Federal Cloud Flag

Defense Department CIO Dana Deasy declined to comment today on DoD’s extension earlier this week of the deadline on the Joint Enterprise Defense Initiative (JEDI) cloud contract from September 17 to October 9. […]

The Department of Defense (DoD) has awarded to TekSynap, a small business based in Reston, Va., a $435 million contract for enterprise IT services and support for the Defense Threat Reduction Agency (DTRA).






[…]

It’s the Monday after a 6-goal barnburner in the World Cup final, a torrential downpour trophy ceremony, and we’ve now entered the era of existential dread for the world’s soccer fans. Reality sets in. It’s four years until the world’s biggest sporting event comes back around.






[…]

Dana Deasy, chief information officer at the Department of Defense (DoD), said today at the Defense Systems Summit that he would not commit to an official release date for the finalized request for proposal (RFP) for DoD’s Joint Enterprise Defense Infrastructure (JEDI) cloud contract.






[…]

An overwhelming majority–86 percent–of 150 Defense Department (DoD) IT managers surveyed by MeriTalk said that failing to modernize legacy DoD systems is putting U.S. national security in jeopardy, and a similar number (83 percent) are concerned about the potential of the U.S. falling behind adversaries like China and Russia in newer-technology arenas including cyberspace, artificial intelligence, and electronic warfare.






[…]

To celebrate Independence Day, the Department of Defense (DoD) released its Digital Engineering Strategy on Wednesday. The strategy “promotes the use of digital representations of systems and components and the use of digital artifacts to design and sustain national defense systems,” DoD said.






[…]

The National Defense Authorization Act (NDAA) for FY2019 will head into conference next week when legislators return from the Fourth of July recess. The $700+ billion must-pass defense spending bill has been approved in both the House and Senate, and now the two chambers must come together to reconcile differences in the legislation and re-vote the unified bill before it can land on President Trump’s desk for signing.






[…]

With cybersecurity threats on the rise, most recently seen in a Chinese hack of a Navy contractor, the Department of Defense is taking new steps to ensure security, in part by putting more of the onus on contractors.






[…]

The Pentagon is a very large building that houses a lot of the authorities for the U.S. Military. It's big. This photo doesn't do it justice, but they're kinda rightly concerned about people flying drones around there.

The Department of Defense (DoD) is using big data analytics and automated intelligence to both uncover discrepancies in budget-draining programs and engage leadership to direct funding to the correct priorities, according to a former Deputy Secretary of Defense and the founder of a business intelligence firm that supports the Pentagon.






[…]

Inventions that are crafted and patented in Federal laboratories are having a difficult time finding their way into use in the private sector, according to a report released Monday by the Government Accountability Office (GAO).






[…]

The possibilities of quantum computing have been floating on the horizon for a while now, at least since renowned physicist Richard Feynman dreamed up the idea in 1982. But like the horizon itself (at least in a world that isn’t flat), it always seems to recede despite all efforts to close in on it. Until now.






[…]

Federal agencies are facing a tall order in cleaning up their cybersecurity practices in the wake of some tough love dished out by the Office of Management and Budget (OMB) in a risk assessment and action plan released May 30. Agencies need to streamline processes, better share information, and finds ways of getting a better return on their cyber investments, all of which can be harder than it sounds.






[…]

A report issued May 31 by the New America Foundation’s Cybersecurity Initiative recommends that the Federal government consider three “priority efforts” to help state governments advance their own efforts to improve cybersecurity, including “designating specific cybersecurity funding that is linked to national priorities.”






[…]

1 2 3 5