Welcome!


Latest Blogs from Government Cloud
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
Snagajob – one of the largest hourly employment networks for job seekers and employers – uses big data to finally understand their systems' performance in action. The next BriefingsDirect analytics innovation case study interview explores how Snagajob in Richmond, Virginia – one of t...
Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This ...
Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with custo...
Today I am especially proud and honored to publicly announce my appointment to the IEEE Cloud Computing Magazine Editorial Board! I am truly appreciative to Dr. Alan Sill and Dr. Masin Yousif for their trust and confidence in nominating me to this position. As the world's largest pro...
The rapid adoption of digital business transformation processes and the ongoing deployment of open hybrid cloud platforms are enabling the achievement of software development bold goals. But when management consultants and industry analysts talk about how IT innovation is changing many...
SYS-CON Events announced today that the "Second Containers & Microservices Conference" will take place November 3-5, 2015, at the Santa Clara Convention Center, Santa Clara, CA, and the “Third Containers & Microservices Conference” will take place June 7-9, 2016, at Javits Center in Ne...
Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. Although every one of these sta...
Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of bu...
While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestin...
"The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acqui...
Change becomes the central principle of today’s enterprises, and thus business agility becomes the most important characteristic our organizations must exhibit. Agile Architecture lays out a best practice approach for achieving this agility – and thus drives and coordinates the other r...
This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency s...
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powerhouse...
FedRAMP defines the requirements for cloud service providers’ security controls, including vulnerability scanning, incident monitoring, logging, and reporting. CSPs in use at federal agencies or in acquisition must meet the cloud computing requirements defined by FedRAMP. Whether o...
Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adop...
Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to w...
It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American all...
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprece...
Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not ...
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chi...
One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to demand. While one hopes that checkout is similarly in demand, it is unlik...
Recent data breaches involved an unclassified computer network used by President Obama’s senior staff, prompting countermeasures by the administration and resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardwa...
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and processes a...
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent...
The President showed respect for something many American's may not have heard of, but you dear readers know very well: Coding! In the context of education he remarked that "we’re connecting community colleges with local employers to train workers to fill high-paying jobs like coding, a...
A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence-the coming together of insights and approaches from originally distinct fields-will make fundamental contributions in our drive to provide creative solut...
The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of Star Trek! Traditional system i...
By Bob Gourley The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have to tell you they do not go public like this unless they have evidence. It ...
For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par with natural disasters or the use of weapons of mass destruction. Wit...
SaaS and cloud computing continue to gain real traction in the enterprise – and that trend is sure to continue for a long time to come. But the reality is that, to date, those gaining real benefit from cloud at the enterprise level have been limited largely to isolated pockets; e.g., s...
This case study assumes you want to build a private cloud on top of an existing virtualized datacenter composed of multiple hosts running vSphere and managed by one or several instances of vCenter. It is understood that you do not want to abandon your investment in VMware by retooling ...
You're in a quarterly meeting where everyone is armed with slide decks; some good, some mind numbingly bad. It's your turn, and you have a concise five-slide deck comprised of targeted, well designed, and insightful graphs. The graphs are clear and the room is able to discuss the highs...
This week Dell released its first Global Technology Adoption Index (GTAI). This survey of more than 2,000 global organizations took a close look at how organizations are truly using security, cloud, mobility and big data to drive success. While the data collected from this effort shoul...
What is Cloud Computing & what are its advantages & disadvantages. Join us for this installment of our Technical Insight series as expert Learning Tree instructor Kevin Jackson examines the following questions- How can Cloud Computing help your business and do you need to be concerned ...
The revolutionary business aspects of cloud excite me every day, but the business diversity is even more exciting. This fact really struck me after teaching my last Learning Tree Cloud Computing Introduction class in New York City. I’ve been in the regular rotation here for four months...
GovCloud Network is proud to announce that we have teamed with Tech Equity Ltd to deliver cloud education and training on a global basis. With this partnership, GovCloud Network will also add the Cloud Clinique Online Training and Cloud Computing Best Practices program to it's list of ...
By Bob Gourley CTOvision Pro is a subscription based research and analysis service that provides information you can not get from any other source (if you have not tried it yet you may sign up for a free evaluation trial here).  This post provides tips on how to make the most of this i...
So you won your first Government Contract… Congratulations! Among the new issues you will need to consider, your accounting systems, both practices and technology, will need to pass muster with Defense Contract Audit Agency (DCAA) auditors. This will require a combination of interna...
In 2011 Wiley (Wrox) published my book “Java Programming. 24-Hour Trainer“. To be honest, I don’t like the title because it misleads people as if this book promises that the reader can learn Java within 24 hours. But creators of this series (many titles were published under this umbrel...