Welcome!


From the GovIT Blogosphere

The PaaS market is plagued with confusion, and agencies are slow to adopt technologies that they do not fully understand. With the high costs of software development, the Government stands to save billions of dollars by adopting PaaS and other cloud technologies. The Federal CIO's offi...
NJVC® will lead efforts to provide secure cloud brokerage services to the Network Centric Operations Industry Consortium using its first-to-market CloudcuityTM Management Portal during a series of 2013 geospatial community cloud demonstrations that will be conducted on behalf of the N...
A recently released infographic from CloudCheckr sheds quite a bit of light on the importance of expert advice when an enterprise decides to deploy to the cloud. When AWS made Trusted Advisor free for the month of March, they took that opportunity to conduct an internal survey of thei...
NIST conducts proof of concept on trusted geolocation in the cloud – A group of NIST scientists working with Intel, VMWare and RSA Archer have created of proof of concept for trusted geolocation in the cloud. This allows managers to locate the exact hardware that is running their cloud...
Using cloud brokerage to provision and manage services from multiple cloud service providers. Here's a snapshot of a typical conversation I've had with large enterprise CIOs. I've had a number of free lunches this way, but my colleagues at Gravitant have built this technology and hav...
Cyber News we are tracking today: Having multiple hypervisors is a growing trend in the virtualization. Customers have mixed emotions about VMware recent purchase of the Virsto software product. Red Cross decided to use Microsoft Office 365. and more. Having multiple hypervisors is...
NJVC, an information technology solutions provider headquartered in northern Virginia, is pleased to announce the winner of the George Mason University (GMU) Student PaaS Developer Contest. For the contest, students used the Cloudcuity AppDeployer platform as a service (PaaS) to devel...
I am honored to announce that I will be a speaker at the Bahrain International eGovernment Forum, April 8-10, 2013, being held at the Ritz-Carlton Bahrain Hotel and Spa, in Manama, Bahrain. Under the Patronage of His Highness Shaikh Mohammed bin Mubarak Al Khalifa, Deputy Prime Minist...
What we saw this week was is very similar to what we saw in 1962. What is most interesting in this case is that the bombshell was not dropped in a stuffy chamber full of wrinkly policy makers, nor was it used by the administration to draw a hard line under the Executive Order 13636 tha...
Raytheon, the 5th largest defense contractor, displayed how their Rapid Information Overlay Technology could collect data a on user. RIOT was designed to search through well known social media sites such as Facebook, Twitter, and Foursquare to gather information that could be linked ...
My job is all about finding commercial solutions that will solve government problems. Some of my favorite work experiences have been when I can connect a new technology to an existing government problem! Talk about satisfying! Although every company is unique in what it offers, the pro...
In this post I will look at the three different service models for cloud computing as defined by NIST. More specifically I will look at the management and operations overhead for each one of the models and compare it... Let's look at how things have been done in the past. Traditionall...
2012 will go down as a “Big” year for Big Data in the public sector. Rhetoric and hype has been followed by tangible action on the part of both government and industry. The $200 million Big Data initiative unveiled by the White House in March 2012 was an injection of R&D and credibilit...
The U.S. government's Federal Trade Commission’s long list of responsibilities includes handling consumer fraud com-plaints, the National Do Not Call Registry for marketers and iden-tity theft cases. Until recently, the FTC's information technology systems handled these different types...
We have previously written about the importance of discipline in terms of art like Big Data. There are plenty of indications that more discipline and rigor is required on how we use the term. To date, our key message has been that it is the enterprise CTO who is responsible for definin...
NJVC®, an information technology solutions provider headquartered in northern Virginia and supplier of Cloudcuity™ AppDeployer, and Virtual Global, a provider of cloud-enabled enterprise IT solutions based in northern Virginia, have teamed up to offer the top 10 transformational impact...
Naturally one of the critical areas specified in the Canadian E-Health Cloud strategy document is the risks related to data privacy. Specifically in section 8, from page 42 through 49, they describe the comprehensive standards, audit and certification frameworks that will be required ...
Cloud security and cloud compliance are one of the hottest topics in cloud computing. During the course of 2012 we’ve seen many companies, specifically software vendors providing healthcare solutions, migrating or implementing their software in the cloud. While cloud computing brings m...
"Selling" the discipline of Enterprise Architecture (EA) in the Federal Government (particularly in non-DoD agencies) is difficult, notwithstanding the general availability and use of the Federal Enterprise Architecture Framework (FEAF) for some time now, and the relatively mature use ...
Today I am honored to be named a GovTech Innovator by Government Technology. My personal thanks goes out to Hilton Collins for letting me Hangout with him on Google+. Govtech.com is the online portal to Government Technology, a division of e.Republic, Inc. Government Technology and it...
