National Aeronautics And Space Administration IT

2y ago
33 Views
2 Downloads
8.84 MB
12 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Mika Lloyd
Transcription

National Aeronautics and Space AdministrationIT TalkOctober - December 2017Volume 7 Issue 4Cybersecurity Awareness —You AreA TargetThink Before You Click!www.nasa.gov

IT TalkOct - Dec 2017Volume 7 Issue 4Office of the CIONASA Headquarters300 E Street, SWWashington, D.C. 20546Chief Information OfficerRenee WynnEditor & Publication ManagerEldora ValentineGraphic & Web DesignerMichael PorterfieldCopy EditorMeredith IsaacsIT Talk is an official publication of theOffice of the Chief Information Officerof the National Aeronautics andSpace Administration, Headquarters,Washington, D.C. It is publishedby the OCIO office for all NASAemployees and external audiences.For distribution questions or tosuggest a story idea, email:eldora.valentine-1@nasa.govIn this Issue3Message fromthe NASA CIO4Securing Our Digital“Robotic” Workforce6Cybersecurity Awareness:You Are a Target. So ThinkBefore You Click!9Applications Program(AP)—A New ParadigmTo read IT Talk online visit:www.nasa.gov/offices/ocio/ittalkFor more info on the OCIO:v www.nasa.gov/ociov inside.nasa.gov/ocio(Internal NASA network only)v s IT Expo: An InvitationTo Innovate, Accelerate, andCollaborate with the OCIO

Message from the NASA CIOCybersecurity is a shared responsibility, and each of us has a role to play.Emerging cyber threats require theengagement of all NASA employees,NASA contractors, other Governmentagencies, and law enforcement.Cybersecurity is critical to ensuring theintegrity of NASA data and, ultimately,the overall NASA mission. October isNASA Cybersecurity Awareness Month.The theme is STOP THINK CONNECT.REMEMBER.STOP: Before you use the Internet,take time to understand the securityrisks involved and learn how to spotpotential problems.THINK: Watch for warning signs andconsider how your actions online couldimpact you and your NASA family’ssafety.CONNECT: Enjoy the Internet withgreater confidence, knowing you havetaken the right steps to safeguardNASA and your NASA computer.I encourage you to remain aware of cybersecurity risks and implement effective cybersecurity practices to protectand safeguard NASA’s information andassets, such as facilities, equipment,and human resources. Best practicesinclude the following:1. Setting strong passwords and notsharing them with anyone.2. Keeping a clean machine—youroperating system, browser, andother critical software can be optimized by installing regular updates.3. Maintaining an open dialogue withyour family, friends, and community about Internet safety.4. Limiting the amount of personalinformation you post online and using privacy settings to avoid sharing information widely.5. Being cautious about what youreceive or read online—if it soundstoo good to be true, it probably is.Throughout the month of October, various activities will be conducted at eachNASA Center to celebrate NationalCybersecurity Awareness Month. Inthis issue, we’ll take a closer look atsome commonsense rules to protectyourself and your organization againstcyber threats. Remember, effectivecybersecurity practices begin and endwith you!NASA OCIO IT Talk Oct - Dec 20173

