recommended reading

author archives

Bob Brewin

Editor at Large

Bob Brewin joined Government Executive in April 2007, bringing with him more than 20 years of experience as a journalist focusing on defense issues and technology. Bob covers the world of defense and information technology for Nextgov, and is the author of the “What’s Brewin” blog.

Results 21-30 of 3080

Navy Picks Dell for Cloud Email Pilot Program

October 21, 2014 The Navy has tapped Dell to provide it with a Microsoft enterprise-as-a-service cloud email system for its reservists. The Navy says the Microsoft cloud email pilot will save hundreds of millions of dollars as an alternative to the service’s Next Generation Enterprise Network, known as NGEN. In mid-September, the Space...

Navy Will Get Its Microsoft Cloud Email from Dell in $2.1M Deal

October 20, 2014 The Navy has tapped Dell to provide it with a Microsoft enterprise-as-a-service cloud email system for its reservists. The Navy says the Microsoft cloud email pilot will save hundreds of millions of dollars as an alternative to the service’s Next Generation Enterprise Network, known as NGEN. In mid-September, the Space...

Intelink Sets Up Ebola Website

October 20, 2014 Intelink -- the word used to describe a whole bunch of intelligence community intranets -- has set up an open source and unclassified website on the Ebola crisis worldwide. The daily Intelink Ebola feed is carried by the All Partners Access Network, run by the Defense Information Systems Agency. APAN...

Preparing for Future Catastrophes, the VA Reaches to the Past

October 17, 2014 The Department of Veterans Affairs plans to build a nationwide high-frequency radio network to connect its medical facilities in case of an emergency that knocks out other forms of communications -- applying century-old technology to current needs. VA said in a contracting notice Tuesday it intends to award a five-year,...

Here Comes the Army Cyber Battle Lab

October 17, 2014 The Army currently operates a Network Battle Lab and plans to change it to the Cyber Battle Lab beginning in October 2015 -- and is looking for some contractor support. What’s the difference? The Network Battle Lab was focused only on experimentation to support the network, but will now add...

Ebola Vaccine Development Probably Too Late to Deal with Current Crisis

October 17, 2014 The Department of Health and Human Services has three Ebola virus vaccines in the research and development pipeline to prevent the spread of the disease at home and abroad as quickly as possible. “We are pushing hard to advance the development of multiple products as quickly as possible for clinical...

Huge Bidder Pile-On for VA’s $22.3 Billion Tech Deal

October 16, 2014 The number of companies that have expressed interest in bidding on the Department of Veterans Affairs’ Twenty-One Total Technology Next Generation contract -- known as T4NG -- hit 635 vendors Tuesday, according to a VA spreadsheet. The list of interested bidders ranges alphabetically from A1C Partners LLC to Yakshna Solutions...

VA Plans to Build Nationwide High-Frequency Radio Network to Communicate During Emergencies

October 16, 2014 The Department of Veterans Affairs plans to build a nationwide high-frequency radio network to connect its medical facilities in case of an emergency that knocks out other forms of communications -- applying century-old technology to current needs. VA said in a contracting notice Tuesday it intends to award a five-year,...

Institute of Medicine Plans Ebola Research Workshop

October 15, 2014 The Institute of Medicine said it will hold a one-day workshop Nov. 3 to examine the areas of biomedical and public health research that should be conducted to best prepare the United States to safeguard the public as a result of the emergence of Ebola. IOM said the workshop, requested...

HHS Awards Contract for Ebola Vaccine Shown to be 100 Percent Effective in Animal Tests

October 15, 2014 The Department of Health and Human Services awarded Tuesday an $8.2 million contract to Baltimore-based Profectus BioSciences Inc. for research and development of an Ebola vaccine proven 100 percent effective in animal tests, according to the company. Elleen Kane, an HHS spokeswoman, said the contract is for animal studies but...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.