I have been especially excited about the recent Canada Health Infoway Cloud strategy document, because I understand their importance in the overall “supply chain” of Canadian e-Health technologies like EHR – Electronic Healthcare Records, and what large scale challenges this particular...
Human-like technology. The potential downfall of the data center. Hyper-personalization of data. These are some of the responses IT leaders gave to us when we asked, “What will business technology look like in 2020?” In 2020, tech experts say, computers could learn from experience, mu...
The U.S. Government needs a robust cyber workforce immediately and for the foreseeable future. The challenge in achieving such a large team of geeks is threefold; it must recruit skilled young individuals, it must continuously train them, and it must improve its ability to retain its w...
Public-Private Information Sharing, or a varient of that concept, has been a part of federal government strategic plans for as long as I can remember. Every cyber security related study I know of, including the famous 1966 President’s Commission on Critical Infrastructure Protection, h...
A big THANK YOU goes out today to KCUR-FM Central Standard host Jabulani Leffall, producer Matthew Long-Middleton,and associate producer Danie Alexander for having me as a guest on this morning's show! Today the focus was on the US Government's mandate that federal agencies consider c...
NJVC, an information technology solutions provider headquartered in Northern Virginia, announces it will spotlight its Cloudcuity framework for delivering secure and unified cloud management solutions at the Gartner Data Center Conference, December 3 – 6, at The Venetian Resort Hotel ...
NJVC, an information technology (IT) solutions provider headquartered in northern Virginia, is pleased to announce that Kevin L. Jackson, vice president and general manager, cloud services, launched his second book, GovCloud II: Implementation and Cloud Brokerage Services—published by...
At the end of last month the EU released its plans for "Unleashing the Potential of Cloud Computing in Europe". But although the document (s) - just like EU commissioner Kroes in this video - do a good job describing in non-technical terms what cloud is and why Europe should care about...
Open Data is data that can be freely used, reused and redistributed by anyone – subject only, at the most, to the requirement for attributes and sharealikes (Open Software Service Definition – OSSD). As a consequence, Open Data should create value and might have a positive impact in ma...
Traffic citations are critical for funding police departments, courts, and municipalities. Unpaid citations or missed court appearances result in warrants and additional fees, but finding or arresting fugitives and collecting unpaid fines is difficult as well as time and manpower inten...
NJVC®, an information technology (IT) solutions provider headquartered in Northern Virginia, introduces CloudcuityTM AppDeployer, a new and innovative platform a s a service that allows developers to quickly create and publish software-as-a-service applications for sale in the cloud. C...
What are the best practices for deploying managed cloud services? Case studies have now confirmed that cloud services can be a better, faster, less expensive and less risky way to source Information and Communications Technology (ICT) solutions, according to the latest market study by ...
NJVC®, an information technology solutions provider headquartered in Northern Virginia, and Virtustream, Inc., a leading enterprise cloud software company, today announced a new alliance to provide the Virtustream xChange cloud marketplace to government customers. Under the terms of th...
As the name suggests our Government SaaS Entrepreneur program tailors their venture accelerator for apps for the public sector. Examples of apps that have already gone through this process include Huddle IL3, referring to it being suitable for the UK’s information security classificat...
About a decade ago, researchers began to study the performance of e-government portals in order to identify best practices. Studies have also focused on identifying the factors that influence the information quality these portals offer to the public. Most of these studies consider only...
Not yet included in the NIST taxonomy of Cloud Computing models is ‘BPaaS’ – Business Process as a Service. Hopefully it soon will be, as although it is the lesser known and discussed of the Cloud categories, it’s the most powerful in it’s ability to directly impact short-term busin...
My how time flies, seems like just yesterday (back in 2008) that I did a piece titled Politics and Storage, or, storage in an election year V2.008 and if you are not aware, it is 2012 and thus an election year in the U.S. as well as in many other parts of the world. Being an election y...
As my long-time readers have certainly noticed, the frequency of my posts have lengthened over the past few months. First, I would like to offer my apologies for being remiss in that department but I have had some extenuating circumstances. For over three years I have been closely o...
This week I got a chance to meet someone that I admire greatly whom I have never met who lives nearby. Her name is Elonka Dunin, and her day job is a computer game developer. But her hobby is cracking codes, and in particular the sculpture that has been in the middle of the CIA headqua...
NJVC®, an information technology (IT) solutions provider headquartered in Northern Virginia, introduces Cloudcuity™, a new framework for the company’s cloud service offerings to help customers transition their technology applications to a cloud environment while cutting spending, impro...