Securing Our Digital “Robotic” WorkforceBy Christine Gex, Center Chief Information Security Officer, NASA Shared Services CenterThis summer, the NASA Shared Services Center (NSSC) introduced anew employee to the NASA workforce. Washington Bot is a software application that operates as a virtual full-time employee with defined tasksthat simulate human activities. The Bot has been granted access to Government-furnished equipment and accomplishes tasks with high speedand accuracy using Robotic Process Automation (RPA) technology.The RPA technology, defined broadly, involves the design, creation, andconfiguration of a computer software robot, commonly referred to as a“bot.” The purpose is to perform a predefined and repeatable computerprocessing action or set of actions. Bots can be created and configuredto perform many different types of role-based functions, including, butnot limited to, transactional processing, data manipulation, and reporting. This technology is still maturing and emerging in the areas of cognitive technologies and artificial intelligence. As the science advances, itwill extend the possibilities for more automation: process monitoring,responding to or triggering responses from other computer applications or systems, and possibly other data-processing scenarios.As with all aspects of information technology (IT), security awarenessis at the forefront. IT Security was brought in during conception and isstill integrated with the project. The project and security teams treatedWashington Bot like any other employee and application. This securityapproach allowed the team to document the processes and systemsfor upgrade when applying them to future bots. The RPA technologysecurity assessments were completed using National Institute of Standards and Technology (NIST) 800-53 v4, and the Office of the Chief Information Officer (OCIO) IT Security Division provided resources to perform a deep-dive assessment on one of the potential software vendors.Some of the challenges the team faced were Personal Identity Verification (PIV) Smartcard compliance and training requirements for authentication and access to Government systems. The Identity, Credential,and Access Management (ICAM) team provided the NSSC with a temporary authentication solution, and NSSC continues to partner withthe ICAM team to reach a solution for soft credentials and other NASAsystem integrations.Last year, the NSSC introduced RPA and participated as a contestantat the NASA Innovative Kick Start Competition with NASA Headquarters. The NSSC’s submission was selected from 100 participants, andthis competition allowed the NSSC to purchase the first RPA and pilota proof of concept.Currently, Washington Bot is in pilot training to support processes at theNSSC Human Resources Services Division, the OCIO, the Office of theChief Financial Officer (OCFO), and the NSSC Budget and AccountingDivision. These pilot efforts will allow the NASA workforce the opportunity to refocus their efforts on analytical tasks. This capability has the potential to support the NASA workforce in new and ever-expanding ways.4www.nasa.gov

NASA Welcomes Newest Class of Citizen Data ExplorersBy Dr. Beth Beck, Open Innovation Manager and Information Management Program Executive, Headquarters (Photos: NASA/Michael Porterfield)In August, NASA welcomed the fourth class ofDatanauts into the data exploration ecosystem.Each class of uniquely talented individuals helpsus shape our understanding of how to engage citizens in data problem-solving using NASA’s treasure trove of high-value datasets. As we interactwith each class, we gain valuable insight into thelatest techniques and tools used by Datanauts andthe communities they represent.A recent addition to the Information Managementteam, the OCIO’s Lori Parker assumed leadershipof NASA’s Datanaut initiative. She offers strategicvision on how to infuse the insights we gain fromDatanauts into our Information Management technology roadmap. Veronica “Ronnie” Phillips, working with Jason Duley at NASA’s Ames ResearchCenter (ARC), coordinates Datanaut activities on adaily basis, providing project support and accessto NASA data and expertise. Lori and Ronnie managed the selection process, which is designed tobalance diverse skills and experiences fosteringcuriosity, exploration, and collaborative learningthrough informal mentorships and self-directedteam projects.OCIO’s Lori Parker welcomes newDatanauts to NASA Headquarters.The newest class is a balance of 50 developers,storytellers, makers, game designers, hardwareexperts, and entrepreneurs. Ten of the 50 classmembers have, or are pursuing, Ph.D.’s, whilemany more hold master’s degrees. They representan impressive array of disciplines, including astrophysics, biomedical engineering, statistics, cognitive psychology, epidemiology, molecular biology,neuroscience, and physics. Many are leaders intheir fields and founders of data/coding organizations. Quite a few participated in InternationalSpace Apps events in their communities, and oneis a Space Shuttle legacy, inspired by her dad toapply. This year, our ratio of women to men is80/20; 12 are beginner coders, 31 intermediate,and 7 advanced.able during their 6-month engagement. Datanautscame from as far away as Spain and Turkey, aswell as Texas, California, and Washington State.We welcomed them with an all-star cast of speakers, including our very own CIO, Renee Wynn. Renee stressed the importance of data for providingnew insights into how we see our world, as well asexperimentation and collaboration to get the bestresults. She challenged each Datanaut to get uncomfortable and to learn from one another.Other notable NASA speakers included astronautAlvin Drew; Dr. Gale Allen, Chief Scientist; KathyNado from the Human Exploration and OperationsMission Directorate; and Dr. Brian Thomas, AgencyData Scientist. Jet Propulsion Laboratory (JPL) engineer Michelle Easter brought her MindMakersteam from California to lead a hands-on workshopon binary code and circuit-building.Renee Wynn addresses the 2017 Fall Datanaut Class.Dr. Beth Beck builds circuits with Datanauts AllanAnzagira and Nadew Kibret, both Ph.D. candidates.In September, Lori and Ronnie designed and hosted the 2017 Fall Class kickoff activities at NASAHeadquarters. Thirty-five Datanauts traveled toWashington, DC, to meet one another, learn fromNASA senior leaders, and gain a better understanding of programming and opportunities avail-The Datanauts initiative is an adaptive organismthat changes shape with each class. Their individual and collective interests and talents influencethe program elements we offer. If discussions atthe kickoff are any indication, hold on to your hat.We are in for a ride!NASA OCIO IT Talk Oct - Dec 20175

