Army tries to solve supply chain management problems with mobile apps

Jared Serbu, Federal News Radio,  Thursday, August 28, 2014

The Army believes it has an answer to a 24-year-old problem all of the Defense Department has been facing. The Army is about to launch several apps intended to replace a supply chain management process that relies on proprietary handheld scanners, which cost about $2,000 each.

Collaboration is the new normal for networks

Amber Corrin, Federal Times,  Thursday, August 28, 2014

From the highest levels of the Pentagon to the brigades upgrading network switches on bases, DoD plans for network modernization encompass a top-to-bottom approach. It begins with modernizing the infrastructure underpinning DoD IT operations, including the implementation of new hardware, as well as transitioning everyday desktop office tools to enterprise services.

DHS Official: Create a Governmentwide Seal of Approval for Apps

Aliya Sternstein, Nextgov,  Wednesday, August 27, 2014

Federal agencies should repurpose the certification route for vetting commercial cloud computing services to also screen popular mobile apps before employees download them, a top Department of Homeland Security official says.

Why Federal Agencies Lag Behind On Mobile Tech

Henry Kenyon, InformationWeek Government,  Tuesday, August 26, 2014

Mobile device use is growing rapidly across the federal government. Still, the lack of overriding strategy and communications between stakeholders is slowing its development, says a federal official.

5 Ways Federal CIOs Plan to Improve Security Monitoring

Kenneth Corbin, CIO,  Tuesday, August 26, 2014

One of the leaders of Homeland Security's Continuous Diagnostics and Mitigation program shares his strategy for deploying real-time security and situational awareness across the government.

Data Breaches in the Cloud: Who's Responsible?

Jessica Hughes, Government Technology,  Tuesday, August 26, 2014

The cloud multiplier effect means data breaches in the cloud are increasing -- and becoming more costly. With so many states and localities opting to host their data there, what happens when breaches occur?

Cards emerge as key player in authentication

Amber Corrin, Federal Times,  Tuesday, August 26, 2014

Another day, another massive security breach: The online theft of usernames, passwords and personally identifiable information is now so common many people barely think twice about it. But when it’s the federal government that’s been hacked, the situation takes on a different urgency.

Taming the wild west of cloud acquisition

Kymm McCabe, Frank McNally and Anne Laurent, FCW,  Tuesday, August 26, 2014

For acquisition professionals, buying cloud computing is a bit like stepping from a 21st-century city into the Wild West. Federal buyers must move from the known, predictable, more or less standard procurement world into one that is unknown, unfamiliar and as yet untamed.

Beyond BYOD: Who oversees the apps?

Colby Hochmuth, FCW,  Monday, August 25, 2014

As the government continues to embrace mobility, however, the workforce is already starting to demand more. First, the bring-your-own-device, or BYOD, movement supported the notion that workers should be able to use their personal devices for work. Now bring your own application, or BYOA, is making its way into the federal government.

New government bare-metal clouds to probe virtualization, IoT frontiers

Joe McKendrick, ZDNet,  Sunday, August 24, 2014

National Science Foundation awards $20 million to develop two cloud testbeds -- with managing the Internet of Things a top priority. We've only just begun to embrace the potential of cloud. As the so-called Internet of Things takes hold, cloud computing services will need to acquire a new depth and breadth to handle petabytes of data, demanding, complex applications, and millions of users. New, evolving architecture is needed.