This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Many government agencies lag in adoption of cloud computing and cite various obstacles as a deterrent. Let’s examine some common beliefs about cloud migration to determine which might be true and which might be misconceptions. Fact: Government Agencies Struggle with Siloed Data Siloed data is a major obstacle for government agencies. Information collected over decades includes isolated and duplicate data that limits visibility across agencies, many of which operate under their own policies.
Procurement 6 is a new short podcast from Art of Procurement that will be published in the Art of Procurement. The post [Pod] Procurement 6 – September 02, 2022 appeared first on Art of Procurement.
All of us start somewhere. As a GS-15 looking back on 20 years in federal government, I had some amazing mentors and supervisors — and some not-so-amazing folks in my professional life. There are many basic skills younger feds could benefit from knowing early by asking a trusted advisor for advice and steps. Here are a few things I wish I’d tackled earlier in my career through on-the-job training or by simply asking questions. 1.
Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader
Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,
83% fear the biggest disruption from Brexit is yet to come, while increasing supply chain disruption caused revenues to drop by an estimated 18%. London, UK, 28th November, 2022. Research from Ivalua , a leading global spend management cloud provider , has revealed that 80% of UK businesses say that Brexit has been the biggest disrupter to supply chains in the last 12 months, while 83% fear the biggest disruption from Brexit is yet to come.
Public water utilities around the country are facing the monumental task of updating aging water systems. But trying to fund a persistent list of deferred and priority projects in an era of shrinking local government revenues, staff constraints, and heightened constituent sensitivity to rate increases makes for a challenging environment. There’s never been a better time to explore creative solutions for stretching budgets further and turning federal infrastructure funding into transformative inv
Oftentimes, contractors find it difficult to differentiate between the government’s acts taken in its sovereign capacity as opposed to those taken in its contractual capacity. The government acts in its sovereign capacity when it takes actions that are general and public in nature and do not target any particular contractor; rather the impact of the government’s action on its contracts is merely incidental to the purpose of a broader governmental objective.
Oftentimes, contractors find it difficult to differentiate between the government’s acts taken in its sovereign capacity as opposed to those taken in its contractual capacity. The government acts in its sovereign capacity when it takes actions that are general and public in nature and do not target any particular contractor; rather the impact of the government’s action on its contracts is merely incidental to the purpose of a broader governmental objective.
This is the eighth (and last) of an eight-part series addressing cutting-edge strategies for Certified Claims under the Contract Disputes Act (CDA). Certified Claims are the primary avenue available to government contractors to recover damages due to changes, delays, inefficiencies, and other government-caused issues – a particularly important point for contractors seeking to maintain positive cashflow while facing the prospect of an economic slowdown or recession.
Author: Liz Busch Public sector entities rely on the expertise and hard work of their contractors to successfully deliver on their mandates. Therefore, the relationships between the public sector and vendors are vital to the smooth operation of any government organization. But how can government employees ensure these positive vendor relationships while still maintaining control of the deliverables provided by contractors and the associated costs?
Although often overlooked, Graphic Design is incredibly integral to government work. Federal government design specifically relies on past and modern-day successes of good design practices in America.
This month it becomes easier to qualify for and remain in the Small Business Administration’s (SBA) programs as a direct result of high inflation over the last year. Notably, the SBA increased the maximum income, net worth, and asset qualification requirements and also raised business size standards across the board. This should make more business owners eligible to qualify for the valuable small business set-aside work for the federal government.
Deploying cost-effective, reliable infrastructure is a must in the public sector. Multiple cities and states turn to Amazon Web Services. Cloud resources are essential for serving web pages and juggling terabytes of user data. What should IT departments consider before hopping aboard? Click the banner to receive curated content by becoming an Insider.
“Perhaps I shouldn’t say this in a public sphere, but within our class of multilateral development banks, my ideal is. The post [Pod] Setting the Standard for Procurement in Western Africa w/ Steve Ashcroft appeared first on Art of Procurement.
