Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

remove outdated priorities and content #1036

Merged
merged 2 commits into from
Jan 22, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 0 additions & 28 deletions content/emergent-technology/aiops.md
Original file line number Diff line number Diff line change
Expand Up @@ -211,34 +211,6 @@ Appdynamics - Now a part of Cisco, Appdynamics began as a traditional APM compan

Devo - Devo began as the only cloud-native APM company and is now centered on AIOps for both service and security operations. They are one of the few vendors who measure and deliver performance beyond traditional IT metrics by focusing on end-user experience. Third party evaluators also cite their unique ability to address changing data formats.

## White House Priorities

### AIOps Technology for COVID-19 

President Biden expressed his intent to move to quickly to contain the COVID-19 crisis by expanding testing, safely reopening schools and businesses, and taking science-driven steps to address the communities — especially communities of color — who have been hardest hit by this virus. Accordingly, the President launched a national vaccination program to inoculate the U.S. population efficiently and equitably. Following the pandemic, experts agree the workplace (and thus the IT landscape) are forever changed. The following resources explain potential applications for AIOps in that context:

[Why You Need AIOps in a Post-COVID World](https://sciencelogic.com/blog/why-you-need-aiops-in-a-post-covid-world)

* ScienceLogic explains that the increase in remote work during the pandemic dramatically increased incident reporting 3-5 fold. If remote work is here to stay, AIOps can lighten this increased IT workload.

[How AIOps is proactively helping organizations stay relevant](https://www.ey.com/en_hr/consulting/how-aiops-is-proactively-helping-organizations-stay-relevant)

* EY discusses how the pandemic accelerated many organization’s digital transformation plans. This naturally increases the availability of data and thus the need to analyze it. AIOps can assist organizations in this endeavor.

### Customer Service Executive Order

On December 13, 2021 President Biden issued an [executive order](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/12/13/executive-order-on-transforming-federal-customer-experience-and-service-delivery-to-rebuild-trust-in-government/) mandating the government be accountable “for designing and delivering services with a focus on the actual experience of the people whom it is meant to serve.” Further, the order identifies that, “Every interaction between the Federal Government and the public, whether it involves renewing a passport or calling for a status update on a farm loan application, should be seen as an opportunity for the Government to save an individual’s time (and thus reduce “time taxes”).” AIOps presents an opportunity for government agencies to reduce that ‘tax’ and smooth operations where the value chain possesses an IT component.

In the examples cited above, citizens expect a high degree of speed and reliability in service delivery. This is in part due to the perceived relative maturity of the customer experience (CX) in the private sector. The federal government can leverage AIOps tools to improve the CX in both of these areas. AIOps is specifically geared towards improving metrics that otherwise unaddressed led to customer frustration. Internally, these metrics include mean-time-to-detection (MTTD), mean-time-to-resolution (MTTR), service availability, and user reported versus automatically detected issues. Further, as noted in our AIOps [vendor overview](#companies-and-contracts), an increasing number of tools are attempting to measure business outcomes in addition to traditional IT metrics. These might include time and cost savings not just for the business or agency, but rather for the customer. In this way, AIOps is one path agencies can use to meet the objectives of this Executive Order.

### Cybersecurity

Similarly, the current Administration has placed an emphasis on cybersecurity through a series of [policies](https://www.whitehouse.gov/omb/briefing-room/2021/09/07/office-of-management-and-budget-releases-draft-federal-strategy-for-moving-the-u-s-government-towards-a-zero-trust-architecture/), [memorandums](https://www.whitehouse.gov/briefing-room/statements-releases/2022/01/19/fact-sheet-president-biden-signs-national-security-memorandum-to-improve-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems/), and [orders](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/). AIOps holds a lot of promise to meet these objectives.

