January, 2015
Thursday, January, 1, 2015 | Dan Blitz
Can Small Business Find Direction In The Clouds?
Tags: Cloud Computing
Government enthusiasm for cloud computing is palpable. Information technology (IT) practitioners at agencies such as the National Institute of Standards and Technology (NIST), General Services Administration (GSA), and the National Oceanic and Atmospheric Administration (NOAA) are facilitating massive cloud migrations to the great benefit of progressive-minded vendors, including Amazon Web Services (AWS) and VMWare. A relatively new set of star government IT organizations is riding this wave to top-line growth and bottom-line success within their public sector divisions. By and large, these companies are neither traditional government contractors nor innovative startups, and only a precious few are emerging small businesses. These are mid- to large-sized commercial companies, aligning their business development with integrators entrusted with the government’s biggest IT initiatives.
Thursday, January, 1, 2015 | Paul Beilke
The Seven-Year TIC Itch: Is SSL Hurting More Than Helping?
Tags: Cyber Security, federal government
Whatever happened to the Trusted Internet Connection (TIC) initiative? Announced amid great fanfare in November 2007, TIC (OMB M-08-05) was supposed to reduce the number of external internet connections from the public internet to federal government networks down to only 50. Seven years later, we are making some progress, but only to expose additional issues. An unexpected consequence of the TIC initiative, the need for increased sophistication in cybersecurity tools, has caused a performance problem at the gateway. Today’s real cyber issues deal
Thursday, January, 1, 2015 | Anne Dunne
Putting a Familiar Face on Key Verification
Tags: Cyber Security, Cryptography
As consumers, retailers, and banks make more use of customer accounts and data thieves grow more sophisticated at hacking into them, it is increasingly important to develop methods of communication security that are not only reliable but also user-friendly. The more secure we make communication, the more likely we are to come into conflict with the desire to make communication easy and transparent to users. Consumers are finally being warned against using familiar words or numbers they easily remember as their passwords.
Thursday, January, 1, 2015 | John Miller
Tags: federal government, small business
While working as a Certified Business Analyst, I have noticed that clients frequently raise the same issues. Several of the myths and facts associated with these issues are outlined below. MYTH: There is federal grant money available for small businesses. FACT: The federal government does not provide grants for starting and expanding a business. Government grants are funded by tax dollars and therefore require very stringent compliance and reporting measures to ensure the money is well spent. As you can imagine, grants are not given away indiscriminately. Grants from the federal government are only available to noncommercial organizations, such as nonprofits and educational institutions, in fields such as medicine, education, scientific research, and technology development. The federal government also provides grants to state and local governments to assist them with economic development.
Thursday, January, 1, 2015 | Brent Reitze
Simplify and Automate: The Keys to Success in Medical Technology
Tags: Federal Healthcare IT
Technological progress continues to yield a smaller footprint and greater ease of access to systems and their corresponding information. Some of its more remarkable advances focus on medical information technology. Three major technological pushes will revolutionize the way we and most of the world access medical testing and information. Those technological advances are Lab on a Chip (LOC), Clinical Decision Support Systems (CDSS), and mobile sensor medical scanners. Lab-on-a-Chip products seek to reduce the support systems needed to run medical diagnostics that require laboratory testing. The technology simplifies and automates laboratory testing by using capillary action to make use of tiny amounts of blood, or other testing materials, to run a full disease or chemical test automatically. Early models are one-shot strips, chips and cassettes that allow for the mass production of testing materials.
Thursday, January, 1, 2015 | Idriss Mekrez
Data Silos – A Pragmatic Approach
Tags: Federal IT, Big Data
People talk disparagingly of the data silo, a repository of fixed data that is not used during an organization’s daily operations. But sometimes, particularly in government organizations and agencies that handle sensitive information, data silos need to remain stored in compliance with security or privacy policies. This puts complex pressure on CIOs to answer the demand to securely make the data available from a unified access point. Historically, the sharing of data meant that the requesting party needed to code a link to the silo, as well as an additional link into yet another repository. At that point, the requested data would then be duplicated into what essentially amounts to yet another silo. Multiply this data redundancy by every requesting party and exposed silos, and you now have littered your infrastructure with out-of-sync systems. Each of these systems brings its own subsets of critical data that need to be administered. Ultimately, the net result is data governance run amok.