Switching the Career Gears to the Millennial Generation

As the American population ages, the workplace is transforming in more ways than one. Those belonging to the baby boomer generation have been working all of their adult lives, but are now either retired or nearing retirement. Among the current generation of working baby boomers, one worry stands out more than most: the idea that retirement will not occur by age 65. Fortunately, baby boomers—those born between the years of 1946 and 1965—need not fret because according to govexec.com, this is not a reality. Indeed, by age 68, only 16 percent of baby boomers will be working full-time jobs while millennials will make-up 75 percent of the workforce by 2026 (www.govexec.com).

In preparation for the career world, millennials are obtaining college degrees and rapidly entering the workforce just in time for baby boomers to make their mass exodus out of the workforce. This is good news for both baby boomers and millennials because as baby boomers are reaching retirement, millennials are more than ready to begin building careers and step into vacant leadership positions once held by their parents and grandparents.

While millennials are eager to become career women and men, 24 percent of millennials feel as though their formal education has not prepared them for leadership roles in the workplace, which will be both a challenge and an opportunity for employers. Although employers will face the burden of having to train millennials to become leaders, employers may gain a competitive advantage because companies that can establish millennials as leaders should grow faster and more profitably than those that are more reluctant to place millennials in leadership positions (www.govexec.com).

As the above infographic shows, the millennial generation is relatively unconventional compared to the generation X and baby boomer generations because millennials have come of age during a period of major technological innovations and economic fluctuations in a globalizing world. As a result, millennials have adopted a set of different behaviors and have experiences unlike their parents. In the workplace, these behaviors and experiences are expected to produce new leadership styles and work environments. In fact, millennials are expected to cultivate greater employee engagement and retention benefits because they place a high value on mentors, leadership, and highly prioritize learning new things, which will make a huge impact in organizational success during this generational career transition (www.govexec.com).

The millennial generation is the biggest in United States history; boasting a population of 92 million young adults (www.goldmansachs.com). If companies want to succeed, it looks as though they will have to put great emphasis on leadership development programs, digital and technological training, employee empowerment, transparency and objectivity in performance criteria, and goal-oriented work.

Baby boomers will not be working forever and organizations will need millennials to dominate their industries by motivating excellence in others to foster and achieve long-term business success. After all, this is the millennial’s world and we are all just living in it.

Continuous Diagnostics and Mitigation program; A Game Changer.

An effective cybersecurity strategy requires more than a periodic safety check. That’s the thinking behind continuous monitoring, a risk management approach that seeks to keep organizations constantly apprised of their IT security status.

The National Institute of Standards and Technology describes continuous monitoring as providing an ongoing awareness of security threats and vulnerabilities. That approach provides a sharp contrast to what has been the federal norm of annual security reviews and more thorough recertifications every three years.

The rapid proliferation of malware and other cyberattacks encourages a faster monitoring tempo. IT security vendor Kaspersky Lab said in late 2013 that it was detecting 315,000 new malicious files each day, up from 200,000 new files per day the previous year. Panda Security, a security solutions provider, reported earlier this year that 20 percent of the malware that has ever existed was created in 2013.

As the onslaught continues, the federal sector has been taking steps to improve its situational awareness. Indeed, agencies have been following continuous monitoring directives and guidelines for a few years now. The Continuous Diagnostics and Mitigation program, which the Department of Homeland Security manages with support from the General Services Administration, is the government’s latest take on continuous monitoring. CDM provides a more comprehensive approach and makes funding available for agencies to adopt the security practice.

The [CDM] program reflects the evolution of continuous diagnostic programs over the past 10 years,” a DHS official said.

However, Ron Ross, a NIST fellow, acknowledged that continuous monitoring is difficult given the number of IT systems in the federal sector and agencies’ diverse missions and business functions. “It is a big job to have a good continuous monitoring program so we can give senior leaders the best information that we can possibly give them,” he added.

