Earlier this year, the Centers for Medicare and Medicaid Services launched a new eHealth Imitative, headed by Robert Tagalicod, director of the office of e-Health Standards and Services. The initiative's goal is to align health IT efforts and standards program with a focus that goes beyond the electronic health record incentive program.
According to a newly released privacy impact statement (.pdf) and local media reports, the Pacific Northwest National Laboratory will on Sept. 21 run a test to see if off-the-shelf cameras can be used to identify the faces of 20 lab volunteers mingled with people filing into the Toyota Center arena in Kennewick, Wash.
Cybersecurity as a field is yet too young and the threats change too rapidly for the federal government to undertake its professionalization, concludes a study from a National Academy of Sciences panel commissioned by the Homeland Security Department.
A Sept. 5 memo from Defense Department Chief Information Officer Teri Takai directs the heads military services and defense agencies to establish plans by Jan. 3, 2013 for moving to DoD enterprise email.
The National Institute of Standards and Technology awarded $7 million in grants that will support five identity protection and verification pilots in support of National Strategy for Trusted Identities in Cyberspace implementation. The grants will further the work of multi-year NSTIC pilots that were first unveiled in September 2012.
Weak user authentication permitted testers to penetrate the Transportation Department-wide network undetected, says a new departmental office of inspector general report.
A next generation 30 orbiter Global Positioning System constellation could be had for a few billion dollars less than planned by reducing the number of full GPS III satellites in favor of lower-cost satellites the Air Force is calling NavSats, the military service said in an April 2013 report to Congress.
Auditors are again finding problems with the Army's $1.4 billion enterprise resource planning system for its general ledger known as the General Fund Enterprise Business System, stating in a new report (.pdf) that it falls short on its real property functions.
Federal agencies with missions related to science and technology are funding research that aims to build capabilities for the analysis of massive data, says a new book published by the National Research Council. While authors did not recommend where agencies should increase grant money, they did outline emerging challenges and opportunities agencies should be aware of as massive data analysis becomes a more popular federal-funding area.
The Government Accountability Office is concerned that the Government Accountability and Transparency Board is hamstrung because it has no dedicated funding, no role in actual policy implementation and has not developed mechanisms for obtaining input from non-federal fund recipients.
Being able to spot duplicative information technology projects in and among agencies was a key reason for the federal enterprise architecture initiative launched by the Office of Management and Budget in February 2002--but more than a decade later the Government Accountability Office says a limited review of agency IT projects turned up $321 million worth of spending on potentially duplicative projects over a 6 year period.
Building a viable exascale supercomputer by 2022 will likely require at least $1 billion to $1.4 billion in funding and won't occur in America unless federal agencies spend money on its development, says a June Energy Department report to Congress. FierceGovernmentIT obtained an unredacted copy of the report (.pdf) through a FOIA request.
Cyber weapons capable of causing kinetic harm, such as the Stuxnet virus exacted on Siemens industrial control systems, require specificity in their coding because targets tend to be unique.
The Homeland Security Department needs to modernize its land mobile radio networks and in March 2012 awarded a $3 billion departmentwide strategic sourcing contract to do so. But the department's inspector general says poor procurement or inventory management practices could cancel out any savings realized from strategic sourcing.
Documents from a border crossing laptop seizure case show the Homeland Security Department using the international passenger alert system to seize the digital equipment of Americans without a warrant. "There's strong circumstantial evidence that they did this precisely to avoid the warrant requirement," said ACLU legal fellow Brian Hauss.
The Census Bureau is exploring new technology for the 2020 Census. By the time it begins collecting data it hopes the Internet will be the primary response option and it plans to use data the government already has to complete information for households that do not respond, said Census Bureau Director John Thompson. Still, field workers will be needed to go door-to-door, and that's where a bring your own device strategy may prove useful.
Federal employees utilizing multiple official email accounts doesn't go against record management practices so long as each email account is traceable to its single user, says the National Archives and Records Administration.
The office within the National Archives and Records Administration meant to review agency Freedom of Information Act policies and procedures hasn't really done so, says the Government Accountability Office. Those policies matter, because they control how agencies respond to document requests – but agencies can go for years without updating their procedures to accommodate new FOIA requirements.
The Homeland Security Department is deficient in its information technology continuity planning and its development of contingency strategies, says a DHS office of inspector general report (.pdf) dated Aug. 28.
The National Security Agency on a daily basis for 3 years illegally accessed telephone metadata records and misled the secret court meant to oversee the storage program, newly declassified documents show.