Welcome!


Latest Blogs from Government IT
Please join me at the Gartner IT Infrastructure & Operations Management Summit in Orlando, Florida, June 18-20, 2013, where my session topic will be "Cloud Service Integration: Increasing Business Value and IT Operational Excellence". Gartner IT Infrastructure & Operations Management...
The President's State of the Union address made it clear that data security is a top priority to keep personal, business-related and national security information protected. During the last State of the Union address, President Barack Obama included improving data security on his list...
By Ryan KamauffFOSE is the nation’s premier event for government technology professionals who need tools, resources, and best practices to transition to the cloud, mitigate cybersecurity threats, and achieve the goals of the DGS while managing uncertainty and the critical need to make ...
By Bob GourleyThe following is the meat from our monthly tech trends report. You can have this delivered to your email each month by visiting our newsletter signup page. Over the last several months we continued to see foundations being established for dramatic positive change in the f...
In-Q-Tel just posted a press release on a recent strategic partnership and technology development agreement with a firm called Apigee. That statement alone is all the savvy technologist needs to know to start diving into Apigee. In-Q-Tel has a reputation for applying lots of focused th...
Next week I will be participating in the inaugural session of What’s Next in IT Debate Series, a new program of authentic debates and conversations on key technology topics. Sponsored by IBM, The Debate Series is an ongoing series of social video debates, held on Spreecast.com (a brow...
By Ryan KamauffHere are the top cyber news and stories of the day. Browsers pose the greatest threat to enterprise, Microsoft reports – “Microsoft’s latest security report has found that Web-based attacks pose the greatest threat to companies, giving credence to effor...
This week I will have the honor of attending the 2013 NNEC Conference at the Corinthia Hotel in Lisbon, Portugal. The NNEC conference is an annual event which has been sponsored by HQ Supreme Allied Command Transformation (HQ SACT) since 2004. The conference is a major driver to promot...
Here are the top cyber news and stories of the day. Report: US Smart Grid Cybersecurity Spending to Reach $7.25B by 2020 – a recent study by research firm Zpryme forecasts annual spending to reach $7.25B in 2020. The focus of this money will be on ICS and SCADA solutions. Via Gre...
Lockheed Martin has designed a new tail hook for the F-35C Navy variant that is meant to allow the plane to land on carriers and be deployed to the fleet, according to a DoD Buzz article. The most expensive weapons program ever undertaken by the Defense Department has not only been ha...
By Ryan Kamauff Here are the top cyber news and stories of the day. Army defends its mobile device security plan – “The Department of Defense’s inspector general has reposted and updated a report critical of the Army’s shortcomings in handling cybersecurity for ...
There’s nothing COMMON about the operational picture any more! We are currently in the throws of change – shifting a legacy force structure capable of fighting two strategic wars at one time, to a leaner, more agile force projecting power through “expeditionary warfare”. As we adjust ...
The PaaS market is plagued with confusion, and agencies are slow to adopt technologies that they do not fully understand. With the high costs of software development, the Government stands to save billions of dollars by adopting PaaS and other cloud technologies. The Federal CIO's offi...
By Bob Gourley If you are a small business with advanced software or hardware (or both) and believe you have something the government really needs, you may want to pay close attention to this. But read to the end, I conclude with some warnings every small tech firm should consider when...
By Bob Gourley As readers of CTOvision you no doubt track the trends and are as aware as any of how software transforms industries, sometimes in shockingly brutal ways. I take no pleasure in telling any of you that my focus industry, the advanced technology sector around national secur...
A recently released infographic from CloudCheckr sheds quite a bit of light on the importance of expert advice when an enterprise decides to deploy to the cloud. When AWS made Trusted Advisor free for the month of March, they took that opportunity to conduct an internal survey of thei...
By Ryan Kamauff Here are the top cyber news and stories of the day. Copyright Chief Urges Congress to Produce ‘Next Great Copyright Act’ – “Register of Copyrights Maria Pallante told a House congressional subcommittee Wednesday that everything from anticircumvention provisi...
NIST conducts proof of concept on trusted geolocation in the cloud – A group of NIST scientists working with Intel, VMWare and RSA Archer have created of proof of concept for trusted geolocation in the cloud. This allows managers to locate the exact hardware that is running their cloud...
By Ryan Kamauff FOSE’s all-encompassing government technology conference will equip you with real-world tools, tactics and strategies via technology trailblazers who’ve been there, done that. From lessons learned to kudos earned, expect to gain rhetoric-free technology insi...
All I can think as I read through this Inc.com Article on “Why not to respond to RFP’s” is… “Man, I really hope our competition is reading this and decides to follow their advice, ha!” Although the author makes a couple of good points about the negat...
