Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Watson, IBM\'s supercomputer, beat its human competitors on the game show.
RSA Security Conference in San Francisco debates the possibility of warfare moving in to the cyber realm.
Approximately $20 billion of the $80 billion the government spends on information technology is a potential target for migration to the cloud, according to the new Federal Cloud Computing Strategy. The document was released by federal Chief Information Officer Vivek Kundra February 8. According to estimates, the departments of Homeland Security and Treasury have the [...]
Josh Stephens, vice president of Technology and Head Geek for Solar Winds, told the DorobekINSIDER that agencies\' tech shops need to embrace the change - not avoid it.
Joint Chiefs Chairman Admiral Mike Mullen is asking for your questions and concerns about the Pentagon.
The Navy\'s cyber command will soon be able to see a real-time view of penetration attempts into the service\'s IT systems, the command\'s number two officer said Thursday.
The Office of the Director for National Intelligence has a new chief information officer - Al Tarasiuk.
Laura Bailyn, the new senior director health initiatives at the Markle Foundation, discusses the ways the foundation is trying to improve health IT worldwide.
OPM has completed a governmentwide cybersecurity survey to approximately 50,000 employees and their supervisors who handle cybersecurity as part of their daily job responsibilities.
GAO\'s biannual list includes 30 programs that are in trouble. House and Senate members promise to focus more of their attention on the initiatives most at risk. Members plan to use the model that worked for DoD and personnel security clearances in other problematic areas.
The technology behind the IBM supercomputer Watson beating human contestants on Jeopardy! could drive Gov 2.0 initiatives and help agencies deliver services more efficiently.
The National Strategy for Trusted Identities in Cyberspace has come under fire due to the possible government overreach and added bureaucracy.
The CD book disk with a secure operating system can convert a spyware-laden PC into a secure government machine.
The agency wants help from federal and industry partners to improve communications between the two. GSA said it has a large toolbox of resources agencies can build on to fit their specific missions. Vendors also should be on the lookout for several new contracts in the coming months.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.