Archive

Blog search

Category: News
photo

Government stepping up its big data game

Posted on March 23, 2016
Category: News

Information is king across every sector. It serves as the basis for all of the decisions that are made and provides businesses with a better idea of how they're performing on a daily basis. With the inclusion of mobile devices and sensors, more data is being generated than ever before, and it's only expected to continue rising in the years ahead. As such, it's important for government organizations in particular to prepare their systems to handle and parse through this information to glean the most relevant parts.  Read More

photo

The state of Massachusetts is taking an interesting step into the digital world with an announcement that legislators are considering making body cameras a required piece of equipment for all police officers. Local news organization WWLP reported that Massachusetts law makers within the Committee on Public Safety are looking into a bill that would make this technology mandatory.  Read More

photo

Two important benefits of VoIP

Posted on April 29, 2015
Category: News

Voice over IP is an integral part throughout government agencies today. This service, part of a unified communications solutions, can trace its roots to 1973, when the Network Voice Protocol was developed. This breakthrough allowed a team of researchers totransmit real-time voice over Arpanet, the early precursor to the Internet.  Read More

photo

According to a recent survey from global telecommunications service provide, Easynet, most companies are not getting the full benefits of unified communications. The firms surveyed understood the benefits of unified communications, as 60 percent said business efficiency improved, however, only 45 percent of respondents said business agility improved.  Read More

photo

What is data sharing?

Posted on April 22, 2015
Category: News

The U.S. House is expected to pass a bipartisan bill that will help combat cyberattacks, according to The New York Times. The Protecting Cyber Networks Act has already garnered the support of the president. The bill aims to push private companies to share information about hacking threats with other companies and the government.  Read More


photo

In a World of Ever Growing Servers; What Is Serverless?

Posted on June 24, 2021 0 comments
Category: Data Center

Serverless computing is the logical conclusion of virtualization, separating where code is run from what the code is running on. Using conventional architecture increasing scalability requires ever increasing complexity and capacity, often driving costs at an exponential rate. Serverless allows scaling to the limit that you set, with costs growing at a linear rate. A system that supports a million users requires the same level of effort as an application intended only for a dozen.  Read More

Why Federal IT Modernization is a Big Deal

Posted on April 08, 2021 0 comments
Category: Technology

Businesses across all industries have been traditionally reluctant to migrate to new technologies and processes while leaving behind their tried-and-true practices. Sectors that are heavily regulated are even harder to sell on modernizing their hardware and software infrastructures due to the amount of considerations and challenges that can be introduced. It's no surprise, then, that the federal government has been slow to upgrade and is still gradually making changes to its IT portfolio.  Read More

photo

Staying Secure in an Always Connected World

Posted on January 29, 2021 0 comments
Category: Cyber Security

According to a recent Cisco report, the number of connected devices per person worldwide will rise 50% from 2.4 in 2018 to 3.6 by 2023. And, at the same time – as we all well know - the days of a government employee logging on just during traditional business hours, in one building, on one or two devices, is over. People bring the “constantly connected” mindset from their personal lives, to work. This mindset forms the expectations that they will have the ability to access all the information they require – anywhere, anytime. For government security teams, it’s a love-hate relationship. On the upside, there are huge productivity benefits. And new opportunities for insights with the data collected and shared. But, as the volume and the variety of connected devices increases, so do potential cyber vulnerabilities.  Read More

M-19-21 Memorandum and What It Is

Posted on December 09, 2020 0 comments

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More

It is said that data runs today's world, and we could argue that it is not an exaggerated statement. From important business decisions to process optimization, everything today is data driven. Data has become a necessity of life. Everyone is pursuing increasing volumes of data, but very few understand that this quest for more data must be closely tied to effective, state-of-the-art datacenters. With the growing demand for data, there needs to be an underlying infrastructure that can host queries, process inputs, and feed relevant information, on pace with modern needs. Prevalent IT infrastructures are insufficient; therefore, to make sure that super-fast data communication is done with negligible latency, the establishment of hyper-converged infrastructure is inevitable.  Read More

photo

How Secure Is Your Server Hardware?

Posted on October 13, 2020 0 comments
Category: Cloud Computing

Security is always evolving and what worked yesterday will not necessarily work today. Security goes far beyond protecting software and networks. Securing your hardware is often overlooked and can have some costly implications, if it becomes compromised. Relying solely on firewalls to secure the infrastructure is bound to end in disaster.  Read More

photo

What Are The Implications of 5G Technology?

Posted on August 26, 2020 0 comments
Category: Cloud Computing

The term 5G simply implies the 5th generation of mobile network technology. And it’s fast, with a theoretical upper limit 10 Gigabits per second. The potential uses for this new technology are just beginning to be understood, possibilities are endless!  Read More

« Previous123456...30Next »