With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
A Czech Republic company has melded eSecurity with simpler, more streamlined eAccess, making cyberspace communications both safer and more efficient.
Homeland security, coalition and other military operations-all depend on the fruits of quick and efficient data processing, exploitation and dissemination. Companies with solutions are making it work with greater efficiency and less impact on bandwidth, paring down copious amounts of data to the bare essentials. Can more be done to achieve success? Read the full article and share your ideas.
The changeover to another generation of IT professionals is inevitable; it's happening right now. But does the federal IT community have a handle on just what this transition entails, and have the Defense Department and other organizations prepared adequately to take on the changes consistently and effectively? Will they end up with a deer-in-the-headlights look, or will they be able to adjust without a hitch? Discuss your ideas and suggestions here.