Campaign managers who urge politicians that they have a certain state’s unwavering support can now use data analytics to detect cities and even individuals within those states who may not back the candidates. […]
Many members of Congress can agree that IT modernization is an important problem in need of a solution, but there is less agreement on how exactly to go about it. In the past four months, two separate bills have been introduced in the House, which aim to improve and fund future IT modernization efforts: the IT Modernization Act and the MOVE IT Act.[…]
Federal agencies need to adopt a standardized taxonomy for their data, according to authors of the report “Accelerating the Mission: Recommendations for Optimizing Federal Technology Cost and Value in the Age of FITARA.” The report proposes a set of Technology Business Management guidelines that would help agencies communicate with each other, Congress, and the private sector more effectively.[…]
MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT.[…]
The House and Senate Intelligence Committees each passed restrictions on the Privacy and Civil Liberties Oversight Board that would restrict its funding, give it jurisdiction only over the privacy of people in the United States, and force it to report to the agencies that it’s overseeing.[…]
The Obama administration this month announced a series of new investments, partnerships, and policies to further the Precision Medicine Initiative, including $55 million in awards from the National Institutes of Health.[…]
BlackBerry received approval for its phone management system and latest phone model to be used by the Department of Defense and its crisis communication software to power the Sergeant at Arms’ Joint Emergency Mass Notification Systems for five years.[…]
No one has attended an introductory physics lecture at the Massachusetts Institute of Technology in 15 years.
In the fall of 2001, MIT opened its first classroom under the Technology Enabled Active Learning initiative. The university has been using this active learning system for its introductory physics classes ever since.
The Department of Energy is investing $19 million to improve the efficiency of the nation’s buildings. This investment will aim to develop advanced building technologies that will help Americans save money on utility bills, reduce greenhouse gas emissions, and create jobs.[…]
The Department of Veterans Affairs this week appointed two veteran government IT leaders to key agency posts responsible for data sharing with the Defense Department and cybersecurity.[…]
While most college students are off enjoying their summer break, the House of Representatives is focusing on helping them out. Last week the House passed five bills, and while they aren’t law yet, each bill could have a serious impact on universities.[…]
The White House released its $400 million Advanced Wireless Research Initiative, led by the National Science Foundation, to enable the use of four city-scale testing platforms for advanced wireless research.[…]
Using social media for professional enrichment can be daunting. However, when used correctly Twitter can provide teachers with a strong community full of support, best practices, new ideas, and new teaching materials. Well, rather than spending your time scouring Twitter to find the social media influencers you should follow, we’ve gathered up the best of […] […]
The active critical vulnerabilities at the Department of Homeland Security have decreased by 99 percent and the time that it takes to detect problems has been cut in half in government agencies since October. The Cybersecurity Strategy and Implementation Plan and Cybersecurity National Action Plan focused on bringing the whole government up to speed on cybersecurity initiatives; however, some individual agencies developed their own way of protecting their digital information.[…]