With the continued focus on enterprise architecture, there has also been increased focus on service oriented architectures and microservices. The persistent emphasis has led to the heightened debate surrounding whether or not SOA and microservices are the same thing.
The Federal Buying season is upon us and while there are many new empowerments in place for agency CIOs through FITARA, many are still approaching this upcoming buying season with apprehension.
Some might say C-SPAN has never been so exciting because this week’s coverage featured live and recorded footage of GovLoop’s training session, “The Internet of Things (IoT): Connected Government.” The half-day session offered up important information concerning how the public sector can leverage the IoT. The panel, moderated by Chris Dorobek, featured innovation and thought leadership from the the United States Postal Service (USPS), Department of Homeland Security (DHS) and the National Institute of Standards and Technology (NIST) as well as other industry experts.
In the last days of July 2015, the White House released a new Executive Order (EO) focused on creating a National Strategic Computing Initiative (NSCI). The purpose of this EO is to establish a “cohesive, strategic effort within the Federal Government and a close collaboration between the public and private sectors” that will “maximize the benefits of high-performance computing (HPC) research, development, and deployment.”
While it used to be enough to vouch for a company doing work for your agency based on their convincing responses in RFPs and cost quotes, it is no longer enough, if those questions don’t include inquiries into a company’s security track record. The consequences of working with a vendor that is not at least up-to-date, if not on the cutting edge, in terms of cyber security awareness, education, and training could be catastrophic for businesses. For government agencies specifically, outdated knowledge and procedures could have disastrous consequences in the face of the near constant cyberattacks that agencies face today.
There is strong buzz around a recent i360Gov press announcement titled,” Portfolio Management Survey Underscores Need for Greater Awareness.” The release highlights new data points from its recent 2015 ProofPoints survey on Application Portfolio Management (APM) within the Federal government. The survey results illustrate that while government IT is packed with innovation and change agents, there is much more to be done. In the survey, over 100 federal government executives weighed in on various elements of government IT decision making, with APM and its need for transparency and understanding at the forefront.
One of the common jokes about the Internet of Things (IoT) is how your refrigerator might one day hack your house and run off with the contents of your bank account. While the scenario may seem absurd, it might also not be too far from the truth. As more and more devices connect to the Internet, innocuous endpoints – like refrigerators, washing machines, and televisions, are likely to be the gateways to valuable data opening the way for cyber attacks that we’ve only just begun to imagine.
It seems odd to think about blizzards in July as the summer heat takes its toll on Washington. Yet, for most government IT leaders, the blizzard they’re thinking about isn’t the next Snowpocalypse, but the data blizzard that’s hitting them as more data is collected from citizens, from Internet-connected devices, and from agency activities. At the most basic level, most agencies are equipped to deal with an inundation of data through their ability to store petabytes of data on premise or in the cloud.