Thursday, November 1, 2012

Fed Data Tools Aid Hurricane Response | FBI Cybercrime Expansion

If you have trouble viewing this email, read the online version.

InformationWeek Government
  Thursday, November 01, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist Hurricane Sandy: Government Data Tools Assist
By J. Nicholas Hoover
Federal, state, and local information technology and data are on the case in the ongoing recovery from Hurricane Sandy.

FBI Expands Cybercrime Division
Federal Bureau of Investigation will hire computer scientists, build new tools and boost collaboration to help catch malicious hackers.

Stimulus Funds First, Layoffs Second?
CRN's investigation into how tech companies used Recovery Act funds yielded some unsettling results. Watch this Valley View video for the details.

California Targets Mobile Apps For Missing Privacy Policies
Mobile app developers that don't post conspicuous online and in-app privacy policies will face $2,500 fine per download.

Huawei Hits Back At U.S. Security Investigation
Executive dismisses U.S. report tying Huawei to security threats, saying it's a case of "Americans being Americans."

4G World: The Need For More Spectrum
The wireless industry may run out of spectrum in three years, and it needs government help to find more to realize the promise of mobile broadband.

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Online retailers are stuck in a maze of e-business security and PCI compliance requirements. The new, all-digital special issue of Dark Reading gives you 10 Ways To Secure Web Data.

DOWNLOAD NOW FREE (Registration Required)

 

------------------------------------------------
This issue sponsored by IBM
------------------------------------------------
The cloud solution for federal agencies is here.
IBM SmartCloud for Federal Government. To optimize performance,
to cut costs, to better serve citizens. All in the cloud and
and compliant with Federal security regulations.
Learn how IBM can help your agency at ibm.com/federal/cloud
 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: Security at Today's Network Speeds
With 10 Gbps Ethernet standard and 40 and 100 Gbps on the way, one big question is whether firewalls, intrusion-detection systems, packet analyzers and other monitoring systems can keep up. If not, your need for speed might prove deadly.
Download Now (Registration Required)

Featured Report
Fundamentals: Cloud ID Management
Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Prepare for a Private Cloud Strategy
Download this white paper to learn about primary tools available to create custom content to be provisioned and managed by the appliance, and prepare for a private cloud strategy.
Download Now (Registration Required)


Strategy Guide to Application Modernization in Government
Keeping legacy applications running smoothly is a time-consuming, resource-intensive process. This whitepaper discusses how to evolve legacy applications and IP into flexible, business aligned solutions.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
8 Cool Windows 8 Tablets
As Microsoft and its hardware partners produce Windows 8 devices in droves, here's a look at some of the more noteworthy launches.

10 Wearable Health Tech Devices To Watch
Wearable medical technology is becoming a hot commodity. As these devices come to market, they have the potential to help both patients and clinicians monitor vital signs and symptoms.

Google Gmail Learns New Tricks
Revised Gmail interface makes it easier to write messages.

Windows 8 Vs. Windows RT: 8 Key Differences
With the introduction of Windows 8 and Windows RT, Microsoft splits its flagship OS into two distinct flavors. Examine the most important contrasts.

Windows 8 Upgrade: No Touch, No Good
BYTE's Chris Spera has been using Windows 8 since the first preview version. There's a lot to like about it on the new touch PCs and tablets, but upgrading Windows on your old non-touch PC to the new OS isn't worth the trouble.
MORE NEWS  
 
WEBCASTS
Getting Started With Big Data
Government agencies must develop a strategy, and put the appropriate systems and processes into place, to fully exploit the Big Data opportunity. This editorial webcast TODAY October 25th will help government IT professionals understand the steps required to support data volumes that are a thousand times bigger than yesterday's databases, and to apply that data to improve government operations and offer new public services. More Information & Registration

------------------------------------------------
This issue sponsored by IBM
------------------------------------------------
The cloud solution for federal agencies is here. IBM SmartCloud for Federal Government. To optimize performance, to cut costs, to better serve citizens. All in the cloud and and compliant with Federal security regulations. Learn how IBM can help your agency at ibm.com/federal/cloud
 
RESOURCES AND EVENTS
InformationWeek 2013 Standardization Survey
We are conducting a survey to explore IT standardization policies. One lucky participant will win a 6GB Google Nexus 7 tablet.
Survey ends Oct. 26



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Government
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of the InformationWeek Government Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment