Archive

Blog search

Archive: February 2016
photo

The movement of large portions of life to a more digital space has spawned a huge influx in data collection. Government agencies and private businesses alike are gathering massive amounts of information in a trend that has been dubbed big data. And yet, many of these organizations are struggling under the weight of all this raw data.  Read More

photo

The state of cyberwar

Posted on February 26, 2016
Category: Cybersecurity

As the Internet and similar technologies began to creep further into government operations, hacking became the go-to method for collecting intelligence about foreign entities. It was a lot easier than sending in a spy to figure out what other countries were up to, and it didn't involve risking anyone's life to do so. However, recent developments into what a country can do with a cyberattack have shown warfare itself might see a major overhaul due to the digital revolution.  Read More

photo

For years, the only place to actually get work done was in the office. An employee could expect to be able to get a certain amount of their duties done at home, but this was a rare occurrence and certainly didn't pertain to a full-day's work. Advancements in technology have changed this, with more organizations beginning to allow employees to complete tasks outside the office.  Read More

photo

A cyberattack on a private institution that works with U.S. intelligence agencies has revealed yet another flaw in how many government officials view cybersecurity. The hack of Juniper Networks, which was announced Dec. 17, 2015, has resulted in a data breach that could contain encrypted correspondence of government agencies spanning more than three years.  Read More

photo

Government bloated by data storage needs

Posted on February 18, 2016
Category: Data Center

It's no secret the government has been having trouble with its data storage. Collecting information on a national scale is incredibly daunting, but putting that data to good use has proven to be quite the challenge. Sorting through big data has massive potential, but current data center administrators simply can't spend time analyzing this information.  Read More

photo

Yet another cyberattack has befallen the American government. This time, the Department of Justice was the main target of the hackers, who got away with the information of nearly 20,000 DoJ employees, according to The Guardian. What's more, the cybercriminals also gained access to data on roughly 9,000 employees of the Department of Homeland Security, posting the information on an encrypted website that The Guardian then investigated.  Read More

photo

The state of Massachusetts is taking an interesting step into the digital world with an announcement that legislators are considering making body cameras a required piece of equipment for all police officers. Local news organization WWLP reported that Massachusetts law makers within the Committee on Public Safety are looking into a bill that would make this technology mandatory.  Read More

photo

In the wake of the infamous Office of Personnel Management data breach, government cybersecurity has arguably trumped every other concern when it comes to government technology services. Cloud computing and data center consolidation have both had their fair share of time in the spotlight in the past few months, but securing the immense quantity of sensitive data the federal agencies possess is still a top priority for government IT leaders. As such, feds have taken several key steps recently that underscore the importance of government cybersecurity.  Read More


photo

An organization’s ability to adapt to change is key to ensuring they stay focused on achieving mission success. With an ever-changing technology landscape, having a strategy that can quickly adjust, and grow with your organization’s needs, is essential. The government has many options when it comes to acquiring technologies and services required to satisfy mission goals. Avoid costly upfront purchase costs and clearly understand our total cost of ownership from the beginning.  Read More

photo

In a World of Ever Growing Servers; What Is Serverless?

Posted on June 24, 2021 0 comments
Category: Data Center

Serverless computing is the logical conclusion of virtualization, separating where code is run from what the code is running on. Using conventional architecture increasing scalability requires ever increasing complexity and capacity, often driving costs at an exponential rate. Serverless allows scaling to the limit that you set, with costs growing at a linear rate. A system that supports a million users requires the same level of effort as an application intended only for a dozen.  Read More

Why Federal IT Modernization is a Big Deal

Posted on April 08, 2021 0 comments
Category: Technology

Businesses across all industries have been traditionally reluctant to migrate to new technologies and processes while leaving behind their tried-and-true practices. Sectors that are heavily regulated are even harder to sell on modernizing their hardware and software infrastructures due to the amount of considerations and challenges that can be introduced. It's no surprise, then, that the federal government has been slow to upgrade and is still gradually making changes to its IT portfolio.  Read More

photo

Staying Secure in an Always Connected World

Posted on January 29, 2021 0 comments
Category: Cyber Security

According to a recent Cisco report, the number of connected devices per person worldwide will rise 50% from 2.4 in 2018 to 3.6 by 2023. And, at the same time – as we all well know - the days of a government employee logging on just during traditional business hours, in one building, on one or two devices, is over. People bring the “constantly connected” mindset from their personal lives, to work. This mindset forms the expectations that they will have the ability to access all the information they require – anywhere, anytime. For government security teams, it’s a love-hate relationship. On the upside, there are huge productivity benefits. And new opportunities for insights with the data collected and shared. But, as the volume and the variety of connected devices increases, so do potential cyber vulnerabilities.  Read More

M-19-21 Memorandum and What It Is

Posted on December 09, 2020 0 comments

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More

It is said that data runs today's world, and we could argue that it is not an exaggerated statement. From important business decisions to process optimization, everything today is data driven. Data has become a necessity of life. Everyone is pursuing increasing volumes of data, but very few understand that this quest for more data must be closely tied to effective, state-of-the-art datacenters. With the growing demand for data, there needs to be an underlying infrastructure that can host queries, process inputs, and feed relevant information, on pace with modern needs. Prevalent IT infrastructures are insufficient; therefore, to make sure that super-fast data communication is done with negligible latency, the establishment of hyper-converged infrastructure is inevitable.  Read More

photo

How Secure Is Your Server Hardware?

Posted on October 13, 2020 0 comments
Category: Cloud Computing

Security is always evolving and what worked yesterday will not necessarily work today. Security goes far beyond protecting software and networks. Securing your hardware is often overlooked and can have some costly implications, if it becomes compromised. Relying solely on firewalls to secure the infrastructure is bound to end in disaster.  Read More

« Previous123456...31Next »