This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The Department of Defense outlined an aggressive zero-trust strategy in the past year, an “ambitious undertaking” in its deputy CIO’s words, and one that entails both the adoption of new technology and a cultural shift. To support this shift, the DOD stood up a Zero Trust Portfolio Management Office, helmed by National Security Agency veteran Randy Resnick and tasked with developing and aligning zero-trust efforts across the department.
LEGAL THOUGHTS – Episode 1 of Business Immigration: What You should know about the L-1A Intracompany Transferee Executive or Manager Visa? Coleman Jackson, P.C. | Transcript of Legal Thoughts Published June 20, 2023 Attorney introduction: Welcome to Legal Thoughts! My name is Coleman Jackson and I am an attorney at Coleman Jackson, P.C., a taxation, […] The post LEGAL THOUGHTS – Episode 1 of Business Immigration: What You should know about the L-1A Intracompany Transferee
CDC Data Maps Illustrate Threat Impacts It’s often impossible to confine environmental and public health events to a specific jurisdiction, agency or area of responsibility. That is particularly true of disasters with wide-ranging impacts. Last summer, the Centers for Disease Control and Prevention (CDC) launched its Environmental Justice Index (EJI), a new mapping tool that uses 36 indicators to measure environmental, social and health impacts nationwide.
National media is starting to pick the story up and I was interviewed yesterday for this piece (Portuguese only). Most of our conversation was about the topics I covered before in last week's blogpost but there is another extra bit of information that came to my attention in the meanwhile. In the post I mentioned a statement by the current Minister from March 2023 where he claimed that in the best case scenario, Portugal would get a better train factory, and in the worst case scenario, a worse o
Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader
Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,
Agencies re-evaluating their relationships with the cloud must remember that what they’re really looking for is the most cost-effective way to deliver a quality end-user experience to citizens and warfighters. A hybrid cloud model can guarantee that federal employees have access to data in the office, at home and on their phones. The government mandated cloud options for agencies’ workloads prior to the COVID-19 pandemic, which accelerated migrations in many cases.
Human rights concerns are at the top of the priority list for supply chain and procurement professionals. Among the most. The post Are contracts obscuring U.S. child labor in your supply chain? appeared first on Art of Procurement.
Increasingly, government leaders recognize the need to approach cybersecurity in the same way they approach public health: There must be a holistic network in which the well-being of individuals, or individual systems, depends on and benefits the well-being of others. Like viruses, cyber threats succeed by finding a vulnerability before moving on to overwhelm the larger population.
Increasingly, government leaders recognize the need to approach cybersecurity in the same way they approach public health: There must be a holistic network in which the well-being of individuals, or individual systems, depends on and benefits the well-being of others. Like viruses, cyber threats succeed by finding a vulnerability before moving on to overwhelm the larger population.
Within the world of US Federal Government Contracting, it is easy to become overwhelmed with all the acronyms that get thrown around. One acronym you might have come across is GWAC.
National security and defense agencies need air-gapped, cloud-based collaboration tools that ensure the security of top-secret information and support their hybrid cloud strategies before fully embracing remote work. A few companies, such as Cisco, which produces Webex, are developing specialized versions of the on-premises calling, meeting and messaging services they already provide agencies to meet their security requirements.
Procurement 6 is a short podcast from Art of Procurement that publishes in the Art of Procurement feed every Friday. The post [Pod] Procurement 6 – June 23rd, 2023 appeared first on Art of Procurement.
Agency leaders know they need to modernize, but many are running into roadblocks when it comes to implementation time, staffing shortages, and even an internal cultural resistance to change. These types of obstacles have led to 88% of federal IT professionals stating their agencies have fallen behind in their modernization plans. So how can agencies get back on track with their modernization journey?
In the extensive chatter since the Federal Acquisition Regulatory Council (“FAR Council”) published an interim rule on the new Federal Acquisition Regulation (FAR) 52.204-27, “Prohibition on a ByteDance Covered Application,” commentators have almost universally advised that if a federal contractor’s employee uses a device in connection with a government contract in any way, TikTok is banned on that device.