Cloud-based technology can make agencies more efficient and reduce stress on government workforces. But not all public-sector entities embrace the cloud; in fact, some strongly resist it. During a recent online training entitled “Top Reasons Agencies Are Moving to Cloud in 2023,” GovLoop heard from three government and industry experts, who discussed why agencies sometimes balk at adopting cloud solutions.
Holdings company GTY Technologies acquired DemandStar , a Seattle startup that offers a public sector bidding marketplace. “We’ve had quite a bit of inbound interest as the tech sector as a whole has been consolidating, so we had a choice of partners,” DemandStar President and CEO Ben Vaught told GeekWire. “We chose Bonfire and GTY Technologies because of how great they are with their customers and the amount of customer value I believed we could create together moving forward.
Ivalua platform selected to improve efficiency, transparency, and the employee purchasing experience. Redwood City, CA, December 15, 2022. Ivalua, a global leader in spend management , and Capgemini, a global IT services and consulting firm, today announced that after a comprehensive evaluation of available technology solutions, the Volkswagen Group has chosen Ivalua’s platform to digitize its global indirect procurement processes for the Group’s entire brand portfolio.
The end of the year often marks a period of gratitude, where many pause to take time to celebrate and reflect on what they are thankful for. From their family to good health, to their jobs, Americans across the country can be found proudly declaring, “I am Thankful For.” NITAAC is no different and as we prepare to close out 2022, I wanted to reflect on what I am thankful for at NITAAC.
The Armed Services Board of Contract Appeals (ASBCA) recently issued a decision regarding a contractor’s claim for increased performance costs due to the economic impact of the COVID-19 pandemic. Notable about this case is the contractor’s invocation of a July 2, 2020 Department of Defense (DoD) memorandum concerning the financial consequences on contractors with firm-fixed-price contracts lacking an economic price adjustment clause during “historic and unprecedented challenges” in the wake of t
This is the seventh of an eight-part series addressing cutting-edge strategies for Certified Claims under the Contract Disputes Act (CDA). Certified Claims are the primary avenue available to government contractors to recover damages due to changes, delays, inefficiencies, and other government-caused issues – a particularly important point for contractors seeking to maintain positive cashflow while facing the prospect of an economic slowdown or recession.
The federal government collects and produces almost unimaginable amounts of information. The — 914 million unique files. And that’s just static information; every day there’s another report or white paper or written testimony that must be absorbed. If you want to learn more about what’s going on in government but need a break from screens, we’ve got an option.
The National Geospatial-Intelligence Agency (NGA) helps keep the world’s waterways safe for commercial vessels, private boaters, military ships and other mariners. As part of its role overseeing navigation, the agency identifies obstacles and hazards at sea and supports national security efforts by warning of potential threats. Earlier this year, NGA put in place artificial intelligence (AI) technology called the Source Maritime Automated Processing System (SMAPS), which helps analysts sort thro
Data is moving increasingly toward the edge. Gartner, for example, predicts that by 2025, more than half of enterprise-managed data will be created and processed outside the data center or cloud. At the same time, government agencies increasingly recognize the need to apply artificial intelligence to data, leveraging AI to accelerate analytics to drive actionable decision-making.
Overhauling the Navy’s IT structure isn’t a matter of a singular pivot. A ripped-to-the-studs approach became warranted after years of lag, with multiple entities — and billions of dollars — now focused on a midstream overhaul of the aged system. At a panel discussion earlier this year, Navy CIO Aaron Weis noted that the service branch is making a move toward modernization.
Federal agencies have long followed the National Institute of Standards and Technology’s Risk Management Framework for Information Systems and Organizations to help agencies select the appropriate safeguards related to cybersecurity, privacy and supply chain risk management. A key component of how agency IT officials assess risk and deploy new information systems is an authorization to operate, or ATO.
