Jared Serbu, Federal News Radio, Thursday, August 28, 2014
The Army believes it has an answer to a 24-year-old problem all of the Defense Department has been facing. The Army is about to launch several apps intended to replace a supply chain management process that relies on proprietary handheld scanners, which cost about $2,000 each.
Amber Corrin, Federal Times, Thursday, August 28, 2014
From the highest levels of the Pentagon to the brigades upgrading network switches on bases, DoD plans for network modernization encompass a top-to-bottom approach. It begins with modernizing the infrastructure underpinning DoD IT operations, including the implementation of new hardware, as well as transitioning everyday desktop office tools to enterprise services.
Aliya Sternstein, Nextgov, Wednesday, August 27, 2014
Federal agencies should repurpose the certification route for vetting commercial cloud computing services to also screen popular mobile apps before employees download them, a top Department of Homeland Security official says.
Henry Kenyon, InformationWeek Government, Tuesday, August 26, 2014
Mobile device use is growing rapidly across the federal government. Still, the lack of overriding strategy and communications between stakeholders is slowing its development, says a federal official.
Kenneth Corbin, CIO, Tuesday, August 26, 2014
One of the leaders of Homeland Security's Continuous Diagnostics and Mitigation program shares his strategy for deploying real-time security and situational awareness across the government.
Jessica Hughes, Government Technology, Tuesday, August 26, 2014
The cloud multiplier effect means data breaches in the cloud are increasing -- and becoming more costly. With so many states and localities opting to host their data there, what happens when breaches occur?
Amber Corrin, Federal Times, Tuesday, August 26, 2014
Another day, another massive security breach: The online theft of usernames, passwords and personally identifiable information is now so common many people barely think twice about it. But when it’s the federal government that’s been hacked, the situation takes on a different urgency.
Kymm McCabe, Frank McNally and Anne Laurent, FCW, Tuesday, August 26, 2014
For acquisition professionals, buying cloud computing is a bit like stepping from a 21st-century city into the Wild West. Federal buyers must move from the known, predictable, more or less standard procurement world into one that is unknown, unfamiliar and as yet untamed.
Colby Hochmuth, FCW, Monday, August 25, 2014
As the government continues to embrace mobility, however, the workforce is already starting to demand more. First, the bring-your-own-device, or BYOD, movement supported the notion that workers should be able to use their personal devices for work. Now bring your own application, or BYOA, is making its way into the federal government.
Joe McKendrick, ZDNet, Sunday, August 24, 2014
National Science Foundation awards $20 million to develop two cloud testbeds -- with managing the Internet of Things a top priority. We've only just begun to embrace the potential of cloud. As the so-called Internet of Things takes hold, cloud computing services will need to acquire a new depth and breadth to handle petabytes of data, demanding, complex applications, and millions of users. New, evolving architecture is needed.