Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Getting More Out of Technology

ARCHIVES

All About Face Time

Since 2009, Brandon Friedman, director of online communications for the Veterans Affairs Department, has helped launch a VA blog, 150 Facebook pages and 70 Twitter feeds, all of which have garnered a wide audience of veterans.

Though Friedman, a former Army infantry officer who served with the 101st Airborne Division in Iraq and Afghanistan, has many high-tech tools at his disposal, he has a simple mission: “Get the right information to the right veteran at the right time.”

That means using social media to provide the most basic information to vets in a new way, he says. VA’s blog, launched in 2009, is a prime example. Friedman says the most popular post on VAntage Point, by then-Deputy Undersecretary for Benefits Tom Pamperin in January 2011, served as a primer on the filing of a disability claim. It drew 676 responses.

Friedman, who wrote the memoir The War I Always Wanted: The Illusion of Glory and the Reality of War in 2007, views VA social media as a key component of the coming home process, allowing vets to easily keep in touch with their comrades. Since VA hospitals are such a familiar institution for vets, Friedman ensured that 150 of the department’s 152 medical centers launched Facebook pages in 2011 as another form of outreach.

VA has only begun to tap the power and potential of this modern form of communication. While the department has developed a means to pump out information, Friedman says his next goal is to figure out how to harvest the material vets post on VA sites to help them even more. - Bob Brewin

Cutting the Phone Bill

The Agriculture Department has saved about 20 percent of its mobile phone costs by consolidating mobile service contracts. The total savings amount to about $400,000 per month, an Agriculture spokeswoman said. 

“Over the past year, USDA has moved from over 700 separate mobile service plans with three carriers that account for the largest portion of USDA cellular services to 10 service plans in three contracts at an estimated 18 percent to 20 percent savings,” she said in an email.

The new slate of contracts is costing USDA about $1.2 million per month compared with about $1.6 million for the legacy plans. Joseph Marks

Combat Computing

The Defense Department may develop forward-deployed data centers to handle computing requirements for forces operating outside the United States, Teri Takai, the Defense chief information officer, told lawmakers last month. 

Takai said she envisions “the possibility for some forward-deployed/deployable data centers. The centers will be flexible and will hold both regional and enterprise services and data, all tailored to the mission situation and to the speed and reliability of the connection to the more fixed portions of the network.”

A number of outfits already offer containerized data centers, which require only power and network connections to operate. This gives a whole new meaning to the concept of plug and play. - Bob Brewin

 

Bob Brewin joined Government Executive in April 2007, bringing with him more than 20 years of experience as a journalist focusing on defense issues and technology. Bob covers the world of defense and information technology for Nextgov, and is the author of the “What’s Brewin” blog.

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.