Cloud Computing for Government Efficiency and Transparency

Government Cloud Computing

Subscribe to Government Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Government Cloud Computing
Cloud computing CAD is now a business requirement. Cloud solution architects are integral to the ideation, creation and deployment of new business models and CAD is the right tool for optimizing their solutions. This is why the use of cloud computing solution computer aided design toda...
ViON solves complex enterprise problems by combining passion and agility to deliver the most effective, innovative solutions because commitment to mission success is in their DNA. One of the ways they deliver success is through ViON on Demand™, which delivers highly secure compute, net...
Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. Although every one of these sta...
Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of bu...
Cloud computing seems destined to be the way enterprises will use information technology. The drastic cost reductions and impressive operational improvements make the transition an unstoppable trend. The “What is cloud computing?” question now, however, seems to be morphing into “Where...
While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestin...
There is almost a deafening discussion going on about the self-centeredness of today’s young adults. Weather you call them Generation Y, millennials or twenty-somethings, the general refrain seems to be a perception that the entire lot of them only care about themselves. Patricia Gree...
Prague is a beautiful city! My last time was in June 2010 when Jeremy Geelan invited me to speak at Cloud Expo Europe (see my blog post and video from that trip at "CloudExpo Europe 2010: Not Your Father's Prague"). And yes, that is the same Jeremy Geelan that is currently enduring the...
"The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acqui...
The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days, according to Gregory Touhill, deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. ...
I woke up this morning to the devastating news about the earthquake in Nepal. Sitting here in California that destruction is literally on the other side of the world but my mind immediately went to thinking about my good friend Jeremy Geelan. See Jeremy and his family have been l...
OmniTI, a provider of web infrastructures and applications for companies that require scalable, high-performance, mission critical solutions, has announced that it has partnered with GovCloud Network, LLC to help clients develop and execute mission and business strategies for cloud-bas...
The adoption of Internet of Things (IoT) appears to be unquestioned. Advances in wearables and sensors are strategic to tech companies, telecoms and manufacturers across multiple domains. Everyone from millennials to boomers is incorporating IoT technologies into the daily flow of life...
Science, technology, engineering and mathematics (STEM) professionals are drivers of innovation,creativity and invention. STEM disciplines are significant drivers of economies worldwide, and STEM careers are rewarding and fulfilling. The promise of STEM is therefore important for econo...
This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency s...
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powerhouse...
FedRAMP defines the requirements for cloud service providers’ security controls, including vulnerability scanning, incident monitoring, logging, and reporting. CSPs in use at federal agencies or in acquisition must meet the cloud computing requirements defined by FedRAMP. Whether o...
Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adop...
Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to w...
Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout history, society has built itself up by transforming raw materials into finished, usable products. This manufacturing proc...
ITIL (formerly known as the Information Technology Infrastructure Library) has been the best management practices framework of choice for world class IT Operations organizations. The 5 stage framework: Service Strategy, Design, Transition, Operation, and Continual Service improvement ...
Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not ...
Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks. For examp...
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chi...
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and processes a...
Did you know that..... Goldman Sachs recognized Bangladesh as one of the Next Eleven (N-11) - a list of eleven countries having strong potential for becoming the world's largest economies along with BRIC (Brazil, Russia, India and China)?JP Morgan named Bangladesh as one of the `Fronti...
I am proud and honored to announce that I have been added as a speaker at SouthAsia's biggest tech event "Digital World 2015" , 9th - 12th February, 2015 at the Bangabandhu International Conference Center Dhaka, Bangladesh. The event will also be attended by the Honorable Prime Ministe...
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent...
The President showed respect for something many American's may not have heard of, but you dear readers know very well: Coding! In the context of education he remarked that "we’re connecting community colleges with local employers to train workers to fill high-paying jobs like coding, a...
According to a Greer Institute Workforce and Talent study, the 2020 workforce is both "the most educated and culturally diverse of any generation" and "notorious job-hoppers who dislike bureaucracy and distrust traditional hierarchies." Given this, it is crucial for leaders to understa...
A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence-the coming together of insights and approaches from originally distinct fields-will make fundamental contributions in our drive to provide creative solut...
Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell's Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. The outcomes ...
What is ITIL & how can it benefit your organization? Learn the answers to these questions plus gain an understanding of the ITIL Service Lifecycle in this video.
Cloud Computing is revolutionizing today's business marketplace. While "learning the art of the possible", corporate executives today are struggling with the business and security challenges associate with this important transition. Just last month, Dell released its first Global Techn...
The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of Star Trek! Traditional system i...
In the last two years, IT security breaches have hit the White House, the State Department, the top federal intelligence agency, the largest American bank, the top hospital operator, energy companies, retailers and even the Postal Service. Melvin Greer, Senior Fellow and Chief Strategi...
We are so proud of the success of out first cloud computing training class. This group took the challenge of changing their careers, studying hard and focusing their efforts in order to reap the rewards! We are ecstatic over there accomplishment of :' 100% PASS RATE ON COMPTIA CLOUD ...
Cloud computing is currently making information technology headlines, and vendors are aggressively promoting the many benefits it can provide organizations. This White Paper addresses the claims and questions that are often raised in relation to cloud computing and provides a clear ...
By Bob Gourley The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have to tell you they do not go public like this unless they have evidence. It ...
Sitting through a number of presentations at various cyber conferences recently I’m struck that many enterprises cyber security planning comes down to having ‘the best people’ doing really pretty boring jobs. Jobs like keeping software updated, tracking down holes in the firewalls, wai...