Why it matters

The Federal Information Security Management Act (FISMA) of 2002 requires agencies to review their information security programs at least annually, and Office of Management and Budget Circular A-130 calls for agencies to review their systems’ security controls at least every three years.

The government’s current security push, however, favors a more dynamic approach. The emphasis on continuous monitoring reflects the realization that nothing stays the same in the IT environment. The threat landscape changes with each new attack vector and malware variety, while agencies’ systems and networks are subject to frequent reconfiguration.

As a result, a security regimen that keeps the IT infrastructure locked down today might not provide adequate protection tomorrow. The moment-to-moment vigilance of continuous monitoring seeks to ensure that an agency’s security controls remain relevant.

 

Editor’s Note: Ideas inspired from;


John, Moore. “Can CDM change the game?– FCW.”

FCW. N.p., 10 Oct 2014. Web. 22 Dec. 2015.

Long Live Mother Earth!

https://youtu.be/8YQIaOldDU8

The global climate is a multi-faceted issue, especially when it comes to how human behavior (seven billion humans) impact the planet. Recognizing the importance of reducing carbon dioxide emissions into the atmosphere, the world’s nations adopted the first international agreement to limit the causes of anthropogenic climate change at the conclusion of the Paris climate talks on Saturday, 12 December 2015.

During this year’s conference, leaders from around the globe came together in Paris to attend one of the largest international conferences ever to review the implementation of the United Nations (UN) Framework on Climate Change to formulate a global resolution designed to slow and eventually halt climate change. Indeed, negotiators from over 195 countries came together to decide that the earth which we inhabit is worth saving—from deforestation, carbon emissions, human emissions and pollution, disappearing coastlines, rising sea levels, and extreme weather patterns—all of which are effects of climate change.

Climate change is the source of much controversy as many people do not believe it exists. Despite the various beliefs, climate change is real. In fact, since the climate talks in Paris are now over, the world has set quite a serious goal for itself: limit temperature rise to 1.5 degrees Celsius, or failing that, 2 degrees Celsius. Achieving this goal is necessary because rising temperatures have already had negative impacts on ice caps and ocean chemistry (www.theguardian.com).

Listed below are just a few excerpts from the UN Framework Convention on Climate Change, “Transforming our World: The 2030 Agenda for Sustainable Development”:

  • (A) Parties account for anthropogenic emissions and removals in accordance with methodologies and common metrics assessed by the Intergovernmental Panel on Climate Change and adopted by the Conference of the Parties serving as the meeting of the Parties to the Paris Agreement;
  • (B) Parties ensure methodological consistency, including on baselines, between the communication and implementation of nationally determined contributions;
  • (C) Parties strive to include all categories of anthropogenic emissions or removals in their nationally determined contributions and, once a source, sink or activity is included, continue to include it;
  • (D) Parties shall provide an explanation of why any categories of anthropogenic emissions or removals are excluded

Although this excerpt only represents a portion of the 32 page agreement, the tone of the document emphasizes the seriousness of the outcome this agreement is intended to produce. While climate change is not a problem that can be solved overnight, there are ways that individuals can make a difference to increase environmental sustainability while decreasing the size of one’s carbon footprint.

Ways that you can mitigate environmental degradation (www.nytimes.com):

  • Reduce your consumption of red meat:
    • According to the New York Times, “You are better off eating vegetables from Argentina than red meat from a local farm”
      • More carbon emissions come from the production of red meat and dairy than from the transportation of food.

         

  • Take advantage of public transportation (bus, train, subway, etc.):
    • People who commute by car to work on a daily basis significantly produce more carbon annually than those who rely on public transportation.
  • Eat everything in your refrigerator:
    • Americans waste up to an estimated 40 percent of household food—amounting to almost 1,400 calories per person daily
      • Food waste not only occupies a considerable amount of landfill space, it also adds methane to the atmosphere. as it decomposes, which subsequently increases carbon emissions.
      • Plan meals ahead of time, freeze food before it spoils, and reduce your portion sizes.