One of the reasons AIOps is likely to be more effective than individuals is that the tools have visibility into the entire organization’s IT infrastructure, rather than the limited view an individual or siloed security organization might have. Further, the sheer magnitude of logs and data generated by traditional cybersecurity monitoring tools makes it nearly impossible to analyze the data for threats in real time. A critical AIOps innovation is the speed at which this happens. As more data is generated, the faster the response occurs. That stands in direct contrast to a team of security analysts, who are likely to be slowed by an increase in the amount of data needing to be analyzed.

Additionally, the President’s Cybersecurity National Security Memorandum to Improve Cybersecurity specifically cites the objective of improving “the visibility of cybersecurity incidents that occur on \[systems].” Here, AIOps can be of benefit too. In addition to alerting, many AIOps tools allow security leaders to create customized service dashboards. This provides visibility across the IT organization as the current vulnerabilities, ongoing threats, and past remediations. For example, one vendor touts their dashboard’s ability to “correlate threats with application logs and telemetry from more than 500 turn-key integrations.” In a complex IT environment such as a large federal agency leveraging hundreds of applications and even more integration points, visualizing the threat landscape is an effective means of ensuring administrators fully grasp the situation at hand in instances where human intervention is required.

## Dependencies and Risks

### Dependencies
Expand Down
12 changes: 2 additions & 10 deletions content/emergent-technology/innovative-authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -236,19 +236,11 @@ Potential risks associated with Innovative Authentication include:
* New tools, processes, and particularly those involving biometrics, may face a steep user acceptance curve.
* Unlike other emerging technologies, the nature of IT security means that there’s always an adversary seeking to develop new explorations. No authentication tool should become a ‘set it and forget it’ implementation. No matter the tool, system managers must constantly assess and mitigate new threats, by either improving their current implementation or seeking out new technology.

## White House Priorities

![white house building](/assets/cms/emergent-technology/1024px-capitol_building_full_view.jpg "White House Priorities")

In his Executive Order 14028, President Biden mandated that agencies operating National Security Systems incorporate multi-factor authentication for data at rest, and in transit. This order doesn’t mandate specific technologies or vendors, but it does require any solution to meet the definition of multifactor. It should also be seen as a minimum, rather than a maximum requirement. ([Source](https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity))

Additionally, the White House is urging private companies to protect their systems using multi-factor authentication. ([Source](https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/fact-sheet-act-now-to-protect-against-potential-cyberattacks/))

## Laws, Legislation, Regulations 

The White House has issued a Zero Trust Strategy which will ultimately change how employees and citizens access federal systems, primarily through multi-factor authentication. Additionally, The National Institute of Standards and Technology (NIST) is also working to update PIV standards to accommodate additional types of authentication methods. [Source](https://federalnewsnetwork.com/cybersecurity/2022/01/white-house-sees-chance-to-design-new-user-experiences-through-zero-trust-strategy/)
In 2022, the White House issued a Zero Trust Strategy which will ultimately change how employees and citizens access federal systems, primarily through multi-factor authentication. Additionally, The National Institute of Standards and Technology (NIST) is also working to update PIV standards to accommodate additional types of authentication methods. [Source](https://federalnewsnetwork.com/cybersecurity/2022/01/white-house-sees-chance-to-design-new-user-experiences-through-zero-trust-strategy/)

In 2017, former President Donald Trump signed an executive order requiring that the top 20 U.S. airports use biometric technology and facial recognition by 2021 for all international passengers. He also signed the National Strategy to Combat Terrorism Travel, which calls for the increased use of biometric technology and data to stop terrorists from entering the U.S. [Source](https://fedtechmagazine.com/article/2019/08/how-government-uses-biometric-authentication-technology-perfcon)
In 2017, President Donald Trump signed an executive order requiring that the top 20 U.S. airports use biometric technology and facial recognition by 2021 for all international passengers. He also signed the National Strategy to Combat Terrorism Travel, which calls for the increased use of biometric technology and data to stop terrorists from entering the U.S. [Source](https://fedtechmagazine.com/article/2019/08/how-government-uses-biometric-authentication-technology-perfcon)

While the future of authentication is still to be determined by way of the Zero Trust Strategy, some agencies are already utilizing advanced technology such as biometrics. Since 2016, U.S. Customs and Border Protection has been working with airlines to use facial recognition technology as part of the pre-boarding screening process; at least five airlines now use it, largely for international flights. This is voluntary for American citizens.

