, agencies must report annually on the results of these efforts.
Why does U.S. Department of Defense lack of an auditable financial statement? What has DoD done to get to auditability? What challenges are faced in getting audited financial statement and how can DoD do better? Join host Michael Keegan as he explores these questions and more with Peter K. Levine of the Institute for Defense Analyses.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. How to turn VHS into MPEG. And we meet the mother of Voice over IP.
In this exclusive executive briefing, federal practitioners provide examples of the digital customer experience.
As the cyber workforce is stretched thin, the Open Organization model can help achieve the flexibility and innovation needed to address complex challenges.
With open season just around the corner, tune in to FEDtalk tomorrow to hear about some of your options as a federal employee when making benefits decisions and planning for your future. Host Jason Briefel will be joined by Joan Melanson of Long Term Care Partners and Joyce Warner of the Federal Employee Education and Assistance Fund (FEEA).
November 2, 2018
This content is provided by Jeskell Artificial intelligence (AI) has moved front and center as a consideration for federal agencies as they seek to enhance customer experience, improve mission delivery, and modernize their organizations. Use…
Dana Laake and her special guest Joshua Chernov will discuss fish oil absorption.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. How to set up a conference call on your iPhone. And we meet the father of computer graphics.
Even though 90 percent of cybersecurity threats are coming through email only a fraction of security budget are dedicated to securing email.
WiFi devices with WPS, WiFi range extender options, inkjet printer cartridge ripoff (HP and Epson), Profiles in IT (Jeremy Stoppelman, co-founder and CEO of Yelp), Apple watch not used to record Khashoggi killing, App of the Week (Be My Eyes), Idea of the Week (hurricane damage photos online), and all Apple user data can now be downloaded for review.
Ellen Sundra, the vice president of Americas systems engineering for ForeScout Technologies, said, like most cybersecurity decisions, agencies need to balance risk and reward when it comes to IoT devices.