       

  • Drive less and avoid first class seating when traveling by plane:
    • Travelers can reduce their carbon footprint by traveling in economy class as first-class seats take up more room, which means more flights for the same number of individuals.
    • However, driving can be worse because driving from coast to coast creates more carbon emissions than a plane seat.
    • If you really want to do your part to reduce your carbon footprint, eliminate travel all together by connecting via Skype or other video chat avenues.

       

  • Adopt a dog or a cat:
    • Although dogs and cats have diets that are high in meat, their meat consumption comes mostly from leftover animal parts that we as humans do not want
      • According to the New York Times, when a cow is slaughtered, almost 50 percent of the animal is removed as unwanted or unfit for human consumption” and usually ends up in pet food as a byproduct of human meat consumption.

       

  • Replace your gas guzzling SUV, but avoid purchasing a second vehicle:
    • “Before you even start driving that new car to add to your first one, you’ve already burned up three and a half times your annual carbon budget” by encouraging the manufacturers to utilize raw materials and metals.
    • Improve your gas mileage by adhering to speed limits, driving defensively, and keeping your tires inflated (United States Department of Energy).

       

  • Consume less stuff, waste less stuff:
    • Avoid the consumption of useless raw materials.
    • Reduce the amount of waste you produce.
    • Remember that not all materials are worth recycling as the New York Times explains, recycling a magazine every day for an entire year saves less carbon than is emitted from four days of running your refrigerator.

In sum, the Paris climate negotiations were a step in the right direction in regards to mitigating climate change. However, the most effective sustainable solution to climate change will require an absolute commitment by individuals, public policies, governing institutions and the global energy system to make fundamental changes in behavior that will foster the development of clean energy and reduce our dependence on non-renewable fossil fuels. Ultimately, people around the world must be willing to act in ways that are conducive to sustainable environmental development for generations to come; after all, we only have one earth on which to live and thrive.

 

 

 

 

 

‘Internet of Things’, may change ‘Internet of Everything’

The term; Internet of Things (IoT) emerged which means, a network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, which are enabled to collect and exchange data. IoT is an ultimate idea which is going to change the entire internet system. Yes, something that neither the Government nor any agencies can afford to ignore.

Internet researchers believe that IoT is the future of internet; shouldn’t we gear-up for this change? This much-hyped idea is not just an alarm, but time for the entire market to evolve. Iot is exponentially much risky, challenging, yet rewarding than any technical arrangement that was deployed yesterday. Increasingly connected, sensor-laden and data-driven systems are poised to change everything from national security to office-space management. The only issue is that, implementing IoT would generate more data, therein increasing complexity which most of the agencies couldn’t handle.

Cisco posits that IoT will generate $4.6 trillion for the public sector before 2025 in value added and costs saved. And although the General Services Administration (GSA) has not yet come close to those sorts of returns, the agency— which manages nearly 10,000 government-owned buildings around the country— has pioneered IoT building management with its GSALink initiative. Read more in the Original article: Internet of Everything: A $4.6 Trillion Public-Sector Opportunity. Collecting 29 million data points per day from myriad sensors throughout its buildings, GSA is able to monitor everything from light use to humidity, enabling the agency to boost productivity and promote good health by optimizing conditions when workers are present and saving on energy costs when they’re not.

Other big adopters include the intelligence community and the Defense Department. Warfighters can benefit from sensors that improve their tactical awareness, while vitals monitors can help commanders know who’s healthy or injured. Gary Hall, chief technology officer for Federal Defense at Cisco said, “I do see the Defense Department out in front [of IoT].” Hall added that there is plenty of room for crossover. Municipal experiments with smart lighting or parking, for instance, could inform similar adoption on agency campuses or military bases. “I’ve been on a lot of military bases, and the parking situation could certainly be improved,” he quipped.

The term “Internet of Things” refers to the physical elements of a connected network — the “things” — while the term “Internet of Everything” is all encompassing including: servers, sensors, data flows between them, people interpreting the data and even people talking to other people about the system.

Now the most important question remains unanswered; Can humans deal with the volume?

The number of connected “things” is expected to balloon from around 16 billion today to 50 billion by 2020, with skyrocketing data generation spurring a need for a 750 percent expansion in data center capacity. Hall pointed to the problem of “big, large data” because both the overall volume and the size of individual files have exploded. That creates a need for pre-processing with machines rather than people. He stated that, “Humans can’t deal with the volume of data we’re producing”. The CTO of Federal Defence concluded by warning the Government agencies quoting, “It’s not something they can avoid.”

Editor’s Note: Ideas inspired from;


Noble, Zach. “Are Agencies Really Ready for the Internet of Things?
— FCW.”FCW. N.p., 1 June 2015. Web. 10 Dec. 2015.

It’s the Most Wonderful Time of the Year….to Avoid a Government Shutdown

When we think of the holiday season, giving your time, resources and effort to make a positive difference in the world in which we live becomes an imperative for spreading holiday cheer. The United States Congress, however, has been putting forth their efforts for a different cause during this holiday season; preventing a government shutdown. In September, Congress was able to divert a government shutdown by collaborating on a provisional resolution to fund the government through December 11th, but with only a few days remaining until the 11th, a December shutdown now looms over Congress.

On 11 December 2015, the government will shutdown if Congress does not decide on several issues ranging from federal government spending to federal grant funding, from education to the nation’s refugee resettlement program. In order to avert a shutdown, congressional policymakers must pass a substantial funding bill in just a few short days.

As the new House speaker, Paul Ryan has been urging Republicans to stand in solidarity on issues that include acting to tighten security on the nation’s refugee resettlement program following the November terrorist attacks in Paris. Furthermore, Speaker Paul Ryan is encouraging his colleagues not to let Democrats use the calendar deadline against them when a government funding bill comes to the floor before December 11th. At the same time, Senate Democrats have already begun to prepare their end-of-year strategy for passing an omnibus spending by holding a bipartisan Senate lunch discussion on December 3rd in which policymakers will zero in on how to handle pending tax legislation and the nearing spending bill deadline (www.politico.com).

In the event that Democrat and Republican lawmakers cannot compromise to pass legislation to fund the federal government, a government shutdown would inconvenience citizens across the country and burden many whose personal economy is tied to the federal government in one way or another (www.money.cnn.com). The diagram below highlights eight negative impacts that occur as a result of a government shutdown:

The good news, according to politico.com, is that virtually no one in Democratic or Republican leadership believes there will be a government shutdown. Indeed, Democrats and Republicans on Capitol Hill have entered a phase of deal negotiation that includes the trading of proposals to fund the federal government through the end of fiscal year 2016. In fact, one part of the ‘omnibus’ spending bill that both Democrats and Republicans are open to reforming is the Visa Waiver Program, which currently allows travelers from 38 countries to visit the United States for three months without a visa (www.politico.com). However, the Visa Waiver Program is just one of about one hundred different policy provisions that both parties must successfully negotiate before December 11th.

As the budget showdown looms during this holiday season, we can only hope that policymakers will keep in mind the greater good for the country while maintaining a sense of holiday spirit. For those who may be less hopeful, it would be wise to contact your local representatives to voice your concerns about the impending budget showdown. After all, government spending and federal grants pay for healthcare, schools, public safety, and a plethora of other programs that affect all Americans all year round.

Government Login System; A Critical Business.

Website, an ultimate tool to match and keep-up with the ever-growing market. What makes it so special? The architecture? The feel? The Service? Or the ability to take control as per our convenience? Be it a personal website or a government website. Every website demands for security, especially those involving transactions.

Federal Agency’s website is always on the front lines when it comes to deliver services to the public. Majority of American Population go online to seek government services. According to the survey, the Research Center estimated that 82% of the U.S. Internet users search for information and complete a transaction on a government website, including 40% of those via smartphones. So, the utmost important ingredient here is; Security.

