Biography for David Perera
David Perera is executive editor of the FierceMarkets Government Group, which includes FierceGovernment, FierceGovernmentIT, FierceHomelandSecurity, and FierceMobileGovernment. He has reported on all things federal since January 2004 and is co-author of Inside Guide to the Federal IT Market, a book published in October 2012. Based in greater-metro Washington, D.C., Dave can be reached here and can be found on LinkedIn or here. Tweeting at @daveperera.
Articles by David Perera
The secretaries of the Defense and Veterans Affairs departments will meet Feb. 5 to likely approve a software development approach permitting the accelerated rollout of a joint electronic health record, VA Chief Information Officer Roger Baker told reporters Wednesday.
Veteran Affairs Department Chief Information Officer Roger Baker spoke with reporters Jan. 30 about the department's data breach reports from September (.pdf), October (.pdf), November (.pdf) and December (.pdf). Click on the media player to listen to the call in full (approx. 1 hour).
In a Jan. 18 privacy impact assessment (.pdf), TSA says it plans to connect the scanners to the watch list via its Secure Flight program, which matches passenger data to databases of suspected terrorists. TSA announced a three U.S. airports pilot of the scanners--dubbed the Credential Authentication Technology/Boarding Pass Scanning System--in April 2012.
Among the deliverables called for by OMB are for all agency chief information officers to appoint by March 25 a Section 508 coordinator and for CIOs and chief acquisition officers to by May 24 develop a plan and a schedule for completing a baseline assessment of Section 508 compliance on their websites and in IT procurement. The results of those assessments are due in December.
Network penetration is "the 21st century nuclear weapons equivalent," said Sen. John Kerry (D-Mass.) while testifying Jan. 24 during a Senate hearing held over his nomination to be secretary of state. What's needed, he added, is "cyber-diplomacy and cyber-negotiations" in order to "try to establish rules of the road that help us to be able to cope with this challenge."
Obama administration criticism of the open government watchdog community overlooks the gap between good policy and implementation, said Nate Jones while speaking earlier this month on a Freedom of Information Act panel at American University.
The distance between government policy favoring open source technology and solicitations that don't actively discriminate against it can be great. That's the case found in a sample of 80 solicitations conducted by the Dutch government between January and June 2010.
The bill (S. 21) doesn't propose action per se but calls on the legislative branch to affirm through a "sense of Congress" a number of creeds. Among them are that there should exist mechanisms for sharing cyber threat and vulnerability information between the government and the private sector, and that the two should develop a system to "assess cyber risk and prevent, detect, and robustly respond" to attacks against critical infrastructure.
Tom Sasala, chief technology officer for the Army Information Technology Agency, said during a Jan. 23 conference that in his underground Pentagon office, his cell phone "hits what I call about half a bar--just enough to tell it that it can connect, but not enough for it to actually do anything, so it's completely useless." He spoke at the 2013 Federal Mobile Computing Summit in Washington, D.C.