Welcome!


Latest Blogs from Government Cloud
Over the last few weeks I had a chance to read a number of interesting books and articles on transformative trends and technologies and wanted to share some of my notes.  I hope you find them useful and interesting as well. Mobile and Social Transforming Power Struc...
The U.S. government's Federal Trade Commission’s long list of responsibilities includes handling consumer fraud com-plaints, the National Do Not Call Registry for marketers and iden-tity theft cases. Until recently, the FTC's information technology systems handled these different types...
By RyanKamauff Since the beginning of the modern Cloud movement (which we trace to November 2006 — see here if you want to know why) technologists have been seeking ways to mitigate key risks. Top on our list include 1) The increased risk due to multi-tenancy 2) The mission needs...
By RyanKamauff Here are the top cyber news and stories of the day. Cyber Threats to Energy Sector Happening at ‘Alarming Rate’ - a recent report from DHS’s Industrial Control System’s CERT found that attacks on the energy sector are growing. Of the 198 incidents they had re...
By BobGourley What will our collective technological future be like in 2013? The answer, of course, depends a great deal on what actions we take to make our future. But the answer also depends on many other factors, including mega trends that are transforming entire industries. We rece...
We have previously written about the importance of discipline in terms of art like Big Data. There are plenty of indications that more discipline and rigor is required on how we use the term. To date, our key message has been that it is the enterprise CTO who is responsible for definin...
Throughout 2012 large organizations and governments around the world continued to struggle with the idea of consolidating inefficient data centers, serer closets, and individual “rogue” servers scattered around their enterprise or government agencies.
By BobGourley This special report provides insights from a our reporting over the last 12 months, including summaries of our Government Big Data Newsletter (sign up for this weekly report here http://ctovision.com/newsletter-subscriptions) Among the many Big Data themes we reported on ...
NJVC®, an information technology solutions provider headquartered in northern Virginia and supplier of Cloudcuity™ AppDeployer, and Virtual Global, a provider of cloud-enabled enterprise IT solutions based in northern Virginia, have teamed up to offer the top 10 transformational impact...
Secure enterprise Dropbox-like service available across Claranet VDC in GermanyHamburg, 10th December 2012 - The managed services provider Claranet Germany has started a Virtual Data Centre (VDC) "Try and Buy" campaign for its TeamDrive file synchronization system. The campaign runs un...
By RyanKamauff Here are the top cyber news and stories of the day. Blame Screen Size: Mobile Browsers Flunk Security Tests - Georgia Tech researchers have found that 90% of mobile browsers have failed safety checks. They failed to display security “indicators.” (Such as ide...
Naturally one of the critical areas specified in the Canadian E-Health Cloud strategy document is the risks related to data privacy. Specifically in section 8, from page 42 through 49, they describe the comprehensive standards, audit and certification frameworks that will be required ...
Cloud security and cloud compliance are one of the hottest topics in cloud computing. During the course of 2012 we’ve seen many companies, specifically software vendors providing healthcare solutions, migrating or implementing their software in the cloud. While cloud computing brings m...
"Selling" the discipline of Enterprise Architecture (EA) in the Federal Government (particularly in non-DoD agencies) is difficult, notwithstanding the general availability and use of the Federal Enterprise Architecture Framework (FEAF) for some time now, and the relatively mature use ...
Today I am honored to be named a GovTech Innovator by Government Technology. My personal thanks goes out to Hilton Collins for letting me Hangout with him on Google+. Govtech.com is the online portal to Government Technology, a division of e.Republic, Inc. Government Technology and it...
I have been especially excited about the recent Canada Health Infoway Cloud strategy document, because I understand their importance in the overall “supply chain” of Canadian e-Health technologies like EHR – Electronic Healthcare Records, and what large scale challenges this particular...
Human-like technology. The potential downfall of the data center. Hyper-personalization of data. These are some of the responses IT leaders gave to us when we asked, “What will business technology look like in 2020?” In 2020, tech experts say, computers could learn from experience, mu...
The U.S. Government needs a robust cyber workforce immediately and for the foreseeable future. The challenge in achieving such a large team of geeks is threefold; it must recruit skilled young individuals, it must continuously train them, and it must improve its ability to retain its w...
Public-Private Information Sharing, or a varient of that concept, has been a part of federal government strategic plans for as long as I can remember. Every cyber security related study I know of, including the famous 1966 President’s Commission on Critical Infrastructure Protection, h...
A big THANK YOU goes out today to KCUR-FM Central Standard host Jabulani Leffall, producer Matthew Long-Middleton,and associate producer Danie Alexander for having me as a guest on this morning's show! Today the focus was on the US Government's mandate that federal agencies consider c...