Expand Down
37 changes: 0 additions & 37 deletions content/emergent-technology/touchless-tools.md
Original file line number Diff line number Diff line change
Expand Up @@ -134,8 +134,6 @@ There are a wide variety of vendors capable of providing touchless tools, but fo

### Other resources

* [GSA Safer Workplace Strategy Book](https://www.gsa.gov/cdnstatic/2021412-GSA-Strategy%20Book-40_508%20Compliant.pdf)

#### Touchless Environment

Evaluate the need for touchless devices or additional services that enable employees to access and utilize spaces hands-free. If an agency wishes to make updates to its space, please contact your GSA Building Manager or the GSA Lease Administration Manager for pricing and approval. Agencies will need to provide a Reimbursable Work Authorization (RWA) through eRETA to fund updates.
Expand All @@ -144,41 +142,6 @@ Evaluate the need for touchless devices or additional services that enable emplo

In addition to maintaining a cleaner facility, consider looking for solutions that minimize people’s contact with surfaces. Agencies who wish to install automatic hold open devices on doors should consult with the GSA Building Manager or Lease Administration Manager and the GSA Regional Fire Protection Program Office. Plans for installing hold-open devices on doors must be reviewed by the GSA Fire Protection Officer. Requests to modify tenant spaces and install touchless features restrooms (e.g., motion activated toilets, faucets, and towel dispensers) must be approved by GSA or lessor and may require an RWA.

## White House Priorities

The White House has identified [four distinct priorities](https://www.whitehouse.gov/priorities/) for the Administration. First on its list is moving to contain COVID-19. As part of the subordinate [National COVID-19 Preparedness Plan](https://www.whitehouse.gov/covidplan/) the administration has highlighted the need to prevent economic and educational shutdowns. 

 Touchless technology can play a role in containing the pandemic and enabling in-person activities to return and thus eliminating the need for further shutdowns.Technologies such as these can prevent physical contact, slowing the spread of the virus, as well as reduce the number of surfaces that require sanitizing on a regular basis. As the federal workforce returns to their on-site duty stations, touchless technology can play a key role in ensuring we won’t need to return to an emergency fully remote work stance. In addition to reducing infections, the peace of mind afforded to employees by having less physical contact with commonly touched surfaces will create a more confident, cared-for work force. Finally, these touchless technologies will have benefits in reducing other transmissible diseases and potentially for future pandemics.

 Additionally, the White House is committed to ensuring Diversity Equity Inclusion and Accessibility (DEIA) be at the forefront of policy considerations. As shown in our coverage of Touchless Tools use cases and applications, there are extensive uses for building accessibility, particularly with respect to controlling the environment (doors, lights, thermostats, and other smart devices) through voice and/or gestures.

## Laws/Legislation, Regulations, and Policy

There are few existing laws and regulations regarding touchless technology; however, there are a number of legal and ethical questions that should be taken into consideration, as these issues spurn public debate and the likelihood of future legislation.

For example, as GSA considers using biometrics in its Login.gov service, the agency has concerns about equity and accessibility.  How will these issues be addressed? The lack of existing regulation raises questions about their usage. For example current sensors placed above the grocery store doors to sense individuals approaching are passive, and expected. As facial recognition technology becomes passive, will it be as accepted. And if so, current concerns about accuracy and bias must be addressed.

