Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
There's a little more than a month to go until sequestration kicks in, taking more than a $1 trillion from agency budgets over 10 years unless Congress finds a way to agree on a Plan B for deficit reduction. In this week's edition of On DoD, Jared Serbu, Federal News Radio's DoD reporter, talks with several defense experts about sequestration and the Defense budget in a second term under President Obama:
USPTO director David Kappos says software is every bit as entitled to patent protection as hardware innovations. Critics of the agency should give recent reforms a chance to work, he told a think tank audience Tuesday.
Gen. William Shelton says some costs for space activities are unsustainable and the service is working to bring them down. But he implored "congressional teammates" not to cut funding for programs that are working.
"Fog bank" of threatened automatic spending cuts makes predicting Defense policy under a re-elected President Obama difficult. But experts agree DoD is likely to take more cuts, with or without sequestration.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Pentagon makes one more plea for a resolution to sequestration. A regular budget, an annual authorization bill and a resolution to the fight over cybersecurity laws would be helpful as well.
The service's new acquisition strategy tries to imagine the Army's needs over the next three decades as the focus shifts away from large counterinsurgency and stability operations.
Two brigades of the Army's 10th Mountain Division are training on a ready-to-go set of networking capabilities as they prepare to deploy to Afghanistan. The IT comes out of the Network Integration Evaluation process.
DISA wants a secure mobile device manager and app store to support at least 162,000 Apple and Android mobile devices. Contract would begin next spring.
Defense Secretary Leon Panetta said the financial health of service members is important for troop readiness. A new report by the Consumer Financial Protection Bureau details potential problems service members are facing.
After a decade of heavy land war, Marine Corps turns to energy efficiency as a way to lighten its load and return to its expeditionary maritime roots. The service already rolled out four technologies that reduce the amount of energy a marine uses. The Marines Corps also is spending hundreds of millions of dollars on developing and testing other energy efficient equipment.
Chris Devlin-Young is a Coast Guard veteran, who became partially paralyzed when his plane ran into a mountainside in 1982. Since then, he's won numerous world medals in the Paralympic sport of monoskiiing and does counseling work with wounded veterans.
The Defense Information Systems Agency sees itself as a safety valve for increasing pressure on military services' IT budgets. At a meeting of CIOs last week, DISA told the military services they could offload commodity IT services to their data centers.
Current definitions of cyberspace have led to confusion about roles, responsibilities, lanes in the road, a top Air Force general said Thursday. Senior leaders will convene a summit in November to zero-in on a common understanding of cyber.
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Congress has a lot of unfinished business to tackle during its lame duck session expected in November. The House Intelligence Committee chairman thinks new threat information could push cyber legislation up the priority list.
As service transitions to Air Force and DoD enterprise IT models, defining what technology services should be shared is still on the to-do list. The service's AFNet program is the umbrella effort to centrally-manage many commodity IT functions.
The Defense Department has marked the week of Oct. 1 as Absentee Voting Week. It's urging service members living overseas to register to vote and to take care of absentee balloting while there's still time for mail to make its way to and from local election jurisdictions.