Home Improvement or Guide to Cloud Migrations?

Scott Andersen by Scott Andersen, CGI
Monday, October 06, 2014

Recently I was watching a home improvement show and it struck me that home improvement design questions and questions we should ask our cloud provider are often quite similar.

The Value of the Broker Model

Scott Andersen by Scott Andersen, CGI
Tuesday, September 16, 2014

I find it interesting and have the argument frequently about the value of cloud brokers. I tend to be arguing with cloud service providers and argue that there is significant customer value in the cloud broker model. Cloud service providers don’t always see that value and they should.. From their perspective its business as usual and the broker of course changes that. Lately however I am seeing more and more people moving to my side and tipping the argument further. So I have come up with my top ten reasons brokers will be of value in the next two years.

Culture Remains A Significant Barrier To Technology Adoption In Government

Bailey McCann, CivSource,  Tuesday, September 16, 2014

If your agency or department has an organizational culture that looks warily on change or adopting new technology, it is more likely that you’ll lag behind your peers, according to a new report from the Harvard Business Review and Verizon. The report entitled, “The Digital Dividend: First Mover Advantage” details how technology adoption is changing the business of government.

Vendor Outreach Key to Unlocking Federal Cloud Market

Kenneth Corbin, CIO,  Tuesday, September 16, 2014

Federal IT executives urge cloud service providers to offer agencies a glimpse of their roadmaps to help guide procurement strategies, which is often a byzantine process hampered by perpetual government tech talent shortages.

4 Tips: Protect Government Data From Mobile Malware

Julie Anderson by Julie Anderson, Civitas Group
Wednesday, August 20, 2014

Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat. It often happens without you knowing. Malware takes over your smartphone or tablet, exploiting vulnerabilities and trolling for information. Perhaps the processing speed on your smartphone slows down. Or a preview of a text message that you didn't write temporarily pops up on your screen. These and other clues lead you to become suspicious that someone has access to your device and data.

Bringing the cloud to data that cannot be moved

Jane Snowdon, FederalTimes,  Friday, July 18, 2014

Many regulations, laws, and industry guidelines govern how sensitive personal information and regulated data are managed in the healthcare, banking, and financial industries. Improper release of regulated or sensitive information can result in significant consequences and damage, making compliance with government regulatory acts and industry guidelines paramount.

Beyond the Horizon, the Data Center of Tomorrow

Scott Andersen by Scott Andersen, CGI
Tuesday, July 15, 2014

From my vantage point data centers are really about four distinct services. They represent the compute power, the storage capability, the network (delivery) system and finally a structured place to build security solutions. So based on my view let’s take a look at what the data center of tomorrow might look like.

Is Your Solution Cloud Ready?

Scott Andersen by Scott Andersen, CGI
Monday, June 23, 2014

What does Cloud ready mean? What in the end is the value of cloud computing based on the cloud ready criteria?

Where do you put Mission Critical Applications in the Cloud?

Scott Andersen by Scott Andersen, CGI
Monday, May 19, 2014

Cloud migrations are expanding as are the supported workloads in the cloud today. Several analysts have pegged the percentage of workloads that can be run in the cloud to be at 80% by 2017. That means that there are workloads that in theory won’t run in the cloud.

The Big Data Report and The Cloud

Paul Rosenzweig by Paul Rosenzweig, The Chertoff Group
Friday, May 02, 2014

On May 1st the Administration released its long-awaited, review of Big Data -- a report from the Executive Office of the President on the phenomenon of large-scale data collection and analysis. The report is likely to set the framework for the policy debate over Big Data for the next 5 years – and that will have significant implications for many cloud applications. Those who collect and aggregate data are going to have to be more proactive and responsible; and that’s a likely sea change. In many ways the report is an excellent summary of the phenomenon of Big Data as it is used today. It collects, in one place, a remarkably concise compendium of information, including contemporary use models for big data; existing government initiatives; and taxonomy of policy questions that arise from new data analytics.