Official websites use .gov A
.gov Website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
USDA’s April dairy forecasts show increased production from the previous month, but what price effects might this have? (Rod Bain and World Agricultural Outlook Board Chair Mark Jekanowski)
USDA's suite of disaster assistance programs includes offerings for livestock producers impacted by an emergency. (Rod Bain and Farm Service Agency Administrator Bill Beam)
*-USDA's Prospective Plantings Report will be released Monday, March 31st at 12 PM Eastern-* The results of the first farmer- based survey of crop planting intentions for this season will soon be available. (Rod Bain and Lance Honig of the National Agricultural Statistics Service)
Lance Honig of the National Agricultural Statistics Service discusses some of the value for producers and others from USDA's annual Prospective Plantings Report - the 2025 edition set for release Noon, Eastern on Monday, March 31st.
*-USDA's Quarterly Grain and Rice Stocks Reports will be released Monday, March 31st at 12 PM Eastern-* How might March’s Quarterly Grain and Rice Stocks Reports play a potential role in shaping supplies for remainder of the commodity marketing year? (Rod Bain and Lance Honig of the National...
Lance Honig of the National Agricultural Statistics Service discusses two methods for interested parties to learn more about the March 31st USDA Prospective Plantings and Quarterly Stocks Reports – livestream of the Reports briefing and a social media follow-up Q and A.
Plant genetic researchers, including those at USDA, are relying on genetic resources like data to help expedite the crossbreeding process to develop new grape varieties. (Rod Bain and Erin Galarneau of the Plant Genetic Research Unit)
USDA and all other federal agencies are mandated by FISMA to implement information security protections that are commensurate with the risk posed to their information and systems.