What makes a website secure? Yes the Login Portal to authenticate users. But Federal Agencies have their own protocol, therefore individuals who want to access government applications and services generally must create a username and password for each agency site they visit. And agencies maintain their own identity management systems to authenticate users. This approach invites data redundancy: Same user maintains multiple passwords whilst the government maintains multiple systems for managing credentials. Security suffers as well; weak and stolen passwords rank among the top ways an online system can be compromised.

In response, the federal government has been moving toward an identity management approach that will let people use the same credential to conduct business with multiple agencies, thereby creating a common mechanism for transmitting identity information and introducing stronger authentication. “The usability of secure identity solutions is something that the market has been struggling to improve for years,” said Jeremy Grant, senior executive adviser for identity management at the National Institute of Standards and Technology. “We’ve had no problem developing ‘secure’ identity technologies, but if people don’t use them, then they really don’t offer much security.”

Since the passage of the E-Government Act of 2002, myriad federal services have emerged online. A 2014 Government Accountability Office report noted that agencies operate more than 11,000 websites. As more people make the Web their default choice for government interactions, the need to provide safe access has become even more important. The sharp rise in the use of mobile devices to access federal websites adds another dimension to the security challenge. The White House’s 2012 Digital Government Strategy states that “policies governing identity and credential management may need to be revised to allow the introduction of new solutions that work better in a mobile world.”

In 2009, the White House published a Cyberspace Policy Review that included the need to create a “cybersecurity-based identity management vision and strategy” on a list of 10 action items. That paper led to the launch in 2011 of the National Strategy for Trusted Identities in Cyberspace, which works with private- and public-sector entities to support the development of interoperable identity credentials. That move set the stage for a cloud-based, federated identity management solution.

A NIST-managed National Program Office coordinates NSTIC activities. The office collaborated with the General Services Administration to draft the requirements for the Federal Cloud Credential Exchange and awarded a contract to SecureKey Technologies in 2013 to create the exchange. FCCX was designed to let people use third-party credentials to access federal services online. In addition to improving the user experience, the governmentwide exchange would help agencies sidestep the cost of credentialing the same person numerous times.

FCCX is now known as Connect.gov and falls under the auspices of GSA. The program allows people to use digital credentials provided by government-approved sign-in partners to confirm their identities when requesting access to online government services. When they log in, users consent to share what Connect.gov describes as a “limited set of personally identifiable information.” Connect.gov then serves as the pipeline for transmitting identity information from the sign-in partner to the agency’s online application.

Editor’s Note: Ideas inspired from;


John, Moore. “How many parties does it take to provide a single government login?– FCW.”

FCW. N.p., 22 May 2015. Web. 26 Nov. 2015.

Reverse auction gets GSA the code for $1

As an experiment in micro purchasing, the General Services Administration’s 18F digital services development group set out to test whether it could buy chunks of code – rather than a full application – for less than $3,500.

Using GSA’s Contract-Award Labor Category tool, 18F asked for bids on loading labor category data from the Schedule 70 into CALC. With the reverse auction starting at $3,499, 18F hoped to test the viability of micro purchasing, plus encourage open source solutions from companies new to the government market.

18F got much more — or less – than it bargained for. The winning bid came in at $1.

Brendan Sudol, the $1 bidder, met the requirements and even loaded the data a few days ahead of the deadline. His code had “100 percent test coverage, an A grade from Code Climate, and included some new functionality to boot.”

But why the $1 bid?

“I love reading about the innovation and impact that 18F, USDS and company are having in the government, and it’s made me want to help contribute to the cause,” Sudol told FCW, GCN’s sister site. “Plus, I use open source technology on a daily basis, and saw this as a great opportunity to give back.”

Not everyone was excited by the turn of events, however.

