How Government Software Procurement is Not Like Buying a Car
I've been thinking about government IT requirements lately. In my mind, the process of getting something purchased in the government is a little like the following analogy.
Technically Speaking’s Top 10 Articles From 2013
This year, you came, you read, and here are the results for the most viewed blogs from 2013. We had diverse mix of traditional blogs, tutorials, and even an infographic. Check out the list below and catch-up on any articles you may have missed. Then, tell us you favorite articles of the year … whether they made the list or not.
The Internet of Hackable Things
The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.
Technically News - 12/16
This week in Technically News: Absolute Security is a Myth; NIST Cybersecurity Framework: Don’t Underestimate It; Government IT and the Promise of Agile Development; How a Cybersecurity Expert Protects His Smartphone; Cyberthreats For 2014.
Technically News - 12/9
This week in Technically News: Battling Malware and Madware; Is PaaS the Savior of the Federal Datacenter Consolidation Initiative; Symantec Gets FISMA Certification for Shared Service Products; 7 IT Strategies for 2014; Less Malware Predicted for 2014 But New Tactics Emerge.
Webinar Series: Modern Infrastructure Design Success with Autodesk
DLT Solutions has partnered with Autodesk to present a series of three 30-minute webinars that address these issues and how to drive project success in the new landscape of infrastructure modernization.
The Best Ways to Eliminate Boredom and Terror on Your Network: Part 3
The first three practices are all about helping you identify all systems under management, standardizing the way you manage these devices, and protecting them from harmful changes. Let’s now build upon this by talking about the remaining two and why they are important. These practices support the thesis that you can eliminate the leading cause of network downtime: simple human error.
The 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 2
In this installment, we will talk about three specific best practices that will help you improve network uptime and operational success and save you time and money.
The 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 1
You may be thinking, “If network configuration is months of boredom, then why should I read this?” The short answer is, “So you never have to experience those moments of extreme terror!” Today, we will be talking about why network configuration management is so difficult and what’s at stake. This article is a three-part series that will look at five best practices for improving your network configuration management.
Technically News – 12/2
This week in Technically Speaking: What IT Can Teach Utilities About Cybersecurity & Smart Grids; Open Source Benefits to Govt Outweigh Misconceptions, Report Says; 5 Ways to Keep large IT Projects From Tanking; Continuous Monitoring, Maintenance Needed to Maintain Cybersecurity; Improving Federal Cybersecurity Need Not Involve Congress.