Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. List of United States defense contractors - Wikipedia

    en.wikipedia.org/wiki/List_of_United_States...

    ('DoD 9700' worksheet). The Department of Defense announces contracts valued at $7 million or more each business day at 5 pm. All defense contractors maintain CAGE (Commercial and Government Entity) Codes and are profiled in the System for Award Management (SAM).

  3. Use of Free and Open-Source Software (FOSS) in the U.S ...

    en.wikipedia.org/wiki/Use_of_Free_and_Open...

    The main conclusion of the analysis was that FOSS software plays a more critical role in the DoD than has generally been recognized. FOSS applications are most important in four broad areas: Infrastructure Support, Software Development, Security, and Research. One unexpected result was the degree to which Security depends on FOSS.

  4. Design Criteria Standard for Electronic Records Management ...

    en.wikipedia.org/wiki/Design_Criteria_Standard...

    United States Department of Defense standard 5015.2-STD, the Design Criteria Standard for Electronic Records Management Software Applications, was implemented in June 2002. This standard defines requirements for the management of records within the Department of Defense, which has become the accepted standard for many state, county, and local ...

  5. United States Military Standard - Wikipedia

    en.wikipedia.org/wiki/United_States_Military...

    Related documents, such as defense handbooks and defense specifications, are also addressed. Definition of document types [ edit ] Although the official definitions differentiate between several types of documents, all of these documents go by the general rubric of "military standard", including defense specifications, handbooks, and standards.

  6. FIPS 140-2 - Wikipedia

    en.wikipedia.org/wiki/FIPS_140-2

    The Federal Information Processing Standard Publication 140-2, ( FIPS PUB 140-2 ), [1] [2] is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001, and was last updated December 3, 2002.

  7. MIL-STD-498 - Wikipedia

    en.wikipedia.org/wiki/MIL-STD-498

    MIL-STD-498. MIL-STD-498, Military Standard Software Development and Documentation, was a United States military standard whose purpose was to "establish uniform requirements for software development and documentation." It was released Nov. 8, 1994, and replaced DOD-STD-2167A, DOD-STD-2168, DOD-STD-7935A, and DOD-STD-1703.

  8. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...

  9. DoD IPv6 product certification - Wikipedia

    en.wikipedia.org/wiki/DoD_IPv6_Product_Certification

    This list is used by procurement offices in the DoD and the U.S. Federal agencies for ongoing purchases and acquisitions of IT equipment. As of February 2009, the DoD ceased the requirement for IPv6-only testing for certification and entry into the Unified Capabilities Approved Products List (UC APL).