Acquisition

Deadline looms for $6 billion military intelligence IT contract

Vendors interested in the $6 billion Enhanced Solutions for Technology Enterprise need to submit their proposals by mid-May.

Cybersecurity

White House urges changes to clearance rules

The government plans to move to a continuous evaluation method for security clearances, which will require new IT systems to store and search through data.

Digital Government

NGA: Seeking full immersion in geospatial data

NGA's Map of the World will serve as the backbone for the agency's innovative efforts to satisfy the geospatial appetites of the 17 intelligence agencies.

Modernization

DOD expects to add nine commercial cloud providers

CIO Teri Takai said four companies are currently approved to run cloud services for the military, though only one has been publicly disclosed.

Cybersecurity

Budget request for classified IT climbs 14 percent

Difference between budget request and IT Dashboard data suggests $6.15 billion for fiscal 2015.

Cybersecurity

Federal agencies flunking FOIA

None of the 15 agencies studied earned an A on a Freedom of Information Act report card from the Center for Effective Government, and seven – including DOD, DHS and State – got an F.

Cybersecurity

Federal 100: Maj. Gen. George J. Franz III

None

Cybersecurity

Federal 100: Michael Butler

None

Modernization

Federal 100: James Brown

None

Modernization

Federal 100: Martin R. Gross

None

Modernization

Federal 100: Randy Cieslak

None

People

Federal 100: Linda Hudson

None

Digital Government

Federal 100: Victor Hernandez

None

Digital Government

Federal 100: Patty Morris

None

Digital Government

Federal 100: Capt. Trent A. Janda

None

Digital Government

Federal 100: Col. Patrick W. Burden

None

Digital Government

Federal 100: Michael Krieger

None

Digital Government

Federal 100: Randy Fuerst

None

Digital Government

Federal 100: Ivy Estabrooke

None

Modernization

DARPA seeks dielets to defend the IT supply chain

The tiny electronic will be used to authenticate the provenance of components.