recommended reading

author archives

Bob Brewin

Editor at Large

Bob Brewin joined Government Executive in April 2007, bringing with him more than 20 years of experience as a journalist focusing on defense issues and technology. Bob covers the world of defense and information technology for Nextgov, and is the author of the “What’s Brewin” blog.

Results 2291-2300 of 3080

Army abruptly stops rollout of electronic dental record application

November 3, 2009 The Army Medical Command abruptly stopped fielding an electronic dental record application that is part of a larger health record network the Defense Department operates for soldiers, according to internal e-mails provided to Nextgov. Maj. Gen. David Rubenstein, the Army's deputy surgeon general, directed what he called a "strategic pause"...

from govexec

Army abruptly stops rollout of electronic dental record application

November 3, 2009 The Army Medical Command abruptly stopped fielding an electronic dental record application that is part of a larger health record network the Defense Department operates for soldiers, according to internal e-mails provided to Nextgov. Maj. Gen. David Rubenstein, the Army's deputy surgeon general, directed what he called a "strategic pause"...

No, This is The Intel Budget

November 2, 2009 The United States spent $49.8 billion on the National Intelligence Program for fiscal 2009, according to a press release issued on Oct. 30 by Dennis Blair, director of National Intelligence. That put the total budget for all intelligence agencies that operate under Blair -- such as the CIA, the National...

Army Technology Live

October 30, 2009 The U.S. Army Research, Development and Engineering Command plans to launch a blog on Nov. 2, the latest entry into the Army Live/Defense Department Live blogosphere. At he moment, the blog has only a few archived links, but it could prove quite tantalizing when fully populated. The command works on...

Questions For VA Contract Award

October 29, 2009 ACS Federal won the contract that the Veterans Affairs Department announced on Wednesday to pitch in, on a temporary basis, to help the department process GI bill benefit claims. VA told me four bidders responded to the requests for proposals, and ACS Federal was chosen because "they submitted the highest...

Compact field system keeps commanders plugged in without weighing them down

October 29, 2009 Think of military command-and-control (C2) systems for contingency operations, and the mind conjures up visions of large, trailer-mounted satellite dishes or banks of routers and switches in a truck or Humvee that provide data and communication feeds for commanders in the field. But at the Joint Communications Support Element --...

VA Seeks Help for GI Claims Work

October 28, 2009 This just in . . . The Veterans Affairs Department announced on Wednesday that it plans to contract for outside help to process what it called an "unprecedented" amount of education claims generated by the post-9/11 GI bill. VA said that the claims, when combined with the standard high volume...

VA will turn to a contractor to reduce backlog of GI educational benefits

October 28, 2009 The Veterans Affairs Department said it issued a solicitation for temporary contractor support to help process what it called an unprecedented volume of educational benefit claims it has received since the post-9/11 GI bill went into effect. The contract "will assist VA in delivering education benefits to our veterans as...

from govexec

From Nextgov.com: VA will turn to a contractor to reduce backlog of GI educational benefits

October 28, 2009 The Veterans Affairs Department said it issued a solicitation for temporary contractor support to help process what it called an unprecedented volume of educational benefit claims it has received since the post-9/11 GI bill went into effect. Read the full story on Nextgov.com

Where's VA's Report?

October 27, 2009 Last week I reported that the Veterans Affairs Department didn't include education claims data in an online report, called the Monday Morning Workload Report, which details pending claims managed by the Veterans Benefits Administration. Through the end of September, VBA presented the pending disability, education and even burial claims data...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.