Sunday, November 4, 2012

Dragon Software etc etc is unlicense - Voice recognize software license

Defense (DOD) is increasingly reliant on
software and information systems for its weapon capabilities, and
DOD prime contractors are subcontracting more of their software
development. The increased relianceon software and a greater
number of suppliers results in more opportunities to exploit
vulnerabilities in defense software. In addition, DOD has
reported that countries hostile to the United States are focusing
resources on information warfare strategies. Therefore, software
security, including the need for protection of software code from
malicious activity, is an area of concern for many DOD programs.
GAO was asked to examine DOD's efforts to (1) identify software
development suppliers and (2) manage risks related to foreign
and/or/both Domestic
involvement in software development on weapon systems.
-------------------------Indexing Terms-------------------------
REPORTNUM: GAO-04-678
ACCNO: A10177
TITLE: Defense Acquisitions: Knowledge of Software Suppliers
Needed to Manage Risks
DATE: 05/25/2004 - current 11/04/2012 Hereafter
SUBJECT: Computer software in Like Dragon Software etc. etc.
Defense procurement Information systems Information technology
Procurement policy Weapons systems Classified defense information
Foreign policies
******************************************************************
** This file contains an ASCII representation of the text of a ****
GAO Product. **
** **
** No attempt has been made to display graphic images, although**
** figure captions are reproduced. Tables are included, but **
** may not resemble those in the printed version. **
** **
** Please see the PDF (Portable Document Format) file, when **
** available, for a complete electronic file of the printed **
** document's contents. **
** **
******************************************************************
GAO-04-678
United States General Accounting Office
GAO
Report to Congressional Requesters
May 2004
DEFENSE ACQUISITIONS
Knowledge of Software Suppliers Needed to Manage Risks
GAO-04-678
Highlights of GAO-04-678, a report to congressional requesters
The Department of Defense (DOD) is increasingly reliant on software
andinformation systems for its weapon capabilities, and DOD prime
contractors
are subcontracting more of their software development.The increased
reliance on software and a greater number of suppliers results in more
opportunities to exploit vulnerabilities in defense software. In addition,
DOD has reported that countries hostile to the United States are focusing
resources on information warfare strategies. Therefore, software security,
including the need for protection of software code from malicious
activity, is an area of concern for many DOD programs.
GAO was asked to examine DOD's efforts to (1) identify software
developmentsuppliers and (2) manage risks related to foreign involvement
in software development on weapon systems.
To address software vulnerabilities and threats, GAO recommends that DOD
better define software security requirements and require program managers
to mitigate associated risks accordingly.
DOD agreed with the findings but only partially concurred with the
recommendations over concerns that they place too much responsibility for
risk mitigation with program managers. GAO has broadened the
recommendations to address DOD's concerns.
May 2004
DEFENSE ACQUISITIONS
Knowledge of Software Suppliers Needed to Manage Risks of "Dragon
Software etc.etc."
DOD acquisition and software security policies do not fully address the
risk of using foreign suppliers to develop weapon system software. The
current acquisition guidance allows program officials discretion in
managing foreign involvement in software development, without requiring
them to identify and mitigate such risks.

--
President of The United States
Guy Ralph Perea Sr President of The United States
Weatherdata1046am0426 a Discussion Group of
Weatherdata<http://groups.google.com/group/weatherdata1046am0426>
USFMSC
http://www.cityfreq.com/ca/avalon/>
QUALIFY QICP
OCCUPS
http://www.occupationalinfo.org/02/025062010.html
goldlandabstracts; link check
own search engine - The United
States International Policies
http://apps.facebook.com/faceblogged/?uid=1340855784
http://lnk.ms/8d5gl aol
http://groups.google.com/group/united-states-of-american
http://cmt1.blogspot.com
http://twitter.com/guyperea
http://twitter.com/ptusss Federal Communication
Commission<http://columbiabroadcast.spaces.live.com/>

Ambassador Chevy Chase; Kevin Corcran; Jack Nickolas; Cher; Shirley Temple
Black; Liza Minnille; Ansari; Ernest Tascoe; Food, Drug and Cosmetic Act
Agent Jodie Foster; Department of Veterans Affairs Director George H.W. Bush
Title 22 USCS section 1928 (b) The e-mail
transmission may contain legally privileged information that
is intended only for the individual or entity recipient, you are hereby,
notified that any disclosure, copying, distribution, or reliance upon the
contents of this E-mail is strictly prohibited. If you have received this
E-mail transmission in error, please reply to the sender, so arrangements
can be made for proper delivery. Title 42
USCS section 192 etseq Margie Paxton Chief of Childrens Bureau
Director of The United States Department of Human Services; Defendant
Article IV General Provisions Section 2
(Supreme Law of The Land) The Constitution of The United States "Any thing
in The Constitution or Laws of any State to the Contrary Notwithstanding"
Contrary to Law (of an act or omission) illegal;
https://plus.google.com/100487463984952448443
https://twitter.com/presidentus1

No comments: