The Expanding Use of Virtual Reality in the Military

Virtual Reality (VR) has strong roots in the military. Long used for training and simulations, the military has helped develop VR technology and continues to innovate in how it can be used. VR continues to be invaluable to tactical, mission training but is also being used in other training areas. For example, the Virtual Welder Trainer program simulates multiple welding processes, blending real world and computer-generated images into a VR environment to allow welders to train without having to use real world resources. Just as flight simulators save money in terms of aircraft use, other virtual reality in military training applications provide similar cost savings in terms of equipment and travel.

Designing and Maintaining Military Equipment

VR is being utilized in all aspects of equipment management. In the design phase, VR can help engineers test designs in combat environments. It can also help determine if a piece of equipment designed for one scenario might work in another and what changes would have to be made to ensure products can operate in a desert environment as well as in cold and rainy climates. Continue reading

Ensuring Equity in Disaster Response

Equity is highlighted in priority two of the President's Management Agenda (PMA), Delivering Excellent, Equitable, and Secure Federal Services and Customer Experience, and is a theme throughout all PMA priorities. Disaster response is possibly the most critical place to ensure equity. While a disaster does level the playing field in some ways-no matter how much money you have it won't stop a tornado from hitting your house-the recovery from disasters is not as fairly distributed.

A 2021 report from the Government Accountability Office (GAO) found that disaster response is "uneven" across the country. The research found that small towns, rural and tribal areas, and underserved and disadvantaged communities have a hard time accessing federal disaster recovery assistance programs. Those that did access funds had difficulty achieving a full recovery with structures still damaged years later. A key to solving this gap? Data. Continue reading

State and Local Grant Management Opportunities and Challenges

With the CARES Act, the American Rescue Plan, and now infrastructure funding, state and local governments have a large pipeline of grant options to help further citizen support. In fact, White House initiatives aimed at providing relief to citizens total nearly $6 trillion.

However, applying for and later managing those grants can be an incredibly burdensome, and often manual process. With a wide variety of variables that need to be carried out and measured, the management of these grants involves a large number of people from multiple constituencies both within a state agency and outside it including grant applicants and recipients, various levels of government and agencies, and affiliated nonprofits. Multiple surveys and studies have shown that grantee organizations spend more than 40% of their grant resources on administration activities alone. Continue reading

Schools Have to Learn the ABCs of Ransomware

Ransomware has traditionally been a practice where cybercriminals encrypt data and demand ransom in exchange for a decryption key. More recently, a growing number of these bad actors threaten to make this information public if they do not get paid. This shift in the practice of ransomware has increased the "attractiveness" of K-12 schools for cyber criminals. Information about children is among the most highly protected data there is, making it more likely ransoms will be paid to keep it private. For this and other reasons, K-12 schools are seeing an increase in ransomware activity. In 2021, there were at least 62 reported ransomware cases as compared to only 11 in 2018. 2021 also saw ransomware as the most common cyber incident for K-12 schools for the first time ever.

What Gets Compromised in a Ransomware Attack?

An incident in 2020 involving Fairfax County, VA Public Schools resulted in employee social security numbers being posted online. Hackers targeting a school district in Allen, Texas emailed parents with threats to expose their childs' personal information if educators did not pay a ransom. Showing the full swing of ransomware impacts from the serious to the mundane, a 2022 attack on the Griggsville-Perry School District in Indiana had many records compromised and leaked including a detention slip from December 2014 for a student who would not stop interrupting his health class. This shows the breadth of access that hackers had to documents and has led many schools to reexamine their file retention policy to reduce the amount of data accessible to bad actors. Continue reading

Key Trends for Selling to Government

Selling into the government means abiding by a number of strict procurement rules around RFP submission, security and clearance compliance, and even buying lunch for customers. Luckily, in addition to these rules, government contractors can hone in their B2G marketing with clear, publicly available guidance on exactly the solutions government needs.

Each administration brings with it a new set of priorities that inform budgets and investments. As we near the halfway point of the first term of the Biden administration, there are a number of key documents that will guide what technologies and solutions government customers will buy. Continue reading