CybersecurityAwareness:You Are a Target.So Think Before You Click!By Eldora Valentine, OCIO Communications Officer, Headquarters6These days, most of us lead Internet-connected, digital lives. From thekitchen table to the classroom, frombusiness transactions to essential Government operations and services, cybersecurity touches all of us. Octoberis National Cybersecurity AwarenessMonth. It is designed to educate, engage, and raise awareness about cybersecurity and increase the resiliencyof the Nation in the event of a cyber incident. October 2017 marks the 14th Annual National Cybersecurity AwarenessMonth sponsored by the Departmentof Homeland Security (DHS). ManyFederal agencies, including NASA, arepartnering with DHS to promote awareness and improve understanding of theimportance of cybersecurity in our everyday lives. So everyone needs to dohis or her part to make sure that our online lives at home and at work are keptsafe and secure.There are a lot of challenges in thisinformation age. And sometimes technologies that help us do good thingscan also be used to undermine us orcause harm.Mike Witt, Acting Senior Agency Information Security Officer (SAISO), says,“Securing NASA’s data and informationtechnology is a responsibility all of usat the Agency share. By learning bestpractices, we are better equipped toprotect sensitive information and theNASA IT infrastructure.”But it does not end there. NASA continues to increase the number of employees equipped with smartcards, whichprovide enhanced security features tosupport strong identification and authorization for access to the Agency’snetworks and systems.www.nasa.govIn recent years at NASA, the threats toand successful attacks on our systemshave increased significantly. There aremany types of intrusions—unauthorized access, denial or disruption ofservice, phishing, cyber espionage,malicious code (such as viruses), andthe list goes on.“Our goal is to ensure our data andNASA’s entire information technology footprint remain secure, from thecomputer aboard the InternationalSpace Station to smartphones carried by Agency employees,” saysRenee Wynn, NASA Chief InformationOfficer.The Agency also monitors its networks24/7 for cyber threats using automatedtools and defenses, as well as a dedicated staff of cybersecurity professionals. Protecting NASA’s data throughbetter management of our IT footprintis a critical step in safeguarding theAgency.So members of the NASA communityare reminded to practice good onlinesafety habits by doing the following:STOP THINK CONNECTSTOP: Before you use the Internet, take time to understand thesecurity risks involved and learnhow to spot potential problems.THINK: Watch for warning signsand consider how your actionsonline could impact you and yourNASA family’s safety.CONNECT: Enjoy the Internetwith greater confidence, knowingyou have taken the right steps tosafeguard NASA and your NASAcomputer.