Now that my research project ‘Digital technologies and public procurement. Gatekeeping and experimentation in digital public governance’ nears its end, some outputs start to emerge. In this post, I would like to highlight two policy briefings summarising some of my top-level policy recommendations, and providing links to more detailed analysis. All materials are available in the ‘Digital Procurement Governance’ tab.
It’s never a good idea to break the law, but even more so in Pinellas County, Florida, where citations for minor infractions have been posted online with personal information like social security numbers available to the public. A local news station looked into the problem after a resident noticed his social security number on a citation for illegally parking his boat on a street.
Problem: Limited IT Budgets Slow Modernization Working with a limited IT budget typically forces an agency’s IT leaders to put up with outdated technology longer than they would. But at some point, something’s got to give. For instance, an employee at the Bureau of Industry and Security (BIS) was having trouble working with a spreadsheet. The problem was that the spreadsheet was massive, and their laptop didn’t have enough processing power to handle it, making it very unstable.
Registered businesses receive notices like this Sources Sought Notice from US Department of Treasury all the time. See what they’re saying, offering, and asking for. Get familiar and start to respond for your chance to win. The CDFI Fund sent an update on June 16th from the US Department of Treasury seeking a contractor to fulfil a contract. They have released a Sources Sought Notice for the following programs: CDFI Rapid Response Program CDFI Equitable Recovery Program Emergency Capital Investm
The Supreme Court’s recent decision in United States ex rel. Schutte v. SuperValu, Inc. clarified that the claimant’s knowledge and subjective beliefs, and not what an objectively reasonable person may have known or believed is relevant to determining liability under the civil False Claims Act (FCA). United States ex rel. Schutte v. SuperValu, Inc., No. 21-1326 (U.S.
Mid-market companies are characterized by ambitious growth trajectories and untapped potential. Procurement has a great opportunity to make an outsized. The post Procurement Strategies for Mid-Market Success appeared first on Art of Procurement.
One of the best measures of productivity when it comes to data is speed to insight — that is, how quickly employees can begin turning data into meaningful analysis. Unfortunately, employees often have to spend an inordinate amount of time doing the preliminary work of ETL: extracting data from various sources, transforming it into usable formats and loading it into a data lake or warehouse. “If it takes me all week to put together a report, is that really a valuable use of my time?
Together with colleagues at the Centre for Global Law and Innovation of the University of Bristol Law School, I submitted a response to the UK Government’s public consultation on its ‘pro-innovation’ approach to AI regulation. For an earlier assessment, see here. The full submission is available at [link] , and this is the executive summary: The white paper ‘A pro-innovation approach to AI regulation’ (the ‘AI WP’) claims to advance a ‘pro-innovation, proportionate, trustworthy, adaptable, clear
The Supreme Court’s recent decision in United States ex rel. Schutte v. SuperValu, Inc. clarified that the claimant’s knowledge and subjective beliefs, and not what an objectively reasonable person may have known or believed is relevant to determining liability under the civil False Claims Act (FCA). United States ex rel. Schutte v. SuperValu, Inc., No. 21-1326 (U.S.
“A lot of CPOs talk about talent shortages. I think that’s because procurement departments are generally growing in size and. The post [Pod] Investing in Next Generation Digital Literacy for Procurement w/ Andrew Daley appeared first on Art of Procurement.
For IT staff, managing legacy storage technology is a losing proposition: It takes an increasing amount of time and energy but provides diminishing returns. For example, many agencies manage multiple storage systems, each for a different type of storage format — e.g., block, virtual machine, file or object. Each format has benefits, but it can be a bear to manage all those individual systems and the interfaces involved.
I have been closely following developments on AI regulation in the UK, as part of the background research for the joint submission to the public consultation closing on Wednesday (see here and here ). Perhaps surprisingly, the biggest developments do not concern the regulation of AI under the devolved model described in the ‘pro-innovation’ white paper, but its displacement outside existing regulatory regimes—both in terms of funding, and practical power.
Late last month, the Biden administration launched the 8(a) MAS Pool Initiative. This initiative is a joint effort between the U.S. Small Business Administration (SBA) and the U.S. General Services Administration (GSA) to help small disadvantaged businesses (SDBs) participating in the 8(a) Business Development Program gain access to more federal contracts in GSA’s Multiple Award Schedule (MAS) Program.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content