Insider Insights

  • Strategies for scaling the world’s biggest networks

    Strategies for scaling the world’s biggest networks

    As the IT environment expands, its monitoring, management and failover systems must scale alongside this growth.

  • Increased application workload visibility can lead to cloud success

    Increased application workload visibility can lead to cloud success

    Having ‘20/20 vision’ into the entire IT environment is the single biggest predictor of cloud transformation success.

  • How Maryland built a one-stop business registration solution

    How Maryland built a one-stop business registration solution

    Recognizing that new business owners were required to submit the same information to several agencies, the state found a way to break down agency silos and create efficiencies.

  • Can endpoint security stop ransomware attacks?

    Can endpoint security stop ransomware attacks?

    Unlike antivirus protection, which only identifies specific signatures, advanced endpoint security provides real-time analysis of file movement and behavior across a whole network.

    Comments: 1
  • How DCIM can help with data center optimization goals

    How DCIM can help with data center optimization goals

    Data center infrastructure management software automates facility monitoring and management, helping federal data center managers meet the goals of the Data Center Optimization Initiative.

  • Federal BYOD: The mobile security conundrum

    Federal BYOD: The mobile security conundrum

    Although there are inherent risks to increasing the number of personal mobile devices connected to government networks, the benefits are too good to ignore.

  • How predictive analytics will shape UX

    How predictive analytics will shape UX

    To properly blend user experience and predictive analytics, UX designers must focus on interface personalization, context sensitivity and careful prioritization of information to be delivered.

  • From left: Allan Friedman (Director of Cybersecurity Initiatives), Edward Felten (Deputy U.S. Chief Technology Officer), Lorrie Cranor (Chief Technologist of FTC), Jonathan Mayer (Chief Technologist FCC) photo credit: Randy Apuzzo

    DEF CON: How feds' outreach plays with the hacker crowd

    The policyspeak of a DEF CON "Meet the Feds" panel put some hackers to sleep, but one attendee was glad to learn of the government’s work on IoT and software security.

  • How to prepare your network for the unexpected

    How to prepare your network for the unexpected

    For most agencies, a combination of security products create a formidable defense.

  • How agile is your IT help desk?

    How agile is your IT help desk?

    When the help desk is familiar with agency- and user-specific issues, it can eliminate gaps in communication, reduce response times, cut waste and create value.


More from 1105 Public Sector Media Group