Safe-haven Design and Construction
A safe-haven is a structure or protected area, that provides protection from man-made or natural threats, for both short and long periods of time. It usually serves as a fall back position in case of emergencies. Effective design components; i.e., air requirements and waste management, capacity limits, use of electronic media and other technologies will be examined in detail.
Category Management: What the Federal G...
Category management is a tried and true practice within corporations all over the world. It is, however, new to the Federal government. As the public sector moves to implement category management, what can we learn from the private sector? How can category management make the government a better buyer and help suppliers at the same time. Join the Public Spend Forum and Michigan State University, along with OFFP Administrator Anne Rung and priv...
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer:
FEDINSIDER Location:
Webcast
Best Hiring Strategies for Government M...
Hiring federal employees was never an easy process, and both hiring officials and staffing specialists often become frustrated by its challenges. Adherence to the federal government’s merit system principles is sometimes seen as an obstacle to hiring the right talent to accomplish an agency’s mission. All too often it seems like the line manager and the human resource management staffer are talking past one another. In today...
AGILE Development in Government Trainin...
Many federal agencies have begun adopting Agile principles and Lean methodologies with the goal of reducing risk and accelerating successful delivery of their IT investments. Across government departments and within their respective agencies, most efforts along this path of adoption include some of the guiding principles of Scrum. The maturity of these efforts varies widely from one agency to another, and even within the same agency among dif...
ATARC Federal Cybersecurity Integration...
The ATARC Federal Cybersecurity Integration Summit will be held on Wednesday, May 20 at the Renaissance Washington in Washington, D.C. This educational one-day symposium will feature cybersecurity subject matter experts from the Federal government and academia on panels with topics such as Information Sharing Across the Cyber Domain; Security: The Cornerstone of Federal IT; and The Future of Cybersecurity. (Agenda) The MITRE-ATARC Cybersecuri...
May 20, 2015
Organizer:
ATARC Location:
Washington, DC
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer:
FEDINSIDER Location:
Bethesda, MD
Electromagnetic Spectrum Operations Summit
“Controlling the Fight in the Electromagnetic Spectrum” DSI’s Electromagnetic Spectrum Operations Summit is designed as an educational and training “Town Hall” forum, where thought leaders and key policy-makers across U.S. military and U.S. civilian organizations can come together for actionable discussions and debate. The Summit will focus on Supporting capabilities & technology that enables full spectrum ope...
Data-Centric Approaches to Government i...
Data-Centric Approaches to Government in the Cloud Cloud computing has evolved into multiple models that employ both agency, interagency and commercial data center resources. This can result in complex, hybrid environments where only parts of the infrastructure are under a given agency’s total control. This raises questions about how to ensure data integrity, availability and safety while also maintaining fast application performance. Th...
May 19, 2015
Organizer:
FEDINSIDER Location:
Webcast
Cyberattacks: 360 Degree View
THIS BRIEFING IS FOR SYSTEMS INTEGRATORS, GOVERNMENT AND MEDIA. In America and indeed across the globe, cyberattacks have risen to be a top national issue, with cyber-threat crossing the line to perpetuating violence in real life. Hacker groups, criminal organizations, and espionage units worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. Government plays a pivotal role in maintaining the...
May 19, 2015
Organizer:
FedInsider Location:
McLean, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.