Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Jason Miller
The Coalition for Government Procurement asks the Federal Acquisition Service to reconsider its decision to close the office supplies schedule to new offerors for two year. The association says the decision will hurt small businesses and likely lead to higher prices for the government.
A draft policy obtained by Federal News Radio details new cybersecurity requirements for more than 1,500 buildings owned by GSA's Public Building Service. GSA wants to standardize how facility control systems connect to GSA's network. The document builds on work already being done under HSPD-12.
The Pentagon's decision to close Joint Forces Command in Norfolk, Va., remains its biggest hot spot in its effort to save $100 billion over the next three years.
Tags: In Depth , Francis Rose , management , technology , William Lynn , Jim Webb , Robert Gates , Carl Levin , Joseph Lieberman , Ashton Carter , John McCain , Senate Armed Services Committee , DoD , Joint Forces Command , BTA , Teri Takai , efficiency initiatives , JFCOM
The General Services Administration is drafting new rules for improving cybersecurity. Federal News Radio's Jason Miller joined DorobekINSIDER with details and reaction to the policy.
Some Senate Armed Services Committee members are unhappy with the Pentagon's lack of transparency and inclusion in the decision to close the base. Defense Deputy Secretary Lynn said the Pentagon held almost 30 meetings before concluding that JFCOM needed to be closed. Lynn also offers insight into future of DoD CIO and BTA.
Tags: management , technology , William Lynn , Jim Webb , Robert Gates , Carl Levin , Joesph Lieberman , Ashton Carter , John McCain , Senate Armed Services Committee , DoD , Joint Forces Command , BTA , Teri Takai , efficiency initiatives , JFCOM
The Defense Department's shrinking industrial base is a major roadblock to achieving significant savings over the next three years. In a hearing Tuesday, members of the Senate Armed Services Committee heard DoD's rationale for plans to save $100 billion over the next three years. Federal New Radio's Jason Miller brings the latest on DoD's plans from Capitaol Hill.
This week, Roger Baker, Chief Information Officer at the Veterans Affairs Department, talks with host Jason Miller about turning around IT processes within the agency.
September 30, 2010
The FAR Council issues a proposed rule to require agencies to justify the use of time-and-materials and labor hours contracts for commercial services. GAO found that agencies didn't understand the rules for buying certain types of services.
The Defense Department and its services plan to hire a total of 1,000 cyber professionals each year over the next three years, Gen. Keith Alexander tells a House committee. Alexander said getting the right people in place to move the DoD Cyber Command into an operational stage is among his highest priorities. DoD and the services must look at how best to retain these professionals once they work for the military.
The Defense Department's cyber command will become fully operational on October 1. Federal News Radio's Jason Miller joined DorobekINSIDER with details about how General Alexander believes DoD can overcome the lack of qualified cyber employees.