Help keep the Web a safe place foreveryone. We all need to own our onlinepresence. If each of us does our partby invoking stronger security practices,raising community awareness, andeducating employees, we will be moreresistant to attacks and live in a saferdigital society.For more information and free onlinesafety resources such as tip sheets,videos, and posters, visit: https://www.dhs.gov/stopthinkconnect-toolkit.You can also find other helpful tips byvisiting NASA’s IT Security AwarenessTraining Center at: https://itsatc.nasa.gov/.NASA Security TipsBy Meredith Isaacs, Communications Specialist, HeadquartersNASA’s information and networks face threats from a variety ofsources. Some methods bad actors use include phishing, cyberespionage, denial-of-service attacks, and the infection of systemswith different types of malware. NASA’s measures to combat theseefforts include continuous monitoring of systems, a 24/7 SecurityOperations Center (SOC), phishing prevention exercises, a transitionto Personal Identity Verification (PIV) Smartcards and Agency SmartBadges, annual training requirements, and communications alerts forcybersecurity events.You can help NASA by following these simple cybersecurity rules toprotect your devices, Agency networks, and NASA’s information:Software Updates Routinely connect your computer to your local network to getcurrent updates and patches. When prompted, update your mobile device software for timelyupgrades and security fixes. Back up your systems regularly.Phishing Prevention Think before you click by verifying e-mail senders, links, andattachments. Set unique, long, and strong passwords for each account. Know the signs of phishing: urgent language, misspellings,hyperlinked text that does not match the actual URL that pops upwhen you mouse over the text, unknown senders, and unsolicited“official” correspondence.Device Protection Protect devices from loss or theft at work, in public, and on travel. Do not leave your devices exposed in a parked vehicle. If necessary,temporarily lock them in the trunk. International travel with NASA devices requires approval from yourCenter’s CIO office. You may be given a loaner.Cybersecurity Information Complete annual Agency and Center cybersecurity trainingcourses, as well as any others assigned to you. Follow all instructions if you are transitioned to the PIV Smartcardor a card reader. Read and comply with cybersecurity alerts sent by IT services,your Center, or the Agency.Report all incidents and suspicious cyber activity to NASA’s SOC,available 24/7: 877-627-2732 or soc@nasa.gov.Remember, cybersecurity begins and ends with you!NASA OCIO IT Talk Oct - Dec 20177

Proactive Solutions: The CybersecurityThreat Management Program at GoddardBy Hilary Gambale, Strategic Communications Specialist, Goddard Space Flight CenterAt the Goddard Space Flight Center (GSFC), the solutions mindset canmanifest itself in many ways. In cybersecurity, one of the most effective waysto provide a solution is to proactivelyeliminate threats that would requireone. The Cybersecurity Services andIntegration Division (CSID) of GSFCcreated the Cybersecurity Threat Management Program in November 2016to provide awareness of imminent andlong-term threats to the various information systems at NASA. Cybersecurity at NASA has evolved into a missioncritical operation, utilizing resources toprotect some of the most valuable datathe Federal Government owns. By allowing the GSFC mission and scienceenvironments to be aware of and takeaction against threats, CSID is preemptively stopping these threats andcreating the solutions-oriented cybersecurity posture GSFC needs to leadthe world’s science development andspace exploration into the 21st century.The CSID Threat Management Programconducts extensive research, collaborating with various partners across theFederal Government to deliver up-todate and relevant threat information.The Threat Management Program hasbuilt relationships with intelligenceand counterintelligence communities,such as the Department of HomelandSecurity (DHS) National Cybersecurityand Communications Integration Center, the Federal Bureau of Investigation(FBI) Cyber Division, and many other8www.nasa.govopen-source intelligence communities, to learn and obtain informationabout actionable and plausible threatsagainst GSFC information systems.This information is shared with stakeholders to ensure that they are awareof threats against their information systems. The shared information includestrending malware, detection signaturesfor the malware, indicators of compromise (IOC), and malicious IP addressesand domains.In the last few months, CSID has communicated the following threat alerts tothe stakeholders: Attempt to steal NASA data: 4 Launch attacks against various operating systems: 1 Encrypt system drivesfor extortion: 4 Compromise system administrator credentials/invalidate antivirus software: 4To provide effective threat management, it is not enough to simply sharea laundry list of information. The ThreatManagement Team also provides subject matter expertise and analysis ofthe situation. For example, the information shared about the WanaCry malware helped the stakeholders to detect systems that can be exploited bythe malware. The Threat ManagementProgram also provided mitigation techniques that can be applied to firewallsto prevent attackers from gaining access to the exploitable systems.In uncertain times, awareness can bethe only solution. On June 27, therewas a threat feed about GSFC IP address ranges that were dumped ontoPASTEBIN, a Web site generally usedby hackers to dump stolen information or publicize successful hacks, bya threat actor. This threat was immediately communicated to the stakeholders because the intent of the threatactor dumping the information wasunknown at the time. By knowing thisinformation, the information systemowners were at a heightened sense ofthreat and knew the probable source ofsuspicious activity.Cybersecurity threats are increasinglyon the rise, and all users need to beaware of the imminent and long-termthreats. From Windows, Macs, andLinux to iPhones and Android phones,there is a rise in exploitation and hacking across all types of operating systems and mobile devices, making ourThreat Management Program essentialto GSFC operations. The CSID’s solution is to mitigate these threats beforethey have a chance to impact the Goddard environment. For more information about the Threat Management Program, please contact Chuck Ruehlingat charles.c.ruehling@nasa.gov.

