Tech

Government and Industry – Partnering to Procure Smarter and More Sustainable Products and Services

Government and Industry – Partnering to Procure Smarter and More Sustainable Products and Services Date of Event: April 12, 2012 Event Location: American Institute of Architects Event Time: 10:00 am (Registration Opens); 10:30 am – 12:00 pm (Program) Register Here: ACT-IAC GreenIT Panel Discussion Who should attend? Federal employees interested in: • Helping your organizationRead… Read more »

Mobile Gov Shifts + Prognostications

A quick video on trends in practices for agencies, shifts in agency aproaches and predictions about the Mobile Gov landscape from Gwynne Kostin, Director Mobile in GSA’s Office of Citizen Services and Innovative Technologies. Resources Get your thinking “unstuck” and check out the resources to help you smartly deliver anytime, anywhere, any device mobile infoRead… Read more »

GovBytes: At least 100 million compromised records in 2011 linked to hacktivism

Statistically, 2011 was the year of the hacktivist according to a Verizon report. The report, which analyzed 855 databreaches worldwide that occurred in 2011, concluded that more than 100 million of the 174 million records compromised was the work of hacktivists rather than those seeking profit. In contrast, only 3% of the attacks were traceableRead… Read more »

Risk management coming into focus for law enforcement

Law enforcement officials maintain a delicate relationship with the communities they protect. They must ensure the safety of citizens while also acting as a force for justice. As communities and law enforcement activities become more complex, officials are seeking out new ways to handle relationship management and avoid risk. CivSource spoke with Captain Mark LongRead… Read more »

Two British NATO troops killed in attack by shooter wearing Afghan army uniform

www.homelandsecuritynet.com KABUL — A gunman wearing an Afghan National Army uniform Monday turned his weapon against NATO troops in southern Afghanistan, killing two British soldiers. “The individual who opened fire was killed when coalition forces returned fire,” the International Security Assistance Force said in a statement. “A joint Afghan and ISAF team is investigating theRead… Read more »

Cybersecurity Track at FOSE – Register Today for Discount

I am looking forward to attending the FOSE Conference April 3-5 in Washington DC. This post kicks off a blog series highlighting the conference tracks. The five tracks for the event are Cybsecurity, Cloud and Virtualization, Mobile, Defense Innovations and Records and Information Management. Over the next week, I’ll highlight one of the tracks andRead… Read more »

On Becoming an IT Solution Architect – 5 Critical Practices

The Information Technology (IT) inventory of HR role and position labels is broad and deep. IT position descriptions may be closely associated with actual black box technology (like “Microsft Windows Server 2008 Administrator” or “Storage Area Network (SAN) Engineer”), or they may describe roles in a methodology-driven context required for IT success (“IT Project Manager”,Read… Read more »

Disaster Recovery and Business Continuity Planning During a Crisis

With so many new technologies at the disposal of IT departments to help during an emergency, IT departments need to be proactive while planning for natural disasters, outages, cyber –crime and a dozens of potential events that could jeopardize network accessibility. In a current white paper from Century Link, Century Link provides some insights asRead… Read more »