AUTHOR ARCHIVES

Bob Brewin

Editor at Large Bob Brewin joined Government Executive in April 2007, bringing with him more than 20 years of experience as a journalist focusing on defense issues and technology. Bob covers the world of defense and information technology for Nextgov, and is the author of the “What’s Brewin” blog.
Results 2471-2480 of 3080

Defense leaders stress importance of social networking

June 19, 2009 FROM NEXTGOV arrow The widespread use of social networking technologies by Iranians frustrated with election results shows "it is increasingly difficult for an authoritarian government to maintain control of all the means of communication that are available to its citizens," Secretary of Defense Robert Gates told reporters during a Pentagon news briefing on...

VHA Bar Code Project Stalled

June 18, 2009 FROM NEXTGOV arrow Waaaay back in 2004, the Veterans Health Administration kicked of a bar code project to label patients' specimens and blood intended for transfusion, a rather nifty use of technology to ensure, for example, that a patient with type O blood instead of type A. In 2006, the VHA purchased new...

Army develops new modernization strategy after scaling back FCS

June 18, 2009 FROM NEXTGOV arrow Battlefield communications networks will be a critical component of a modernization strategy the Army is developing after canceling the $160 billion ground vehicle portion of its Future Combat Systems program, an Army spokesman said. The Brigade Combat Team Modernization Strategy aims to develop a new line of ground combat vehicles...

From Nextgov.com: Army develops new modernization strategy after scaling back FCS

June 18, 2009 Battlefield communications networks will be a critical component of a modernization strategy the Army is developing after canceling the $160 billion ground vehicle portion of its Future Combat Systems program, an Army spokesman said. Read the full story on Nextgov.com.

Another Whack at Acquisition Reform

June 17, 2009 FROM NEXTGOV arrow The House Armed Services Committee in its version of the 2010 Defense authorization says in a summary that it plans to provide the Defense Department with the authority to establish 10 pilot programs to "rapidly acquire" information technology capabilities under an alternative acquisition process. The summary, alas, fails to define...

Defense plans presidential network that can survive a nuclear attack

June 17, 2009 FROM NEXTGOV arrow The Defense Information Systems Agency plans to install a presidential network in the Washington area this year that will be able to survive an attack by a nuclear weapon that generates a high-altitude electromagnetic pulse (HEMP), which can burn out circuit boards and other electronic devices, according to budget documents....

From Nextgov.com: Defense plans to install presidential network that can survive a nuclear attack

June 17, 2009 The Defense Information Systems Agency plans to install a presidential network in the Washington area this year that will be able to survive an attack by a nuclear weapon that generates a high-altitude electromagnetic pulse (HEMP), which can burn out circuit boards and other electronic devices, according to budget documents....

Baker Wonders Where's the Privacy?

June 16, 2009 FROM NEXTGOV arrow At a meeting held by the Health IT policy committee on Tuesday, Roger Baker, the Veterans Affairs Department's new chief information officer, injected a dose of practical reality to the very wonkish discussion of what "meaningful use" of electronic health record systems means -- as required by the 2009 American...

A Joint Cyber Command Office

June 16, 2009 FROM NEXTGOV arrow The House Armed Services Committee decided to tinker around with Defense Department cyber stuff in its version of the fiscal 2010 Defense authorization bill and inserted language calling for the department to establish "a joint program office for cyber operations capabilities." The report said the new program office will "assist...

Men in Gray

June 16, 2009 FROM NEXTGOV arrow I've been poking around a pile of fiscal 2010 budget justification documents that recently surfaced on the Defense Department Comptroller Web site. I found a rather yummy item in the proposed procurement budget for the Defense Information Systems Agency. Slogging through hundreds of pages of teeny type, I came across...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.