Technology

  • The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.

    December 06, 2010
  • The added accreditation brings greater transparency security to the cloud, says the Microsoft blog.

    December 06, 2010
  • The BBC reports that Chinese officials orchestrated the hacking at Google earlier this year, according to WikiLeaks cables.

    December 06, 2010
  • December 9th, 2010 at 11:00AM The value of accessing, analyzing, and securely sharing health information is clear—the ability to confidently come together as a single community to do so is not. How health information exchange will facilitate individual mission priorities, while advancing a common vision of a unified health system, is a constant demand. Core issues such as privacy, security, and trust must be put in the right context to make informed decisions, make health information exchange possible, and improve the health and wellness of our nation. Realizing the Promise of Health Information Exchange: Have We Turned a Corner?, part of the Booz Allen Hamilton Expert Voices panel series, features top industry and federal health experts who understand the opportunities and challenges of Health Information Exchange.

    December 06, 2010
  • Demand for vendor-furnished information security products and services by the U.S. federal government will increase from $8.6 billion in 2010 to $13.3 billion in 2015 at a compound annual growth rate (CAGR) of 9.1%. INPUT\'s John Slye explains why.

    December 06, 2010
  • Computer networks and social networks depend on interaction between individuals -- whether it\'s individual machines or human beings. The science of these complex interactions shares some common underlying themes, and a team of Army researchers hopes that examining these networks will provide feasible solutions.

    December 06, 2010
  • Several of the most promising technological research projects at University System of Maryland-related labs are getting a strategic infusion of federal cash to help them through the most difficult phase of development, and toward the commercial market. Maryland\'s Jacques Gansler explains.

    December 06, 2010
  • IBM has a new tool to spot security vulnerabilities even while they\'re being written.

    December 06, 2010
  • The agency will implement e-mail in the cloud using Google Apps for Government under an almost $7 million deal with Unisys. Many agencies are paying attention to how GSA implements this technology. GSA\'s CIO or Unisys could not confirm whether the datacenter is located in the U.S.

    December 06, 2010
  • MACE program taking commercial technology and modifying it to make it more secure and rugged. The Army is asking for vendor ideas on how to do this and what apps are possible in theater.

    December 06, 2010
  • The incoming chairman of the House Oversight and Government Reform Committee doesn\'t find much good in the new telework act.

    December 03, 2010
  • The Army is developing technology for soldiers to use smart phones on the battlefield.

    December 03, 2010
  • A study by Poneman Institute estimates that $2 billion are lost each in lost laptops.

    December 03, 2010
  • Info Security reports that lost USB drives containing sensitive data are threatening cybersecurity.

    December 03, 2010

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.