Technology

  • DoD, industry and Congress all acknowledged the need for new acquisition approaches for DoD's procurement of critical commercial satellite communications capabilities. Congress even included language to encourage DoD to use new acquisition models in the fiscal 2014 National Defense Authorization Act. DoD needs to reduce cost for these capabilities and to reduce the risk of not having sufficient SATCOM where and when DoD needs it. Panelists will talk about possible new approaches for DoD to buy commercial satellite services to meet mission needs around the world.

    February 12, 2014
  • The National Geospatial-Intelligence Agency is focusing on four programs to add more value to how it delivers GIS content and services to the DoD and intelligence communities. Director Letitia Long said the community is in phase three of the evolution of using and sharing geospatial information.

    February 12, 2014
  • This week on Federal Tech Talk, host John Gilroy interviews Dan Chenok, vice chair of ACT-IAC, and Rick Smith, co-chair of ACT-IAC's Smart Lean Government Initiative. February 11, 2014

    February 11, 2014
  • In the midst of the current decline in federal defense spending, the Commonwealth of Virginia is taking steps to ensure that companies in the state's multi-billion dollar defense industry are able to find new business opportunities. It's a program that goes beyond the usual "goodwill tour". This week on "AFCEA Answers," we'll examine the "Going Global" initiative with Paul Grossman, vice president of international trade with the Virginia Economic Development Partnership; and Brian Dearing, vice president of business development and government relations with HDT Global. The initiative is designed to help prepare Virginia businesses to find new markets beyond American shores, and develop business strategies to help them win their share of this business.

    February 10, 2014
  • The Financial Industry Regulatory Authority is looking at the measures that Wall Street's brokerages take to protect their businesses and customers from cyber security threats. FINRA, which conducts periodic "sweeps," or targeted checks on Wall Street brokerages, says it is conducting the review, in part, because of the growing threat to information technology systems from "a variety of sources.

    February 10, 2014
  • App River email and security experts says Bank of America customers have been targeted by a new virus campaign they're calling a Bredo virus. It comes in the form of phishing email that claiming to be from BofA and asking the recipient of download a security file. The main goal of this virus is to steal information such as banking info or recording keystrokes. The software may also have abilities to further infect a system by downloading more malware on to the machine.

    February 10, 2014
  • PortfolioStat is widely deployed across federal agencies and thus well worth exploring how we may be able to maximize the benefits derived from it.

    February 10, 2014
  • Agency officials said Thursday that they will switch from a custom-built to a commercial-off-the-shelf approach to modernize TECS, a mainframe system that has been operating for more than a quarter of a century. ICE spent more than $60 million before deciding to change directions after realizing the custom-built approach wouldn't work.

    February 10, 2014
  • DoD opens its electronic medical records to VA claims processors for the first time. The goal is to shave days or weeks from the time it takes VA to decide disability claims for recently separated service members. But the launch of the system has had a few bugs.

    February 07, 2014
  • EPA's "How's My Waterway?" app earned the most votes out of eight finalists in ACT-IAC's Igniting Innovation awards. The site takes public data, simplifies it and adds new technology to make it easier to find and use by the public.

    February 07, 2014
  • Sen. Tom Coburn's (R-Okla.) report on cybersecurity and critical infrastructure in the federal government examined more than 40 inspector general audits and revealed gaping holes in the security of agencies' systems.

    February 06, 2014
  • The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.

    February 06, 2014
  • The STEM leader profile clearly shows the STEM leader is unlikely to be effectively served by traditional leader development programs.

    February 05, 2014
  • Phyllis Schneck, the deputy undersecretary for cybersecurity in the National Protection and Programs Directorate at DHS, said the department's goal is to further the trust relationship with industry around sharing and understanding cybersecurity threats. February 6, 2014

    February 05, 2014

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.