Interact with Highly Regarded Cyber Intelligence Professionals at AFCEA’s Global Intelligence Forum 30-31 July 2013

By Bob Gourley AFCEA continues to help facilitate dialog on issues of importance to the nation regarding technology and national security. An event I believe you will find of high interest is their July 30-31 2013 Global Intelligence Forum. I have pasted information below from their site including a list of speakers. AFCEA events almostRead… Read more »

Big Data Vocabulary: Datafication

Last Friday, the Office of eDiplomacy within the State Department’s Bureau of Information Resource Management held its Tech@State conference on the theme of Moneyball Diplomacy. The event centered on how emerging tools and practices in data analysis can add a valuable quantitative lens to approaches in U.S. foreign development and policy. My favorite speaker wasRead… Read more »

Upcoming Conference Call on “Spreading the Word”

We are excited to invite you all to join us for a free conference call being hosted by our partners at CommunityMatters® and the Citizens’ Institute on Rural Design on Thursday, June 20th from 3:00 to 4:00 pm Eastern. The call will feature Amy Frykman from Resource Media and Fran Stoddard of the Orton FamilyRead… Read more »

DISA collapsing wired networks, expanding wireless, Coasties don’t want expensive TISCOM laptops and more

By Ryan Kamauff Here are the top cyber news and stories of the day. Coasties don’t want expensive TISCOM laptops – According to a recent DHS audit, the Coast Guard is sitting on over 5,000 laptops in Coast Guard Telecommunications and Information Systems Command warehouses. These laptops, many of which are over 3 years old,Read… Read more »

PortfolioStat: Rigorous program reviews similar to system integrator best practices

By Bob Gourley Systems Integrators must put quality first or they will fail. Every integrator I know has processes in place to ensure program success. The best include rigorous reviews early in program life to help program managers succeed. Rigorous review processes check program documentation, personnel training, schedules, budgets, risks, and overall plans. Reviews alsoRead… Read more »

Facebook Attempts to Gain Cool Points With Roll-out of #Hashtags

Proving once again the awesomeness of Twitter, Facebook bit the bullet on hashtags and rolled them out to some users this week. Rumors of Facebook hashtags began to circulate in March, but now that they’re finally here we will begin to see whether they enhance user experience and functionality on Facebook, or indicate that FacebookRead… Read more »

What Traffic Lights Say About the Future of Regulation

I have a piece up on TechPresident about some crazy regulations that took place in Florida that put citizens at greater risk all so the state and local governments can make more money. Here’s a chunk: In effect, what the state of Florida is saying is that a $20 million increase in revenue is worthRead… Read more »

A New Approach to Cybersecurity Across Agencies – the Administration’s Progress Report

This article was originally posted by Dan Chenok on the IBM Center for the Business of Government blog. Last week, the Obama Administration released its latest set of reports on government performance toward achieving many high-priority goals, within and across agencies. As the Center has written previously, public presentation on this topic focuses on outcomesRead… Read more »