Welcome!


Latest Blogs from Government IT
SYS-CON Events announced that Blue Box has been named "Bronze Sponsor" of SYS-CON's DevOps Summit New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Blue Box delivers Private Cloud as a Service (PCaaS) to a worldwide customer base. Built on a t...
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud...
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the gl...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. R...
Everyone’s talking about the Internet of Things recently, but one topic I don’t see addressed much is the difference between Service-Focused IoT and Device-Focused IoT. The concept of “The Internet of Things” has always been about vast, heterogeneous networks of small, limited-purpose ...
Change becomes the central principle of today’s enterprises, and thus business agility becomes the most important characteristic our organizations must exhibit. Agile Architecture lays out a best practice approach for achieving this agility – and thus drives and coordinates the other r...
This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency s...
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powerhouse...
FedRAMP defines the requirements for cloud service providers’ security controls, including vulnerability scanning, incident monitoring, logging, and reporting. CSPs in use at federal agencies or in acquisition must meet the cloud computing requirements defined by FedRAMP. Whether o...
Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adop...
Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to w...
It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American all...
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprece...
Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not ...
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chi...
One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to demand. While one hopes that checkout is similarly in demand, it is unlik...
Recent data breaches involved an unclassified computer network used by President Obama’s senior staff, prompting countermeasures by the administration and resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardwa...
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and processes a...
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent...
The President showed respect for something many American's may not have heard of, but you dear readers know very well: Coding! In the context of education he remarked that "we’re connecting community colleges with local employers to train workers to fill high-paying jobs like coding, a...
A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence-the coming together of insights and approaches from originally distinct fields-will make fundamental contributions in our drive to provide creative solut...
The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of Star Trek! Traditional system i...
By Bob Gourley The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have to tell you they do not go public like this unless they have evidence. It ...
For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par with natural disasters or the use of weapons of mass destruction. Wit...
SaaS and cloud computing continue to gain real traction in the enterprise – and that trend is sure to continue for a long time to come. But the reality is that, to date, those gaining real benefit from cloud at the enterprise level have been limited largely to isolated pockets; e.g., s...
This case study assumes you want to build a private cloud on top of an existing virtualized datacenter composed of multiple hosts running vSphere and managed by one or several instances of vCenter. It is understood that you do not want to abandon your investment in VMware by retooling ...
You're in a quarterly meeting where everyone is armed with slide decks; some good, some mind numbingly bad. It's your turn, and you have a concise five-slide deck comprised of targeted, well designed, and insightful graphs. The graphs are clear and the room is able to discuss the highs...
This week Dell released its first Global Technology Adoption Index (GTAI). This survey of more than 2,000 global organizations took a close look at how organizations are truly using security, cloud, mobility and big data to drive success. While the data collected from this effort shoul...
What is Cloud Computing & what are its advantages & disadvantages. Join us for this installment of our Technical Insight series as expert Learning Tree instructor Kevin Jackson examines the following questions- How can Cloud Computing help your business and do you need to be concerned ...
The revolutionary business aspects of cloud excite me every day, but the business diversity is even more exciting. This fact really struck me after teaching my last Learning Tree Cloud Computing Introduction class in New York City. I’ve been in the regular rotation here for four months...
GovCloud Network is proud to announce that we have teamed with Tech Equity Ltd to deliver cloud education and training on a global basis. With this partnership, GovCloud Network will also add the Cloud Clinique Online Training and Cloud Computing Best Practices program to it's list of ...
By Bob Gourley CTOvision Pro is a subscription based research and analysis service that provides information you can not get from any other source (if you have not tried it yet you may sign up for a free evaluation trial here).  This post provides tips on how to make the most of this i...
So you won your first Government Contract… Congratulations! Among the new issues you will need to consider, your accounting systems, both practices and technology, will need to pass muster with Defense Contract Audit Agency (DCAA) auditors. This will require a combination of interna...
In 2011 Wiley (Wrox) published my book “Java Programming. 24-Hour Trainer“. To be honest, I don’t like the title because it misleads people as if this book promises that the reader can learn Java within 24 hours. But creators of this series (many titles were published under this umbrel...
Security and Defense People offers a tremendous opportunity for experts and consultants, whether you are focused on building your brand or seeking work. You can target your messages and interactions to the right targeted audience, publish your content that connects with that audience, ...
Addressing the global cloud skills gap is the number one priority to help accelerate the successful adoption of Cloud, according to the Cloud Credential Council. To address the skills gap specifically related to FedRAMP, the Cloud Credential Council has released an online course and ex...
Cyber-secure cloud computing can help both businesses and governments improve their ability to collaborate with non-traditional partners so they can quickly and cost-effectively tackle complex problems. That’s the message Kevin Jackson of the Network Centric Operations Industry Consort...
In February 2011, Vivek Kundra announced the “Cloud First” policy across the US Government. The directive, issued through the Office of Management and Budget, required agencies to give cloud technology first priority in developing IT projects. He also described cloud computing as a “10...
Congratulations to my friends at "On The FrontLines Magazine" for an EXCELLENT presentation of important operational and managerial cloud computing transition lessons. This issues showcases cloud computing leaders from government and the private sector that share their views on this cr...
From “military dedication” to “civilian success,”Veterans 360 Services is approaching the challenging transition of military service to civilian life with an innovative, focused and all-inclusive, 360 degree, process of education and employment. This San Diego-based veteran’s non-profi...