Best Practices

Properly planned and well-executed, cloud migration can result in significant savings, increased efficiency and performance, and even enhanced privacy and security. This section of the SafeGov.org site includes case studies of cloud deployments with the goal of articulating best practices and potential pitfalls by focusing on the risk management, strategic planning, and resource management issues that define a successful cloud transition.

Do You Know What Apps Your Employees Use?

Deborah Gage, Wall Street Journal,  Monday, October 27, 2014

Unauthorized cloud-based software is proliferating in the workplace, causing regulatory and security challenges for companies that often don’t even know their employees are using it. Some of the services are well known, such as Dropbox, for file sharing, and the multipurpose social-media site Facebook . But at some companies, employees are tapping hundreds of cloud-based apps to perform functions ranging from Web conferencing to conducting surveys to sharing photos.

Why Some Agencies Want a One-Size-Fits-All Policy for Mobile Devices

Aliya Sternstein, Nextgov,  Monday, October 27, 2014

Various national security agencies would like the White House to provide guidance on how to handle mobile devices in the workplace. Employees are clamoring to use their personal smartphones and managers fear falling behind the technological curve. Currently, there is no governmentwide policy on mobile device security.

Why don't we have a Cloud Transition Framework?

Scott Andersen by Scott Andersen, CGI
Wednesday, October 22, 2014

There is a wonderful cloud process called “design for failure.” Once upon a time in IT we called that “prepare a risk analysis.” Include in that analysis both mitigation and contingency planning. Make sure you socialize that list so that people know what the project risks are. Design for failure works the same way. So let’s design our transition for failure.

Final NIST cloud roadmap sets 'action plans' for gov't cloud adoption

Molly Bernhart Walker, FierceGovernmentIT,  Wednesday, October 22, 2014

The National Institute of Standards and technology Oct. 21 published a final version of its U.S. Government Cloud Computing Technology Roadmap. The document lays out 10 requirements – each accompanied by "priority action plans" and target completion dates – necessary for cloud adoption by the federal government. The 10 specific requirements relate to the broader priorities of security, interoperability, portability, performance and accessibility.

How the Cloud Can Help Our Government Innovate

Jane Snowdon, Wired,  Wednesday, October 22, 2014

Currently, much of the dialogue seems focused on the infrastructure, or data center consolidation and decisions about what to move to the cloud. Those are important issues and require the attention of CIOs and the IT community. But as the federal government shifts to the cloud, we must not lose sight of how this new infrastructure can be a tool for innovation. So far, exactly how the cloud can spur innovation seems to be missing from the narrative.

Microsoft's Azure makeover features Dell hardware

Peter Judge, Datacenter Dynamics,  Tuesday, October 21, 2014

Microsoft gave its Azure cloud offering a makeover on Monday, with new virtual machine classes in its public cloud, and a partnership with Dell to sell hardware pre-configured for on-premises Azure clouds. The new G family virtual machines are a challenge to Amazon Web Services (AWS) with Microsoft's vice president for cloud, Scott Guthrie (below), promising that with up to 450GB of RAM,

Where Government Leads: Designing For User Choice

Julie Anderson by Julie Anderson, Civitas Group
Wednesday, October 15, 2014

When used to benefit the individual, "choice architecture" helps citizens make better choices. It means thinking hard about software defaults. Rarely is government far ahead of the technology sector in cutting-edge policies designed to produce better results. Surprisingly enough, that is exactly what is happening with techniques that empower citizens to make optimal decisions related to economics, resource allocation, and privacy.

Federal Agencies Push Cloud Migration Boulder Uphill

John K. Higgins, E-Commerce Times,  Wednesday, October 15, 2014

The benefits cloud offers are immense, but with the introduction of new hybrid cloud architectures, data stewardship becomes even more complex, as data must be managed and accessed across any cloud," said NetApp exec Kirk Kern. "Federal agencies must establish enterprise-wide governance practices, while deploying solutions that streamline data mobility and stewardship across cloud models. Agencies that have done a good job in governance programs are much more disposed to implementing cloud programs than those lacking sufficient data management controls, the survey found.

The public cloud just got a new poster child

Matt Asay, Tech Republic,  Wednesday, October 15, 2014

In a surprisingly candid and punchy interview with InfoWorld, Chris Drumgoole, GE's chief operations officer of Information Technology, dissed private clouds as merely "well-orchestrated virtualization" and declared GE will reduce its data center assets by 90% in favor of the public cloud. Is GE the new poster child for the public cloud? Which brings us to GE, the multinational firm founded in 1878. For GE to use public cloud resources isn't all that ground-breaking. After all, whether it has known it or not, its developers have almost certainly been using the cloud to route around IT for years. But to commit to the public cloud without reservation? That's big.

Guidelines aim to prevent overloading of mobile networks

Stephanie Kanowitz, FierceGovernmentIT,  Wednesday, October 15, 2014

As applications and devices associated with the "Internet of Things" grow, they threaten to overload mobile networks. New guidelines offer methods to make sure that doesn't happen. The "IoT Device Connection Efficiency Guidelines" from the GSM Association, a London-based group representing mobile operators worldwide, aim to help mobile network operators deal with the deployment of inefficient, insecure or defective IoT devices on their networks.