Ideas
Baker Tapped for VA CIO?
It looks like the Obama administration is vetting long-time federal IT executive Roger Baker for the chief information officer post at the Veterans Affairs Department, according to sources.
Cybersecurity
DHS prepares to deploy virtual fence
Lab testing of the Homeland Security Department's SBInet virtual fence revealed minor computer bugs that are expected to be fixed before construction begins in March or April, the program's director said.
Modernization
Air Force relaunches weather Web site
Video forecasts of weather conditions around the world are designed for families with deployed military service members.
Digital Government
DHS set to begin tech component of troubled border network
SBI Director Mark Borkowski says the program's on track but faces funding hurdles and Secretary Napolitano's history of skepticism.
Cybersecurity
ODNI's Hathaway expected to be named cyber czar
Cybersecurity advisor will conduct 60-day review of federal security efforts to drive President Obama's cyber agenda, sources say.
Acquisition
GSA gives Alliant small-biz contractors the all clear
The General Services Administration gave the all clear this week to the contractors tapped for the $15 billion Alliant Small Business contract.
Digital Government
Florida Guard's Ice Storm Expertise
At first it may seem bizarre why the state of Kentucky would ask National Guard units based in the Sunshine State of Florida for help in dealing with the aftermath of last week's ice storm, described by Kentucky Gov. Steve Beshear as <a href=http://www.time.com/time/nation/article/0,8599,1876304,00.html>the worst natural disaster</a> in that state's history.
Digital Government
Cyber Czars, Thumb Drives and Marines
I recently had a chat with Dale Meyerrose, former chief information officer for the Director of National Intelligence, and since last month the vice president and general manager of Cyber and Information Assurance for Harris Corp. I want to pass on some of his insights on cyber czars and how clever Marine NCOs can figure out how to do end runs on security policies.
Ideas