Smarter Gov Tech, Stronger MerITocracy

The journey to meet the requirements of the Data Center Optimization Initiative (DCOI) has been long, difficult, and full of roadblocks–and, from the back seat, we can hear anxious voices asking when the trip will be over. With the extension earlier this year of the 2018 DCOI deadline to 2020, agencies are clearly still looking for the right routes to take. […]

Scientists at the Army Research Laboratory (ARL) are covering some new ground in artificial intelligence (AI) by connecting a machine with human intelligence via a neural connection. Not to worry: the research team isn’t cooking up an AI system that will run the show inside a person’s head. But it does have promise for both medical as well as deep machine learning systems uses, potentially in military and everyday applications. […]

Action plans to accelerate Federal agency migrations to cloud platforms and services as outlined in the White House IT Modernization Report have been in effect for nearly three months now. For instance, the Office of Management and Budget (OMB) was directed to conduct a data call within 30 days of the report’s release, requesting agencies to identify systems that might be ready for cloud migration, but have not because of some perceived or encountered difficulties. […]

Jay Huie

Jay Huie, Cloud Portfolio Director for GSA’s Technology Transformation Service (TTS)–which includes FedRAMP–sat down with MeriTalk last week. He offered insights on his role at GSA, FedRAMP, and the perspective on the road ahead for cloud adoption, FITARA, and MGT. […]

The Army recently added 18 more vendors to its $250 million Army Cloud Computing Enterprise Transformation (ACCENT) contract, which kicked off last year with 50 vendors certified as meeting the Army’s requirements for cloud services. […]

The new President’s Management Agenda solidified the administration’s focus on IT modernization. In the 54-page agenda, released last week, the White House laid out its roadmap for improving the Federal government. Central to its plans? Modernizing the government’s IT infrastructure.  […]

Last week, the National Institute of Standards and Technology (NIST) revealed the initial public draft of its Special Publication 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems. […]

Most Federal managers grasp the concept of automation, the use of technology to perform a process or procedure without human assistance. However, do they really understand the role of automation, and how it can be applied to accelerate delivery and management of IT resources and applications, especially in this era of multi-clouds? […]

The U.S. military has long laid claim to having the best-equipped, best-trained fighting force in the world, and to spending more on defense than the next eight top-spending nations combined. But when the battleground is cyberspace, does that claim hold up? […]

data management

It’s an old axiom: “you can’t manage what you can’t measure.” And nowhere is that axiom truer these days than with Federal IT investments. Federal executives need to better understand, manage, and show value from money spent on IT resources. […]

cybersecurity

It is imperative for Federal agencies to effectively utilize threat intelligence combined with the power and agility of the cloud to better defend their networks. But, today, agencies are lacking adequate situational awareness to give their IT and security teams more clarity about what is going on in their networked environments. So, what’s holding them back? […]

Cybersecurity

The Department of Homeland Security’s (DHS) rare public alert last week about a large-scale Russian cyber campaign targeting U.S. infrastructure raised a piercing alarm about vulnerabilities in the nation’s power grid, and underscored what officials have meant when talking about the need for a whole-of-government and whole-of-nation approach to cyber defense. Protecting against a major attack, managing the damage once one hits, and responding to an attack are beyond the reach of any one agency or sector, they argue; the job requires concerted efforts from the public and private sectors. […]

While Federal agencies race to migrate to the cloud, security concerns seem to multiply by the hour. This month alone, Russian hackers penetrated the U.S. power grid; cyber attackers got into the network of a petrochemical company in Saudi Arabia in hopes of triggering an explosion; and North Korean hackers apparently “blitzed” Turkish banks and government organizations to gather intel for a future heist. […]

funding

Opening day for the Nationals might be a week away, but four Beltway insiders have already knocked one out of the park. The latest omnibus spending bill, which passed through the Senate early Friday morning, includes $100 million for the MGT Act’s centralized revolving capital fund. President Trump signed the MGT Act into law late last year as an amendment to the National Defense Authorization Act. […]

