8:00 AM ET In 2010, the DOD launched the Better Buying Power initiative in an effort to simply and improve its acquisition of products and services. In April of 2015, Pentagon acquisition head Frank Kendall released the updated, Better Buying Power 3.0, which renews focus on long-term R&D and achieving dominant capabilities through technical excellence and encouraging private sector innovation. The renewed initiative will focus on long term investments such as cybersecurity, big data, advanced computing, robotics, and other investments to maintain U.S. technological superiority. After five years and three iterations of Better Buying Power, what is the "State of Defense Acquisition"?
September 29, 2015 Defense One and Iraq and Afghanistan Veterans of America will once again team up to produce “Veterans: The New Battleground," an event featuring top leaders and experts on the most urgent issues facing veterans. This event will continue dialogue and drill down into impact areas affecting veterans.
September 9, 2015 The mission of Nextgov Prime is to provide today’s and tomorrow’s federal IT decision-makers and influencers with insight into technological innovations to improve how the government works. Prime will convene technology CXOs, innovators and thought leaders to explore ideas and discuss solutions to current challenges and critical issues in the government of tomorrow.
August 5, 2015 Used to dealing with companies that distinguish themselves through superior customer engagement, today’s public has come to expect a level of customer experience to which most agencies haven’t been able to live up. However, the Obama administration’s prioritization of customer experience puts federal agencies in the challenging position of pushing to provide a first-class customer experience while meeting their unique missions. With the right combination of customer-focused strategy, technology, and talent, federal agencies have a chance to significantly raise the bar for the government’s customer service.
July 30, 2015 Ever wonder how organizations like Google and Facebook deliver such highly available, dynamically scalable infrastructure without maintaining datacenters on every corner in America? Federal agencies of any size can adapt those world-class architecture models in their own environments. Today. Want to learn how?
July 21, 2015 In the coming fiscal year, the White House expects the federal government to spend some $7.5 billion on provisioned services like cloud computing. Four years removed from the unveiling of the Cloud First strategy, the question today isn’t whether agencies will transition services and critical systems to cloud, it’s when. Maximizing investment in the cloud requires a strategy that factors in risk, security, cost, agility and a hard assessment of what cloud computing will really do for the mission.
July 16, 2015 Join Defense One Live for a discussion on correlating and contextualizing the world reality in organizational knowledge, given the explosion in information sources to internalize and exploit.
June 23, 2015 As Chief Data Officers work to define their new roles, they will face a suite of opportunities and challenges that will shape their day-to-day efforts – and ultimately define their success. And in this new Open Data environment, CDOs will need to balance transforming and opening their data to the American taxpayer with ensuring the data is meaningful and empowers data-driven decisions.
June 9, 2015 It is no secret that the DOD is concerned about the military's “force of the future." As the economy improves and the “so-called 9/11 generation” begins to leave the military, the Pentagon needs to do more to attract and retain the best and brightest.
June 4, 2015 Mark your calendar today for June 4th and register for this popular annual program—participation is complimentary; registration is required. Attend to expand your professional expertise on how to orchestrate IT architectures for today and tomorrow. Don’t miss this program where like-minded professionals will address how innovative technologies can be applied to protect public sector information assets and ensure trusted computing—whenever and wherever they are needed.