TechWonk Blog
TechWonk Blog
Go Back
-
With the start of the new Congress, GAO today released their 2015 High Risk List calling attention to agencies and programs that they deem are high risks because of their exposure to fraud, waste, abuse, and mismanagement or which are in need of transformation. Not surprisingly, the Office added “Improving the Management of IT Acquisitions and Operations” to their list this year. The federal information [...]
-
Spectrum may not be a household word, but we rely on it every day for the connected devices like smartphones and portable devices that are a central part of our lives. Spectrum is a term used to describe the radio frequencies that all wireless communications use. And, as there are only so many radio frequencies, spectrum is a limited and valuable resource. As the Internet of Things (IoT) connects [...]
-
Like many, we here at the IT Alliance for Public Sector (ITAPS), a division of ITI, have been studying President Obama’s proposed $4 trillion fiscal year 2016 budget in-depth since it was released this week to offer greater insights for the federal acquisition community. Upon deeper study, much of the budget the Obama administration submitted to Congress is good news for contractors, who would see [...]
-
Yesterday New Jersey Gov. Chris Christie (R) vetoed Senate Bill 1811, a so called “Buy American” bill, saying in his veto message that he will not build an economic wall around New Jersey. Sponsored by the state Senate’s president, Sen. Stephen Sweeney (D), this bill required state agencies, political subdivisions and school districts to source American-made products purchased through public bidding. [...]
-
As U.S. and European negotiators meet in Brussels today to launch the eighth round of Trans-Atlantic Trade and Investment Partnership (T-TIP) negotiations, ITI encourages them to reach concrete progress on provisions to support the continued growth of the digital economy. By building upon previous commitments that promote the growth of key aspects of the digital economy, including ensuring that the [...]
-
Today is Data Privacy Day—a day dedicated to prompting discussions around the globe surrounding privacy and charting a path forward to address some of the challenges that can impact individuals and their privacy. All participants in the data ecosystem have privacy responsibilities. In the United States, both the government and the commercial sector are subject to a robust framework designed to provide [...]
-
President Obama has just wrapped up his state visit to India as the chief guest for Republic Day and there is renewed optimism about the relationship between the world’s two largest democracies. This is good news for the information and communications technology (ICT) sector. Just a few short months ago, Prime Minister Modi met with President Obama in Washington to rekindle a relationship that had [...]
-
The past few weeks have seen a flurry of pomp and circumstance in state capitals as new governors are inaugurated and as incumbents deliver their State of the State addresses to lay out their visions. As governors, administrators, and state legislators begin to roll up their sleeves for the work ahead, the IT Alliance for Public Sector (ITAPS), the alliance of leading technology companies in the public [...]
-
As the new Congress begins the “First 100 Days” in earnest, the new Republican majorities, Democratic lawmakers, and the President are in search of areas for bipartisan agreement. Updating the 28-year old Electronic Communications Privacy Act, or ECPA, is fertile common ground for bipartisanship. Bringing this law up to date is an effort broadly supported across political aisles and ideologies and [...]
-
Halfway into January, 2015 is starting to emerge as a year policymakers will focus more strongly on cybersecurity in the United States. Today President Obama took a significant step in sending a cybersecurity legislative package to Congress. His proposed legislation covers three topics: 1) enabling cybersecurity information sharing, 2) modernizing law enforcement authorities to combat cybercrime, and [...]
- ...
- ...