Glenn’s External WebPresence ReachesNew HeightsBy Kristin Ratino, CommunicationsSpecialist, Glenn Research CenterA collaborative effort betweenGlenn Research Center’s Office ofthe Chief Information Officer andCenter Operations Directorate hasGlenn’s external, non-NASA portalwebsites “reaching new heights.”The team was presented the opportunity to improve Glenn’s digitalpresence and better align it with thecenter’s strategic priorities. Theyaddressed this by merging multiple, diversely-managed externalwebsites with independent contentstrategies into a streamlined andvisually engaging digital presence.Another key driver in the redesigneffort was an aspiration to demonstrate Glenn’s unique research capabilities while connecting with awide-ranging audience base.The team focused on improvingsearch engine optimization andproviding quick access to the information that is most important tothe center’s audiences. Spotlightimages with links to current content have been added to providegreater transparency into the center’s work and to respond to thegrowing need for access to NASA’sdata. The fresh and modern designof the sites also enables audiencesto engage with the content througheasier and more intuitive navigation. Visit the redesigned site athttps://www1.grc.nasa.gov/.Applications Program (AP)—A New ParadigmBy Kellie White, Communications Specialist, Marshall Space Flight CenterThe Applications Program (AP) is one of six newProgram Offices stood up by the Office of theChief Information Officer (OCIO). The AP is not tobe confused with the Agency Applications Office(AAO), although they will work closely with oneanother to achieve the missions of the both theAP and the AAO.AP formulation is a result of IT Business Services Assessment (BSA) Roles and Responsibilities decisions which adjust the organization andgovernance of information technology servicedomains. The mission of the AP is simple: anticipate and align customer requirements withsolutions that best meet the Agency missionthrough: Providing innovative, secure, efficient costeffective solutions; Maintaining a comprehensive understanding of the Agency’s application portfolio,constantly assessing for health of investments and optimization; and Advising and counseling customers as theydevelop solutions.Led by the Program Executive, this program office oversees the projects and services in the Applications domain and is supported by the AAO,Web Services Office (WSO), and NAMIS (NASAAircraft Management Information System).To achieve those goals, the AP will leverage theApplication Portfolio Assessment Tool (APAT).This comprehensive, accurate application inventory will assist the AP and associated governance boards in managing and optimizing theapplication portfolios to meet current and futurebusiness and mission needs, as well as in making IT investment decisions. Sound investmentplanning will ensure IT investment decisions arein compliance with functional roadmaps andtechnical and architectural standards.There are several new governance boards designed to manage the AP mission. The Applications Program Board (APB) ensures that: 1) theApplications Portfolio is managed and optimizedto meet current and future mission needs; 2) investments are vetted to enable sound businessdecisions and compliance with technical and architectural standards; and 3) delivery of qualityservice for all NASA Information Technology (IT)users. This board includes Center Deputy CIOs,Mission Directorate applications leads, and Application Portfolio Management Board (APMB)Chairs.The APMBs are filled with Portfolio Owners andcenter representatives with a purpose to guidethe portfolio management processes within theirrespective functional domains. The ApplicationsPortfolio Management–Working Group (APMWG) will draft application standards, guidelines,and templates for approval by the APB and foruse by application teams. Although it may seemlike many boards, the AP believes these willprovide just enough application governance tomaintain control and stability without slowingbusiness down.A joint AP and Computing Services Program(CSP) face-to-face, held at Kennedy Space Center (KSC) in June 2017, brought together keystakeholders from around the Agency to learnabout their “stake” in the AP proposed governance model and the shift to a new paradigm.To learn more about the AP or Application Portfolio Management (APM) please visit the APSharePoint site: https://sharepoint.msfc.nasa.gov/sites/ap (Internal only).NASA OCIO IT Talk Oct - Dec 20179

