RHEL 7 Preupgrade-Assistant Tutorial
One of the new features announced with RHEL 7 is the ability to do an in-place upgrade from RHEL 6. This is a long requested addition to the platform, and I'm sure welcomed by a host of folks. So I decided to take a look in my local environment to see what the process entails.
Debunking the DoD Certified Records Management Requirement Myth
Clarifying the misconception that requires all software serving records management purposes must be DoD 5015.2 Certified RMAs and why this is important for the Presidential Records Management Directive 2016 Goal requiring e-mail records to be managed electronically.
Technically News - 8/1
This week in government IT news: The EPA Doesn't Know What Clouds It Has; GSA CIO Calls for Open Source to be Considered First; NIST Revising Key Security Controls Publication
Changing AWS’ Elastic Load Balance Connection Timeout
Yesterday, Amazon Web Services (AWS) announced the ability to customize the idle timeout for their Elastic Load Balancer from the previously fixed 60 seconds to anywhere from 1 to 3600 seconds. Learn how.
Technically News - 7/25
This week in Technically News: US Federal Gov Failure to Leverage Cloud May Cost Up to $19B; Federal IT Networks: Simpler Is Better; IT Stockholm Syndrome is Slowing Down Reform of Bad Practice in Government
The 4 Steps To Opening Your Agency's Data
Open government is not about releasing every bit and byte you’ve ever collected to the world. Without context and structure, that data will not be applied in ways that will most benefit you and your constituents. We have identified four steps to help your agency move along the data flow process.
The State of Phishing Cyber Attacks: An Infographic
Though it's the oldest hacking trick in the book, phishing cyber attacks are still a nightmare for cybersecurity. We created an infographic that offers a look at what phishing attacks are, how they're launched, tips to defend yourself, and examples.
Where Contract Administration Meets the Cloud
Chris Rader is a DLT Solutions Senior Contract Administrator, a cloud enthusiast, a cloud procurement aficionado, and a Certified Federal Contracts Manager (CFCM). That's why DLT's Chief Cloud Technologist refers to him as Chris-Rader-as-a-Service. Chris gives us his views on cloud procurement and his tips for agency's looking to procure cloud technologies.
Technically News - 7/18
This week in Technically News: Three Types of Cybersecurity Threats (and two employees) to Worry About Most; Survey Suggests Federal Network Complexity is Limiting Data Center Consolidation; Feds Pursue Cloud Forensics Standards; U.S. Army Grants Certificate of Networthiness (CoN) for 21 SolarWinds IT Management Products
Government Social Media Use – A Few Tips for Employees About Social Media Security
Social media outlets like Twitter, Facebook, Tumblr, and LinkedIn are great because they allow us to maintain friends and connections across the country without leaving our homes and offices. The downside of social media is the casualty with which we use it.