Government Cloud

Download Slide Deck: ▸ Here Information Technology (IT) service providers have historically struggled between the huge capital expenditure and long development cycles of building their own cloud versus the thin margins and limited flexibility of using public retailers such as A... (more)
Download Slide Deck: ▸ Here DevOps is the hottest moving target when it comes to software development methodologies. Many people fear that this fast-paced, barrier-breaking movement will leave information security best practices in the dust. Analysts provide recommendations to ... (more)
SAP/HANA Does Big Data for National Security While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives r... (more)
Software analytics company New Relic, Inc. announced a set of new features to its Software Analytics Platform that are designed to enable greater productivity for developers and agility for IT operations to meet business objectives. Collectively these updates reflect the shift by... (more)
Two-Thirds of Feds Say DevOps Will Put Them in the Fast Lane to the Cloud MeriTalk, a public-private partnership focused on improving the outcomes of government IT, today announced the results of its new report, "The Agile Advantage: Can DevOps Move Cloud to the Fast Lane?" The st... (more)
Three Steps for Integrating Security into DevOps The fate of CSO John in The Phoenix Project is a good parable for illustrating the dynamic and often conflicted relationship between Security and IT Operations. Security can either become a separate, obscure, and increasingly irre... (more)
The Internet of Things Maturity Model (IoTMM) is a qualitative method to gauge the growth and increasing impact of IoT capabilities in an IT environment from both a business and technology perspective. In his session at @ThingsExpo, Tony Shan will first scan the IoT landscape a... (more)
"The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal... (more)
Digital Revolution or DevOps Revolution? How about Agile Architecture? I’ve been writing about Agile Architecture for years – and in fact, I believe it is such a fundamental change in the way businesses deliver value that I named by 2013 book The Agile Architecture Revolution. An... (more)
Cloud Acquisition Strategy, Customized to the Right Cloud Model By Melvin Greer Managing Director, Greer Institute This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact cloud computing may be the bigge... (more)
By Jodi Kohut Government Cloud Computing Professional March is Women's History Month. As we celebrate women and their role in our history, our workplaces, and our homes, I thought it was important to bring to the forefront some of the strengths that might make them stand out as ... (more)
Understanding FedRAMP and Overcoming Obstacles FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice,... (more)
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powe... (more)
When describing cloud computing, terms like highly scalable, efficient, and on-demand probably come to mind. Unfortunately, those same descriptors aren't commonly associated with operations in the federal government. In 2011, the White House's Office of Management and Budget set o... (more)
By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal ... (more)
U.S. Department of Defense Sets Its Cloud Security Guidelines By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the secur... (more)
By Shannon Perry It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American... (more)
Internet of Everything: The Value of Connections The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before - transforming information into knowledge and knowledge into wisdom. IoE ... (more)
By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realiza... (more)
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The executive in the hot seat for preventing these failures is t... (more)
© 2008 SYS-CON Media