Welcome!


Latest Blogs from Government Cloud
Today data has replaced money as the global currency for trade. “McKinsey estimates that about 75 percent of the value added by data flows on the Internet accrues to “traditional” industries, especially via increases in global growth, productivity, and employment. Furthermore, the Uni...
DoubleHorn is now offering its feature-rich and cost effective Evidence Management System for Law enforcement agencies interested in developing body-worn camera programs across Texas. DoubleHorn's Evidence Management System (DEMS) is a unified system suitable for capturing any digital...
Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud S...
While many government agencies have embraced the idea of employing cloud computing as a tool for increasing the efficiency and flexibility of IT, many still struggle with large scale adoption. The challenge is mainly attributed to the federated structure of these agencies as well as th...
Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue. Layering inherently global cloud services on top of a globally fractured networking infrastructure just doesn’t work. Incompatibilities abound and enterpris...
Cloud Service Brokerage is changing from an industry footnote toward becoming a major system integration play. This role has now become a crucial component of a cloud computing transition because they help organizations aggregate multiple cloud services, integrate services with in-hous...
The U.S. Army Intelligence and Security Command (INSCOM) has awarded BAE Systems a five-year contract worth as much as $75 million to provide enhanced geospatial intelligence technical and analytical support. The award was issued under the INSCOM Global Intelligence indefinite deliver...
Karen Field, Penton Communications' IoT Institute director, in her article "Start Small to Gain Big," postulated an oil drilling platform with 30,000 sensors would generate about 1 Terabyte of data per day. She also stressed that only 1% of that data would likely be used. From a system...
IoT networking requirements are vastly different from those supported by today's cloud network. The processing and transport levels are multiple orders of magnitude higher than ever seen before. More importantly though, societal economic and the safety ramifications of making mistakes ...
The "Internet of Things" depends on the "Cloud" for the processing and storage of data. The Cloud's backbone, however, is the network. This logic train reveals the importance of professional rigor and solid System Engineering (SE) of the network. Imagine a sea of sensors, put out in...
Enterprise storage is trending away from traditional, enterprise managed network-attached storage (NAS) and storage area networks (SAN) towards a more complex environment that includes software-defined and cloud-based solutions. Spinning disks are also being replaced with flash arrays ...
Enterprises must rethink network management in the cloud computing world. This new reality is driven by the rise of software defined networking, the virtualization of everything and a business imperative to create and deploy even newer information delivery models. With the entire infra...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a ...
Not to long ago I was honored to be included as a storage expert in the Dell ebook, "10 Ways to Flash Forward: Future-Ready Storage Insights from the Experts." This publication provided insight into some of the most recent advances in enterprise storage and gave some excellent recomend...
VASCO Data Security International has announced that eSignLive ™, the e-signature choice for government organizations, has worked with Cloud Services Provider (CSP) Project Hosts to deliver its electronic signature solution in a FedRAMP SaaS-level compliant cloud. U.S. government agenc...
The use of Electronic Medical Records (EMR) by medical professionals has increased dramatically. According to HealthIT.gov, 2015 statistics show that 56 percent of all U.S. office-based physicians (MD/DO) have demonstrated meaningful use of electronic health records. The downside of th...
SYS-CON Events announced today that LeaseWeb USA Inc., one of the world's largest hosting brands, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. LeaseWeb USA has announced that its platform ...
In December 1998 when transitioning into a job doing intelligence support to DoD computer network defense, one of my mentors reminded me of a Reagan-era publication that helped the public better understand the Soviet threat called "Soviet Military Power." This document was based on th...
SYS-CON Events announced today that (ISC)²® ("ISC-squared") will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. (ISC)²® and KPMG LLP have announced they will survey federal cybersecurity executiv...
Last year I read an article in the Federal technology publication FCW that talked about the President’s 2016 spending plan and how much of the focus is on the improvement of digital services. Overall, the IT spending budget is $86.4 billion and $105 million of that is slated to expand ...
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a st...
Yesterday, we kicked the 2016 IIoT Bold Prediction Series off with a bang! As a nice follow-up, and second iteration of the series, Tim Mester, Principal Engineer of Advanced Technology at FreeWave, presents his Industrial IoT bold prediction: Prediction #2: Government Regulations Comi...
Platform-as-a-Service (PaaS) has always been the unappreciated sibling of the cloud computing service model trio. Existing in the dark shadow of the most widely adopted Software-as-a-Service (SaaS) and foundationally powerful Infrastructure-as-a-Service (IaaS), the third service model ...
Mobility and cloud computing have combined to obliterate any so-called network security perimeter. Corporate data has now been let loose to roam in a world of cyber thieves, manipulators and untrusted infrastructure. What is a security professional to do? According to Bill Odell, the ...
One cloud does not fit all organizations. That's true whether it is a public or private cloud. A hybrid cloud option allows your business to create a custom solution that fits your organizational needs. However, there are always questions with new solutions. We reached out to indust...
As cloud computing continues to grow in importance, enterprises are now facing a new realization. In their almost rampant embrace of cost savings associated with public cloud, many are just now understanding the information technology governance challenge posed by vastly different trad...
The traditional, on-premise computing model has established processes, accreditations, certifications, governance and compliance rules - FISMA, NERC CIP, HIPAA, PCI-DSS, IRS 1075. While the security industry is aggressively addressing the technical security gaps in cloud-driven service...
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management.” While thi...
Cybersecurity is top of mind for corporations around the world. The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in cybersecurity or a failure to properly invest in people, security training or technology. While b...
The Internet of Things Maturity Model (IoTMM) is a qualitative method to gauge the growth and increasing impact of IoT capabilities in an IT environment from both a business and technology perspective. In his session at @ThingsExpo, Tony Shan will first scan the IoT landscape and inve...
As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems commissioned online survey of 400 U.S. white-collar, adult workers, more than 90 percent of them a...
Is your company struggling with the idea of using “cloud hosting” in order to save money? Truth be known, using cost savings as the primary reason for moving to cloud will almost guarantee failure. Some reasons that typically lead to cloud computing costing more include: Building and...
On February 8, 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy[1]. In the executive summary he laid out the inefficient state of affairs that was the US Federal Government's IT environment: The Federal Government's current Information Techn...
In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1]. In the executive summary he pointed to cloud computing as a key component of the US Federal Government’s information technology modernization efforts: “Cloud computing has the potential ...
In 2011 the US Federal Government issued a Cloud First policy mandating that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. Cloud computing is a design style that allows for effici...
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This ...
Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with custo...
Today I am especially proud and honored to publicly announce my appointment to the IEEE Cloud Computing Magazine Editorial Board! I am truly appreciative to Dr. Alan Sill and Dr. Masin Yousif for their trust and confidence in nominating me to this position. As the world's largest pro...
The rapid adoption of digital business transformation processes and the ongoing deployment of open hybrid cloud platforms are enabling the achievement of software development bold goals. But when management consultants and industry analysts talk about how IT innovation is changing many...