Technology

  • The Department of Defense is working with private developers to create a system that automatically detects and prevent network intrusions.

    March 22, 2011
  • The Department of Homeland Security already has real-time access to biometric data maintained in the FBI\'s huge database of criminal records. Soon, agency officials say they\'ll be able to share similar data with the Defense Department. Biometric information - mainly fingerprints - can be shared between DHS databases and the criminal records the FBI holds at its Criminal Justice Information Services Division in West Virginia. DoD\'s database will be in the loop within the next year - among other things - letting customs and immigration officials instantly know if someone trying to enter the country has been on the battlefield against the US military. The technology could potentially come into play even if the Defense Department hasn\'t positively identified that person. That\'s because the database also includes latent fingerprints taken from improvised explosive devices in Iraq and Afganistan. DoD and DHS say it\'ll be a big improvement over the limited information sharing they conduct now, using slow, manual processes.

    March 21, 2011
  • The Health and Human Services department wants researchers and IT developers to use its vast storehouse of data to make new apps. And it\'s trying to make it easier for that to happen. The department has created what it calls a Health Indicators Warehouse - a collection of databases on health indicators, along with application programming interfaces built on Web 2.0 technologies. HHS hopes programmers will come up with innovative ways to use the information it\'s built up in its databases and make it more relevant and more widely available. The agency says the data sets available through the new APIs include 1200 different health indicators from 170 data sources. To get the ball rolling, HHS started developing some of its own apps using the data last year, as part of the Community Health Data Initiative. The apps, and the APIs, are available at health indicators.gov.

    March 21, 2011
  • Federal IT policymakers say the days of agency employees having one cell phone for work and other for personal use could soon be a thing of the past. The same could be true of laptops. They\'re exploring the idea of letting federal workers use their personal devices to do their jobs, rather than segregating their work lives onto separate devices. The idea, according to Federal CIO Vivek Kundra is that many employees are already using newer, better technology in their personal lives than the equipment their agency issues them. Under the idea, workers would get a stipend to help pay for technology that they buy on their own, rather than agency-issued devices, and Kundra says federal CIOs can overcome the security challenges. He says as I-T needs continue to become a bigger and bigger part of agencies\' missions, keeping up with the latest technology will rack up unsustainable costs.

    March 21, 2011
  • By Ruben Gomez Federal News Radio Northrop Grumman has won a contract that could make it safer for your agency to share information. The project has a potential value of $1.1 billion. It’s a follow-on…

    March 21, 2011
  • The Partnership for Public Service\'s Tim McManus describes how an overhaul of the current performance review system might look like.

    March 21, 2011
  • For the first time ever, the American Council for Technology and Industry Advisory Council added a best mobile app category to its annual Excellence.gov Awards.

    March 21, 2011
  • Hildy Ferraiolo, a NIST computer scientist, explains how the standard is changing to access federal buildings and computer systems.

    March 21, 2011
  • The sophisticated cyber attack on security company RSA has Senate Republicans worried. The attack targeted RSA’s SecurID product. And the cyber crooks got away with confidential data about products that make it harder for people…

    March 21, 2011
  • March 23rd, 2011 at 11 AM Criminal enterprises operating globally - so-called \"Transnational Criminal Organizations\" -- have spent years refining their approaches to all types of illicit trafficking including narcotics, weapons, illicitly gained and laundered money, and even modern day slavery. In many ways, these organizations can be considered multi-national corporations, given their size, reach, and sophistication. Indeed, their production and logistics operations rival best practices in the commercial sector, with highly resilient supply chains driven by the need to minimize the risk of seizure. TCOs often directly and indirectly enable, support, and facilitate insurgencies and terrorism; undermine state stability, security, and sovereignty; and corrupt legitimate global financial and trade networks. The stakes are high. U.S. Law Enforcement, Homeland Security, and the Department of Defense (DoD) find themselves at the front lines of this global security issue. As criminal organizations adapt to traditional interdiction methodologies, stakeholders across government are coming together to stem the tide, looking at what new technologies and whole of government approaches can be brought to bear to address this complex threat.

    March 21, 2011
  • The Honorable Tom Davis talks about on trends facing Government Contractors; as a former congressman and noted technology leader, he shares Government Contractor strategies and vision.

    March 21, 2011
  • Cyber Command gave no reason for the turnabout in policy.

    March 21, 2011
  • Agencies reported more than 41,000 cyber incidents in 2010.

    March 21, 2011
  • Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.

    March 21, 2011

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.