Government Cloud

By Jodi Kohut Government Cloud Computing Professional March is Women's History Month. As we celebrate women and their role in our history, our workplaces, and our homes, I thought it was important to bring to the forefront some of the strengths that might make them stand out as ... (more)
Understanding FedRAMP and Overcoming Obstacles FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice,... (more)
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powe... (more)
When describing cloud computing, terms like highly scalable, efficient, and on-demand probably come to mind. Unfortunately, those same descriptors aren't commonly associated with operations in the federal government. In 2011, the White House's Office of Management and Budget set o... (more)
By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal ... (more)
U.S. Department of Defense Sets Its Cloud Security Guidelines By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the secur... (more)
By Shannon Perry It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American... (more)
Internet of Everything: The Value of Connections The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before - transforming information into knowledge and knowledge into wisdom. IoE ... (more)
By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realiza... (more)
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The executive in the hot seat for preventing these failures is t... (more)
Purpose-driven Networking: Where IoT and Microservices Intersect One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to dem... (more)
Recent data breaches involved an unclassified computer network used by President Obama's senior staff, prompting countermeasures by the administration and resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or ... (more)
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and proce... (more)
Fear Hackers? First Invest in an IT Security Culture Change With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increa... (more)
The Technology Related Content of the President’s State of the Union Address The 2015 State of the Union address was full of technology related content. Here are key takeaways from the perspective of a CTO: The President showed respect for something many American's may not have h... (more)
by Melvin Greer, Greer Institute for Leadership and Innovation A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence-the coming together of insights and approaches from originally distinct fields-will ... (more)
2015 Prediction Time!! The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of St... (more)
FBI Provides An Update On Sony Hack Investigation Including Some Tech Details On Attribution The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the pas... (more)
The Sony Hack, It’s Still Not War Or Terrorism By SeanLawson For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par ... (more)
SaaS and cloud computing continue to gain real traction in the enterprise - and that trend is sure to continue for a long time to come. But the reality is that, to date, those gaining real benefit from cloud at the enterprise level have been limited largely to isolated pockets; e... (more)
© 2008 SYS-CON Media