This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The federal government is continuing to invest in generative AI technology produced by OpenAI, with a handful of agencies recently inking deals to use the enterprise version of the firm’s ChatGPT platform. The increased activity comes as policymakers weigh potential concerns with the technology, while also trying to exploit its potential benefits.
As data volumes continue to increase, federal IT leaders are considering cluster computing as a way to avoid spending money on maintaining storage infrastructure or public cloud.
Agencies can struggle to stick to recommended three- to five-year IT refresh cycles due to their large install bases, tight budgets and legacy technologies that are not interoperable with newer ones.
Native American tribes and tribal agencies looking to benefit from artificial intelligence and advancements in healthcare IT must prioritize cybersecurity and IT modernization, according to CDW technology experts, citing a recent Indian Health Service implementation as an example.
The General Services Administration and Microsoft reached an agreement under the Governmentwide Microsoft Acquisition Strategy (GMAS) to streamline IT acquisition processes and enhance cybersecurity standards for agencies procuring the companys services, the GSA announced Wednesday.
The Technology Modernization Fund awards a total of $19.67 When just 13% of IT projects funded in a traditional manner are successful, the Technology Modernization Fund’s 80% success rate demonstrates its value as a funding model of choice,” Clare Martorana, the federal CIO and the TMF board chair, said in a statement. Efficiency fuels innovation.”
Addressing underrepresentation in the IT workforce is the first step toward developing a robust pipeline of Native American IT professionals, according to Monday’s multipanel session at TribalNet 2024.
With the most recent Federal Information Security Modernization Act report cataloging 11 major incidents among government agencies in fiscal 2023, there is a clear need to continue improving overall cybersecurity. A key component is the federal identity credential and access management program created in 2009.
The Office of Personnel Management will lean heavily on artificial intelligence as it leverages a recent Technology Modernization award to update legacy mainframe programs for its retirement systems, according to an agency spokesperson. The latter approach would take five years, according to the spokesperson.
The General Services Administration has awarded its Polaris small business governmentwide acquisition contract for IT services to 102 vendors, with awards for other types of vendors on the way. Unlike its predecessor, the new Polaris contract doesnt have an award ceiling.
Now in its 20th year, the Department of Defense Intelligence Information System Worldwide Conference is the largest IT gathering focused on the defense and intelligence communities. DoDIIS, sponsored by the Defense Intelligence Agency, takes place in Portland, Ore.,
Census Bureau needed new devices for their workers to survey residents across the country, the organization’s IT leaders wanted to ensure the process of getting those tablets was seamless for tens of thousands of employees. They needed enumerators to have the devices in their hands so they could hit the streets.
The National Institute of Standards and Technology’s February release of version 2.0 of its Cybersecurity Framework is a milestone in the evolution of cyber standards, expanding them to encompass all sectors.
The Environmental Protection Agency lacks a complete and accurate inventory of its information systems and software asset management data, according to the agencys Office of Inspector General. Additionally, senior information officials and relevant IT personnel should be made aware of that designation.
Patrick Fredericks shared on LinkedIn Saturday that he has been elevated to vice president of enterprise IT at General Dynamics Information Technology. As the new technology VP, Fredericks will oversee GDIT’s enterprise IT offerings, including independent research and development and delivery efforts.
Addressing underrepresentation in the IT workforce is the first step toward developing a robust pipeline of Native American IT professionals, according to Monday’s multipanel session at TribalNet 2024.
Federal agencies face a wide range of cybersecurity threats, including ransomware, insider attacks and phishing attacks. Some of these threats come from relatively new vectors such as Internet of Things devices. Others are much older and elemental, including memory safety.
Raft, a technology consulting firm, has received a contract valued at $25.1 million from the U.S. Air Force to provide cloud computing and IT integration 2.0
The National Artificial Intelligence Research Resource pilot is an important but limited step in getting agencies to start planning to integrate AI technology into their work, according to an NVIDIA spokesperson. Led by the U.S.
Managing security effectively across a vast landscape of legacy technologies at some point feels like a losing proposition for federal cybersecurity and IT teams. There are too many updates, patches and critical fixes to tackle — all to maintain systems that likely don’t offer the power or agility required to run more innovative solutions.
Interview transcript: Tom Temin: Dan, this is one of those cases that sounds really arcane, markings on technical drawings, but you feel this is an important case for governmentwide. Tell us about it. Dan Ramish: Sure, Tom. So the government is different from commercial buyers in that it buys a lot of stuff that is going to be around a long time.
Let’s explore what cooperative purchasing entails and delve into the myriad ways it can revolutionize public sector procurement. What is Cooperative Purchasing? Cooperative purchasing lets organizations purchase goods and services through contracts already competitively solicited and awarded by a lead agency.
A home is more than just shelterit is a source of dignity, stability, and connection to the community. In a way, it can become our identity. Yet for decades, the residents of Villa 20, one of Buenos Airess historic informal settlements, lived without official addresses, access to basic public services, or even clean drinking water.
