Bob Brewin

Editor at Large Bob Brewin joined Government Executive in April 2007, bringing with him more than 20 years of experience as a journalist focusing on defense issues and technology. Bob covers the world of defense and information technology for Nextgov, and is the author of the “What’s Brewin” blog.
Results 2481-2490 of 3080

Group tackles definition of 'meaningful use' for e-health records

June 16, 2009 FROM NEXTGOV arrow The United States can develop an electronic health record system that could, within the next five years, help prevent a million heart attacks annually and reduce the number of medication errors by 50 percent, a top health official in New York City said on Tuesday. Farzad Mostashari, assistant commissioner of...

China's 128 Cyberattacks a Minute

June 15, 2009 FROM NEXTGOV arrow As the Defense Department slowly moves toward development of a cyber command, it sure looks like the United States needs some kind of defense against cyber aggression from China, even though no one in the Pentagon, quite diplomatically, pins such cyberattacks directly on the Chinese government. The Chinese cyberattackers --...

No Cyber Command Announcement

June 15, 2009 FROM NEXTGOV arrow Though my colleagues in the chattering classes have pumped out megabytes of copy on formation of a new Defense Department cyber command over the past couple of days -- it's not happened yet. Pentagon spokesman Air Force Lt. Col. Eric Butterbaugh said Deputy Secretary of Defense William Lynn said in...

Unlike Obama, Senate Likes GPS Backup

June 12, 2009 FROM NEXTGOV arrow The Obama administration came up with a loopy plan to save a grand total of $36 million out of the proposed $3.5 trillion federal budget by canceling funding for the Coast-Guard-operated terrestrial Long Range Navigation system (Loran). A lot of folks (except the bean counters) view Loran as the only...

A Real Hooah Airman

June 11, 2009 FROM NEXTGOV arrow Although "hooah" is an Army term not used by the Air Force, in the case of Tech. Sgt. Darrell DeMotta, an Air Force Joint Terminal Attack Controller I had the pleasure to meet this week at Kirtland Air Force Base in Albuquerque, N.M., the term definitely applies. JTACs are Air...

AHLTA Contest Winner Is . . .

June 10, 2009 FROM NEXTGOV arrow Anonymous. Alas, I had singled out the best entry (actually two entries sent in by the same person) in the AHLTA definition contest, but the winner has chosen to remain anonymous. It seems person who submitted the entries fear that that the folks who run the Military Health System may...

Doing the Innovation Thing at ASD/NII

June 10, 2009 FROM NEXTGOV arrow Here in Whatsland we try to keep track of all the personnel changes at the office of the assistant secretary of Defense for networks and information integration (a.k.a. the chief information officer shop). I note that yesterday, Defense Secretary Robert Gates appointed Prabha Kumar, as the chief innovation and technology...

With tight budgets, Air Force simulation center proves a cost saver

June 10, 2009 FROM NEXTGOV arrow KIRTLAND AIR FORCE BASE, N.M. -- In an ordinary office building here, the Air Force Distributed Mission Operations Center runs sorties with all the realism of combat, but without burning one drop of jet fuel. Instead of taking to the air, pilots and aircrew strap themselves into simulators, located about...

EDS' Failure to Wipe

June 9, 2009 FROM NEXTGOV arrow EDS, which runs the Navy Marine Corps Intranet under a 10 year, $10 billon contract, serves about 650,000 folks. Users turn in, on an annual basis, about 120,000 old computers for new ones. The company failed to magnetically wipe (the technical term is degaussing) at least 12 hard drives containing...

AHLTA Definition Contest Update

June 8, 2009 FROM NEXTGOV arrow Last month I kicked off a contest for the best definition of AHLTA, the Defense Department's electronic health record system that used to stand for the Armed Forces Health Longitudinal Technology Application. As loyal What's fans know, it turned out that in a bureaucratic assault on the English language, the...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.