Extract New Returns from Legacy Systems Via Application Modernization

Within today’s tight operational margins and changing users and demands, sustaining legacy enterprise applications (custom or COTs) requires significant operating budget that may hinder your ability to adapt to an ever changing enterprise IT landscape. As enterprise IT becomes an important competitive building block, enterprise applications are getting larger which deters innovation and poses the risk of cost overruns.

Cybersecurity Wednesdays: Information Security Continuous Monitoring (ISCM) Enabling Technologies: Can You Name Them?

Cybersecurity Wednesdays is written by Van Ristau, DLT Solutions’ Chief Technology Officer. Throughout the month, he’ll explore the world of public sector cybersecurity; introducing concepts, offering opinions, providing resources, and identifying ways to protect your agency. You may also follow Van on Twitter at @VanRistau.

A Call for Ethical IT Selling: Part Two – A Code of Engagement

Thinking back on my previous article, a thought occurred to me: Those of us in the blogosphere, and certainly those of us assisting with governmental IT missions, need to maintain a stricter code of engagement that needs to first and foremost deal with what is needed, not just wanted, from the people that we try to inform. We can do this by applying some of the basics of the journalistic code to all our communications and recommendations:

Technically News - 11/19

TechnTechnically News is a new feature on Technically Speaking that scans thousands of industry articles to present you with a weekly source of IT news, information, and ideas that impact the public sector.ically News is a new feature on Technically Speaking that scans thousands of industry articles to present you with a weekly source of IT news, information, and ideas that impact the public sector.

GovDefenders Wednesdays: Continuous Monitoring is not like a Mobius Strip: How to get in the Loop

GovDefenders Wednesdays is a weekly written by Van Ristau, DLT Solutions’ Chief Technology Officer. Throughout the month, he’ll explore the world of public sector cybersecurity; introducing concepts, offering opinions, providing resources, and identifying ways to protect your agency. Follow Van at @VanRistau for additional news.