Government Cloud

Two-Thirds of Feds Say DevOps Will Put Them in the Fast Lane to the Cloud MeriTalk, a public-private partnership focused on improving the outcomes of government IT, today announced the results of its new report, "The Agile Advantage: Can DevOps Move Cloud to the Fast Lane?" The st... (more)
Three Steps for Integrating Security into DevOps The fate of CSO John in The Phoenix Project is a good parable for illustrating the dynamic and often conflicted relationship between Security and IT Operations. Security can either become a separate, obscure, and increasingly irre... (more)
"The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal... (more)
Digital Revolution or DevOps Revolution? How about Agile Architecture? I’ve been writing about Agile Architecture for years – and in fact, I believe it is such a fundamental change in the way businesses deliver value that I named by 2013 book The Agile Architecture Revolution. An... (more)
Cloud Acquisition Strategy, Customized to the Right Cloud Model By Melvin Greer Managing Director, Greer Institute This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact cloud computing may be the bigge... (more)
By Jodi Kohut Government Cloud Computing Professional March is Women's History Month. As we celebrate women and their role in our history, our workplaces, and our homes, I thought it was important to bring to the forefront some of the strengths that might make them stand out as ... (more)
Understanding FedRAMP and Overcoming Obstacles FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice,... (more)
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powe... (more)
When describing cloud computing, terms like highly scalable, efficient, and on-demand probably come to mind. Unfortunately, those same descriptors aren't commonly associated with operations in the federal government. In 2011, the White House's Office of Management and Budget set o... (more)
By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal ... (more)
U.S. Department of Defense Sets Its Cloud Security Guidelines By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the secur... (more)
By Shannon Perry It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American... (more)
Internet of Everything: The Value of Connections The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before - transforming information into knowledge and knowledge into wisdom. IoE ... (more)
By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realiza... (more)
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The executive in the hot seat for preventing these failures is t... (more)
Purpose-driven Networking: Where IoT and Microservices Intersect One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to dem... (more)
Recent data breaches involved an unclassified computer network used by President Obama's senior staff, prompting countermeasures by the administration and resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or ... (more)
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and proce... (more)
Fear Hackers? First Invest in an IT Security Culture Change With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increa... (more)
The Technology Related Content of the President’s State of the Union Address The 2015 State of the Union address was full of technology related content. Here are key takeaways from the perspective of a CTO: The President showed respect for something many American's may not have h... (more)
© 2008 SYS-CON Media