USPTO chief information officer most excited about new search algorithms
New search algorithms for relevant prior art most excite the U.S. Patent and Trademark Office’s CIO right now.
USPTO created the machine-learning algorithms to increase the speed at which patents are examined by importing relevant prior art — all information on its claim of originality — into pending applications sent to art units, said Jamie Holcombe.
Filtering data into haystacks allowing patent examiners to more easily find what they’re looking for — the needle — is the new paradigm for search algorithms, Holcombe said.
“The ability to search, especially the big datasets, gets me so excited,” he added, during an ACT-IAC event Tuesday. “Because that means we can unleash that power to anybody who can get on a computer and access the net.”
Patent examiners previously had to scour three to four pages of single-spaces, text searches for relevant prior art assembled based on word relevance. Now examiners can search concepts like “chemical adhesion” and receive all the relevant prior art they need in one place.
Authorities to operate
One hurdle Holcombe faces as he attempts to test new innovations to modernize USPTO is that often they haven’t been approved by the Federal Risk and Authorization Management Program (FedRAMP).
Small businesses have a hard time ponying up the money needed for authorization, and the federal government is “overly oppressive” when it comes to compliance, Holcombe said.
If a new technology has potential, USPTO temporarily tests it in a sandbox to determine the minimum requirements needed to issue an authority to operate (ATO).
“We’re not exposing everything to it,” Holcombe said. “But I’m giving it enough time to grow to the point where it can comply with the minimum amount of bureaucracy that it has to comply with.”
The most important thing to Holcombe when issuing an ATO? That data at rest resides in the U.S.
Data in motion around the world can be encrypted, but the rest of the world is the “Wild West” when it comes to protecting stored data in accordance with other countries’ regimes and authorities, Holcombe said.
DOD’s innovation ecosystem is growing, but strict compliance is a barrier, DARPA director says
The number of innovative companies the Department of Defense is working with has increased in recent years, but a key roadblock remains compliance regulations, the head of the Defense Advanced Research Projects Agency told Congress Tuesday.
The growth of the innovation ecosystem is a welcome sign to DOD and is the result of outreach programs like the Small Business Innovation Research (SBIR) awards. But DARPA Director Stefanie Tompkins told senators that compliance requirements remain an obstacle to further growth of the innovation base, especially for small companies and some universities.
“We will be looking for ways to sort of meet them in the middle and find ways to make it easier for them to participate and while still being fully compliant with our requirements,” Tompkins told the Senate Appropriations Subcommittee on Defense.
While she did not name specific compliance regimes that are hampering growth of the innovation base, new requirements for contractors have been added in recent years, including the need to rid their networks of specific Chinese-made technology and to ensure their cybersecurity meets basic DOD standards.
Tompkins specifically noted some universities not being able to clear regulatory hurdles. In October, a group of universities asked for an exemption from the Cybersecurity Maturity Model Certification (CMMC), a new standard for contractors that will require them to pay for a third-party verification that their networks meet security controls. CMMC leaders have said that universities will not be exempt.
“We are going to be taking a hard look at potential barriers,” Tompkins said.
Other officials have voiced concern over the barriers CMMC could place on industry. Lauren Knausenberger, CIO of the Air Force, said she had “mixed feelings” on the program and worried some of the requirements were too strict.
“I would rather just say, ‘Hey let’s just give you some endpoint requirements,’” Knausenberger said about small sub-contractors that do not have the resources to meet some of the requirements.
Tompkins said it is important to keep growing the innovation base to meet growing technological threats. DARPA is engaged in research on artificial intelligence, hardware advancements and quantum sciences, among other areas, that often also have commercial applications.
“We are seeing that increase and we hope to see it even more,” Tompkins told Senators. “To get the best ideas and to get the best capabilities we need to be reaching the broadest possible and most diverse performer pool possible.”
Army to stand up multi-domain task force in Germany
The Army will stand up its second multi-domain task force, this time in Germany as the first unit focused on modernizing all-domain operations within Europe.
