Summary: Building on efforts to boost Federal cybersecurity & as part of National Cybersecurity Awareness Month, today we’re releasing a proposed guidance to modernize Federal IT. America’s spirit of ingenuity and entrepreneurship created the world’s most innovative economy and keeps us dominant in today’s digital age. Indeed, in 1985 about 2,000 people used the Internet; today, 3.2 billion people do. What started out as a useful tool for a few is now a necessity for all of us—as essential for connecting people, goods, and services as the airplane or automobile.
In December, I plan to write two postings detailing a scenario analysis for the next ten years of the Federal government’s data technologies. Governments are on the cusp of amazing technological advances propelled by artificial intelligence, blockchain technologies, and the Internet of Things. Also, governments will face new challenges such as the recent global cyber attack that took down Twitter and Netflix. I want to invite you, the reader, to also send in your predictions for the future of Federal government data.
No Longer an Idea of the Future, Artificial Intelligence Is Here and You Are Probably Already Using It
It might surprise some of you to know that artificial intelligence (AI) is already in use and a routine part of our daily lives, but we leverage this technology when we use our smartphones or other devices to ask Apple’s Siri, Microsoft’s Cortana, Google Now, or Amazon’s Alexa a question to get the facts or data we are looking for. Using your voice, you can say, “Where’s the nearest gas station?
Summary: Today, OMB is releasing an update to Circular A-130, the Federal Government’s governing document for the management of Federal information resources. Today the Office of Management and Budget (OMB) is releasing an update to the Federal Government’s governing document for the management of Federal information resources: Circular A-130, Managing Information as a Strategic Resource. The way we manage information technology (IT), security, data governance, and privacy has rapidly evolved since A-130 was last updated in 2000.
Internet strategist Mary Meeker delivered her 2016 Internet Trends report this month, and there are several key takeaways for government agencies to consider and continue tracking as our connected world continues to evolve: Mobile phone adoption and Internet growth is meeting saturation. Incremental global growth will continue (especially in India, which she called out for their wild expansion) but especially for Americans, most people that want to be on the Internet can be on the Internet.
Algorithms are becoming more important as the amount of data grows, and the complexity of government and business processes grows. Put simply, an algorithm is just a set of steps for solving a problem. If you shop online, use an online social network or a mobile app to plan your route, then you are using an algorithm: A sophisticated algorithm that uses large amounts of data to make hundreds (or thousands) of decisions in milliseconds.
DigitalGov Citizen Services Summit: Reflections from Our Livestream Host, and Full Recording Now Available!
The second annual DigitalGov Citizen Services Summit was held at GSA headquarters in Washington, DC on May 21. This year’s Summit sold out early to in person attendees, attracted nearly 1,200 folks to sign up, and for the first time a live stream was offered for online viewers across the country. I was honored to serve as this year’s virtual livestream host for the Summit. We’ve kicked off the #DigitalGov15 Summit with @USCTO @jakegab @gwynnek @PSChrousos!
Data. Security. Privacy. These are the cornerstones of many discussions concerning technology. The security of citizen information when interacting with the federal government will be increasingly important as we progress into the future. A few agencies have begun to use Hyper Text Transfer Protocol Secure (HTTPS) in lieu of the standard HTTP. For these agencies, this transition to HTTPS is seen as a step in the right direction and is one way for the government to address the security of citizen information.
According to an article from Readwrite, the amount of money going to big data projects is steadily increasing despite widespread failure to achieve many results. For big data-related projects in global organizations, a total of $31 billion was spent in 2013 and that amount is expected to top $114 billion by 2018. The recognition that big data is important is present, but the results from big data projects have not illustrated this to the full extent.
Today, people rely heavily on insecure and inefficient means to access federal government applications to conduct business (i.e., they depend on usernames and passwords to log into federal agency services online). Users are required to create and manage several online accounts for different applications, which can become a nuisance, difficult to manage, and creates administrative burden for the organization. Additionally, with the abundance of these weak credentials (i.e., usernames and passwords that are easy to hack and difficult to trust), organizations – including the federal government – are left with minimal confidence in a user’s identity.
In 1995, the World Wide Web, which had been fairly niche up until then, attracted mainstream attention. What followed were 20 years of business and social innovations in how we humans chose to use the web at work, school, at home, and with our friends. The web and its “Web 2.0” successor allowed us to access, provide, remix, and exchange information in ways previously limited by time and space.
Contact centers operated and managed by federal agencies have to follow certain laws, regulations, policies, and other directives. Unless specifically noted, contact centers operated and managed by states or local governments do not have to comply with these same requirements. Access for People with Disabilities (Section 508) Federal contact centers must comply with Section 508 of the Rehabilitation Act of 1973. Review the requirements and the accompanying guidance to ensure your contact center makes services accessible to individuals with disabilities.
_Guest post by Cheryl Hackley who works in the Office of Public Affairs at the Federal Trade Commission. _ From my early days of using email, sites like MySpace, and later getting my first smartphone, it was a common practice for me to breeze right past or simply “accept” privacy policies on websites and apps. That was until a few years ago when I joined the Federal Trade Commission (FTC) as its first social media strategist.
Security testing is used to ensure that a mobile product does not pose a threat to agency IT systems and databases. In addition, privacy testing ensures that an app does not put the user’s personally identifiable information into a compromisable position. This article was developed as part of the Mobile Application Development Program. See our general guidelines to testing article for more resources on mobile product testing. Government Guidance Please coordinate with your ISSO when creating mobile or digital products.
Government videos need to follow two main laws: People with disabilities must be able to fully experience them, and They must adhere to privacy laws 1. Making Video Accessible for People with Disabilities (Section 508) Federal employees are required by law (Section 508 of the Rehabilitation Act of 1973) to make the materials they create usable for people with disabilities. Section 508 applies to video as well. There are three main requirements for making a video 508 accessible.