This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
For the Citizen Potawatomi Nation, a tribe of nearly 40,000 in Shawnee, Okla., guarding against a potential loss of data related to its history, language and culture is a huge priority. That means protecting tribal history at CPN’s Cultural Heritage Center museum and data in the Tribal Rolls Department, which handles membership, including tribal enrollment, burial insurance and tribal ID cards.
Just days ago, the White House came out with a national security memorandum devoted to artificial intelligence. It’s a catch-all for trying to keep the United States ahead of A-I developments in what the memo calls the new frontier. For analysis, the Federal Drive with Tom Temin spoke with the Executive Vice President for Policy at the Professional Services Council, Stephanie Kostro.
Guidance from the Department of Commerce aimed at establishing a first-of-its-kind framework for using the agency’s public federal data with artificial intelligence tools could come in the next several months. Victoria Houed, director of AI policy and strategy to the undersecretary for economic affairs at the Department of Commerce, said the agency is aiming to publish that guidance by the end of the year or, if not, January 2025.
I recently returned from the 35th Annual Judicial Conference for the Court of Federal Claims. I wanted to send a hearty thanks to all of the organizers of the conference, especially Judge Tapp! It was a great opportunity presenting on the topic of Private Conflicts: How the New Private Sector OCI Rules Could Impact Federal Procurement. I also thoroughly enjoyed the other presentations at the conference.
Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader
Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,
Given the increasing fiscal constraints facing Latin America and Caribbean (LAC), it is imperative to adopt smarter, more strategic procurement approaches that reduce waste and enhance the efficiency of public funds, particularly with a focus on mid- and long-term developmental outcomes.Such strategy could go a long way in helping bridge the financing gap for development.
The Department of Energy has awarded four companies spots on a potential 10-year, $2.7 billion contract to procure uranium enrichment services to help establish a domestic supply chain of high-assay low-enriched uranium, or HALEU, used for deploying advanced nuclear reactors.
Zach Whitman, the General Services Administration’s chief AI officer and data scientist, reminds his colleagues that the GSA was one of the first agencies to adopt email and internet access for the government workplace. It shouldn’t come as a surprise, then, that GSA has fully embraced experimenting with generative AI, an emerging technology that has similar potential to transform the workplace, Whitman says.
Zach Whitman, the General Services Administration’s chief AI officer and data scientist, reminds his colleagues that the GSA was one of the first agencies to adopt email and internet access for the government workplace. It shouldn’t come as a surprise, then, that GSA has fully embraced experimenting with generative AI, an emerging technology that has similar potential to transform the workplace, Whitman says.
A defense contractor this month agreed to pay nearly a billion dollars to settle criminal fraud and other federal charges. Not some fly-by-night, but rather the legacy contractor Raytheon. The company is under Justice Department investigations for defective pricing, foreign bribery and violations of the Arms Export Control Act. My next guest says these problems aren’t isolated to Raytheon.
With the support of USAID, the Philippine Space Agency three years ago launched its Introducing Non-Geostationary Satellite Constellations Test Deployments to Improve Internet Service program, boosting the country’s collective connectivity. Since then, thousands of people in the Philippines have been connected to the internet because of INCENTIVISE — another example of the aid agency’s increasing interest in satellite technology.
There are two weeks to go until the 2024 U.S. Presidential Election. Interest, speculation, and tension have been building all. The post 2024 U.S. Presidential Election Special Series appeared first on Art of Procurement.
National security leaders play key roles in modernizing, protecting and defending the technologies that drive missions on land, sea, air and space. These leaders support one of the government’s most important missions: securing and defending the nation’s citizens, economy and institutions. The security-related missions highlighted here cover critical infrastructure, cyber-connected operating equipment, Internet of Things, [.
“Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security” by Chuck Brooks is a must-read for anyone who wants to understand and take advantage of the next wave of technological progress. Brooks is a well-known executive and adviser who breaks down complicated technological trends into easy-to-understand insights.
The State Department’s law enforcement arm, the Bureau of Diplomatic Security, defends the department and the foreign affairs community by applying cybersecurity, technology security and law enforcement expertise to help advance U.S. foreign policy and safeguard national security interests. Specifically, the bureau’s Directorate of Cyber and Technology Security is responsible for ensuring tactical cyberdefense for all U.S. diplomats and data held by the department, spanning more than 260 locatio
The Defense Department released the final rule for the long-awaited Cybersecurity Maturity Model Certification program today, further paving the way for CMMC requirements to show up in contracts starting next year. The final CMMC program rule was released for public inspection today. It’s expected to officially publish in the Federal Register on Tuesday, Oct. 15.
In an era of increasing digital fraud, federal and state government agencies are ramping up efforts to strengthen identity verification and fraud prevention systems. Modern solutions integrating third-party consumer data and device intelligence are becoming essential to combat synthetic identities and safeguard public services, according to a new report produced by Scoop News Group for TransUnion.
Whenever I find out that a company – or a person – decided to do something new in 2020 or. The post Creating a B2C to B to C Improvement Cycle at Walmart Business appeared first on Art of Procurement.
In August, the U.S. Department of Justice (DOJ) launched its Corporate Whistleblower Awards Pilot Program. So far, the program has received over 200 whistleblower tips according to a DOJ official. On October 23, Principal Associate Deputy Attorney General Marshall Miller delivered remarks at the New York City Bar Association Compliance Institute. “In the first few months of the Justice Department’s whistleblower awards program, we’ve already received more than 200 tips,” he stated.