The Multi-Domain Task Force-Europe will lead the charge in implementing new combat operational constructs in Europe along with a Theater Fires Command, which will focus on increasing the range and precision of artillery through faster networks and data usage. More than 500 soldiers will be sent to Army Garrison Wiesbaden in Germany across both units, the Army says.
The task force will be comprised of artillery, missile defense, intelligence, cyberspace, electronic warfare and other elements and serve to combine their efforts through new networking technology. The task force will activate Sept. 16.
“The Theater Fires Command and Multi-Domain Task Force in Europe will enable U.S. Army Europe and Africa to synchronize joint fires and effects, control future long range fires across all domains and will create more space, cyber and electronic warfare capabilities in Europe,” said Col. Joe Scrocca, the spokesman for U.S. Army Europe and Africa.
The task forces are unique units of soldiers that are designed to implement the Army’s future concept of operations that will rely heavily on networking data across different domains, like air and land operations. The first task force was set up in the Joint Base Lewis-McChord in Washington to focus on multi-domain operations in the Pacific. The task forces also are building new all-domain operations centers that allow commanders to see more data and use technology to extract meaning from multiple operations at once.
One of the Army’s multi-domain priorities is extending the range and precision of long-range artillery, or “fires.” To achieve these goals, the Army wants to link data from all domains and create new software to fuse information into stronger targeting methods, leaders have said. The task force will take many of the lessons learned in previous Army test events and put them into practice.
“The future is all about range and speed,” Army Chief of Staff Gen. James McConville previously said about the work the multi-domain task forces are doing.
In Europe, where Russia remains the No. 1 security threat, focusing on long-range precision fires suits a land-based conflict.
The Pacific task force unit is focusing on area-denied communication resiliency, something that the Army anticipates will be a threat in the Pacific. Leaders have voiced concern about China’s technical abilities to create cyber-defenses and offensive weapons that could disable the U.S. military’s ability to communicate and use command and control systems.
“We face increased physical and virtual standoff through layered and integrated networks, where adversaries leverage all instruments of national power to blur the lines between competition and conflict, altering international norms to the detriment of the international community,” Brig. Gen. Jim Isenhower, commander of the task force in Washington, previously said.
Lawmakers ask Biden administration for Technology Modernization Fund spending plan
Lawmakers want to know what IT improvements the Biden administration is planning with the $1 billion recently injected into the Technology Modernization Fund, according to a letter sent by five Democratic members of the House Oversight Government Operations Subcommittee on Tuesday.
The letter asks the Office of Management and Budget, General Services Administration, and TMF Board to submit a spending plan to Congress for the funds appropriated in the American Rescue Plan Act, as well as for partial repayment by agencies.
TMF spending is perhaps the fastest way to invest in critical IT and cybersecurity projects across government. But agencies are expected to pay the money back within five years so the fund remains self-sustaining, which is an “unduly burdensome” ask on “inherently riskier projects,” according to industry.
“To ensure the most immediate and effective investment of the $1 billion TMF appropriation, we understood that the reimbursement model would need to be relaxed in the American Rescue Plan,” reads the letter from Democrats. “Although that requirement could not be retained in the budget reconciliation process, we strongly urge the administration not to let the reimbursement model atrophy during the expenditure of the investment made by the American Rescue Plan.”
Reps. Gerry Connolly, Va.; Carolyn Maloney, N.Y.; Eleanor Holmes Norton, Washington, D.C.; Katie Porter, Calif.; and Jamie Raskin, Md., further want to know:
- how the TMF Program Management Office will scale to handle increased project proposals from agencies,
- how the TMF Board will encourage proposals from the agencies most in need;
- TMF Board proposal priorities;
- OMB timetables for agencies that can repay TMF funds on time; and
- criteria for measuring project success when timely repayment isn’t expected.
The subcommittee wants an OMB and GSA briefing on the plan no later than May 7. And the letter comes a day after GSA told FedScoop its offices will frictionlessly lend technical and acquisition expertise to agencies receiving TMF funds, albeit without naming specific projects likely to see investment.
“We look forward to working with you to ensure this funding catalyzes the transformative IT investments the federal government so desperately needs to better serve this nation at a most critical time,” reads the letter.
