This document provides an overview of the Department of Homeland Security's (DHS) procurement structure and spending in fiscal year 2014. It discusses that DHS spent $16.5 billion through 86,594 transactions in FY2014, with the largest components by spending being the Office of Procurement Operations, U.S. Coast Guard, Customs and Border Protection, and Immigration and Customs Enforcement. It also breaks down DHS spending by commodity families such as IT & telecom, professional services, and facilities & construction. The document outlines DHS' strategic sourcing program and notes that it achieved $471 million in savings for FY2014.
BORDER SECURITY
DHS Needs to Strengthen Its Efforts to Modernize Key Enforcement Systems
Statement of David A. Powner, Director, Information Technology Management Issues
Secure World Expo DC, Rod Beckstrom, Director of the NCSC, National Cybersec...RodBeckstrom
Secure World Expo Washington DC Conference Cybersecurity by Rod Beckstrom, Director, National Cybersecurity Center (NCSC), Department of Homeland Security (DHS) cyber security
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
Cybercrime impacts a lot of users every year.
Indirectly (compromised merchant – credit card)
Directly (compromised login credentials)
Cybercrime’s impact can be financial and reputation to your company
Impacts 1 in 5 small businesses every year
Cybercrime is a global business
The Internet allows attackers to be anywhere in the world and attacking victims anywhere in the world
Today more organized and motivated than any time in history
The cyber security job is everyone's business including the Board of Directors, even without a cyber security degree. Recent cyber security news proves that. According to several studies, Boards are getting it wrong and are leaving cyber awareness and risk management in the hands of the CEO, CISO, CTOs and cyber security companies. In a sense they are abdicating their responsibility to the shareholders. This slideshare proposes 7 questions every board should be asking their company executives abour IT security. They're not necessarily all encompassing and don't take the place of real cybersecurity training, but will drive the discussion to better and more complete understanding of strategic risk. Questions cover the basics of cyber security training, cyber policies, who briefs and when at board meetings. Thanks.
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
Highlights of Chuck Brooks thought leadership writings, articles, and speeches on topics of cybersecurity, homeland security and emerging technologies.
BORDER SECURITY
DHS Needs to Strengthen Its Efforts to Modernize Key Enforcement Systems
Statement of David A. Powner, Director, Information Technology Management Issues
Secure World Expo DC, Rod Beckstrom, Director of the NCSC, National Cybersec...RodBeckstrom
Secure World Expo Washington DC Conference Cybersecurity by Rod Beckstrom, Director, National Cybersecurity Center (NCSC), Department of Homeland Security (DHS) cyber security
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
Cybercrime impacts a lot of users every year.
Indirectly (compromised merchant – credit card)
Directly (compromised login credentials)
Cybercrime’s impact can be financial and reputation to your company
Impacts 1 in 5 small businesses every year
Cybercrime is a global business
The Internet allows attackers to be anywhere in the world and attacking victims anywhere in the world
Today more organized and motivated than any time in history
The cyber security job is everyone's business including the Board of Directors, even without a cyber security degree. Recent cyber security news proves that. According to several studies, Boards are getting it wrong and are leaving cyber awareness and risk management in the hands of the CEO, CISO, CTOs and cyber security companies. In a sense they are abdicating their responsibility to the shareholders. This slideshare proposes 7 questions every board should be asking their company executives abour IT security. They're not necessarily all encompassing and don't take the place of real cybersecurity training, but will drive the discussion to better and more complete understanding of strategic risk. Questions cover the basics of cyber security training, cyber policies, who briefs and when at board meetings. Thanks.
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
Highlights of Chuck Brooks thought leadership writings, articles, and speeches on topics of cybersecurity, homeland security and emerging technologies.
This webinar was hosted by Ignyte Assurance Platform and Federal Publication Seminars on 18 June 2021.
The Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security, launches a campaign to reduce the risk of ransomware. Following an executive order signed by President Biden on May 12, 2021, which aims to increase cybersecurity defenses and resiliency against nation-state data exfiltration and hold global criminals accountable for ransomware attacks.
