Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
FEDtalk What do you know about the 2020 Census? Tune in to FEDtalk this Friday, April 5 for a comprehensive discussion of the mission, planning, and execution of next year’s big count. Natalia Castro, Policy…
Working with UiPath, NASA set up four bots that automatically begin processing grant applications for the employees.
Federal agencies and components with as few as 100 employees face unique HR challenges due to limited staff and legacy software systems.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. When it comes to modern digital cables, like HDMI and USB, a cheap cable will work just as well, so do not waste…
Dana Laake and her special guest Dr. Patricia Webbink will discuss mindful eating.
This program will provide a progress report on big data in government.
By minimizing access to applications based on requirements of the specific user, Zero Trust security removes the need to rely on the traditional boundaries of a network perimeter.
Since its inception in 2013, the federal government’s Continuous Diagnostic and Mitigation program (CDM), led by the Department of Homeland Security, has helped agencies discover up to 50 percent more assets inside their systems than they were previously aware of. And they’re able to do it in real time.
This content is provided by BlackBerry In the movies, it’s easy: the federal agent answers his phone and receives a tip, then calls his wife and apologizes for missing dinner, then dials his boss and…
The Department of Homeland Security has worked with Congress to implement Continuous Diagnostic and Mitigation programs, commonly known as CDM. One variation on that approach is from the Defense Department with a concept of the Comply to Connect program, or C2C. Much confusion has ensued trying to understand the differences and applications of both concepts.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. What to do if you don’t trust the Wi-Fi networks in public places. Also, meet the unluckiest man in technology, who sold his share in Apple Computer far too soon.
Major breaches have created a sense of urgency around securing high-value assets (HVAs) in federal agencies. In May the Department of Homeland Security released binding operational directive (BOD) 18-02 requiring agencies to take new steps in identifying and mitigating the vulnerabilities in their own HVA systems. But agencies need to ask themselves first whether they have the right tools for the job.
Dr. Kevin Passero and his special guest Dr. Malisa Carullo will discuss nutritional formulas and tips for healthy aging.
What will government be in 2040? How will it operate? The IBM Center for The Business of Government convened a panel discussion envisioning government operations 20 years into the future. Join host Michael Keegan for a special edition of The Business of Government Hour as he explores the vision of government in 2040 and beyond.