GSA planning to lend tech, acquisition expertise to support scaling TMF
General Services Administration officials anticipate lending technology and acquisition expertise to agencies modernizing IT using the more than $1 billion in funds allocated within the American Rescue Plan Act.
GSA holds weekly meetings with the Office of Management and Budget, U.S. Digital Service, Cybersecurity and Infrastructure Security Agency, federal chief information officers, and industry to discuss the $1 billion added to the Technology Modernization Fund (TMF) and $150 million to the Federal Citizen Services Fund (FCSF).
The TMF is a central pot of appropriations that agencies can apply for to fund impactful modernization projects under the stipulation that they’ll pay it back within five years. The FCSF, on the other hand, is an internal GSA fund that TTS can use to support interagency digital services initiatives.
While process improvements streamlining how that money is distributed to agencies will be determined in the coming weeks and months, the news that GSA teams like Technology Transformation Services and 18F will offer assistance should assuage tech companies that demanded as much in a letter last month.
“If we can be of service along the way — whether it’s through our technology expertise, whether it’s through our acquisition expertise, whether it’s through our thought leadership in certain areas,” Sonny Hashmi, commissioner of the Federal Acquisition Service, told FedScoop in an exclusive interview. “We will be available as a resource for those agencies to tap into in the most frictionless way possible.”
TTS is working with the TMF Board to bring in the right people, potentially from the Centers of Excellence and Presidential Innovation Fellows programs, said Dave Zvenyach, the TTS’s director and deputy federal acquisition commissioner.
Adding the right capabilities and skills to the evaluation side of investments is a priority, Hashmi said.
“We have to figure out our org chart behind the scenes and work with our agencies in all the many different ways that we can,” he added. “Because that has been a challenge historically that I think we have the ability to overcome.”
In addition to improving the way investments are made, government is reconsidering agency repayment requirements and how to hold projects accountable for the way funds are spent to “make the most good happen as quickly as possible,” Hashmi said.
GSA’s 10x program has had great success expanding Login.gov entity verification across government on a smaller budget than the TMF and FCSF have now, Zvenyach said.
He categorizes the uses of new funds in three ways: recovery tied to the COVID-19 pandemic, economy, racial inequity and climate change; rebuilding government services; and reimagining digital services delivery — all of which offer high-impact opportunities for investments.
“Some of them are going to be duds,” Zvenyach said. “But some of them are going to be home runs.”
Both officials declined to name specific initiatives that will likely receive TMF funds citing the many stakeholders involved in those decisions. But possibilities include immediate, tactical investments in cybersecurity in response to last year’s SolarWinds hack, new shared services, and specific systems helping people find COVID-19 vaccinations, vote or receive Social Security benefits, Hashmi said.
GSA is assisting the Small Business Administration with baking fraud detection into its loan application systems, which may have doled out as much as $105.4 billion in COVID-19 relief money to fraudsters.
“There are a range of specific initiatives we’re looking at,” Zvenyach said. “Everything from [the Federal Risk and Authorization Management Program] to improving forms and digitizing paper-based services.”
Another factor in all of this is President Biden’s appointment of Clare Martorana as federal CIO last month. Martorana‘s experience with IT modernization as CIO of the Office of Personnel Management and, before that, at USDS bodes well for projects reimagining digital and shared services.
“She brings a wealth of knowledge and experience,” Hashmi said. “And new thinking around how the TMF can actually be used as an investment fund to change things at a much greater scale, across multiple agencies.”
Air Force can now deploy drones from other drones
The Air Force‘s unmanned aerial systems (UAS) capabilities took a step forward with new test flights that launched a small UAS out of a larger drone.
The test, conducted in late March by the Air Force Research Lab, showed that a larger Valkyrie UAS can release a smaller UAS through its weapons bay door, a new capability that could lead to the use of drone networks being deployed during battle.
“This is the sixth flight of the Valkyrie and the first time the payload bay doors have been opened in flight,” Alyson Turri, demonstration program manager, said in a release.
