Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: acquisition
Today is the first of a three-day series here at Federal News Radio called The Missing Pieces of Procurement Reform. Today's focus is legislating reform. Over the years, what statutes have made the most impact, what have been the least successful and what pending legislation holds the most promise? The Clinger-Cohen act changed the landscape of federal procurement back in 1996. It gave agencies more authority and formalized the CIO position. Bill Greenwalt is a former Senate staff member who helped pen Clinger-Cohen, formally known as the Information Technology Management Reform Act. He's now a visiting fellow at the American Enterprise Institute. Greenwalt joined Tom Temin on the Federal Drive to explain why the Clinger-Cohen act was needed to update the prevailing law at the time.
The practices and procedures for how the federal government procures goods and services did not happen overnight. They were established by multiple pieces of legislation over many decades.
Few activities have vexed the federal complex of Congress, agency managers, overseers and regulation-writers over the decades more than procurement. Buying things, so simple to individuals, is a highly legalized and regulated process in government. Federal News Radio's special report, Missing Pieces of Procurement Reform, will look back at the past 20 years of acquisition laws enacted to gauge their impact, and look ahead to short- and long-term changes that need to happen today to make a difference in 2016 and beyond.
William Greenwalt, the former Deputy Under Secretary of Defense for Industrial Policy, says its long overdue to update the way the Defense Department purchases goods and services.
Uncle Sam is the biggest, shopper, consumer, buyer in the world. Everything from aircraft and weapons systems to protective suits used by medical personnel dealing with Ebola. Senior Correspondent Mike Causey preview's Federal News Radio's special report, "The Missing Pieces of Procurement Reform."
Elizabeth Harr of Hinge Marketing will discuss the benefits of content marketing and how to make it work for your agency or business.
October 13, 2014
The Federal Acquisition Regulations Council issued a final rule Monday detailing the timeframe and steps agencies must take to begin using the Procurement Instrument Identification (PIID) numbering system. The PIID only is for new contracting actions after the effective date.
The Council of Inspectors General analyzed 77 commercial cloud contracts across 19 civilian agencies and found most failed to implement federal guidance and best practices. Auditors found these shortcomings could put data and systems at a greater risk to cyber attack or data theft.
The Defense and Homeland Security departments both say they are putting their programs on a path that will insist that technologies are rigorously tested before they commit to expensive acquisition strategies.
Jim Ghiloni, program manager for OASIS, will bring us up to date on the capabilities, features, and opportunities of the OASIS contracting program.
October 7, 2014