As we’ve seen with the Solar Winds and Colonial Pipeline hacks, cybercrime isn’t limited to government organizations. In fact, both public and private sectors are vulnerable to an all-too-common type of cyber attack which exposed the gaps in U.S. cyber defenses. New standards such as Cybersecurity Maturity Model Certification (CMMC) are becoming required compliance and cyber hygiene minimum for all organizations involved in the federal supply chain.
This webinar is designed for federal contractors and companies that provide critical infrastructure or any type of software to the government. Our guests and leading data security and compliance experts will explain how both public and private sector organizations need to act now to protect global software supply chains that affect government and private sector computer systems.
Knowing exactly where your cybersecurity and compliance gaps are and the solutions needed to implement and fix them is central to your success. Early adopters demonstrating high security & compliance postures are positioned to win more business over laggards.
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)NRB
This presentation describes the process leading to outsourcing and highlights not only the benefits of outsourcing application development & maintenance but also the pitfalls to avoid. It describes how we help our customers to innovate in the mainframe environment thanks to our competence, the tools we use and our experience.
This report summarizes the program plans and funding for each of the major acquisition programs included in the SAR and four additional programs. The Air Force’s Long Range Strike-Bomber (LRS-B), Long Range Standoff Missile (LRSO), and Ground Based Strategic Deterrent (GBSD), the future replacement for the Minuteman III, and the Navy’s Ohio-Class Replacement are not yet reported in the SAR, but enough is known about each program to construct a reasonable cost estimate. These programs are among the largest acquisition programs in DoD’s portfolio, and any discussion of major acquisitions would be incomplete without them. The programs included in this report represent 36 percent of the total acquisition budget in the FY 2016 FYDP. The remaining 64 percent of funding is used for hundreds of smaller acquisition programs not reported in the SAR or other programs too early in development to be included in the SAR.
This webinar was hosted by Ignyte Assurance Platform and Federal Publication Seminars on 18 June 2021.
The Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security, launches a campaign to reduce the risk of ransomware. Following an executive order signed by President Biden on May 12, 2021, which aims to increase cybersecurity defenses and resiliency against nation-state data exfiltration and hold global criminals accountable for ransomware attacks.
As we’ve seen with the Solar Winds and Colonial Pipeline hacks, cybercrime isn’t limited to government organizations. In fact, both public and private sectors are vulnerable to an all-too-common type of cyber attack which exposed the gaps in U.S. cyber defenses. New standards such as Cybersecurity Maturity Model Certification (CMMC) are becoming required compliance and cyber hygiene minimum for all organizations involved in the federal supply chain.
This webinar is designed for federal contractors and companies that provide critical infrastructure or any type of software to the government. Our guests and leading data security and compliance experts will explain how both public and private sector organizations need to act now to protect global software supply chains that affect government and private sector computer systems.
Knowing exactly where your cybersecurity and compliance gaps are and the solutions needed to implement and fix them is central to your success. Early adopters demonstrating high security & compliance postures are positioned to win more business over laggards.
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)NRB
This presentation describes the process leading to outsourcing and highlights not only the benefits of outsourcing application development & maintenance but also the pitfalls to avoid. It describes how we help our customers to innovate in the mainframe environment thanks to our competence, the tools we use and our experience.
This report summarizes the program plans and funding for each of the major acquisition programs included in the SAR and four additional programs. The Air Force’s Long Range Strike-Bomber (LRS-B), Long Range Standoff Missile (LRSO), and Ground Based Strategic Deterrent (GBSD), the future replacement for the Minuteman III, and the Navy’s Ohio-Class Replacement are not yet reported in the SAR, but enough is known about each program to construct a reasonable cost estimate. These programs are among the largest acquisition programs in DoD’s portfolio, and any discussion of major acquisitions would be incomplete without them. The programs included in this report represent 36 percent of the total acquisition budget in the FY 2016 FYDP. The remaining 64 percent of funding is used for hundreds of smaller acquisition programs not reported in the SAR or other programs too early in development to be included in the SAR.
“The Tustin Hangars: Titans of History” is a comprehensive history of the two blimp hangars at the former U.S. Navy and Marine Corps air station in Tustin, California. The hangars were built early in World War II to house manned blimps or, in Navy terminology, non-rigid lighter-than-air (LTA) airships.