The Valkyrie XQ-58A is an “attritable” system, meaning it is cheap enough to easily replace it if destroyed or lost. The Valkyrie drone hardware is being developed for use in multiple Air Force emerging technology programs, including the Skyborg program, which plans to network attritable drones as “loyal wingmen” to human-piloted fighters, and the Advanced Battle Management System that will serve as the backbone of the military’s Internet of Things concept.
Nesting a smaller drone into the Valkyrie system that can be deployed mid-air could give the Air Force enhanced surveillance, counter-drone and even explosive-delivery capabilities. The smaller drones were developed by Kratos and Area-I — the latter of which was recently acquired by Anduril Industries.
Other parts of the military are also investing in research on how to build networks of drones and how to counter enemy systems. Turning single drones into systems of networked drones has also been a priority for Anduril, the new owner of Area-I, which specializes in mid-air launch systems.
“We believe that to really enable these technologies to go, you have to solve the autonomy side,” Anduril CEO Brian Schimpf told FedScoop when the purchase was announced.
The tests in late March also increased the altitude and speed at which the Valkyrie flew, giving it enhanced military capability.
Six months into JAIC 2.0, DOD still needs to move faster on AI
Despite revising its strategy six months ago to speed up artificial intelligence adoption across the Department of Defense, the Joint AI Center is still not moving fast enough, its director said.
The JAIC made the significant change from being an organization focused on product delivery to being more of an “enabling force” that supports AI offices across the military in November. That change brought more unity of effort across the department’s AI projects, but it’s still not moving as fast as it should be, Lt. Gen. Michael Groen said during a press briefing Friday.
“Is JAIC 2.0 enough? Are we moving fast enough?” Groen said. “I lay awake at night and say the answer is no.”
Groen’s message of raising the bar for the JAIC’s performance was echoed by Bob Work, former deputy secretary of defense, who appeared alongside Groen in his capacity as vice chair of the National Security Commission on AI. Work backed the JAIC’s new strategy of being an enabling force designed to help others, pointing to his commission’s 700-page report on how to achieve more of the speed Groen is after.
New development networks
Groen says he is satisfied with much of the work the JAIC has done, but he measures success in the achievements of other AI- and data-focused organizations through DOD. That means getting program offices more tools like the Joint Common Foundation, the JAIC’s AI coding environment, and the data-know how to achieve AI at scale.
Groen also detailed his hopes of stitching together a cloud-based “operating layer” of databases and development platforms to turn disparate efforts into unified ones.
“You need a network of operating platforms,” he said. “This will give us the capability.”
When civilians and service members want to work with data or code new solutions they still turn to a patchwork of different environments, like the Air Force’s Platform One. There are also disparate cloud systems with different authorities to operate, a problem officials hope the still-stymied Joint Enterprise Defense Infrastructure (JEDI) cloud program will fix.
Beyond purely technical work, Groen said members of the JAIC have fanned out across the department to share best practices. He said the center has less of a “teacher-student” relationship and more of a partnership and supporting role with other AI initiatives. He said the JAIC is also finding ways to use its new acquisition authority.
“We can do our own acquisition,” Groen said. “Now we can start a much broader array of support services.”
A new set of recommendations
The NSCAI report Work helped lead has more than 100 recommendations for the DOD to speed up the work the center is already engaged in.
“We thought about this as a blueprint,” he said. “You should not look at the recommendations individually, you have to do them all together to get the effect that the commission feel is important.”
The recommendations push the DOD to be “AI-ready” by 2025 through widespread education, leadership support for AI, computer hardware development to run AI on, and greater investment in cutting-edge and basic AI research.
Groen said the JAIC is fully behind all of the recommendations but taking a “hard look” at some— which he didn’t enumerate — on how exactly they could be implemented.
White House proposes even more for Technology Modernization Fund
In its fiscal 2022 discretionary funding request on Friday, the White House asked Congress for an additional $500 million for the Technology Modernization Fund, citing agencies’ need to update and secure antiquated information systems.
That’s on top of a $110 million increase, to $2.1 billion, requested for the Cybersecurity and Infrastructure Security Agency and $750 million requested as a reserve for agencies’ IT enhancements.
