Digital Government
That's Counterintelligence, No Spaces
Evidently I have some real eagle-eyed readers in the intelligence community, because I received a note pointing out that I had a slight misspelling when referring to counter-intelligence in <a href=http://whatsbrewin.nextgov.com/2009/02/thumb_drives_like_unsafe_sex.php>my continuing coverage</a> of the thumb-drive ban.
Digital Government
Panel: DOD needs experienced procurement people
Former defense officials agreed that the Defense Department can't make better purchasing decisions without experienced acquisition people.
Modernization
CBP to test trade data programs
The agency will test its collection and sharing of trade data starting in late March.
People
Agencies get cost-estimating advice from GAO
A guide offers step-by-step recommendations for how to avoid cost overruns, missed deadlines and performance gaps.
Modernization
GSA close to agreement with YouTube
Negotiations between GSA and several social media sites have focused on terms-of-service agreements.
Cybersecurity
John Klossner: Everybody's doing it
Earlier this month the FAA became the latest in a long line of agencies and companies that have had data hacked into and/or stolen.
People
Get a Life: What kind of employer?
With more hiring expected to help government carry out the economic recovery, a recent survey indicates what kind of employer government might be, writes blogger Judy Welles.
Digital Government
Government joins whistleblower lawsuit against EMC
Contractor is accused of providing kickbacks to partners and overcharging GSA.
Digital Government
States partner with White House to track stimulus spending
Reporting requirements pose risks, including sending data to numerous federal agencies instead of one central depository, says head of a national CIO group.
Digital Government
OK, Can't Treat Adults Like Adults
In my <a href=http://whatsbrewin.nextgov.com/2009/02/thumb_drives_like_unsafe_sex.php>last post</a> I endorsed the intelligence community's approach to thumb drives - don't ban them but issue warnings about the risks, and then assume end users will take an adult approach to the judicious use of computer technology.
Ideas