Photo: Korean Culture and Information Service (Jeon Han) Prof. Daein Kim Professor Daein Kim of Ewha Womans University’s School of Law (Seoul) is visiting Washington with a team of fellow researchers from South Korea to share lessons learned on humanitarian assistance in fragile states. Professor Kim previously visited George Washington University Law School as a Visiting Scholar, and he is a long-time friend of and fellow researcher with GW Law’s Government Procurement Law Program
U.S. Navy IT leaders received notification from an aircraft carrier on deployment that the ship’s entire unclassified network was inoperable in April 2022. “The impact is tremendous,” says Jeff Myers, deputy program manager for PMW 160, the Navy’s tactical networking program office. The office oversees the Consolidated Afloat Networks and Enterprise Services, or CANES, program, providing a tactical edge network for all ships and submarines in the Navy.
Want to expand your small business with government contracts? This article covers how a small business government contractor can qualify, find opportunities, and thrive in this space. We’ll explore essential resources, strategies for winning contracts, and compliance requirements. Key Takeaways Small businesses must qualify for federal contracts through various programs like the 8(a) Business Development, HUBZone, and Women-Owned Small Business Federal Contract programs, which ensure fair compet
The Federal Bureau of Investigation is using artificial intelligence to mine tips about potential threats but is revealing little about how the system actually works. Specifically, the bureau is using a system it calls the “Complaint Lead Value Probability” to prioritize tips by conducting algorithm scores and triaging, according to two versions of an agency AI disclosure.
In 1932, Aldous Huxley published the book Brave New World. At the time, the actual world was perched between World. The post Tips for Surviving in a Brave New World appeared first on Art of Procurement.
In a ruling that could shake up the landscape of whistleblower litigation, a federal district court struck down a key provision of the False Claims Act as unconstitutional. The decision, which came out on September 30, 2024, in United States ex rel. Clarissa Zafirov v. Florida Medical Associates, LLC , found that the FCA’s qui tam provisions violate the Appointments Clause of the U.S.
Photo: Umm Al Quwain – Rainer Strehl David Drabkin and Christopher Yukins presented on October 3, 2024 at the International Public Procurement Conference 9, a regular event which was held this year in the emirate of Umm Al Quwain in the United Arab Emirates. (Because of a surge in armed hostilities in the Gulf, they presented virtually.) Messrs.
Cloud security posture management offers a lifeline to agencies struggling to implement cyber best practices, such as continuous monitoring, when going multicloud. The Senate’s consideration of the Multi-Cloud Innovation and Advancement Act of 2023, which would help agencies modernize and streamline their IT environments, also underscores these conflicting priorities amid increased multicloud adoption.
Delivering top-notch internal customer support is crucial for nonprofit organizations. Efficiently addressing internal customer support tickets can profoundly impact an organization’s productivity and employee well-being, apart from their ability to focus on the mission at hand. To meet these demands, many nonprofits, including Thorn , are turning to innovative technology solutions.
In the pre-GPT era of artificial intelligence, there wasn’t a ton for the National Archives and Records Administration — and its billions of unstructured documents — to do with the technology. According to Gulam Shakir, NARA’s chief technology officer, those more nascent AI tools “did not really fit” with the agency’s needs — namely the processing and management of massive “free-form” datasets lacking any logical formatting or rules.
We know supply chains are complex, but to truly understand how complex they are, and how they reached this point, The post Supply Chains as Business in Action appeared first on Art of Procurement.
On October 10, the U.S. Securities and Exchange Commission (SEC) issued a $12 million award to three joint whistleblowers who voluntarily provided the agency with original information that led to a successful enforcement action. Through the SEC Whistleblower Program , qualified whistleblowers are eligible to receive awards of 10-30% of the funds collected in an enforcement action aided by their disclosure.
Centerra Construction Partners, a Constellis company, has landed a $54 million contract from the Naval Facilities Engineering Systems Command Far East for base operations support. Constellis said Tuesday the multi-year Singapore Base Operations Support Contract, awarded on April 9, covers multi-function base operations support services for the Navy and other military service branches.
With the most recent Federal Information Security Modernization Act report cataloging 11 major incidents among government agencies in fiscal 2023, there is a clear need to continue improving overall cybersecurity. A key component is the federal identity credential and access management program created in 2009. FICAM supports modernized security policies and solutions, allowing risk-based decision-making, automating identity and access management processes and moving access protections closer to
The nature of global conflict has changed, extending the battlefield beyond the physical realm and into the cyber domain. As physical barriers continue to fall and global tensions rise, the United States has recognized the need to master cyber combat, but so have its adversaries.
MITRE, the federally funded operator of research and development centers on behalf of agencies, unveiled plans this week to train three new artificial intelligence foundation models in critical infrastructure, weather modeling and sustainable social services. The Federal AI Sandbox, a supercomputer, is expected to be capable of training large-scale foundation models and supportive of generative AI, multimodal perception systems and reinforcement learning decision aids, according to a Wednesday p
“Let me be clear: we don’t want any form of semi-automation or full automation. We want our jobs—the jobs we. The post East and Gulf Coast Port Strike – Part 1 appeared first on Art of Procurement.
On October 10, U.S. authorities announced that TD Bank agreed to pay $3.1 billion in penalties and pled guilty to violations of the Bank Secrecy Act (BSA), the nation’s primary anti-money laundering (AML) law. TD Bank will pay $1.8 billion in penalties to resolve the Department of Justice’s (DOJ) investigation and $1.3 billion to the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN).
Consulting company LMI has booked a contract from the Deputy Assistant Secretary of the Army for Data, Engineering and Software to help enhance the Army’s digital capabilities at Impact Level 5.
Agencies rely on multiple tools and vendors for cybersecurity. According to Cisco, 23% of agencies use 11 to 20 security vendors whose tools often function independently rather than as a cohesive system. Such fragmentation limits visibility and increases security threats, highlighting the need for interoperability, especially with the upcoming deadline for adopting zero-trust architectures.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content