Language Selection

English French German Italian Portuguese Spanish

Government IT gets star treatment at FOSE

Filed under
OSS

The 29th edition of FOSE opened today at the Washington Convention Center with a three-day slate of exhibits, demonstrations, discussions and meetings on IT and government.

About 100,000 square feet of space on the show floor will host more than 500 exhibitors, featuring everything from new keychain gadgets and desktop PC applications to storage area networks and data-sharing tools.

Also on the floor are theaters and pavilions that will host discussions on topics ranging from systems consolidation and enterprise architectures to the Defense Department's Global Information Grid and the Homeland Security Department's border systems project.

A Linux Pavilion, focusing on Linux systems for government, is new this year, and the SAN Pavilion has been expanded to the Data Center Storage Theater. They'll join the established DOD, E-Town and Homeland Security theaters, which will offer targeted sessions and, Wednesday afternoon, host briefings from the various federal CXO councils.

Away from the show floor, vendors and government officials will hold forth in a variety of educational sessions hosted by the Federal Information Managers Council, the General Services Administration, Cisco Systems Inc., Hewlett-Packard Co., Microsoft Corp. and the Greater Washington Initiative.

FOSE on the air

If you're stuck in traffic on the way to the convention center, you can also get FOSE on the radio. With selected broadcasts on WAMU 88.5 FM and WTOP 1500 AM, and an all-day Wednesday broadcast from FOSE on WMAL 630 AM. The Best of FOSE awards ceremony will be broadcast at 2 p.m. Thursday on WTOP.

FOSE serves as a sort of barometer for trends in government IT, said Lorenz Hassenstein, vice president of trade shows for PostNewsweek Tech Media, which owns FOSE and publishes GCN.

Pervasive topics this year include homeland security, biometrics, cybersecurity and e-government, with a heavy emphasis on integration, he said, particularly in areas such as tagging and sharing data.

"I see FOSE as a technology show" that takes in the bigger picture, Hassenstein said. "Information technology is the keystone, allowing government to drive efficiencies throughout the financial, human capital and procurement disciplines, along with so many other critical activities."."

He said there also is a broader Defense presence, with the Army, Air Force and Marines joining the Navy, which "did a lot of the heavy lifting last year," and a growing presence of small, minority-owned and veteran-owned businesses.

The show also has a growing international flair, with exhibits from several countries and delegations from a total of eight nations.

Source

More in Tux Machines

Welcome To The (Ubuntu) Bionic Age: Nautilus, a LTS and desktop icons

If you are following closely the news of various tech websites, one of the latest hot topic in the community was about Nautilus removing desktop icons. Let’s try to clarify some points to ensure the various discussions around it have enough background information and not reacting on emotions only as it could be seen lately. You will have both downstream (mine) and upstream (Carlos) perspectives here. Read more

Programming: Perl, JavaScript, Ick, PowerFake, pylint-django, nbdkit filters

  • An Open Letter to the Perl Community

    Some consider Perl 6 to be a sister language to Perl 5. Personally, I consider Perl 6 more of a genetically engineered daughter language with the best genes from many parents. A daughter with a difficult childhood, in which she alienated many, who is now getting out of puberty into early adulthood. But I digress.

  • Long Live Perl 5!

    While not mentioned in the original Letter, a frequent theme in the comments was that Perl 6 should be renamed, as the name is inaccurate or is damaging.

    This is the topic on which I wrote more than once and those who have been following closely know that, yes, many (but by no means all) in the Perl 6 community acknowledge the name is detrimental to both Perl 6 and Perl 5 projects.

    This is why with a nod of approval from Larry we're moving to create an alias to Perl 6 name during 6.d language release, to be available for marketing in areas where "Perl 6" is not a desirable name.

  • JavaScript Trends for 2018
    Trying to bet on how many new JavaScript frameworks will be released each month, is, the best software engineer’s game in the past 5 years.
  • Ick: a continuous integration system
    TL;DR: Ick is a continuous integration or CI system. See http://ick.liw.fi/ for more information.
  • Introducing PowerFake for C++
    PowerFake is a new mini-framework/tool to make it possible to fake/mock free functions and static & non-virtual member functions in C++. It requires no change to the code under test, but it might need some structural changes, like moving some parts of the code to a different .cpp file; or making inline functions non-inline when built for testing. It is useful for writing unit tests and faking/mocking functions which should not/cannot be run during a test case. Some say that such a feature is useful for existing code, but should not be needed for a code which is written testable from the beginning. But, personally I don’t agree that it is always appropriate to inject such dependencies using virtual interfaces or templates. Currently, it is not supposed to become a mocking framework on its own. I hope that I can integrate PowerFake into at least one existing C++ mocking framework. Therefore, currently it doesn’t provide anything beyond faking existing functions.
  • Introducing pylint-django 0.8.0
    Since my previous post was about writing pylint plugins I figured I'd let you know that I've released pylint-django version 0.8.0 over the weekend. This release merges all pull requests which were pending till now so make sure to read the change log.
  • nbdkit filters
    nbdkit is our toolkit for creating Network Block Device (NBD) servers from “unusual” data sources. nbdkit was already configurable by writing simple plugins in several programming languages. Last week Eric Blake and I added a nice new feature: You can now modify existing plugins by placing “filters” in front of them.

Moving to Linux from dated Windows machines

Every day, while working in the marketing department at ONLYOFFICE, I see Linux users discussing our office productivity software on the internet. Our products are popular among Linux users, which made me curious about using Linux as an everyday work tool. My old Windows XP-powered computer was an obstacle to performance, so I started reading about Linux systems (particularly Ubuntu) and decided to try it out as an experiment. Two of my colleagues joined me. Read more

Security: TPM, Yubikey, Holes, Bricking and Uber

  • Trusted Computing
    The Trusted Platform Module on your computer's motherboard could lead to better security for your Linux system. The security of any operating system (OS) layer depends on the security of every layer below it. If the CPU can't be trusted to execute code correctly, there's no way to run secure software on that CPU. If the bootloader has been tampered with, you cannot trust the kernel that the bootloader boots. Secure Boot allows the firmware to validate a bootloader before executing it, but if the firmware itself has been backdoored, you have no way to verify that Secure Boot functioned correctly.
  • Locking the screen when removing a Yubikey

    I have my Yubikey on my key ring, so whenever I leave my computer, I have to remove the Yubikey. So why not lock the screen automatically?

  • Corporate cultural issues hold back secure software development

    The study of over 1,200 IT leaders, conducted by analysts Freeform Dynamics for software company CA Technologies, finds 58 percent of respondents cite existing culture and lack of skills as hurdles to being able to embed security within processes.

  • Stop installing our buggy Spectre CPU firmware fixes, Intel says
  • Uber shrugs off flaw that lets hackers bypass two-factor authentication

    Security researcher Karan Saini found the bug in Uber's two-factor authentication process, which has yet to be rolled out widely to Uber users. The flaw relates to the way an account is authenticated when users log in, meaning hackers [sic] with someone's username and password can drift pass the 2FA with ease.