The role of the federal government in citizens’ everyday lives has drastically changed over the past two years. Between the pandemic, record-breaking data breaches, ransomware attacks and the shift to virtual services, federal agencies are looking for ways to continue developing their technology services to meet changing needs. The Government Accountability Office recently released a new strategic plan that will guide efforts from 2022 to 2027 as the agency aids federal operations and addresses
Imagine autonomous shuttle buses transporting military personnel around a base, or a smart warehouse using a distributed sensor network and robotics to track military vehicles. Or, picture a medic in the field receiving immersive training remotely. All of that and more is becoming reality at military bases from Georgia to the Hawaiian Islands, as the Department of Defense prototypes 5G wireless connectivity, network interoperability and security, and 5G-enabled applications such as augmented rea
Serverless architecture is not a new concept in government IT, but it is in the early phases of adoption. When it comes to computer models, it’s an upcoming trend to keep an eye on. Despite its name, a serverless architecture does require servers. After all, applications need a place to run. However, a serverless architecture differs from server-based architectures because it is managed by a cloud service provider, such as Amazon Web Services (AWS), Google, or Microsoft Azure.
When it comes to cybersecurity, visibility is key. Security teams need to know exactly what software and services are in use and especially what components those applications contain. How much open source is in use in the applications the organization uses every day? Are there any known vulnerabilities in the open source or other code components? Looking Under the Hood of Applications and Services Unfortunately, many organizations lack this level of visibility and do not know the precise makeup
While federal agencies may have opted for more bespoke applications and equipment in the past, some are now finding that preconfigured, plug-and-play options can offer a number of operational benefits. The adoption of ready-to-use technology indicates a shift within the industry toward an increasingly cloud- and service-based mindset. It also advances digital transformation efforts at a faster clip than agencies could on their own, according to Jonathan Alboum, federal CTO at ServiceNow.
For nearly two decades, the federal government, led by the Department of Defense, has been at the forefront of strong authentication, jumping far ahead of most private sector enterprises. Smart card authentication — based on digital certificates, a federal public key infrastructure (PKI), well-defined identity assurance levels and a physical access card — has been in place at federal agencies for many years.
This year marks the 20th anniversary of the pivotal E-Government Act of 2002, which provides guidelines on how government agencies use IT to handle personal information. Several federal CIOs who were on the front lines of carrying out the act said it was a critical part of their IT modernization journeys, driving technology to solve some of the most difficult challenges facing the government.
To see the impact of the Federal Information Technology Acquisition Reform Act, all you need to do is look at the numbers — and the letters. FITARA’s semiannual assessment ranks agencies on how well they meet the requirements outlined in the law, including data center optimization, enhancing CIO authority, cybersecurity and more. When 24 agencies were first assessed on the FITARA report card in 2015, only seven received a grade of C or higher.
The U.S. Department of Veterans Affairs oversees a diverse array of operations, including healthcare services, insurance and benefits systems, and cemeteries. As recently as four years ago, its video teleconferencing technology was equally diverse; each service area used its own equipment for its own purposes. The various video platforms weren’t necessarily compatible with each other, let alone easy to upgrade all at once.
“Our data’s been compromised.” Those are words no agency team member wants to hear. And, most likely, agencies will experience significant downtime in the process of recovering data, according to the Veeam 2022 Data Protection Trends Report. The report found that after an incident affects operations, 90 percent of enterprises experience a gap between how quickly they need that data to return to productivity and how fast they can actually recover it.
Without application programming interfaces, the modern internet would not be possible. APIs let developers connect easily to cloud-based and on-premises services from different vendors, as well as offer their own customers the ability to programmatically interact with products and services. APIs are the glue that holds modern technology environments together, but they also raise potential security concerns, requiring attention from developers and cybersecurity professionals to ensure they oper
While the transition to 5G continues, buzz is building around 6G, which experts say could finally unlock the internet’s almost magical potential. “5G is trying to enable the Internet of Everything, and it’s making some steps toward that, but 6G will really get it right,” says Jeffrey Andrews, director of 6G@UT, a research center at the University of Texas at Austin that was launched in June 2021. 5G-enabled carrier frequencies above 6 gigahertz will be used for the first time in a cellular syste
In addition to the traditional advanced persistent threats from traditional nation-state actors, cybersecurity threats have lately been coming from unexpected places. Legitimate software updates and open-source software have contained major vulnerabilities that IT experts did not expect. Tony Sabaj, head of channel engineering for the Americas/Office of the CTO for Check Point Software Technologies, explains what security officials should be watching for.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content