DoD’s Efforts to Make Emerging Technology Established Technology

The U.S. Department of Defense's (DoD) shift from a focus on counterterrorism to one of near-peer rivals has highlighted the need to incorporate emerging technologies into the DoD faster than ever before. To keep up with the technological advances of peer nations, it is critical that the DoD speed the time to the field of technologies that can give our troops an advantage in terms of intelligence, data sharing, and visibility. But in this need for speed, the security and the reliability of these solutions cannot be ignored.

DoD is successfully striking the balance of speed, innovation, and reliability with several recent implementations of emerging technology. Continue reading

If Data is the New Currency, How Are We “Spending” It?

The government is at no loss for data. And, over the last decade, there has been a concerted effort to use that data more efficiently to improve decision making and service to the citizen. Chief Data Officers are in place across government to shepherd the changes in process and technology needed to achieve the goals set forth in the Federal Data Strategy.

Meeting the Plan to Plan

Department-level data strategies have been borne out of the federal guidance to mature data governance and infrastructure and publish those plans. In fact, the report "CDO Insights: 2021 Survey Results On the Maturation of Data Governance in U.S. Federal Agencies," found that 75 percent of respondents said they had started or completed five of the six action items named in the Federal Data Strategy 2020 Action Plan. The report found that constituting a data governance body (completed by 75%) was the least challenging action. Getting these bodies in place means that beyond department-level plans, some agencies are moving to making plans for critical subsets of data much like the State Department did for geospatial data.

Continue reading

Next Generation Connectivity Catching Up to This Generation’s Needs

Pandemic-necessitated remote work and increased reliance on online apps and sites for routine everyday tasks like shopping and transportation showed us that Internet connection is a critical utility. It also proved that getting connected is not enough -- the speed and quality of that connection have a huge impact on how we carry out day-to-day activities. In a timely coincidence, this reliance on connectivity comes at a time when networks are improving their service to supply that exact speed and reliability.

Introducing a Whole New Level of Speed: 5G

5G promises to be faster with less latency when connecting to the network. The speeds afforded by 5G mean that visions for smart, connected cities can be logistically achieved as 5G networks will be better able to handle more users, lots of sensors, and heavy traffic. The Department of Veterans Affairs is already tapping into 5G to allow doctors to use augmented reality to look at and manipulate large imaging files, like MRIs or CT scans.

Continue reading

Putting a Value on Trust — Introducing Zero Trust Security Approaches

With so many high-profile hacks this year, it's easy to want to throw up your hands and say, "Is there nothing that can be trusted?!" Interestingly, that lament is what is driving the latest approach to cybersecurity -- zero trust. Zero trust is what it sounds like, a security approach centered on the belief that organizations should not automatically trust anything accessing their systems either inside or outside their perimeters. Instead, all people and devices must be verified before access is granted. To the untrained eye, this seems untenable. How, in this day and age, when we depend on digital information and connection to do most anything, can we use a process where we have to constantly verify identity and access permissions? Luckily, the practice of zero trust is more sophisticated than its premise.

Continue reading