JPL’s IT Expo:An Invitation To Innovate, Accelerate,and Collaborate with the OCIOBy Whitney Haggins, IT Communication Strategist, Jet Propulsion Laboratory,California Institute of TechnologyOn September 12, JPL’s Office of theCIO (OCIO), along with JPL IT partners and organizations, welcomed theJPL community to its 15th annual ITExpo: “Innovate. Accelerate. Collaborate.” The event explored new waysto use, manage, and safeguard datato enable onsite and telecommuting(Flex-Work) employees.With more exhibits and longer Expohours, the OCIO developed a smartphone guide using the Guidebookapp to help attendees plan their Expoexperience, including a map and descriptions for over 70 exhibitors andvendors. Throughout the expo, tentsdisplayed applications of JPL’s Digital Data Strategy. Attendees engagedin conversations with team membersfor numerous OCIO products andservices, viewed demonstrations ofcustomized IT solutions with partnerorganizations, were quizzed on theircybersecurity knowledge, experienced virtual reality, and saw how ITis using innovation to bring cool andcutting-edge technologies to JPL.Students from nearby John Muir HighSchool shared how they are infusing emerging technologies into theirstudies, including a video on theirprogram, which ran on one of three84-inch Microsoft Surface Hubs stationed at the tent’s main entrance.The displays will be installed in eachof the three Spacecraft Assembly Facility high bays.JPL's Open DeveloperMeetups StimulateInnovationBy David Mittman, Deputy Manager,Planning and Execution Systems Section,Jet Propulsion Laboratory,California Institute of TechnologyThe Jet Propulsion Laboratory’s softwareengineering community consists of over1,400 people. With a community of that size,chances are good that someone has alreadyconsidered, started, or even finished workthat will benefit you. Since the introductionof our internal GitHub Enterprise collaboration service, our community has createdover 6,000 shareable projects.The Open Developer Meetup was created inAugust 2014 as an informal get-together toencourage the community to actively sharethese projects by highlighting them in shortpresentations. The presentation format isfive to ten minutes for demonstration, followed by five minutes for questions andanswers, and each Meetup takes placemonthly over the lunch hour. Each Meetupattracts between 30 and 80 attendees, andpresentations are recorded and made available on our internal video-sharing site, JPLTube, where they are tagged and categorized for easy searching. Topics are solicitedin a general call to our 500-member mailinglist. The Meetup has resulted in increasedawareness, code reuse, and collaborationbetween groups who previously did not interact.The most successful talks describe a tool'smajor features and use cases, demonstrateone "getting started" feature and one "power" feature, and finish with links to "learning more" resources and questions. Thecasual and comfortable atmosphere is wellsuited to both new and experienced developers; presenters have ranged from internsand early-career hires with no professionalpresentation experience to developers withmultiple decades of JPL experience.The Meetup leadership team consists ofrepresentatives from our Engineering andScience, Information Technology, and Business Operations Directorates, who selectand refine presentations and handle meeting logistics and publicity.JPL employees explore the IT Expo, September 12, 2017.10www.nasa.gov

