There are plenty of good reasons for creating enterprise architectures: Such models can take the sting out of integrating agency functions, launching new initiatives or just optimizing existing functions and IT investments.
Fourteen senators asked Appropriations Committee leaders to help restore funding for the Small Business Innovation Research program, which provides research and development funds to small businesses. Funding for the program was cut in the omnibus appropriations bill.
Rep. Mac Thornberry, R-Texas, was named chairman of the new House Homeland Security subcommittee on Cybersecurity, Science and Research and Development. Rep Zoe Lofgren, D-Calif., was named ranking minority member.
While the concept of an enterprise architecture may remain an abstract notion to many agency executives, one integrator is hoping to show managers at the Census Bureau how useful an enterprise architecture can be, mainly by deploying flexible modeling software from Computas NA Inc., Sammamish, Wash.
Administration officials sought to reassure information technology industry executives that the federal government has not lost its focus on cybersecurity.
Rep. Darrell Issa, R-Calif., has introduced legislation to mandate that the Army use American-based cell phone technology when building out a cellular phone infrastructure for Iraq.
Administration officials sought to reassure information technology industry executives that the federal government has not lost its focus on cybersecurity during a Capitol Hill forum today.
When <b>Dave Zeppieri</b> joined the Office of Justice Programs last March as its chief information officer, he knew almost immediately that he needed help putting together budget plans that would pass muster with the Office of Management and Budget.
New procedures for public-private competition of government jobs likely will omit a provision for direct conversion of public-sector work to the private sector.
At a Senate hearing today, federal officials said efforts to unbundle contracts and ease the effects of necessary bundling on small businesses could work if properly implemented and monitored.
A possible solution to computer security vulnerabilities may be to widen the scope of parties that could be held liable for the damage they do, according to a report from the National Academy of Sciences.
The Navy's new guide for establishing a Navy-Marine Corps Portal says the new portal must be capable of integrating and viewing data using commercial standards for Web services as specified by the service's chief information officer.
The Air Force has had such poor luck running OMB A-76 competitions to outsource IT that the service no longer considers use of A-76 beneficial, the service's CIO said today.
Congress should give the president fast-track authority to reorganize government agencies to prevent the squabbling that hampered the creation of the Department of Homeland Security, a key House lawmaker said today.
<FONT SIZE=2>An interim acquisition rule went into effect March 1 requiring Defense Department contractors to submit bills electronically and DOD to process the bills electronically. The capability is required by the National Defense Authorization Act of 2001. </FONT>
<FONT SIZE=2>Legislators Feb. 25 launched the congressional E-911 Caucus. Caucus members want to ensure emergency call centers get funding to comply with the Federal Communications Commission's Enhanced-911 services mandate. The nation's wireless carriers have until 2005 to adapt their service so that emergency dispatchers can find the location of a 911 call made on a cell phone.</FONT>
<FONT SIZE=2>The Defense Department CIO is expected to sign a policy next month that will set guidelines for using wireless devices across the department. The new policy will revise the Pentagon Area Common IT Wireless Security Policy signed last fall, said Dawn Meyerriecks, chief technology officer for the Defense Information Systems Agency. DOD users and vendors should find the departmentwide policy more comprehensive than the Pentagon policy, she said. </FONT>