Guest Blogs

April 21, 2015
By Bill Nolte

Guest blogger Bill Nolte discusses how attention will shift to verification when and if the Iranian nuclear framework becomes an agreement, marking a major challenge for U.S. intelligence.

April 21, 2015
By Justin Marston
Virtual smartphones running commercial mobile apps from a government-hosted data center could be the future of classified mobility.

Guest blogger Justin Marston tackles the reality that is the current state of classified mobility across the U.S. government—voice and basic email. It’s not what senior leaders want, he writes. They want apps, just like everyone else, but their (justified) level of paranoia has neutered most mobile devices.

April 16, 2015
By Glenn Kesselman

Do you have unique personal identification numbers (PINs) for all of your passwords? If you answered no, create a priority “to do” and investigate password vaults, accessible from your mobile devices and web browser.

April 15, 2015
By David E. Meadows

In December 2014, Stephen Hawking, the renowned theoretical physicist, warned the world that true artificial intelligence (AI) could mean the death of mankind. Well, that got my attention.

April 8, 2015
By Al Krachman

Is the U.S. Defense Department moving back toward requiring cost and pricing data for commercial item purchases? A recent series of memoranda and experiences show a backward march toward the department requesting cost data as a means to justify fair and reasonable pricing for commercial item purchases.

April 6, 2015
By Lewis Shepherd

Guest blogger Lewis Shepherd says poll results can be surprising, especially when it comes to young people's views on the U.S. intelligence community.

March 30, 2015
By Terry Roberts

Guest blogger Terry Roberts shares concerns about the ability of government to continuously attract, recruit and enable top talent of all ages, educational and experiential backgrounds. After all, organizations and companies alike are only as good as their leadership talent pool.

March 27, 2015
By Chris LaPoint

Just when you thought consolidation was a good thing. Guest blogger Chris LaPoint addresses the issue caused by consolidation of federal data centers and the added workload for administrators of the remaining centers who must manage the growing infrastructure—and all of the problems that brings—while still meeting service levels required by end users. 

March 20, 2015
By Bill Nolte

Guest blogger Bill Nolte discusses the need for a strategic review of America's intelligence.

March 16, 2015
By Suzanne Petrie Liscouski

Guest blogger Suzanne Petrie Liscouski recaps one panel discussion from the AFCEA Homeland Security Conference on agile principles in procurement and goals, including successes with agile development and agile operations and maintenance.

March 4, 2015
By Glenn Kesselman

You can reduce the probability of a cyber attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and making a commitment to spending more time with your employees/members of your command.

March 3, 2015
By Joyce Bosc

Guest blogger Joyce Bosc, from Boscobel Marketing Communications, outlines some steps companies can use to get the most out of exhibiting at a conference.  

February 27, 2015
By Terry Roberts

In 2015, we have approximately 3 million apps that we can download to our wireless devices (iOS and Android), topping out with more than 100 billion apps to be downloaded across all devices. As a result, the hunt is on for assured privacy and security.

February 26, 2015
By Ed Bender
U.S. soldiers work on a Mission Event Synchronization List in the Joint Cyber Control Center during Operation Deuce Lightning in 2011.

Guest blogger Ed Bender from SolarWinds outlines the steps the U.S. Defense Department should take to secure and streamline information networks successfully toward the realization of the JIE. The department must strive for greater interoperability of NetOps and other IT management tools within the services.

January 15, 2015
By Ralph Wade

The changing nature of threats and diversity of adversaries bring unique challenges to maintaining a strong national security posture. In 2015, we will see nation-states, extremist groups and individuals bring a distinctive set of intelligence challenges to U.S. defense officials. By making the best use of ISR technological capabilities, coupled with innovative commercial information technology, we can equip our military leaders with an integrated ISR enterprise to evaluate and anticipate threats so they more fully and quickly understand proper courses of action, whether on a battlefield or at home.

January 5, 2015
By Ed Bender

Outside the world of government, video traffic is mostly about watching clips on YouTube and streaming a favorite Netflix series. Within the government, particularly the Defense Department, video traffic—more specifically videoconference calling—often is far more mission critical.

November 4, 2014
By Chris LaPoint

Sixty million malware programs are written annually, according to McAfee President Dave DeWalt. That is up from 3 million in 2007. With attacks aimed at virtually anything connected to the Internet and coming at networks from all entry points, finding the bug in an agency's appstack can prove quite difficult. Guest blogger Chris LaPoint outlines how taking a holistic view of the appstack and optimizing visibility into the entire information technology environment is key to running a healthy organization.

October 20, 2014
By Anthony Robbins

Network modernization is becoming a priority for defense agencies—and for good reason. Much of our defense network infrastructure was conceived 20 years ago and put into place almost a decade ago. While the networks remain the same, the technologies that depend on them have advanced, and innovation can no longer be supported by outdated and ineffective infrastructure.

September 23, 2014
By Chris LaPoint

Without quick problem resolution, information technology pros are very often the first to be blamed for slow application performance. A SolarWinds survey found that the lack of cross-silo visibility delays app problem resolution, hindering government information technology professionals from accomplishing their missions.

August 25, 2014
By Chris LaPoint

"There’s an app for that" is truer than ever these days. As BYOD and BYOA increasingly infiltrate government agencies, public sector information technology departments must consider the impact these apps and devices have on their own environments. Chris LaPoint explains why agencies need to focus on applications, not devices, as the key to enabling a mobile work force.

Pages