Remove Distribution Remove Leadership Remove Networking
article thumbnail

Using Data to Fortify Network Defense (E151)

FedInsider

Years ago, anti-virus software updates were distributed via floppy disks through the U.S. Nate Fontaine’s exceptional contributions to education, local and federal government, and community service embody the values of leadership, service, and honor. He also held executive positions with the U.S. Department of Agriculture.

article thumbnail

Manage Teamwork Across a Distributed Workforce

GovLoop

Borrowing a page from the agile book can help improve collaboration across a distributed workforce. Building trust and connections across networks takes time and energy. Now that many — but not all — employees have returned to the office, organizations need to adapt techniques and tools for hybrid teamwork.

article thumbnail

National Science Foundation breaks ground on computing facility in Texas

FedScoop

NSF on Thursday announced it had started construction on the Leadership-Class Computing Facility, which will be led by the University of Texas at Austin. A spokesperson said leadership-class computing is one of three complementary advanced computing areas in which NSF invests. In that release, Hartzell also thanked Rep.

article thumbnail

The Human Side of Zero Trust (E121)

FedInsider

We will also delve into reducing risk with an approach using SASE and ICAM in the distribution of technology for Zero Trust among cloud service providers. Wayne had 10+ years of experience in the Department of Defense (DoD) where he started as a network engineer before advancing as a Technical Lead and Program Manager in Perimeter Defense.

Education 105
article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud (E165)

FedInsider

Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. He brings a strong background in public and private IT management and leadership. He is also an Eagle Scout. He has twice been awarded Jessie H.

article thumbnail

Applying Zero Trust Architecture in State & Local Government

FedInsider

Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers. He has twice been awarded Jessie H.

article thumbnail

Federal Support for Cybersecurity – Part 2-2 (E126)

FedInsider

Her focus areas included Data Centers, Data Systems/Services, Storage, Virtual Desktop Infrastructure (VDI), Continuity of Operations (COOP), Disaster Recovery, Inside/Outside Plant Telecommunication Cable Distribution, Networking, and Cooperative Research and Development Agreements (CRADAs).