Technological, cultural, and budgetary hurdles are straining the goal of a digital and mobile federal workforce. What is your agency doing to meet the challenge?
ALL INSIGHTS Report POSTS
To help achieve its ambitious audit readiness goals, the Pentagon can enhance awareness of mission critical assets through M2M.
Real-time data and analytics can empower agencies to act quickly and more effectively to achieve their missions -- from infrastructure protection, to environmental conservation, to disaster relief.
Better data on employee competencies can assist federal managers with workforce planning, but few agencies have established formalized processes to link this information with strategic decision-making.
Information on equipment, facilities, utilities, vehicles, and other assets has never been more important for agency mission execution, but collection continues to pose a challenge. To make information collection more efficient and effective, federal agencies can take advantage of existing communication technologies.
A recent wave of Big Data initiatives has agencies focused on how they can best leverage data to improve performance.
Bridging the Disconnect: The Government-as-Integrator Approach to Streamlining the DoD Acquisition Process
Shrinking budgets and a quickly evolving threat landscape have prompted senior leaders in the Department of Defense and Congress to push for defense acquisition reform. Though DoD has begun making changes, a fundamental restructuring of how governments works with industry to supply the military may be necessary.
The recent proliferation of data-producing technologies has generated new challenges for the U.S. national security community. Chief among these are cybersecurity, terrorism financing, insider threat, and border security. In countering these challenges, the difference between catastrophe and security comes down to the ability to effectively analyze data.
In the age of increased information collection, analysis, and storage, nearly all organizations struggle to respond to and prevent ever-increasing threats to their data. Personally identifiable information, health and financial data, trade secrets, and national security assets must all be protected, but traditional security measures are not enough.