Civil Rights Group Challenges NSA Phone Surveillance Program
I appreciated the opportunity to comment on this important national security issue – Civil Rights Group Challenges NSA Phone Surveillance Program
I appreciated the opportunity to comment on this important national security issue – Civil Rights Group Challenges NSA Phone Surveillance Program
By Bob Gourley AFCEA continues to help facilitate dialog on issues of importance to the nation regarding technology and national security. An event I believe you will find of high interest is their July 30-31 2013 Global Intelligence Forum. I have pasted information below from their site including a list of speakers. AFCEA events almostRead… Read more »
Last Friday, the Office of eDiplomacy within the State Department’s Bureau of Information Resource Management held its Tech@State conference on the theme of Moneyball Diplomacy. The event centered on how emerging tools and practices in data analysis can add a valuable quantitative lens to approaches in U.S. foreign development and policy. My favorite speaker wasRead… Read more »
We are excited to invite you all to join us for a free conference call being hosted by our partners at CommunityMatters® and the Citizens’ Institute on Rural Design on Thursday, June 20th from 3:00 to 4:00 pm Eastern. The call will feature Amy Frykman from Resource Media and Fran Stoddard of the Orton FamilyRead… Read more »
By Ryan Kamauff Here are the top cyber news and stories of the day. Coasties don’t want expensive TISCOM laptops – According to a recent DHS audit, the Coast Guard is sitting on over 5,000 laptops in Coast Guard Telecommunications and Information Systems Command warehouses. These laptops, many of which are over 3 years old,Read… Read more »
By Bob Gourley Systems Integrators must put quality first or they will fail. Every integrator I know has processes in place to ensure program success. The best include rigorous reviews early in program life to help program managers succeed. Rigorous review processes check program documentation, personnel training, schedules, budgets, risks, and overall plans. Reviews alsoRead… Read more »
Proving once again the awesomeness of Twitter, Facebook bit the bullet on hashtags and rolled them out to some users this week. Rumors of Facebook hashtags began to circulate in March, but now that they’re finally here we will begin to see whether they enhance user experience and functionality on Facebook, or indicate that FacebookRead… Read more »
I’m going to try something new out today. I’m not going to tell you that this is a tried and true method I’ve used to maintain a healthy network or that this has led to me being a happier or more successful person because I’ve never tried this before. All I know is I wasRead… Read more »
How you respond to the impacts of Federal sequestration on ongoing projects will be at least partly determined by how “mature” your project management practices are. Gartner’s PPM Maturity Model is useful to review here. Gartner describes 5 levels of “maturity, with 1 being low and 5 being high: Level 1: Reactive Level 2: EmergingRead… Read more »
I have a piece up on TechPresident about some crazy regulations that took place in Florida that put citizens at greater risk all so the state and local governments can make more money. Here’s a chunk: In effect, what the state of Florida is saying is that a $20 million increase in revenue is worthRead… Read more »