Treat Data As Code
It’s time we start treating our data with the same love and respect that geeks treat their code. It’s time that we begin treating data as open source, not simply as something to be published.
Technically News – 9/23
This week in Technically News: NetApp Outlines Strategy for Data Management Across Clouds; Major Changes Ahead as NIST Cybersecurity Framework Nears Oct. Publication; State Finds Power in Data Center Consolidation; More Than 1 in 5 Cyber Jobs Vacant at Key DHS Division; Cybersecurity Depends on Smarter Design, NIST Fellow Says.
Key Takeways From Recent SolarWinds & SANS Cybersecurity Survey
Last week, SolarWinds, working alongside SANS, released the results of an information security survey, involving more than 120 government IT professionals. It was conducted to identify the impact of cybersecurity threats and the use of security analytics and intelligence to resolve those threats. We’ve reviewed their report and have identified these five interesting takeaways:
Technically News - 9/16
This week in Technically News: Symantec to Start Revoking Customer’s SSL Certificates by October 1; Oracle Launches Cloud Services Built for Government Agencies; Red Hat CIO Takes an Open-Source Approach to Security & BYOD; Are Federal IT Initiatives Strangling Agency Networks; 13 Cloud Computing Stats for CIOs; Cybersecurity Legislation: What’s Next.
Technical Debt & Vendor Lock-In
Vendor lock-in is either a key technology problem or an overhyped marketing missile depending on the point of view. I think there's a definition problem at the heart of the agita over in the issue. John Dewey remarked, "A problem well put is half-solved," so I aim to reframe the question while trying to avoid bikeshedding. The heart of vendor lock-in is the obscene nature of the problem, by which I mean "I know it when I see it" a la Potter Stewart's famous opinion on obscenity laws. You can almost hear the start of a Jeff Foxworthy routine...
End of the Year as We Know IT
Crazy times. Furloughs froze contracting shops and requiring organizations. Last year's playbook for year-end opportunities is no good. Everybody – inside and outside of government – trying to work out what September will bring. Here's a take on how the Army will close ranks – from a fella who's spent some time in the foxhole.
Technically News - 9/2
This week in Technically News: Army Admits To Major Computer Security Flaw; Secure Data, Not Devices; NIST Issues Preliminary Cybersecurity Draft Framework; Red Hat Unveils New Offerings, Cloud Certification at VMworld; Investment Capital Floods Cybersecurity Market.
Federal Agency Modernizes Its Identity Management System
It has become a top priority for government agencies to maintain a secure directory without limiting the amount of data users can access. The Federal CIO Council’s subcommittee created the FICAM mandate to protect sensitive personal information amidst cybersecurity concerns. Learn how the DLT Solutions Professional Services team worked with Oracle solved an agency's security challenge.
Technically News – 8/26
This week in Technically News: Outsourcing Cybersecurity; Amazon Still Public Cloud Leader by a Long Shot; and Goverment CIOs Prioritize Business Intelligence, Analytics, IT Management as Role Changes.
Breaking Down Information Silos Across the DoD
Today’s warfighter needs and expects the latest information in order to complete their mission. But providing real-time access across the DoD Information Enterprise, particularly in tactical environments, has been a challenge. Find out how Google Search Appliance offers the DoD a way to break down information sharing barriers and give warfighters real-time access to the information they need to make confident decisions.