Insider Insights

  • Best practices for emergency preparedness

    'Tis the season for emergency preparedness

    Before the weather gets frightful – increasing the chances that you may experience significant system downtime – make sure you have a plan in place and follow these best practices.

  • App-level approach to mobile management

    App-level approach to mobile management

    Mobile app management can help government IT pros who want to take advantage of the savings mobile apps bring but still need to secure the enterprise.

  • 4 building blocks for app stack dominance

    4 building blocks for app stack dominance

    How to manage your app stacks in order to maintain uptime, maximize enterprise resources and generate consistent productivity throughout your agency.

  • Hardware secured mobile devices toughen first line of defense

    Hardware secured mobile devices toughen first line of defense

    Combining a hardware-secured device with a PIN or biometrics can deliver more security and ease of use.

  • Keys to effective open data portals

    4 habits of highly effective open data portals

    Data analysis software and other business intelligence tools can help create an open data portal that is both compelling and transparent, while saving time and money.

  • 8 steps to reducing unauthorized software

    8 ways to reduce unauthorized software

    Unauthorized software not only increases the attack surface for adversaries, but it also hampers IT managers’ ability to fully secure their assets. Here are eight ways to get unauthorized software under control.

    Comments: 4
  • 6 tips for open source adoption

    6 tips for adopting open source

    Introducing open source code doesn’t have to be an intimidating process. But ensuring security is key.

  • Apple

    First take: Apple’s Swift speeds programming

    In offering leaner coding features, including the use of modules and concise syntax, the Swift programming language is challenging conventional coding with a combination of speed and ease of use.

    Comments: 1
  • 8 best practices for evaluating cloud risk

    8 best practices for evaluating cloud risk

    After an initial slowdown, government cloud adoption should pick up as security and standards are incorporated by agencies.

  • How data virtualization speeds application delivery

    Virtualizing data can boost the success rate of an agency’s application development projects by enabling better data management and faster delivery of applications in a risk-free environment.