This document reflects my personal assessment, based on your input, of the most immediate opportunities to improve the quality of our Corps and our warfighting capabilities. My guidance
reflects what the Nation expects from its Corps of Marines, our approach to leadership, and our warfighting philosophy. My intent is to direct actions at the institutional level with a particular emphasis on leadership, warfighting, and balanced readiness across the force. To ensure a common understanding of the end state of our efforts, the planning guidance begins with a brief summary of what we do for the Nation, who we are as Marines, and the future operating environment.
The Military Compensation and Retirement Modernization Commission (MCRMC) retirement
reform plan is a blended approach that includes a defined benefit (DB), a defined contribution
(DC) plan, and higher current compensation in the form of continuation pay at year
of service (YOS) 12. In addition, the plan allows active component (AC) service members—at
the time of their retirement from the military—a choice regarding the DB annuity receivable
from the time of retirement to age 67.1 The member may choose a full DB annuity, a full
lump-sum payment in lieu of the annuity, or partial DB annuity and partial lump sum. The
DB is like today’s DB, except with a multiplier of 2.0 percent instead of 2.5 percent in today’s
system. Reserve component (RC) retirees could elect to receive (1) a full DB annuity starting
at age 60; (2) a lump sum paid at the time of retirement from the RC in lieu of the annuity to
age 67; or (3) a partial DB annuity from ages 60 to 67 and a partial lump sum paid at the time
of retirement from the RC, then receive the full annuity starting at age 67. The DC plan vests
at YOS 3, the Department of Defense (DoD) makes an automatic contribution of 1 percent of
basic pay from years 1 to 20, and DoD matches the member’s contribution up to 5 percent of
basic pay over years 3–20.
DOD's 2015 China Military Power Report (85 pages long)
Text Document
On May 9, 2015, the Defense Department released its annual China military power report.
Commandant of Marine Corps Posture Statement_2015 to CongressTom "Blad" Lindblad
Attached is the current posture statement and opening statement from yesterday's briefing by General Dunford to the House Appropriations Subcommittee on Defense.
Topics in the Posture Statement include:
• OEF-Afghanistan
• ARG/MEU Operations
• SPMAGTF-CR Operations
• Marine Corps in the Pacific
• Black Sea Rotational Force, Embassy Security Forces, and Theater Security Cooperation
• Fiscal Year 16 Budget Priorities
• Force Structure
• Amphibious Combat Vehicle
• Joint Light Tactical Vehicle
• Joint Strike Fighter
• CH-53K
• Command, Control, Communications and Computers
• Naval Integration and Programs of Interest
Readiness
• High Quality People
• Unit Readiness
• Capacity to Meet Combatant Commanders' Requirements
• Facility Investments
• Equipment Modernization and Innovation
• Marine Corps Force Integration Program (MCFIP)
• Sexual Assault Prevention and Response (SAPR)
• Suicide Prevention
• Wounded Warriors
• Transition Readiness
This report presents statistics regarding U.S. military casualties in the active missions Operation
Inherent Resolve (OIR, Iraq and Syria) and Operation Enduring Freedom (OEF, Afghanistan), as
well as operations that have ended, Operation New Dawn (OND, Iraq) and Operation Iraqi
Freedom (OIF, Iraq). This report includes statistics on post-traumatic stress disorder (PTSD),
traumatic brain injury (TBI), amputations, evacuations, and the demographics of casualties. Some
of these statistics are publicly available at the Department of Defense’s (DOD’s) website and
others have been obtained through contact with experts at DOD.
To provide information about its plans beyond the coming year, the Department of Defense (DoD) generally provides a five-year plan, called the Future Years Defense Program (FYDP), that is associated with the budget it submits to the Congress. Because decisions made in the near term can have consequences for the defense budget in the longer term, CBO regularly examines DoD’s FYDP and projects its budgetary impact for roughly a decade beyond the period covered by the FYDP. For this analysis, CBO used the FYDP that was provided to the Congress in April 2014; it spans fiscal years 2015 to 2019, and CBO’s projections span the years 2015 to 2030.