In the project’s Github chatter, other bidders questioned the legality of Sudol’s offer when they saw bids plummet from $1,250 to $1 in a single day. Was it even legal for feds to pay so far below minimum wage? They also questioned the bidding setup, because as it stands, it appears one bidder could log a $3,499 bid, a colluding bidder could log a $1 bid and bidding would cease. The colluding $1 bidder then just has to fail to deliver within the 10-day time limit, and the higher bidder would get the project at the maximum rate.

“It’s legit,” Zvenyach told FCW, responding to the question about minimum wage. “It’s a business not an individual, and the bid is not a labor rate.”

“In some respects, this result was the best possible outcome for the experiment,” Zvenyach wrote. “It proved that some of our core assumptions about how it would work were wrong. But the experiment also validated the core concept that open-source micro purchasing can work, and it’s a thing we should try to do again.”

Throughout the course of the experiment, Zvenyach said 18F saw 16 different bidders jump in on the action, including several woman-owned, minority-owned and service-disabled-veteran-owned small businesses. Eight of the bidders, Sudol among them, registered on SAM.gov only after hearing of the experiment.

Sudol, who said he worked with his friend and colleague Andy Chosak to complete the work, noted that this was his first time working for the feds, and he was happy to do it dirt cheap. “This is $1 more than I make from the other little web projects I like to work on in my free time,” Sudol told FCW. “And this one actually is meaningful and helps the community.”

 

Editors Note: Ideas referred from;


Noble, Zach. “18F Hacked Procurement and Got Code for $1.” Web log post.
Https://fcw.com/. N.p., 09 Nov. 2015. Web. 12 Nov. 2015.

The Right to Life, Liberty and the Pursuit of…Anger?

“We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. — That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, — That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness.”

The quote —an excerpt from The Declaration of Independence—paints a rather ideal picture of how everyday Americans influence the United States political system. As an American voter, do you ever ask yourself if your elected and prospective elected leaders of government represent the needs of the average or majority of American citizens? Do you question your happiness with the current state of the American political system? If the answer to any of these questions is “no”, you are not alone; American voters are becoming increasingly angry with the United States political system.

In fact, according to a late October 2015 survey conducted by Hart Research Associates/Public Opinion Strategies, over sixty percent of Americans are angry because they feel the political system only works to serve the interests of the insiders with money, influence, and power, such as those on Wall Street or in Washington, instead of working to serve and enhance the well-being of everyday people (www.nbcnews.com).

View the full survey here.

Indeed, a majority of the electorate—the body of persons entitled to vote in an election—are angry at the political system regardless of their party, race, educational background, and income level. For instance, when a those surveyed were asked about the extent of their anger, the survey found that 72 percent of men, 67 percent of women, 69 percent of whites, 68 percent of African Americans, 65 percent of Hispanics, 73 percent of college graduates, 67 percent of non-college attendees, 71 percent of those in the lowest income bracket, and 67 percent of those in the highest income bracket are angry at current political institutions.

But why are so many different groups of American voters so dissatisfied? The answer may partially lie in the general voting behavior patterns as well as the longstanding voting rules and protocol by which voters must abide. The infographic below finds that American voters are not actively voting enough, thus denying their voices to be heard. Another example of voter resentment could be due to a lack of voter participation in midterm elections—elections in which representatives are chosen to become members of the United States Congress.

While elected officials may not always hold themselves accountable in serving the interests of the majority, the Obama administration has recently announced the launch of a new program called “the White House Leadership Development Program”, an initiative designed to indoctrinate a new cohort of top career federal managers who will serve to modernize the government. According to the Office of Personnel Management (OPM), a diverse group of sixteen highly scrutinized individuals will act to engage more frequently in complex, cross agency challenges to improve government agencies and produce positive outcomes from such challenges (www.govexec.com). These future leaders have undergone a rigorous selection process in which they demonstrated their ability to effectively collaborate, communicate, adapt, perform strategic planning, demonstrate politically awareness, and identify and overcome unconventional challenges. It is important to realize that these future leaders will ultimately be held accountable by voters to foster positive reformations in the American political system.