IT Strategic Plan Cover ContestBy Meredith Isaacs, Communications Specialist, HeadquartersThis June, the Office of the Chief InformationOfficer (OCIO) invited all CIO office personnelacross the Agency to weigh in on the upcoming NASA Information Technology Strategic Plancover. Voters chose from one of three images,devised by OCIO leadership and hand-sketchedand colored by artist Andrew Miller. The imagesshow information technology and its essentialsupporting role in NASA’s vision.Once the votes were tallied, the “atomic” structure emerged as the winner. Some of our participants also submitted comments and eventheir own compositions. The final Strategic Plancover image includes some of this feedbackand further refinement from the artist.Our CoverThe upcoming NASA IT Strategic Plan coverrepresents the OCIO’s vision, its strategic goals,and the role information technology plays whensupporting NASA’s vision. Data and informationtechnology enable mission outcomes and support jobs across the Agency through excellence,data, cybersecurity, value, and people (our fivestrategic goals). This depiction of our vision alsosalutes the Agency’s near-term goals in Marsexploration.National Aeronautics and Space AdministrationNASA Information Technology Strategic Plan(Fiscal Years 2018-2021)Office of the Chief Information Officerwww.nasa.govOur Creative CommunityMixed in with the votes, comments, and suggestions, some members of the CIO communitycreated their own illustrations. Kudos to KevinSamms and teammate Trudy Hill, of KennedySpace Center (KSC), two prolific designers whosent in several compositions. In another concept, Beth Merrell of Marshall Space FlightCenter (MSFC) drew creative inspiration fromSuperman. Thank all of YOU for your feedback,time, and artistry!Pictured are various CIO community creations.Office of the Chief Information Officer Honor AwardsBy Meredith Isaacs, Communications Specialist, Headquarters2017 FedScoop 50 AwardsNASA Chief Information Officer Renee Wynn hasbeen nominated for this year’s FedScoop 50Award in Federal Leadership. This distinctionhonors “the federal leader helping their agencyimplement new technologies, strategies and ITprograms to lower the cost of government whilemaking it more innovative, agile and effective.”Renee came to NASA, and the Office of the ChiefInformation Officer (OCIO), from the Environmental Protection Agency (EPA) in July 2015.November 1. To view all award categories andnominees, please visit t

NASA Headquarters 300 E Street, SW Washington, D.C. 20546 Chief Information Officer . Renee Wynn Editor & Publication Manager. Eldora Valentine Graphic & Web Designer . Michael Porterfield Copy Editor. Meredith Isaacs IT Talk is an official publication of the . Office of the Chief Information Officer of the National Aeronautics and

Related Documents:

3 aeronautics. angel flight. aeronautics. aurora. 4 part series aeronautics. aviation week. aeronautics. balloons. see: aeronautics. hot air balloons.

Description of document: Listing of National Advisory Committee for Aeronautics (NACA) technical reports designated or identified in the National Aeronautics and Space Administration (NASA) Scientific and Technical Information (STI) database as restricted or nonpublic, 1944-1959 . Requested date: 17-March-2014 . Released date: 21-April-2014

coloring book National Aeronautics and Space Administration National Aeronautics and Space Administration Goddard Space Flight Center Innovative Partnerships Program .

SAR Processing and Data Analysis Erika Podest . National Aeronautics and Space Administration Applied Remote Sensing Training Program 2 Learning Objective 1. Understand Sentinel Data 2. Perform image preprocessing 3. Analyze SAR imagery to classify land and water . National Aeronautics and Space Administration Applied Remote Sensing Training Program 3 Outline 1. Sentinel-1 Background 2 .

National Aeronautics and Space Administration . SPHERES OF EARTH . Part 1: Systems and Features. Earth is a diverse planet. What makes up our planet and how does it work?

Coloring Book www.nasa.gov National Aeronautics and Space Administration NP-2016-5-432-GSFC For more information, please visit our web site: . Look for TESSie throughout this activity book! TESS will help us discover thousands of exoplanets and identify Earth-like planets in our solar neighborhood.

Analysis of Fiber Clustering in Composite Materials Using High-Fidelity Multiscale Micromechanics Brett A. Bednarcyk National Aeronautics and Space Administration Glenn Research Center Cleveland, Ohio 44135 Jacob Aboudi Tel Aviv University Ramat Aviv 69978, Israel Steven M. Arnold National Aeronautics and Space Administration Glenn Research Center

National Aeronautics and Space Administration Windage power loss (WPL) Drag on gear tooth in transmitting load. Viscous drag on gear faces Air/Oil impingement on tooth surface Generally occurs at greater than 10,000 ft./min. Gearbox efficiency losses Reduced rotorcraft performance (i.e. payload, range) Ref: