Archive

Blog search



Big Data Technology Taking Hold in the Public Sector

Posted on May 30, 2012 0 comments
Category:

Data in the public sector continues to grow exponentially and agencies are being challenged to find ways to leverage big data in the support of government mission outcomes. In my big data blog earlier this year, I mentioned several emerging trends that are driving the adoption of new approaches to data analytics across the federal government – including the volume, velocity and variety (both structured and unstructured data, including full motion video, emails, voice, social networks, sensor-enabled facilities, web and biometrics data). Agencies have started taking big data seriously and I am seeing this technology take a firm hold in the public sector.  Read More

Watch Out! Citrix Redefines the Cloud Broker

Posted on May 23, 2012 0 comments
Category:

Last week I attended the Citrix Synergy conference in San Francisco, CA at the Moscone Center. As usual, Citrix announced many new products, feature sets and new acquisitions. For me, the highlight of the conference was the announcement of the Citrix Cloud Portal. Many of my colleagues around the beltway have been saying that they want to be a “Cloud Broker,” but what does this mean?  Read More

Bridging the Gap between BYOD and Policy Enforcement

Posted on May 16, 2012 0 comments
Category:

Best practices preach that security policies should be applied consistently across an entire distributed agency. However, the Bring Your Own Device (BYOD) trend is making it even more complicated than before, because not only are employees bringing a vast array of disparate wireless devices to work, they also want to connect from anywhere, with any device, and often look to access the cloud. Additionally, there is continuing need for contractors requiring access to government network resources, as well as cross-department access and information sharing between various agencies. These demands create an increasing pressure that CIOs in the government have to face. This diversity also means the weakest link in security policy enforcement could exist almost anywhere in the agency infrastructure. Many CIOs are wondering how they can accommodate the exponential growth of new devices and applications on their agency network in real-time, as well as how to secure, determine and manage who, what, when, where, how and how many users and devices access that network?  Read More

Will you be in the Cloud by New Year’s Day?

Posted on May 09, 2012 0 comments
Category:

Recently, Rob Wolborsky, CTO for SPAWAR, was interviewed by Defense Systems magazine. In the interview, Rob shared several somewhat startling facts.  Read More

Cyber Attacks & Mobile Threats on the Rise

Posted on May 04, 2012 0 comments
Category:

Symantec Corporation just released their new “Internet Security Threat Report,” which provides an overview and analysis of the year in global threat activity. As per the Report, the number of cyber attacks increased significantly in 2011. Mobile platforms, particularly Android OS and social networks, were a focus of attackers. Social networks are gaining in popularity even among enterprises, and due to their viral nature and affinity to social engineering, it is easy for malware to spread very quickly.  Read More

Finally, multi-vendor collaboration for Mobility & Desktop Virtualization

Posted on April 25, 2012 0 comments
Category:

Last week, I attended the Cisco Partner Summit 2012 in San Diego. There were thousands of Cisco partners attending from 90 countries, and a lot of excitement in the air. I have attended this event several times in the past, and the focus has always been almost exclusively on Cisco’s products. This year the focus is radically different. The conference is oriented on joint, integrated, best-of-breed “smart” solution architectures and “smart” services. It has been a welcome change to see top infrastructure vendors like Cisco, NetApp, VMware, Citrix, EMC and several others working together to create integrated solution offerings in Private Cloud, Desktop Virtualization and several other technology hotspots. Customers in both the private and public sectors have been clamoring for this collaboration for years.  Read More

Federal Cloud Initiatives for 2012

Posted on April 12, 2012 0 comments
Category:

In a talk at FOSE last week, Department of Energy CTO Peter Tseronis said that agencies should do much more than meet the minimum three use cases for Cloud to be identified by the end of the year.  Read More

Gartner says Personal Cloud to replace PC by 2014

Posted on March 21, 2012 0 comments
Category:

There is a really good article from Gartner last week which can be found at http://www.gartner.com/it/page.jsp?id=1947315 in which Gartner claims that Personal Cloud will replace PC’s by 2014.  Read More

Is Cloud a cure-all?

Posted on March 16, 2012 0 comments
Category:

I recently ran across a customer that wanted to move an application to a public IaaS Cloud. They were convinced that moving their application to the Cloud would solve a bunch of their downtime issues. Now, let’s dismiss for a minute the fact that the customer had no idea what the application was costing them to run as is, what it would cost to run in a public IaaS cloud, or the relative performance of the app in either place. Let’s forget all that for a moment. The real problem here is that the customer thought they could move their existing application architected the same way as in their data center, to the public IaaS Cloud. They had a standard 3-tier application with web servers, application server, and a database server.  Read More

“Which type of Cloud is right for me?”

Posted on March 01, 2012 0 comments
Category:

This is a question that I hear almost daily from potential customers. But the question is really an indication that the person asking the question doesn’t understand the paradigm shift that is occurring in IT today. By that I mean that Cloud is just another way of delivering a service that meets a set of business requirements. It is one of the many options that IT needs to evaluate based on the requirements of the business or organizational unit, the promised SLA’s of the service, and the costs of that service.  Read More