Have You Ever Had A Complaint/Suggestion About How The Federal Government Buys Technology

cao_logo

Everyone with any history in or around government has stories they can tell about federal government procurements. It really is a different beast. There are many reasons why. Perhaps the first 535 reasons are the 535 voting members of the US Congress that have the funding, oversight and legislative powers for how government works. Name […]

The Final DATA Act: Here’s What It Means, Here’s What It’ll Do

dawn-open-reuse

Editor’s note: Hudson Hollister is the executive director of the data transparency coalition. His insightful update below covers issues of interests to technologists in and out of government. -bg Sweeping change and open data are dawning for U.S. federal spending. On Thursday 10 April 2014 the U.S. Senate passed the DATA Act — unanimously. In […]

Innovators, Integrators and Tech Vendors: Here is what the government hopes they will buy from you in 2015

wh_2015_budget_0

Everyone knows it can be very hard to do business with the government. But you can take steps to make it easier to serve. The most important thing to do, in my opinion, is to be informed on government mission needs. How else can you determine if you have what the government really wants from […]

Some hallmarks and advantages of Data Center 2.0 in the federal enterprise

io

Today, IT requirements are changing.  IT trends are moving towards centralized processing, exploding stores of data and always-on always available services. Economic realities in the federal space are driving new approaches even faster now, since centralized processing and services make tremendous economic sense. Several federal mandates and requirements underscore this continued push to smartly modernize. […]

PortfolioStat: Rigorous program reviews similar to system integrator best practices

omblogo-150x150

Systems Integrators must put quality first or they will fail. Every integrator I know has processes in place to ensure program success. The best include rigorous reviews early in program life to help program managers succeed. Rigorous review processes check program documentation, personnel training, schedules, budgets, risks, and overall plans. Reviews also include input from […]

Agency cybersecurity deficiencies remain as attacks reach all-time high, Obama's Cyberwarfare Strategy Will Backfire and more

Here are the top cyber news and stories of the day. Napolitano: Cybersecurity executive order only part of the solution – “President Obama’s Feb. 12 executive order falls short of a complete cybersecurity plan and should be seen as a first step in addressing cybersecurity issues, said Homeland Security Secretary Janet Napolitano March 7.” It […]