The American Rescue Plan Act saw a record $1 billion injected into the TMF and $650 million appropriated to CISA in March, but countering the cybersecurity threats posed by China and Russia remains a priority for the Biden administration.
The General Services Administration will play a central role in managing the TMF and other governmentwide funding for IT modernization.
“These funds will allow GSA to support the administration’s efforts to tackle the climate crisis, promote economic opportunity and strengthen federal cybersecurity,” Acting Administrator Katy Kale said in a statement. “These critical investments will enhance support to federal agencies and the public, while making our nation’s infrastructure more secure and sustainable.”
GSA‘s emphasis will be on mission-critical systems and citizen-facing digital services in light of the COVID-19 pandemic and the SolarWinds hack that compromised products agencies use, according to the request.
The proposed increase for CISA would go toward enhanced cyber tools, hiring and support services. Another $20 million would be for a new Cyber Response and Recovery Fund.
Within the Department of Commerce, the White House asked for $916 million — a $128 million increase — in funding for the National Institute of Standards and Technology. That money would expand NIST’s research into computing, cybersecurity, artificial intelligence and quantum information science (QIS). Another $39 million was requested for spectrum sharing research benefitting broadband and 5G deployment.
Additionally, the White House proposed a $1.7 billion increase, to $10.2 billion, for the National Science Foundation to, in part, establish a new directorate for prioritizing practical applications of AI, high-performance computing, QIS, robotics, advanced communications, and cybersecurity research.
“NSF stands ready to maximize the impact of this increase in funding and tackle critical challenges to bolster the U.S. economy and our leadership in critical and emerging areas of research and technological advancements,” said an agency spokesperson in a statement.
The White House request also asks for $4.8 billion for the Department of Veterans Affairs‘ Office of Information Technology in support of cloud modernization and $2.7 billion for the department’s ongoing Electronic Health Record modernization.
Discretionary funding is but one part of the president’s overall proposed budget request, which the Office of Management and Budget intends to release in the coming month. The discretionary request doesn’t include mandatory proposals or tax reforms, and Congress will decide which of the president’s proposals to fund.
“This year’s appropriations process comes at a particularly important moment,” said one administration official on a call with reporters. “Where the past decade, due to overly restrictive budget caps, our country has underinvested in core public services, benefits and protections that are incredibly important to our success.”
Three recommendations to secure a hybrid workforce
Kurt Steege, chief technology officer at ThunderCat and Peter Romness, cybersecurity principal at Cisco, together bring decades of experience advising IT leaders in the U.S. government.

Peter Romness, Cybersecurity Principal, Cisco and Kurt Steege, CTO, ThunderCat
The pandemic proved to agency leaders that they can offer a more flexible work arrangement for government workers. But securing a remote and hybrid work environment for today — and tomorrow — requires greater attention to a holistic security strategy.
Flexibility built into both policies and the underlying IT infrastructure is one way that CIOs and CISOs can accommodate a new way of working. And what agency leaders should aim for is a near seamless and equitable work experience — whether from home or from the office.
The good news is that thanks to the investments many agencies made to use cloud infrastructure, IT leaders are now in a position to take advantage of more effective cloud security capabilities around data. That includes identity and access controls that can reduce agencies’ overall security risks in the years ahead.
Smart cloud decisions yesterday make today’s response possible
The immediate need during the pandemic was to adjust IT systems so that employees could work productively at home. Secondary to that, agency IT departments needed to make certain those systems were secure. Unfortunately, the traditional “checkbox approach” to securing systems is no longer enough to lessen the level of cyber risk agencies face today.
To build a holistic security strategy will take both time and money — for which there are many limitations for agencies.
The bright side is that we have seen how the Cloud First and Cloud Smart policies set by the last two administrations have paid off in big ways. In fact, the most notable successes to facilitating mission during the pandemic are coming from those organizations which have been leveraging their cloud investments.
The biggest change making a difference in security — more than any other security practice — is when organizations use cloud tools to implement dynamic and persona-based policies that control access to agency resources. It not only improves security. It also improves the user experience, by allowing people to view content in a way that helps them in their job — regardless of the location — without jumping through a variety of security hoops to make that happen.
