Four Ways One Agency Recognizes that CORs Matter

By Patricia Miller, Senior Acquisition Analyst Recently I wrote an article about the significant role that Contracting Officer’s Representatives (CORs) play in the acquisition process flow. In “Do COR’s Matter in Your Agency? Why they Should,” I advocated the importance of reassuring CORs that they are a valuable force within acquisition teams. This blog generatedRead… Read more »

IJIS Institute’s Technical Advisory Committees Publish New White Papers

Papers explore the NIEM-UML specification and provide guidance on selecting and implementing technology solutions Ashburn, VA (August 21, 2013). The IJIS Institute, a nonprofit organization that focuses on mission‐critical information sharing for justice, public safety, and homeland security, is pleased to announce the publication of two new white papers authored by IJIS Institute Advisory Committees:Read… Read more »

Gov 2.0 at SxSW 2014

The argument has been made that South by Southwest has outlived its usefulness as a technology and culture festival. Yet the annual gathering, often called “South-by” and spelled SxSW, continues to attract tens of thousands of participants and a docket of speakers that should inspire anyone interested in technology’s impact on nearly any facet ofRead… Read more »

From Gov 2.0 to GovInnovate – expanding the agenda

I’m pleased to note that CEBIT, whose Gov 2.0 Conference has been a great event over the last few years, has recognised the growing innovation agenda in government and broadened this annual conference into GovInnovate. Now including Gov 2.0, Cyber Security, Service Design and mobile Government (mGov) streams, the GovInnovate conference looks like it willRead… Read more »

More Transparency Needed for Federal Communicators to Build Public Trust

As a federal communicator, are you able to share as much information and data with the public as needed, or is real transparency just the latest buzzword? Do you often run into antiquated bureaucratic stonewalls and other internal obstacles when trying to foster greater transparency and open government? If so, this is likely problematic notRead… Read more »

What You Should Know About Cyber Heists

Our resident security expert and a retired Army JAG David Willson, JD, LLM, CISSP, Security+, shared this blog with us on cyber heists. A cyber heist is a robbery that occurs in cyberspace or on the Internet. Hackers usually compromise business networks with e-mail scams and phishing attacks. They also steal usernames, passwords, logon credentials,Read… Read more »