By RyanKamauff Here are the top cyber news and stories of the day. Cisco Systems to buy Meraki for $1.2 billion - Cisco announced on Sunday that it would be buying Meraki, a cloud solutions provider, for $1.2B. This purchase is intended to help Cisco reach $1B in annual revenue, as wel...
NJVC, an information technology solutions provider headquartered in Northern Virginia, announces it will spotlight its Cloudcuity framework for delivering secure and unified cloud management solutions at the Gartner Data Center Conference, December 3 – 6, at The Venetian Resort Hotel ...
By BobGourley We look forward to seeing you at the 2012 FedCyber Summit on 15 Nov 2012. An amazing group of cyber security professionals from all three branches of the federal government have signed up to attend. They are being joined by other world-class-best cyber security profession...
NJVC, an information technology (IT) solutions provider headquartered in northern Virginia, is pleased to announce that Kevin L. Jackson, vice president and general manager, cloud services, launched his second book, GovCloud II: Implementation and Cloud Brokerage Services—published by...
This is the first edition of our new SMAC newsletter.  I am a SMAC (social, mobile, analytics and cloud) analyst and am studying this subject daily and wanted to share the best excerpts of interesting information I come across each week. Each of us are impacted by SMAC daily. &...
By BobGourley The Department of Defense and its key Information Technology players (including DISA and leadership at OSD/DoD CIO) have done a tremendous job in keeping the community informed on a new, ambitious approach to enterprise IT in DoD called the Joint Information Environment. ...
At the end of last month the EU released its plans for "Unleashing the Potential of Cloud Computing in Europe". But although the document (s) - just like EU commissioner Kroes in this video - do a good job describing in non-technical terms what cloud is and why Europe should care about...
Open Data is data that can be freely used, reused and redistributed by anyone – subject only, at the most, to the requirement for attributes and sharealikes (Open Software Service Definition – OSSD). As a consequence, Open Data should create value and might have a positive impact in ma...
Traffic citations are critical for funding police departments, courts, and municipalities. Unpaid citations or missed court appearances result in warrants and additional fees, but finding or arresting fugitives and collecting unpaid fines is difficult as well as time and manpower inten...
NJVC®, an information technology (IT) solutions provider headquartered in Northern Virginia, introduces CloudcuityTM AppDeployer, a new and innovative platform a s a service that allows developers to quickly create and publish software-as-a-service applications for sale in the cloud. C...
What are the best practices for deploying managed cloud services? Case studies have now confirmed that cloud services can be a better, faster, less expensive and less risky way to source Information and Communications Technology (ICT) solutions, according to the latest market study by ...
NJVC®, an information technology solutions provider headquartered in Northern Virginia, and Virtustream, Inc., a leading enterprise cloud software company, today announced a new alliance to provide the Virtustream xChange cloud marketplace to government customers. Under the terms of th...
As the name suggests our Government SaaS Entrepreneur program tailors their venture accelerator for apps for the public sector. Examples of apps that have already gone through this process include Huddle IL3, referring to it being suitable for the UK’s information security classificat...
About a decade ago, researchers began to study the performance of e-government portals in order to identify best practices. Studies have also focused on identifying the factors that influence the information quality these portals offer to the public. Most of these studies consider only...
Not yet included in the NIST taxonomy of Cloud Computing models is ‘BPaaS’ – Business Process as a Service. Hopefully it soon will be, as although it is the lesser known and discussed of the Cloud categories, it’s the most powerful in it’s ability to directly impact short-term busin...
Cloud Computing can be approached purely at a technical level, using it for cheaper IT or for hosting of ad-hoc applications. Or it can be approached at a strategic level, by CIO’s looking to drive innovation and be a leader of organizational change. Transformational Cloud Comput...
My how time flies, seems like just yesterday (back in 2008) that I did a piece titled Politics and Storage, or, storage in an election year V2.008 and if you are not aware, it is 2012 and thus an election year in the U.S. as well as in many other parts of the world. Being an election y...
As my long-time readers have certainly noticed, the frequency of my posts have lengthened over the past few months. First, I would like to offer my apologies for being remiss in that department but I have had some extenuating circumstances. For over three years I have been closely o...
This week I got a chance to meet someone that I admire greatly whom I have never met who lives nearby. Her name is Elonka Dunin, and her day job is a computer game developer. But her hobby is cracking codes, and in particular the sculpture that has been in the middle of the CIA headqua...
Bob Gourley, editor of CTOvision as well as  founder and CTO of Crucial Point, LLC, was recently interviewed by WashingtonExec, where he shared his views on emerging information technology, government needs, and Big Data. The interview is reproduced below:   How does Bob Gourley, ...