To achieve those improvements, though, requires visibility across the network. From a data security standpoint that means understanding where your data is, how it is being used and accessed, how the network behaves and knowing what policies that have been built.
Investing in security for hybrid work environments
The future of work is poised to look very differently across both the government and private sectors now that leaders and employees alike have experienced many of the positive benefits of a flexible work environment.
One of the discussions we have been a part of with some of our customers is a thoughtful transition to a “30-40-30” office-home work model: 30% of an organization’s staff may never return to the office; 40% may go back to the office a few days a week; and the remaining 30% would most likely work full-time at the office.
To secure this new work model, our first recommendation involves matching policies with existing use cases. Even before you look at the security tools you plan to use, weaving together policies regarding identity and data will make the whole system run more smoothly and securely.
Our next recommendation — and often a sticking point when managing data security — is understanding appropriate levels of security classification and sensitivity. For agencies that work in a more classified or sensitive area, it’s easy to just classify everything the same. But it’s also important to look at the long-term needs of users. The good news is, dynamic policies make it easy to adjust the data classification to be more variable, depending on the user and type of data.
That ties into our third recommendation, which is identifying what you have. A lot of organizations don’t know where to start in this endeavor. The don’t know what data they have or where it is; they often don’t even know all the devices that are in their environment or what those devices are doing. Having an accurate inventory really matters.
The value of working with strong partners
While at the surface these recommendations may seem simple, the complexity of agencies’ enterprise network brings a lot of challenges. That is why we promote working with a strong integration partner to get the most from your existing security investments and lessen the burden of acquisitions for new tools.
The partnership between ThunderCat Technology and Cisco offers a great resource for agencies to integrate and automate Cisco’s security tools across agency networks because ThunderCat Technology has built a practice around Cisco’s suite of solutions.
Cisco brings a full range of tools that provide the strongest levels of visibility, flexibility and security. ThunderCat Technology, meanwhile, understands all the components operating across an agency’s systems, and can serve as a knowledgeable advisor for how to best develop a holistic security strategy across multiple vendors partners so everything works together.
Learn more about how ThunderCat Technology and Cisco can help your organization integrate a holistic security strategy.
White House asks for $5B to fund VA IT in 2022
The White House released a discretionary budget outline Friday that asks Congress to appropriate $4.8 billion for the Department of Veterans Affairs‘ Office of Information and Technology for fiscal 2022.
The $4.8 billion top-line IT number is just shy of the enacted $4.9 billion given by Congress last year, which doesn’t include emergency funding made available to the VA to account for telemedicine and telework needs during the pandemic.
Separate from the OIT budget, the White House has also asked for $2.7 billion for the continued modernization of VA’s electronic health record, a 10-year project that could cost north of $16 billion before it’s all said and done.
“The funding request invests in the core foundations of our country’s strength and advances key U.S. Department of Veterans Affairs (VA) priorities, including addressing Veteran homelessness, suicide prevention, caregiver support, and modernizing information technology systems to enhance customer service experience and ensure Veterans receive world-class health care,” VA Secretary Denis McDonough said in a statement following the budget proposal release.
In total, the VA is requesting $113.1 billion in discretionary funding, an $8.5 billion or 8.2% increase from the fiscal 2021 enacted level, according to the White House.
Congress ended up giving the VA more than it asked for in fiscal 2021, and we’ll have to wait and see if appropriators will be as generous this time given the record spending the government has already undertaken in light of the pandemic.
Leaders on Capitol Hill and at VA have expressed concerns about cost overruns on the EHR program, which is funded separately from the IT budget. Secretary McDonough told Congress in March that he saw higher than anticipated staff needs during the initial launch of the program, which may result in higher costs than the $16 billion originally expected.
The VA received $2.6 billion in the enacted fiscal 2021 budget for the EHR program.
Spending on the new cloud-based medical records system was supposed to peak early in the rollout. The program is built on Cerner’s Millennium software system and will eventually be interoperable with a similar system being rolled out in military medical centers.