Identity Management: Securing the Kingdom

At the heart of our endeavors to create dynamic networks that drive collaboration, information sharing and business performance to new levels is the essential concept of identity management. If IT managers are to provide extensive access to the kingdom without…

8 Tips for Data Center Virtualization

Data Center Consolidation and Virtualization are the buzzwords de jour in government IT today. The opportunity to virtualize large data centers within and across agencies offers a significant opportunity for cost reduction and performance/reliability enhancement. Before you begin your virtualization…

Will the Cloud Drive Out Government Waste? Or Compound It?

Vivek Kundra, the federal government's CIO, believes huge government savings can be realized by moving IT infrastructure into the cloud of hosted computing. But not everyone agrees. Some analysts think that IT decision makers in the federal government could make…

Borderless Network Strategies in Government

Government agencies are intent on meeting citizen expectations. But they'll need to be able to facilitate real-time interaction between people and departments if they are to meet this objective. They'll need advanced networking strategies that remove barriers or borders in…

If Target or Sony can be a target for cyber criminals, so can you

When hackers breached Sony or Target or the IRS or the U.S. Office of Personnel Management, you probably heard about it.Without fail, data breaches at major organizations always rank high in the news, particularly because so many citizens are often…