### What Laws, Legislation & Regulations are in place regarding Touchless Technologies? 

Is facial recognition legal in the US? [ Face Recognition Is Being Banned—but It’s Still Everywhere](https://www.wired.com/story/face-recognition-banned-but-everywhere/). "That’s likely to continue, because face recognition is **unregulated** in most of the US, as there's no federal law covering the technology. Many uses of face recognition have lower stakes than in policing; some, like unlocking a phone with a glance, can be convenient."

That said, the the top six ethical concerns related to facial recognition systems include:

* Racial bias in detection methods
* Racial discrimination in law enforcement 
* Data privacy
* Lack of informed consent and transparency
* Mass surveillance
* Data breaches and lack of legal remedies. 

[(Source)](https://learn.g2.com/ethics-of-facial-recognition)

These considerations are already having an impact, even absent regulation. The IRS, after weeks of pushback from Congress and the public, is now allowing taxpayers to sign up for an online account without the use of any biometric data, including facial recognition. Taxpayers now have the option to verify their identities through a live, virtual interview [(Source)](https://fcw.com/digital-government/2022/04/logingov-plans-scale-without-facial-recognition-tech-now/363948/). This decision has implications beyond the IRS, as GSA hasn’t ruled out biometrics for its Login.gov service as the agency plans to scale its use.

### Specific rules and Legislation

Currently an interim FAR rule restricting certain foreign microchip manufacturing is in effect. (See Interim FAR Rule [(Source)](https://www.acquisition.gov/sites/default/files/page_file_uploads/FAR%20Case%202019-009-Interim_Rule_prepublication_07_10_20.pdf).

## Dependencies and Risks

There are a number of risks inherent to the adoption of any new technology; touchless tools are no different. Here are some specific potential risks associated with touchless tools:
Expand Down
10 changes: 0 additions & 10 deletions content/emergent-technology/virtual-presence.md
Original file line number Diff line number Diff line change
Expand Up @@ -161,16 +161,6 @@ The Source [8ASTARS3](https://www.gsaelibrary.gsa.gov/ElibMain/scheduleSummary.d

The category STARS3 ET 8(a) Streamlined Technology Acquisition Resource for Services (STARS) III Emerging Technology-Focused IT Services - This scope sub-area provides for IT services-based solutions which involve emerging technology (ET) innovation to securely accelerate transformation and advance mission outcomes. A task order requirement can fit in this sub-area if it includes IT services-based solutions with ET as the focus.

## White House Priorities

The White House Priorities are set by each administration. Currently these are the high level priority areas which are subject to change based on official release by OMB on behalf of the Office of the President. Within the Virtual Presence space, we’ve identified potential alignment within the priorities and how the federal community might leverage them.

### COVID-19, Equity, and Climate

As the staggered return to the physical workplace continues, it will be more important than ever to ensure equal experiences across unique working environments. As our overview of Virtual Presence technologies has shown, these tools enable employees to participate on even terms with their in-person colleagues. Further, virtual office spaces can help remote employees more clearly define their workspaces within the home, which may help individuals place stricter boundaries between their work and personal lives. This will be of particular benefit to those residing in smaller homes, who may not have the luxury of a dedicated office space. It may also reduce the commuting burden on individuals who would otherwise spend time and money (not to mention frustration) on lengthy commutes. In the same vein, this will help achieve the Administration's climate goals by reducing vehicle emissions and potentially heating/cooling for large office spaces.

For further reading regarding the current administration's priorities see the [Biden-⁠Harris Administration Immediate Priorities](https://www.whitehouse.gov/priorities/).

## Dependencies and Risks

### Dependencies
Expand Down
12 changes: 0 additions & 12 deletions content/techtalks/2017-02-21-a-look-into-the-ctos-office.md

This file was deleted.

12 changes: 0 additions & 12 deletions content/techtalks/2017-02-28-open-source-at-gsa.md

This file was deleted.

12 changes: 0 additions & 12 deletions content/techtalks/2017-03-14-gsa-digital-services.md

This file was deleted.

Loading
Loading