So, when will elected officials become more accountable to everyday American citizens? Unfortunately, there is no definitive answer, but there are ways in which the general public and elected officials can instill confidence (or the pursuit of happiness) among American voters. The most obvious way to decrease public discontent is to ensure that qualified voters exercise their constitutional right to vote; keep in mind that one characteristic of a legitimate democratic society is the occurrence of routinely held free and fair elections. After all, democracy is contingent upon the integrity of majority rule and individual rights.

Better data, Better decisions, Better government

A year ago, Congress passed the Digital Accountability and Transparency Act of 2014, or the DATA Act. Since then, the Office of Management and Budget (OMB) and the Department of the Treasury (Treasury) have engaged with the communities that create and use this data and taken important first steps towards creating a more data driven government, and making federal data more transparent and available to the American people. Today marks the beginning of the next phase of implementation of the DATA Act.

Rolling Out Data Standards

Currently, the Federal Government produces huge amounts of data about how it spends money, but in some cases the same words are used in different ways. These inconsistencies make it difficult to use this data in a comprehensive way. Over a two-year period, starting today, the DATA Act requires Federal agencies to streamline this fragmentation and report Federal funds, broken down into specific categories like how much funding an agency receives from Congress and how much they are spending on specific projects and awards. It also requires agencies to use common government-wide data standards when posting that information to USAspending.gov – standards that aren’t currently applied across all agencies for all uses.

Today we are beginning the rollout of 57 data standards. Some are final based on public input we have already received, and others will require additional input as we finalize them this summer. As a result of input from our partners in Congress, industry stakeholders, federal agencies, and taxpayers through feedback on our public GitHub collaboration space, 15 final data standardsavailable today will be used by all agencies for all federal spending data posted on USAspending.gov, the Federal Government’s one-stop shop for spending data.  We are also releasing 12 additional proposed data standards and 30 existing data elements that we are in the process of standardizing across the government. Conversation and collaboration with the public has been key to our progress thus far and we encourage you to visit our online collaboration space on GitHub for more information on these proposed standards.

In addition to data standards, we have been testing new formats for exchanging data across the Federal Government. In particular, Treasury’s pilots have demonstrated how we can digitally tag award data through the eXtensible Business Reporting Language (XBRL) format. This process is called the DATA Act Schema and it has been released online and will continue to be refined with public input.

Helping Agencies & the DATA Act Playbook

To ensure the government has the necessary tools to adopt these standards within the two-year timeline, OMB also issued guidance to agencies on Increasing Transparency of Federal Spending by Making Federal Spending Data Accessible, Searchable, and Reliable. And to assist agencies with implementation, Treasury created a DATA Act Playbook with eight key steps that, if followed together, will help agencies leverage existing capabilities to drive implementation of the DATA Act. Treasury will continue to refine the Playbook and will hold meetings and workshops with agencies to provide updates on DATA Act activities, encourage agency collaboration, and share important insights and information.

Finally, leveraging the leadership of the Department of Health and Human Services (HHS), we have begun a pilot program to test and explore ways to simplify the reporting process for recipients of federal grants. We are approaching this pilot in a non-traditional way, with the goal of using the next two years to identify and test multiple ways to improve.  To start, today, we have launched a repository for common data elements and a new section of Grants.gov  with information about the grants lifecycle, which will test how data standards can translate to actual time saved in reporting and how to put all information about Federal grants in one place.

While we are pleased with the progress that has been made so far on the DATA Act implementation within existing budgetary resources, this is a complex project with challenges ahead. The FY 2016 Budget proposes $84 million to allow agencies to make progress in implementing the DATA Act and increase Federal spending transparency. With better data, we will make better decisions and ensure that every dollar is well spent.

For more information about our efforts under the DATA Act and how the public can participate, please visit USAspending HERE.