The tactics of warfare aren’t what they used to be. In addition to asymmetric battlefield tactics that differ from conventional battles, they also can include cyber, social, economic, and psychological strategies that don’t necessarily involve physical combat or destruction–or even direct human involvement–and can’t be divined by tracking troop movements or fleet deployments. As a result, the signs of impending war aren’t what they used to be either. […]

Federal IT comes with some baggage–much of its data is trapped in legacy technologies.  Agencies can’t realistically pick everything up and move to more modern infrastructure.  So how do they bridge the gap?  MeriTalk’s latest report found that improving data sharing between new and legacy systems is the number one solution to accelerating Federal IT modernization.  The “Modernizing the Monolith” study explores why legacy systems are so persistent and outlines a path to modernizing with them, instead of in spite of them. […]

A recent study showing just how easy it is to hack into Internet of Things (IoT) devices–and to use that access to gain entrance to a larger network–focused on commercial products used in the home. However, it could serve as yet another wake-up call for the Department of Defense and other government agencies that are increasingly relying on IoT. […]

The Department of Homeland Security (DHS) has been working in unison with the Office of Management and Budget to assess the risk management posture of the Federal government. They’ve been using a combination of agency self-reporting and independent verification to evaluate each agency’s mitigation techniques as well as the nation’s overall security standing. DHS’ latest […]

Government IT leaders may feel a little punch drunk lately. Between new mandates, an understaffed workforce, and aging systems–they are getting hit from all angles. Indeed, Chad Sheridan, CIO for USDA’s Risk Management Agency kicked off his keynote at last Thursday’s Veritas Public Sector Vision Day in Washington, D.C. by quoting Mike Tyson: “Everybody has a plan until they get punched in the mouth.” […]

GSA

Do agencies have enough time to make a smooth transition to the new Enterprise Infrastructure Solutions (EIS) contract by spring of 2020 when the older telecom contract vehicles expire? […]

Another important piece of the emerging Federal IT modernization ecosystem is in place now that the General Services Administration (GSA) has given four companies the greenlight to start work on the first of five IT Modernization Centers of Excellence (CoEs). […]

The House subcommittees on Information Technology and Government Operations held a “State of Play” Federal IT Hearing Wednesday for the latest updates on ongoing modernization efforts, and the tone was resolute and unflinching. […]

Artificial intelligence (AI) deployments in the Federal government are already making government smarter, based on examples shared during the second of a three-part series on AI launched last month by the House Subcommittee on Information Technology. Federal agency leaders from the Defense Advanced Research Projects Agency (DARPA), the General Services Administration (GSA), National Science Foundation (NSF), and Department of Homeland Security (DHS) discussed how AI is being implemented to improve the mission of their agencies and what is required to ensure the technology continues to be viewed as a problem solver. […]

The Senate Subcommittee on Communications, Technology, Innovation, and the Internet took a deep dive look at the future of broadband in the United States during a hearing on Tuesday. “To make next-generation broadband a reality and position the United States so it can win the global race to 5G, we should modernize outdated rules that delay and add unnecessary costs to broadband infrastructure deployment,” said subcommittee Chairman Sen. Roger Wicker, R-Miss. […]

Health

The Department of Defense (DoD) and contractor Cerner are coming off an eight week break in the initial deployment of what’s planned to be a worldwide health care records system. The team stopped work to address glitches in system performance and contend with negative user feedback. But officials in charge of the deployment of the MHS Genesis system said the pause was planned as part of the rollout, initial complaints were expected, and DoD still expects to complete the $4.3 billion system by 2022. […]

Like King Louie in the Jungle Book–Artificial Intelligence has to learn like people. Machine learning’s surely a brilliant student, but it’s still a slow learner. Once trained to recognize patterns, analyze huge amount of data, or interpret speech, they can do the job at lightning speed, often better than humans can. But the training part of that equation can be a labor and programming-intensive task, because machines still learn like machines–one thing at a time, often only after repeated instruction. […]

Not all bots are bad. But in the wrong hands, botnets can be commanded to do some very nefarious things, like Distributed Denial of Service–DDoS–attacks to disrupt and bring down websites. There are also malware-based bots that are increasingly being used to steal data and personal information. […]

Categories