Commentary

Feds See Great Potential In Mobility But Warn Of Inadequate Investment

AOL Government,  Thursday, June 28, 2012

Federal managers see significant potential from mobile technology in improving productivity and saving taxpayer dollars, but express concerns that current investments are inadequate to achieve much of that potential.

Microsoft and Yammer: What It Could Mean for Government

Matt Williams, GovTech,  Tuesday, June 26, 2012

Microsoft has acquired Yammer for $1.2 billion, the companies announced Monday, June. 25. The deal had been an open secret for more than a week. Yammer is a product that allows companies and enterprises to make internal social networks for employees. Or as PC World put it well, “Yammer is like Facebook, but a Facebook that’s segregated from the rest of the Internet, and that provides monitoring and controls for IT admins to be able to enforce policies and protect information.”

10 trends shaping the federal IT future

Camille Tuutti, Federal Computer Week,  Tuesday, June 26, 2012

Don’t be surprised to see more agencies using information technology to tackle problems stemming from scarce resources and budgets, and adapting practices from the private sector for greater efficiency, performance and innovation.

As federal agencies shift to cloud e-mail, officials tout savings, security

Timothy R. Smith, Washington Post Politics,  Tuesday, June 26, 2012

At least 12 federal agencies have shifted or are preparing to shift to cloud-based e-mail systems, with estimated savings of $100 million next year, government officials said. The transition to cloud, or Web-based, systems is one of the top federal information technology priorities, mandated by the Office of Management and Budget in 2010.

10 Developments Show Government Cloud Maturing

John Foley, Information Week,  Monday, June 25, 2012

Emerging trends such as FedRAMP, community clouds, and single-source contracts point to the start of phase two for cloud computing in federal government. Federal agencies are moving beyond their phase one cloud computing initiatives. They're testing and revising different cloud models, types of contracts, and security approaches, among other standard practices. The Office of Management and Budget lit a fire under federal agencies and departments 18 months ago with its "cloud first" policy. With fed organizations already forced to close hundreds of data centers under the Federal Data Center Consolidation Initiative, they had little choice.

'Do Not Track' Web System Falls Off The Rails

All Things Considered, NPR,  Monday, June 25, 2012

A failure to reach a deal on a "Do Not Track" system for web browsers has prompted possible intervention by the government. For a year now, tech companies, the ad industry and privacy hawks have been trying to hammer out the details for the new system, which was supposed to give users the ability to shield their personal information from online companies.

Agency-owned PCs could be a relic of a bygone era

Bob Brewin, NextGov,  Friday, June 22, 2012

Veterans Affairs Department Chief Information Officer Roger Baker predicts that within five or six years VA will no longer furnish employees with computers. Instead, they will use the devices they own to connect to department networks.

Los Alamos offers a model for how to charge for cloud services

Rutrell Yasin, Government Computer News,  Friday, June 22, 2012

How should data center managers bill users for services in a virtualized, cloud environment? One way might be to embrace user diversity and focus on how they conduct business. At least, that is how the Energy Department’s Los Alamos National Laboratory approached chargeback, the billing of users for IT-related services in a virtualized, cloud environment.

White House digital strategy hits the mark

Michael Daconta, Government Computer News,  Thursday, June 21, 2012

On May 23, the Obama administration released its new digital government strategy, titled “Digital Government: Building a 21st Century Platform to Better Serve the American People,” a plan for increasing the information and services available to citizens. Longtime readers of this column will know that I am sparing with my praise and often mete it out in measured and sometimes mitigated dosages. In this case, I have nothing but high praise for this new strategy.

Mobile security: The old ways don't cut it

Henry Kenyon, Government Computer News,  Tuesday, June 19, 2012

Establishing a viable and secure mobile device program is about the details: creating the infrastructure and the policies necessary to issue and deploy handhelds and apps — and realizing that mobile security is a different game than traditional network security.