David Mader is the Controller of the Office of Federal Financial Management at the White House Office of Management and Budget. David Lebryk is the Fiscal Assistant Secretary of the U.S. Department of the Treasury.

 

Editors Note: Ideas referred from;


Mader, David, and David Lebryk. “Better Data, Better Decisions, Better Government.”
The White House. The White House, 08 May 2015. Web. 30 Oct. 2015.

Want Your Tax Refund? Better Take a Selfie First

In this technology-driven day and age, critics of smartphone consumers condemn users about their fondness for taking selfies (a photo taken of oneself with a smartphone or webcam and shared via social media), which critics believe are causing people to become increasingly vain, narcissistic, and self-absorbed. But, could taking a selfie make you richer? According to www.nextgov.com, some state revenue agencies and motor vehicle departments are receiving federal tax returns to verify the smartphone selfies of taxpayers in order to distribute refunds.

That’s right, selfies are not just for posting to social media platforms anymore; they are for security too. Indeed, in late 2016, residents of North Carolina and Georgia will be permitted to download a ‘selfie matching’ facial recognition application meant to deter thieves from claiming state tax refunds in their name. MorphoTrust, the biometric technology provider of this innovative mobile application, remains cognizant of the fact that confidential biographical data alone is not enough protection against identity theft as more and more personal data is readily available online. More compelling evidence of identity theft comes from the federal government when in August 2015, it disclosed that identity thieves entered stolen private information of over 300,000 individuals, and filed for $39 million in fraudulent funds. In another case, TurboTax had to suspend its state return filing services earlier this year after numerous states reported thieves using false identities to collect refunds.

In spite of rising rates of cyber-criminal activity, thousands of North Carolina and Georgia residents will be able to prevent anyone from filing and collecting their refund if they do not possess the same facial features, personal information, and driver’s license credentials beginning in late 2016, according to officials. To explain how this facial recognition application will have a positive effect for taxpayers, the designers describe how the MorphoTrust mechanism will work (www.nextgov.com):

  • An individual will download a MorphoTrust application that will be available on several smartphone models
  • The user will scan the barcode on their driver’s license with the phone
  • The individual uses the phone to take a photo of the front of the license so that DMV can verify it is a valid license
  • Users then take a selfie by opening their phone cameras and taking a self-portrait
  • The taxpayer consequently consents to having the barcode scan and photo cross-matched with data in the DMV’s records

Furthermore, the images that are transmitted will not be stored nor shared by MorphoTrust, the DMV, or the taxpayer to ensure absolute protection for the application user. This kind of identity security is important especially with the increasing incidences of hacking, data breaches, and phishing scams that are targeting individuals and government agencies, like the Office of Personnel Management (OPM), which is now facing a class action lawsuit over a breach of 4.2 million federal employees’ personal data.

To heighten awareness of internet users, President Obama has recognized the importance of cybersecurity to our nation by designating October as National Cyber Security Awareness Month. According to the Department of Homeland Security, National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation in the event of a cyber incident (www.dhs.gov).

Unfortunately, selfies are not yet the norm for identity verification nor identity protection. However, the Department of Homeland Security has provided Americans with the following internet user advice to practice in order to keep themselves, their personal information, and their assets safe online (www.dhs.gov):

  • Set strong passwords and don’t share them with anyone.
  • Keep your operating system, browser, and other critical software optimized by installing updates.
  • Maintain an open dialogue with your employees, co-workers, and colleagues about Internet safety.
  • Limit the amount of personal information you post online and use privacy settings to avoid sharing information widely.
  • Be cautious about what you receive or read online—if it sounds too good to be true, it probably is.

Ultimately, internet users who are active in the online community must be as protective about their information as they are about family and finances. Since online security is far from “theft-proof”, my advice is to create and frequently change passwords, secure your wireless networks, and be a good online citizen.

The infographic shown below is useful for both small businesses and individuals as cybersecurity is a major component of safety in today’s digital age.