For fiscal year 2015, DoD requested appropriations totaling $555 billion. Of that amount, $496 billion was for the base budget and $59 billion was for what are termed overseas contingency operations (OCO). The base budget covers programs that constitute the department’s normal activities, such as the development and procurement of weapon systems and the day-to-day operations of the military and civilian workforce. Funding for OCO pays for U.S. involvement in the war in Afghanistan and other nonroutine military activities elsewhere. The FYDP describes DoD’s plans for its normal activities and therefore generally corresponds to the base budget.
DoD’s 2015 plans differ from its 2014 plans in important ways. For example, in an effort to reduce costs, the current FYDP includes sizeable cuts in the number of military personnel, particularly in the Army.
In a May 9, 2024 paper, Juri Opitz from the University of Zurich, along with Shira Wein and Nathan Schneider form Georgetown University, discussed the importance of linguistic expertise in natural language processing (NLP) in an era dominated by large language models (LLMs).
The authors explained that while machine translation (MT) previously relied heavily on linguists, the landscape has shifted. “Linguistics is no longer front and center in the way we build NLP systems,” they said. With the emergence of LLMs, which can generate fluent text without the need for specialized modules to handle grammar or semantic coherence, the need for linguistic expertise in NLP is being questioned.
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
हम आग्रह करते हैं कि जो भी सत्ता में आए, वह संविधान का पालन करे, उसकी रक्षा करे और उसे बनाए रखे।" प्रस्ताव में कुल तीन प्रमुख हस्तक्षेप और उनके तंत्र भी प्रस्तुत किए गए। पहला हस्तक्षेप स्वतंत्र मीडिया को प्रोत्साहित करके, वास्तविकता पर आधारित काउंटर नैरेटिव का निर्माण करके और सत्तारूढ़ सरकार द्वारा नियोजित मनोवैज्ञानिक हेरफेर की रणनीति का मुकाबला करके लोगों द्वारा निर्धारित कथा को बनाए रखना और उस पर कार्यकरना था।
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
13. FY14 Strategic Sourcing Savings
13
Total FY14 Savings = $471M
Strategic Sourcing Program Office
14. DHS Strategic Sourcing Highlights
DHS is an active participant on Federal
strategic sourcing initiatives, including, but
not limited to:
Office Supplies 3
Domestic Delivery Services 3
Wireless Devices & Airtime;
Print Management;
TechOps - Surveillance Equipment
DHS achieved a 41% utilization rate of
strategic sourcing contracts in FY 2014
i.e., DHS purchased 41% of its needs
through strategic sourcing for the areas
covered by the vehicles we had in place
during FY 2014.
FY 2015 target is 42%
Cumulative savings = $2.5 billion
(since 2005)
FY2014 = $471.4 million
FY2013 = $336.9 million
FY2012 = $386.5 million
FY2011 = $336.4 million
* Savings independently validated (March 2011)
SAVINGS
In FY 2014, DHS strategically sourced
$2.89 billion
This represents approximately 23% of the
total FY 2014 obligated dollars
Small businesses received 43% of the
spend through strategic sourcing
contracts
SPEND
FEDERAL PARTICIPATION UTILIZATION
14
FAST FACT
NO CHANGE IN BUSINESS IS REQUIRED TO MEET
NEW FAR RULE, SECTION 1331 SB ACT OF 2010Strategic Sourcing Program Office
16. DHS Office of Small and
Disadvantaged Business Utilization
Key premises:
DHS supports all of the federal small business
programs
DHS has small business prime contracting and
subcontracting opportunities
DHS uses both pre-existing contract vehicles
(such as the GSA schedule and DHS-wide IDIQs)
and open market procedures (FedBizOpps)
16
17. DHS Office of Small and
Disadvantaged Business Utilization
Ongoing activities:
DHS small business website –
www.dhs.gov/openforbusiness
Small Business Specialists in each major buying
activity
Forecast of contract opportunities
Outreach program
Listing of large business prime contractors with
subcontracting opportunities
DHS mentor-protégé program
17
18. DHS Office of Small and
Disadvantaged Business Utilization
Did You Know?
In FY 2014, about 13,000 companies
representing all 50 states, DC, and five
territories had DHS contracts.
Of the 13,000, about 9,400 are small
businesses;
Of those 9,400, nearly 1,800 small
businesses secured their first DHS
contract.
18