Using cloud brokerage to provision and manage services from multiple cloud service providers. Here's a snapshot of a typical conversation I've had with large enterprise CIOs. I've had a number of free lunches this way, but my colleagues at Gravitant have built this technology and hav...
By Ryan Kamauff Here are the top cyber news and stories of the day. GitHub hires first government-focused employee – GitHub has recently announced the hiring of their first government focused employee. GitHub offers social coding, which opens the development process. “forme...
Cyber News we are tracking today: Having multiple hypervisors is a growing trend in the virtualization. Customers have mixed emotions about VMware recent purchase of the Virsto software product. Red Cross decided to use Microsoft Office 365. and more. Having multiple hypervisors is...
NJVC, an information technology solutions provider headquartered in northern Virginia, is pleased to announce the winner of the George Mason University (GMU) Student PaaS Developer Contest. For the contest, students used the Cloudcuity AppDeployer platform as a service (PaaS) to devel...
I am honored to announce that I will be a speaker at the Bahrain International eGovernment Forum, April 8-10, 2013, being held at the Ritz-Carlton Bahrain Hotel and Spa, in Manama, Bahrain. Under the Patronage of His Highness Shaikh Mohammed bin Mubarak Al Khalifa, Deputy Prime Minist...
What we saw this week was is very similar to what we saw in 1962. What is most interesting in this case is that the bombshell was not dropped in a stuffy chamber full of wrinkly policy makers, nor was it used by the administration to draw a hard line under the Executive Order 13636 tha...
Raytheon, the 5th largest defense contractor, displayed how their Rapid Information Overlay Technology could collect data a on user. RIOT was designed to search through well known social media sites such as Facebook, Twitter, and Foursquare to gather information that could be linked ...
My job is all about finding commercial solutions that will solve government problems. Some of my favorite work experiences have been when I can connect a new technology to an existing government problem! Talk about satisfying! Although every company is unique in what it offers, the pro...
By RyanKamauff Here are the top cyber news and stories of the day. ‘We the People’ 2.0 to include APIs – “White House Deputy Director of Online Platform Peter Welsch wrote on the White House blog that Petitions 1.0, the code “We the People” runs on is complete, opening the ...
By RyanKamauff Here are the top cyber news and stories of the world. BlackBerry signs up security firm to screen third party apps – BlackBerry has signed a contract with Trend Micro to screen all their App World submissions. This is a solid move, to further enhance BlackBerryR...
Welcome to Enterprise Mobility Asia News Weekly, an online newsletter that consists of the most interesting news and articles related to enterprise mobility in Asia.  Asia is predicted to be the fastest area of growth for enterprise mobility between now and 2016. Also read Fiel...
In this post I will look at the three different service models for cloud computing as defined by NIST. More specifically I will look at the management and operations overhead for each one of the models and compare it... Let's look at how things have been done in the past. Traditionall...
By RyanKamauff Here are the top cyber news and stories of the day. DOD, VA improve eBenefits portal – The eBenefits self-service portal has been updated. This portal allows service members and vets unparalleled access to information and services. It allows users to get into compe...
By BobGourley These are the technology events we are tracking at CTOvision.com, either because we plan on attending and reporting on these events, or because we are speaking at them, or because we thought they would be of high enough interest to our readers to warrant their inclusion h...
2012 will go down as a “Big” year for Big Data in the public sector. Rhetoric and hype has been followed by tangible action on the part of both government and industry. The $200 million Big Data initiative unveiled by the White House in March 2012 was an injection of R&D and credibilit...
By RyanKamauff Here are the top cyber news and stories of the day. Gartner: Cloud security growth to overtake on-premise by 2015 - Gartner believes that over the next three years, the cyber security market will change significantly. The analysts believe that 10% of enterprise security ...
Over the last few weeks I had a chance to read a number of interesting books and articles on transformative trends and technologies and wanted to share some of my notes.  I hope you find them useful and interesting as well. Mobile and Social Transforming Power Struc...
The U.S. government's Federal Trade Commission’s long list of responsibilities includes handling consumer fraud com-plaints, the National Do Not Call Registry for marketers and iden-tity theft cases. Until recently, the FTC's information technology systems handled these different types...
By RyanKamauff Since the beginning of the modern Cloud movement (which we trace to November 2006 — see here if you want to know why) technologists have been seeking ways to mitigate key risks. Top on our list include 1) The increased risk due to multi-tenancy 2) The mission needs...
By RyanKamauff Here are the top cyber news and stories of the day. Cyber Threats to Energy Sector Happening at ‘Alarming Rate’ - a recent report from DHS’s Industrial Control System’s CERT found that attacks on the energy sector are growing. Of the 198 incidents they had re...