AOL Government, Thursday, June 28, 2012
Federal managers see significant potential from mobile technology in improving productivity and saving taxpayer dollars, but express concerns that current investments are inadequate to achieve much of that potential.
Matt Williams, GovTech, Tuesday, June 26, 2012
Microsoft has acquired Yammer for $1.2 billion, the companies announced Monday, June. 25. The deal had been an open secret for more than a week. Yammer is a product that allows companies and enterprises to make internal social networks for employees. Or as PC World put it well, “Yammer is like Facebook, but a Facebook that’s segregated from the rest of the Internet, and that provides monitoring and controls for IT admins to be able to enforce policies and protect information.”
Camille Tuutti, Federal Computer Week, Tuesday, June 26, 2012
Don’t be surprised to see more agencies using information technology to tackle problems stemming from scarce resources and budgets, and adapting practices from the private sector for greater efficiency, performance and innovation.
Timothy R. Smith, Washington Post Politics, Tuesday, June 26, 2012
At least 12 federal agencies have shifted or are preparing to shift to cloud-based e-mail systems, with estimated savings of $100 million next year, government officials said. The transition to cloud, or Web-based, systems is one of the top federal information technology priorities, mandated by the Office of Management and Budget in 2010.
John Foley, Information Week, Monday, June 25, 2012
Emerging trends such as FedRAMP, community clouds, and single-source contracts point to the start of phase two for cloud computing in federal government. Federal agencies are moving beyond their phase one cloud computing initiatives. They're testing and revising different cloud models, types of contracts, and security approaches, among other standard practices. The Office of Management and Budget lit a fire under federal agencies and departments 18 months ago with its "cloud first" policy. With fed organizations already forced to close hundreds of data centers under the Federal Data Center Consolidation Initiative, they had little choice.
All Things Considered, NPR, Monday, June 25, 2012
A failure to reach a deal on a "Do Not Track" system for web browsers has prompted possible intervention by the government. For a year now, tech companies, the ad industry and privacy hawks have been trying to hammer out the details for the new system, which was supposed to give users the ability to shield their personal information from online companies.
Bob Brewin, NextGov, Friday, June 22, 2012
Veterans Affairs Department Chief Information Officer Roger Baker predicts that within five or six years VA will no longer furnish employees with computers. Instead, they will use the devices they own to connect to department networks.
Rutrell Yasin, Government Computer News, Friday, June 22, 2012
How should data center managers bill users for services in a virtualized, cloud environment? One way might be to embrace user diversity and focus on how they conduct business. At least, that is how the Energy Department’s Los Alamos National Laboratory approached chargeback, the billing of users for IT-related services in a virtualized, cloud environment.
Michael Daconta, Government Computer News, Thursday, June 21, 2012
On May 23, the Obama administration released its new digital government strategy, titled “Digital Government: Building a 21st Century Platform to Better Serve the American People,” a plan for increasing the information and services available to citizens. Longtime readers of this column will know that I am sparing with my praise and often mete it out in measured and sometimes mitigated dosages. In this case, I have nothing but high praise for this new strategy.
Henry Kenyon, Government Computer News, Tuesday, June 19, 2012
Establishing a viable and secure mobile device program is about the details: creating the infrastructure and the policies necessary to issue and deploy handhelds and apps — and realizing that mobile security is a different game than traditional network security.