TechWonk Blog Subsection
TechWonk Blog
-
On January 20, the Biden-Harris Administration will assume control of a tumultuous policy landscape. The ongoing SolarWinds breach and the ongoing cyber threats in the wake of the January 6 attack on the U.S. Capitol pose significant challenges and painstakingly demonstrate the importance of a streamlined and strategic approach to federal information security. The Biden-Harris Administration has the [...]
-
If one thing is clear from the past four years, it鈥檚 that U.S. federal government operations have been anything but 鈥渂usiness as usual.鈥 Recently, several White House Executive Orders have unilaterally shifted major requirements for federal agencies and their contractors. One of the most troubling measures is Executive Order (EO) 13950: Combating Race and Sex Stereotyping, which applies to all federal [...]
-
In January 2021, Joe Biden will assume the responsibilities of the U.S. Commander-in-chief. Among the many national security challenges the new administration will face is the rapid proliferation of threats to the information and communications technology (ICT) supply chain, which can lead to costly IP theft and erode the United States鈥 worldwide technological influence to the benefit of its adversaries. [...]
-
On September 22, 2020, President Trump issued an Executive Order on Combating Race and Sex Stereotyping. In addition to restrictions on the internal diversity programs of Federal Agencies, the Executive Order (EO) prohibits federal government contractors from providing diversity training to their own employees in any manner that suggests America has a racial inequality problem. 91pro视频, on behalf of the [...]
-
With news of cyber-attacks and IP theft rippling across the government contracting world, officials in the United States Congress and Executive Branch have recognized the importance of securing federal IT networks and infrastructure. Concerns about the U.S. government鈥檚 supply chain security contributed to the enactment of a 2018 law, commonly known as Section 889, targeted at Huawei, ZTE and three [...]
-
The global spread of COVID-19 accelerated the United States into one of the worst public health crises in generations. Entire segments of public life have since closed, the lives of millions have been interrupted, and the way we work and do business has shifted to an online and digital environment faster than anyone believed possible. Local, state, and federal governments, which are employers of millions [...]
-
It鈥檚 easy to forget just how much technology has changed our world and our lives. A little more than a decade ago, a small business owner relied on foot traffic from local customers rather than web visits from international shoppers to grow. Drivers mapped out unfamiliar routes and took wrong turns instead of using precise, voice-activated directions to travel. Cancer patients faced an uncertain diagnosis [...]
-
States have long been considered laboratories of democracies and increasingly are becoming cradles of innovation. Governors across the country are leading the charge in leveraging emerging technologies to solve the most pressing issues facing constituents. For example, states are using mobile application technology to better respond to their constituents needs, applying blockchain technology to save [...]
-
The start of the 115th Congress and new administration not only marked an era of profound political change, but it also presented a unique and timely opportunity to modernize outdated policies. Lawmakers acted on many issues critical to the tech industry by enacting substantial reforms to bring both the U.S. federal tax code and the U.S. government procurement process into the 21st century. The Tax [...]
-
This week, President Trump signed the National Defense Authorization Act (NDAA) for Fiscal Year 2018 (FY18) and federal IT contractors should note the changes it brings for them. We commend the Senate and House鈥檚 continued commitment to acquisition reform, adopting innovative technologies to help warfighters meet their missions, and improving oversight of cybersecurity. While no single provision can [...]
- ...