Quantcast
Channel: Blog entries
Browsing all 113 articles
Browse latest View live

Parallelized Data Mining Security

Parallel Data Mining (PDM) is currently attracting much research. Objects involved with ‘Parallel Data Mining' include special types of entities with the ability to migrate from one processor to...

View Article



Privacy in a Digital World: It Takes Two to Tango

  Privacy in a Digital World:  It takes Two to TangoSummary:  Both Consumers & Technology Providers are responsible for privacy.  In this month's blog I attempt to support my theory, as well as...

View Article

Sneak Preview: CXOs Perspectives on Federal IT Reform

Sneak Preview:  CXOs Perspectives on Federal IT ReformHere is a preview of GTRA’s Summer 2011 Research Brief, which focus entirely on how the Federal IT community views 25-Point Reform six-months after...

View Article

IPv6 and IPv4 Monitoring: Will You be Ready?

IPv6 and IPv4 Monitoring: Will You be Ready?In the 30+ year history of the Internet, the move to IPv6 will be the largest single upgrade. The clock is ticking on the availability of IPv4 addresses,...

View Article

The Problem with Cybersecurity Legislation

In doing research for an upcoming book on defending cyberspace, I have had the opportunity to dive into the world of Cybersecurity legislation and better understand what we have, why existing laws are...

View Article


How to Get What you Want… More $$$!

The Bottom Line: Each and every one of you who is asking for budget needs to accept the fact that you are a sales person! Focus on selling the problem, not the fact that you need money. Once you get...

View Article

Why All IT Leaders Should Care About the Success of Health IT

As part of GTRA’s new HealthTech initiative, I have spent the past several months conducting research with Health IT leaders from health care organizations, governments and technology providers in...

View Article

Why VanRoekel is the Type of Leader We Need

The Bottom Line:  A true leader isn’t afraid to build on someone else’s good work.  Lucky for us the new Federal CIO understands and embraces this.  Read More...

View Article


Robert Brese (Deputy CIO, Energy) Receives Secretary of Energy's Honor Award...

Just a quick post to congratulate my good friend Robert "Bob" Brese on receiving the Secretary of Energy's Honor Award for Excellence.  This tremendous honor is bestowed annually to three leaders...

View Article


Highlights from 2011 GTRA SecureGOV Council Meeting

  It’s hard to believe that another SecureGOV Council Meeting has come and gone, but it has and all I can say is WOW!  Despite one of the toughest fiscal climates in recent memory, I am proud to...

View Article

A Crash Course in Big Data

As I tweeted back in December 2011, Big Data is well on its way to becoming the buzz of 2012. Here is a quick 101 to get you up-to-speed!At the December 2011 GTRA Council Meeting, one of my good...

View Article

GTRA Unfiltered: What Federal IT Executives are Talking About

A real-time snapshot of the most frequently made comments by federal IT executives, some of which may come as a surprise.   Why is being the director of research at GTRA the coolest job for anyone...

View Article

The Case for Big Bandwidth

Why the time is right for a massive network upgrade   Big Data and shared services, arguably two of the hottest trends in Federal IT, posses the unquestionable power to revolutionize our ability to...

View Article


1 in 2 people still don’t know Webcams can be hacked… another sign that we...

  Summary: Despite high-profile media stories and even some arrests, a new study shows large numbers of people are still unaware that webcams can be hacked and used to spy on you! This statistic points...

View Article

Key Takeaways from the June 2012 GTRA Council Meeting

With Keynote speakers from the CIO's of Energy and EPA, Defense Executives from the DCMO and DoD OCIO, and dozens of other C-level executives speaking and collaborating on how to build a more efficient...

View Article


Open Standard Protocols for VA Networks

GTRA would like to highlight a Memo from the VA CIO on “Open Standard Protocols for VA Networks”, which marks an important shift if the agency’s strategy and shows its commitment to innovative uses of...

View Article

Securing the New Federal IT Ecosystem: Contracts & Supply Chains

Abstract: As the Federal IT community moves deeper into the outsourced model, a CIO and their CISO’s security strategy must increasingly focus on contracts and supply chain management in order to...

View Article


Securing the Federal IT Supply Chain: A Mammoth Task? Absolutely. An...

Who said that securing our Federal IT supply chain was an impossibility? No one. But many -- from NASA to NIST -- are noting the tremendous challenges associated with such a feat. The innovative and...

View Article

Securing a BYOD Environment: Adopting a Comprehensive Approach

The federal bring-your-own-device (BYOD) strategy, a component of the federal digital strategy, is rapidly gaining ground. Having proven to increase efficiency and effectiveness, this movement,...

View Article

Building a Trust-Based Relationship with your Cloud Vendor: The Dating Game

Abstract:  Creating trust with your vendor is a lot like dating, it takes time, communication, and above all knowing what you want. A relationship with a Cloud vendor built on a foundation of trust is...

View Article
Browsing all 113 articles
Browse latest View live




Latest Images