Doug Henschen, InformationWeek, Tuesday, September 02, 2014
Virtualization, private cloud, and public cloud deployment options have only added to licensing complexity, introducing a mix of on-premises, per-CPU, per-VM, per-use, and per-user licensing models in this brave new hybrid world
William Welsh, InformationWeek, Tuesday, September 02, 2014
The DHS cyber research effort comes at a time when cyber attacks by well-funded crime groups around the globe and hostile nation-states are on the rise, and there is a shortage of funding for technologies to help vital sectors of the economy combat a daily barrage of attacks.
Judith Lamont, KMWorld, Monday, September 01, 2014
According to IDC, the federal government will spend $118.3 million on public cloud solutions in FY14, and more than $1.7 billion on private cloud solutions. The private cloud expenditure is slightly lower than it was in FY13, while the public cloud figure reflects an increase of about 33 percent. Looking ahead a few years, however, private cloud expenditures are expected to grow dramatically, reaching $7.7 billion by FY17.
Jared Serbu, Federal News Radio, Thursday, August 28, 2014
The Army believes it has an answer to a 24-year-old problem all of the Defense Department has been facing. The Army is about to launch several apps intended to replace a supply chain management process that relies on proprietary handheld scanners, which cost about $2,000 each.
Amber Corrin, Federal Times, Thursday, August 28, 2014
From the highest levels of the Pentagon to the brigades upgrading network switches on bases, DoD plans for network modernization encompass a top-to-bottom approach. It begins with modernizing the infrastructure underpinning DoD IT operations, including the implementation of new hardware, as well as transitioning everyday desktop office tools to enterprise services.
Aliya Sternstein, Nextgov, Wednesday, August 27, 2014
Federal agencies should repurpose the certification route for vetting commercial cloud computing services to also screen popular mobile apps before employees download them, a top Department of Homeland Security official says.
Henry Kenyon, InformationWeek Government, Tuesday, August 26, 2014
Mobile device use is growing rapidly across the federal government. Still, the lack of overriding strategy and communications between stakeholders is slowing its development, says a federal official.
Kenneth Corbin, CIO, Tuesday, August 26, 2014
One of the leaders of Homeland Security's Continuous Diagnostics and Mitigation program shares his strategy for deploying real-time security and situational awareness across the government.
Jessica Hughes, Government Technology, Tuesday, August 26, 2014
The cloud multiplier effect means data breaches in the cloud are increasing -- and becoming more costly. With so many states and localities opting to host their data there, what happens when breaches occur?
Amber Corrin, Federal Times, Tuesday, August 26, 2014
Another day, another massive security breach: The online theft of usernames, passwords and personally identifiable information is now so common many people barely think twice about it. But when it’s the federal government that’s been hacked, the situation takes on a different urgency.