Management

MeriTalk has released a report that reveals how federal IT managers view the barriers, current status, and future plans related to moving mission-critical applications to the cloud.

The report, released this week, also reveals that government could save an estimated $16.6 billion annually if all agencies move just three mission-critical applications to the cloud. Keep reading →


In this video, Mari Maeda of DARPA describes scenarios in which using data has helped soldiers do their job.


The video is from The Economist magazine’s Ideas Economy: Information 2012 event in San Francisco, California. Keep reading →

Borrowing insights gleaned from the FBI and the National Science Foundation, six U.S. lawmakers introduced legislation today that would revamp the leadership structure within NASA and U.S. space program.

The Space Leadership Preservation Act, introducedby Reps. John Culberson (TX), Frank Wolf (VA), Bill Posey (FL), Pete Olson (TX), James Sensenbrenner (WI) and Lamar Smith (TX), would create a 10-year term for the NASA Administrator. Keep reading →


Data is often compared to water: people talk about data purity, data flow, and of course, data leaks.

One of the ways that companies try to avoid data leaks is through keeping tight control over the pipelines through which data moves, but when most (or all) of an organization’s employees carry smartphones through which they access data, it’s like having a spigot in every pocket. Organizations then face a choice: limit the functionality of devices by restricting their access to data, install technological filters on the devices to minimize the chance of a leak, or trust their employees to safeguard their devices and the data that they either hold or can access, or some combination of the latter two.
_____________________________________________________
This is the second in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________ Keep reading →

Keeping track of telework is about to get a lot easier for telework managing officers (TMOs) – and a lot more valuable.

The U.S. Office of Personnel Management (OPM) has worked with the Federal Shared Service Centers to automate the collection of telework data via the Enterprise Human Resources Integration (EHRI) HR and Payroll data feeds. OPM will begin piloting the automated method this fall, with an eye on mandating government-wide participation next year when agencies collect data for the 2014 Telework Report to Congress.
_______________________________________________

This article originally appeared in The Teleworker. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.

_______________________________________________ Keep reading →

When the Department of Homeland Security hired Chief Information Officer Richard Spires three years ago, he became the seventh CIO in eight years tasked with bringing rationality to DHS‘s unwieldy IT fiefdoms – and delivering on a mandate for sharing information across the department.

Spires, a former IRS deputy commissioner in charge of operations, quickly set his sights beyond technology matters, persuading the department’s top officials that to succeed, it would take a functioning governance board and the commitment of top leadership to support that governance if DHS was to achieve those goals.

That effort, followed by a systematic portfolio review of every major IT program across the DHS, is clearly paying off, according to a Congressional report from the Government Accountability Office. The report, issued Sept. 18, generally praised the Department of Homeland Security for making progress in achieving its information-sharing mission. But it also cautioned DHS that further steps should be taken to continue that progress and improve its efforts.

The GAO auditors reviewed information obtained from customers of DHS’s information sharing efforts, including 10 of 77 fusion centers, where states and major urban areas collaborate with federal agencies to improve information sharing; 1 of 7 DHS operational components who participate in the DHS Intelligence Enterprise, ICE; and 2 of DHS’s 16 intelligence community customers, the Office of the Director of National Intelligence (ODNI) and the Federal Bureau of Investigation (FBI).

Investigators concluded DHS’s governance board is proving effective in enhancing collaboration among DHS components. The board has also developed and documented a process to prioritize some of the initiatives for additional oversight and support.

However, GAO said DHS needs to do more to sustain its progress: specifically updating its processes for identifying information-sharing gaps and the results; and analyzing root causes of those gaps. It also said DHS lacks an institutional record that would help it replicate and sustain

those information-sharing efforts.

The report also noted that funding constraints appear to be having a significant impact on DHS’s key information-sharing initiatives.

“Progress has slowed for half of the 18 key initiatives, in part because of funding constraints,” the investigation found, noting five of DHS’s top eight priority information-sharing initiatives

currently face funding shortfalls.

The governance board has not been able to secure additional funds for these initiatives because they ultimately compete for funding within the budgets of individual components, although the board’s involvement has kept some initiatives from experiencing funding cuts, according to DHS officials.

DHS’s eight priority information-sharing initiatives, as of September 2012, include:

  • Controlled Homeland Information Sharing Environment
  • Information Sharing Segment Architecture Transition
  • Law Enforcement Information Sharing Initiative
  • Common Operating Picture/User-Defined Operation Picture
  • Traveler Enforcement Compliance System Modernization
  • Private Sector Information Sharing Work Plan
  • Homeland Secure Data Network
  • Homeland Security Information Network
However, GAO also noted that “DHS has not yet determined the specific capabilities each particular program must implement for DHS to conclude that it has improved information sharing enough to achieve its information-sharing vision for 2015.”

Establishing the level of capabilities programs must implement could help DHS prioritize programs, and track and assess progress toward its vision, the report said.

DHS responded to GAO’s report, saying department officials concurred with GAO’s recommendations.

The stalemate over sequestration just got deeper with horribly predictable political posturing over the tardy release Friday of the Office of Management and Budget’s congressionally-mandated report on how the drastic automatic cuts would be implemented.

The 394-page report set the stage for the mutual denunciations in its preamble, declaring House Republican proposals to avert the sequester as “particularly irresponsible.” Keep reading →

Data.gov Evangelist Jeanne Holm is doing something never before tried in the federal government – creating a virtual world via social networking tools rather than face-to-face meetings.

That world is a compilation of issue-oriented web-based communities providing previously unavailable or hard-to-reach government data. Holm’s effort offers the federal government an example of a new way of working, without management silos and the tedium or expense of on- or offsite meetings. Keep reading →

Choosing the best software for soldiers on the battlefield is becoming as important as the weapons they use. But it’s also becoming an increasingly complicated supply challenge for military commanders and acquisition officials, according to defense experts.

There’s little question that real-time information – and the ability to analyze and act on that information quickly – is becoming the ultimate weapon for warfighters. Keep reading →

New college graduates entering the workforce this year may have gotten their first iPhone in high school and their first email address in middle school. While the class of 2007 used laptops for research in their dorm rooms, this year’s graduates could fact-check.

Surely, these new hires will have different expectations for the technology employers will provide and how it will be used. Keep reading →

Page 11 of 551...789101112131415...55