Welcome!


From the GovIT Blogosphere

The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This ...
Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with custo...
Today I am especially proud and honored to publicly announce my appointment to the IEEE Cloud Computing Magazine Editorial Board! I am truly appreciative to Dr. Alan Sill and Dr. Masin Yousif for their trust and confidence in nominating me to this position. As the world's largest pro...
The rapid adoption of digital business transformation processes and the ongoing deployment of open hybrid cloud platforms are enabling the achievement of software development bold goals. But when management consultants and industry analysts talk about how IT innovation is changing many...
ViON solves complex enterprise problems by combining passion and agility to deliver the most effective, innovative solutions because commitment to mission success is in their DNA. One of the ways they deliver success is through
Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. Although every one of these sta...
Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of bu...
While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestin...
Before the rise of DevOps, strong functional distinctions were supposed to help groups focus on their core competencies. Developers wrote code, operations provisioned and maintained infrastructure, and security found holes and worried about all the vulnerabilities they knew hadn't been...
"The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acqui...
Change becomes the central principle of today’s enterprises, and thus business agility becomes the most important characteristic our organizations must exhibit. Agile Architecture lays out a best practice approach for achieving this agility – and thus drives and coordinates the other r...
This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency s...
March is Women’s History Month. As we celebrate women and their role in our history, our workplaces, and our homes, I thought it was important to bring to the forefront some of the strengths that might make them stand out as compelling agents of change in such a time as this in the IT ...
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powerhouse...
FedRAMP defines the requirements for cloud service providers’ security controls, including vulnerability scanning, incident monitoring, logging, and reporting. CSPs in use at federal agencies or in acquisition must meet the cloud computing requirements defined by FedRAMP. Whether o...
Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adop...
Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to w...
It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American all...
Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not ...
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chi...
Recent data breaches involved an unclassified computer network used by President Obama’s senior staff, prompting countermeasures by the administration and resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardwa...
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and processes a...
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent...
The President showed respect for something many American's may not have heard of, but you dear readers know very well: Coding! In the context of education he remarked that "we’re connecting community colleges with local employers to train workers to fill high-paying jobs like coding, a...
A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence-the coming together of insights and approaches from originally distinct fields-will make fundamental contributions in our drive to provide creative solut...
The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of Star Trek! Traditional system i...

By Bob Gourley

The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have...

For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par with natural disasters or the use of weapons of mass destruction. Wit...
SaaS and cloud computing continue to gain real traction in the enterprise – and that trend is sure to continue for a long time to come. But the reality is that, to date, those gaining real benefit from cloud at the enterprise level have been limited largely to isolated pockets; e.g., s...
This case study assumes you want to build a private cloud on top of an existing virtualized datacenter composed of multiple hosts running vSphere and managed by one or several instances of vCenter. It is understood that you do not want to abandon your investment in VMware by retooling ...
You're in a quarterly meeting where everyone is armed with slide decks; some good, some mind numbingly bad. It's your turn, and you have a concise five-slide deck comprised of targeted, well designed, and insightful graphs. The graphs are clear and the room is able to discuss the highs...
This week Dell released its first Global Technology Adoption Index (GTAI). This survey of more than 2,000 global organizations took a close look at how organizations are truly using security, cloud, mobility and big data to drive success. While the data collected from this effort shoul...
What is Cloud Computing & what are its advantages & disadvantages. Join us for this installment of our Technical Insight series as expert Learning Tree instructor Kevin Jackson examines the following questions- How can Cloud Computing help your business and do you need to be concerned ...
The revolutionary business aspects of cloud excite me every day, but the business diversity is even more exciting. This fact really struck me after teaching my last Learning Tree Cloud Computing Introduction class in New York City. I’ve been in the regular rotation here for four months...

#SDAS #HTTP #webperf #SSL De facto standards can be as difficult to transition off of as official ones

If you haven't heard about HTTP 2.0 it's time to start paying attention. It i...

American interest in online privacy and surveillance programs has jumped since Edward Snowden’s revelations about digital government surveillance in the United States. Deteriorating public relations have plagued intelligence agencies that have been identified as participating in the ma...
A key component of this event will be a series of ‘Advisory Clinics’ that will run throughout the summit. These clinics are designed to provide attendees the opportunity to meet one-to-one with some of the industry’s leading advisors from critical areas of growth and development. GovC...
GovCloud Network is proud to announce that we have teamed with Tech Equity Ltd to deliver cloud education and training on a global basis. With this partnership, GovCloud Network will also add the Cloud Clinique Online Training and Cloud Computing Best Practices program to it's list of ...
A recent Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent (l). This forecast was gleaned from a just released Emergent Research and Intuit study. Th...