Information Technology for Government Efficiency and Transparency

Government Information Technology

Subscribe to Government Information Technology: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Information Technology: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The Internet of Things (IoT) is an uninterrupted connected network of embedded objects/ devices with identifiers without any human intervention using standard and communication protocol.  It provides encryption, authorization and identification with different device protocols like MQTT, STOMP or AMQP to securely move data from one network to another. IoT in connected Government helps to deliver better citizen services and provides transparency. It improves the employee productivity and cost savings. It helps in delivering contextual and personalized service to citizens and enhances the security and improves the quality of life. With secure and accessible information government business makes more efficient, data driven, changing the lives of citizens for the better. IoT focused Connected Government solution helps in rapidly developing preventive and predictive ana... (more)

NATO ACT 'Art of the Possible' Interoperability Demonstration

NATO ACT 'Art of the Possible' Interoperability Demonstration GovCloud Network is proud to have served as the Program Manager for the NATO Allied Command Transformation, "Art of the Possible" Interoperability Demonstration on December 16, 2016. supporting the The Network Centric Operations Industry Consortium (NCOIC), this effort featured an important demonstration for military, government and business leaders by its member-companies to underscore the benefits of collaborating via an interoperable network environment. The demonstration used a secure, federated-cloud infrastructure to highlight the consortium's work over the past few years in how to develop a trusted environment, including governance processes and federation management as well as interoperability verification. This demonstration itself is an outgrowth of  the NCOIC Interoperability Verification (IV)... (more)

Cloudy Thinking and Digital Transformation | @CloudExpo #DX #Cloud #Analytics

(Originally posted on the Engility Corporation Blog) There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to a shared drive. Cloud computing as a mission transformation activity, not a technological one. As an organization moves from local information hosting to the cloud, one of the most important challenges is addressing cloud computing as a mission transformation activity, not a technological one. Cloud computing isn't a new technology. It's a new way of consuming and provisioning information technology services. Adopting cloud computing means paralleling your mission processes, rethinking the economic models and abstracting your applicati... (more)

Should Data Centers Think? | @CloudExpo #Cloud #Agile #Analytics #DataCenter

As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data center management.  According to industry research firm IDC, organizations will spend an additional $142.8 billion oninfrastructure for both public and private cloud environments in the next three years (2016-2018) to boost efficiency and business agility. To support this rapid evolving space, Intel announced a “Cloud for All” initiative last year in order to help businesses get the most out of their cloud infrastructure. Specific goals for this initiative include: Investing in the ecosystem to accelerate enterprise-ready, easy-to-deploy software defined infrastructure (SDI) solutions; Op... (more)

Digital Transformation Driven by ITaaS | @CloudExpo #Cloud #ITaaS #DigitalTransformation

When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use models.  Quite often this transition also leads to the adoption of software defined environments across the enterprise infrastructure. Software defined infrastructures do, however, bring with them some very unique challenges. Many of the most prevalent issues are centered around the relatively immature state of the technology itself. The most significant aspect of this challenge is the lack of industry standards for device control. Control software must know the status of all network devices and trunks, no matter what vendor equipment is being used. While OpenFlow stands today as the d... (more)

Crisis Response Using Cloud Computing | @CloudExpo #ML #IoT #AI #DX #DevOps #FedRAMP

Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver. BlackBerry, in fact, has just become the first cloud-based crisis communication service to receive a Federal Risk and Authorization Management Program (FedRAMP) authorization from the United States Government for its AtHoc Alert and AtHoc Connect services. If you're not familiar with FedRAMP, it is a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The Blackberry certification was sponsored by the US Federal Aviation Administration. While you may not need a US Government certified solution in an emergency, your organization may really want to consider the benefits of cloud computing for crisis response. From a communications point of view, companies can... (more)

How Quantum Computing with DNA Storage Will Affect Your Health | @CloudExpo #Cloud #Storage

How Quantum Computing with DNA Storage Will Affect Your Health By Guest Contributor Taran Volckhausen Contributing Editor at Vector Moore's Law, which states that processing speeds will double every two years as we cram more and more silicon transistors onto chips, has been faltering since the early 2000s when the law started to run up against fundamental limitations presented by the laws of thermodynamics. While the chip industry, with Intel leading the charge, has found ways to sidestep the limitations up until now, many are now saying that despite the industry's best efforts, the stunning gains in processor speeds will not be seen again by the simple application of Moore's Law. In fact, there is evidence to show that we are reaching the plateau for the number of transistors that will fit on a single chip. Intel has even suggested silicon transistors can only keep ... (more)

The BYOD Problem | @CloudExpo #Cloud #Mobile #Security

Everyone wants their device of choice right there next to them 24/7.  To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on "Bring Your Own Device" (BYOD). The key trends influencing enterprise BYOD and mobile security line up as follows: Increased employee mobility (63%), satisfaction (56%) and productivity (55%) dominate as the top drivers of BYOD. These employee related drivers are considered more important than reduced costs (47%). Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi. Security threats to BYOD... (more)

TAP Accelerates #ArtificialIntelligence | @CloudExpo #AI #BigData #Hadoop

Over the past few years, the use of artificial intelligence has expanded more rapidly than many of us could have imagined. While this may invoke fear and dread in some, these relatively new technology applications are clearly delivering real value to our global society.  This value is generally seen in four distinct areas: Efficiency - Delivering consistent and low-cost performance by characterizing routine activities with well-defined rules, procedures and criteria Expertise - augment human sensing and decision makingwith advice and implementation support based on historical analysis Effectiveness - improve the overall ability of workers and companies by improving coordination and communication across interconnected activities Innovation - enhance human creativity and ideation by identifying alternatives and optimizing recommendations. Photo credit: Shutterstock ... (more)

White House Open Government Initiatives

Beth Noveck is deputy chief technology officer for open government and leads President Obama’s Open Government Initiative. She is giving a talk at Harvard. She begins by pointing to the citizenry’s lack of faith in government. Without participation, citizens become increasingly alienated, she says. For example: the rise of Tea Parties. A new study says that a civic spirit reduces crime. Another article, in Social Science and Medicine, correlates civic structures and health. She wants to create more opportunities for citizens to engage and for government to engage in civic structures — a “DoSomething.gov,” as she lightly calls it. [NOTE: Liveblogging. Getting things wrong. Missing things. Substituting inelegant partial phrases for Beth's well-formed complete sentences. This is not a reliable report.] Beth points to the peer to patent project she initiated before she... (more)

Surviving the Coming 'Hackerpocalypse' | @CloudExpo #API #Cloud #Security

With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse.  Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our survival will depend on society’s ability to deal with the evolution and maturation of the changing enterprise cybersecurity challenge. If you’re completely oblivious to the living dead threat, a zombie apocalypse refers to a widespread (usually global) rise of zombies hostile to human life.  The zombies will engage in a general assault on civilization where victims may become zombies themselves. This causes the outbreak to become an exponentially growing crisis. The spreading phenomenon swamps normal military and law enforcement organizations, leading to the panicked collapse of civili... (more)