General Services Administration (GSA) is Transactional Data Reporting (TDR). TDR may initially sound intimidating, but it’s an essential aspect of doing business with the federal government—and can even work to your advantage once you understand it.
PCI Federal, an Alabama-based 8(a) enterprise owned by the Poarch Creek Indians, has acquired Superlative Technologies to expand its IT capabilities in the government contracting sector.
By Aparna Achanta, Principal Security Lead, IBM Shadow software-as-a-service refers to unauthorized cloud applications used within an organization. Shadow SaaS is a challenge in modern IT governance. IT teams lack oversight and monitoring of unapproved applications making it difficult to effectively govern shadow SaaS.
Government customers expect the technology resellers they work with to employ certain sustainability practices, such as IT asset disposition, to maintain compliance with environmental, cybersecurity and human rights regulations.
Last year, the Office of Management and Budget released FedRAMP guidance intended to make it easier and faster for federal agencies to put cloud solutions to work. Since the establishment of FedRAMP in 2011, cloud solutions have exploded, and they continue to grow exponentially.
million in TMF funds, NARA will upgrade two outdated IT systems no longer supported by its vendor with new cloud-based software. The new applications improve efficiencies and provide veterans and their families — and hundreds of federal agencies — with faster, more reliable and secure access to records.
The General Services Administration announced Wednesday that it has awarded IBM a 15-year, $903.5 million contract to provide a next-generation travel and expense management service for the federal government. All chief financial officers across federal agencies (except for the Department of Defense) will be required to use the new system.
The Army needs to improve its IT asset management to complement its security operations and create a more robust environment for the modern warfighter, according to CDW Government technology experts. Asset management refers to the steering of hardware and software, including applications, through their lifecycles, from…
The White House is gathering industry feedback as it drafts policies aimed at keeping the U.S. at the forefront of artificial intelligence innovation. Global competition around AI is intensifying as the technology reshapes industries, meaning the forthcoming AI Action Plan will arrive at a pivotal moment.
A clause in the Defense Authorization law for 2025 has procurement attorneys sitting up in their chairs. It calls on the Defense Department and the Government Accountability Office to develop a plan to test a novel idea: having companies that lose bid protests to repay DoD for legal costs. Chris Griesedieck: No, it’s not. Tom Temin: Wow.
The Defense Department has been investing in 5G wireless technology for years, partnering with commercial partners to test use cases at military bases for everything from edge computing to connected vehicles, base security and more.
Before the advent of cloud computing and self-service tech, IT professionals often drowned customers in tech jargon. But the industry’s evolution has brought a new way to interface with technology. Today, tech is intuitive and a lot more user-friendly. A toddler can master a tablet in minutes without any instruction. Agencies may cling…
Graber comes to government after a long career in the private sector, where his experience includes managing Googles security and privacy technical program for four years and joining Twitter before it became X as an information security manager and then a risk and data analytics senior manager, according to his LinkedIn.
The Department of Veterans Affairs is “playing catch-up” to agencies such as the National Institutes of Health in automating its acquisition processes, according to its chief acquisition officer.
These were among the chief findings of the Data Foundation and Deloittes recent survey of 232 CDOs, which also revealed that their responsibilities are increasingly ambiguous. The overlap between the roles of CDOs and other IT leaders,
When the Office of Personnel and Management secured $9.9 million from the Technology Modernization Fund to support its zero-trust security efforts, the agency was thinking big. “We We wanted to tackle it all,” says OPM CISO James Saunders of its journey to a zero-trust architecture. And for federal civilian agencies, the clock is ticking.
Many agencies suffer from unnecessary IT spending, unused licenses, Software as a Service (SaaS) sprawl and an incomplete picture of their technology posture due to a lack of software asset management visibility. The space agency isn’t alone: More than a quarter of about 800 IT leaders across the U.S.
The Defense Department has issued a formal notice to the contractor on its household goods moving contract , asking the firm to justify recent performance issues that appear to violate the terms of the multibillion dollar contract. The recent show-cause notice from U.S. GHC is truly a transformational effort.
An agency’s cybersecurity is only as airtight as that of its closest industry partners. That’s the thinking behind a lengthy compliance standard the Department of Defense introduced four years ago to ensure that data and meaningful information weren’t slipping into the hands of adversaries. which differs from the original in many ways.
Zach Whitman, the General Services Administration’s chief AI officer and data scientist, reminds his colleagues that the GSA was one of the first agencies to adopt email and internet access for the government workplace.
For the Citizen Potawatomi Nation, a tribe of nearly 40,000 in Shawnee, Okla., guarding against a potential loss of data related to its history, language and culture is a huge priority. Data is so important for a company, and that data needs to be backed up,” says tribe CIO Christopher Abel. “It
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content