The U.S. Department of Defense has 150 active “other transaction” agreements, or OTAs, on its books, which combined have generated $5.8 billion in spending to date, according to a Bloomberg Government analysis.
The Defense Department lost out on $28 billion at the end of fiscal 2018 because it let authority to spend the funds expire, according to a report by its inspector general on results of the Pentagon’s first-ever audit.
Security risks and concerns about excessive complexity were among the factors leading the Pentagon to choose a single-award contract for its Joint Enterprise Defense Infrastructure (JEDI) cloud contract, a Government Accountability Office ruling reveals.
The Defense Information Systems Agency is planning major upgrades to the Pentagon’s classified and unclassified networks.
The Air Force is partnering with the General Services Administration on a fast-track buying procedure to acquire a cloud-based development platform for artificial intelligence and “internet of things” applications.
Dana Laake and her special guest Dr. Aminah Keats will discuss natural medicine and its safety and efficacy in breast cancer care.
Leadership stories are at the core of The Business of Government Hour. Join host Michael Keegan in the first of a two-part series exploring the leadership stories and public service of government leaders encompassing a wide range of disciplines, a diverse set of experiences, and a vast span of geographies. This edition introduces to four government executives leading missions and programs that include military health, government-wide acquisition, technology and innovation, and environmental protection.
The General Services Administration is pushing forward a plan that could enable government contracting officials to start buying everyday products more easily using online marketplaces run by companies like Amazon.com Inc. or Walmart Inc. Critics say this will enable agencies to bypass federal acquisition regulations and will adversely affect competition.
The cloud can help free people up from the undifferentiated heavy lifting of common problems like compliance or intrusion detection. Agencies can save hundreds of staff hours by utilizing automation tools offered by cloud service providers.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. We look into the security of computers in hotel business centers. And we meet a man who contributed much to the modern practice of weather forecasting.
Unisys defines identity intelligence like this: The compilation of digital knowledge and trust on an entity with biometric, biographic and relevant publicly available data about that entity.
In this exclusive executive briefing, federal IT and security practitioners reveal how they balance cybersecurity and access in the hybrid world.
Agencies need to think about how they intend to use AI. Everyone wants to apply it to cybersecurity, to keep data safe. But what about applying it to patterns and use cases around the data? Who is looking at it, and when?
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Running that microwave really is messing with your wi-fi. And meet the man who is opening the world of coding to more young people in a simple and viral way.
Dr. Kevin Passero and his special guest Dr. Anthony Thomas will discuss the most appropriate bacterial (sub)species to serve as a probiotic for infants.