- Welcome Guest
- Sign In
It starts in kindergarten. Three playground swings and 15 kids. The teacher introduces the concept of sharing the swings by limiting the time per child. Fast-forward 30 years and those same children are hugging their IT servers and programs and clinging to "their" silo stash of legacy equipment and software ...
Botnets represent a major security threat to e-commerce. The effectiveness of this malicious software has gone far beyond the realm of simple annoyance and inconvenience to a major global, technical and economic challenge ...
U.S. government agencies are looking everywhere they can to cut costs -- including the cost of information technology. Tight budgets will be the dominating factor in federal IT procurement over the next several years -- at least ...
Federal Cloud Adoption, Part 1: Lots of Baby Steps ...
The U.S. government is learning quickly that achieving the next big thing in information technology depends upon implementing a huge number of little things. For federal IT managers, that big thing is the cloud ...
E-Commerce buzz words sound great in theory, but innovation often founders on the shoals of "getting there from here" as IT managers slog through the details of converting to new systems and programs ...
President Obama initiated an Open Government program on his second day in office, pledging to make government information more accessible to the public. ...
Information technology vendors seeking business from the federal government are well advised to keep an eye on the requirements of big agencies such as the Department of Justice or the Department of Homeland Security. Within big departments, there are big components -- such as the Food and Drug Administration or the Bureau of the Census. ...
Federal agencies will be moving significant portions of their annual IT spending to "commodity" type procurement vehicles by the end of 2012. As part of continuing reforms in IT acquisition and management, the White House Office of Management and Budget (OMB) has directed agencies to immediately begin the process of consolidating IT procurement, with a focus on shared service arrangements...
Managers of information technology systems in both the private and public sectors have had their hands full dealing with security breaches that come from hackers invading IT systems. Increasingly, however, IT systems are becoming vulnerable from another channel -- the actual supply chain sources of both hardware equipment and software programs ...
The market for mobile information technology will grow sharply in the next few years as employers increasingly embrace both "at home" telework solutions and the use of other remote access capabilities, including smartphones and tablets. In a February forecast on mobile data traffic, Cisco Systems predicted that such traffic will grow at a compound annual rate of 74 percent in the U.S. between 2011 and 2016. The compound annual rate over that period for smartphone traffic will be 110 percent; for tablets, 91 percent; and for laptops, 34 percent...
The notion that the U.S. government workforce is a huge, deskbound bureaucracy is the typical stereotype, but that vision is only part true. The federal workforce is huge, and it may be well be bureaucratic -- but federal workers are not always deskbound ...
Information technology leaders in the U.S. government have been promoting cloud technologies for more than a year. In December 2010, the federal chief information officer launched an IT reform plan that required agencies to start adopting cloud technologies. At the time, some agencies had already implemented cloud solutions, and since then many others have initiated cloud programs...
As the U.S. economy shows modest signs of recovering, and with forecasts for the overall information technology market also showing modest growth, vendors can at least count on one big customer to provide a steady stream of revenue for the next year or two: the U.S. government ...
Google has hired veteran lobbyist and former member of Congress Susan Molinari to represent the company. Molinari served as a Republican member of the House of Representatives from New York between 1990 and 1997. Since then, she has represented major businesses as a lobbyist ...
The Obama administration's program to modernize federal information technology operations is now in its second year, and the momentum for reform is continuing at a high level. ...
Federal agencies charged with improving the efficiency of information technology operations are embracing data consolidation, the cloud and mobile devices. One of the major factors involved in these efforts is the use of virtualization technologies that enhance the productivity of computer operating systems. ...
Identity theft and privacy breaches are reported almost daily. For example, on Jan. 23, two utilities in New York reported that an employee of a software contractor allowed unauthorized access to a database containing social security, date of birth and other information. There was no indication the records were misused, the utilities said. ...
The sharp growth in the use of smartphones and tablets has spurred the U.S. government to keep pace with the private sector in the use of mobile devices. ...
It's one thing to have a computer system at a major bank, retailer or government agency invaded by cybercriminals. At best, such hacking incidents cause minor annoyances, and at worst, they result in high-cost privacy invasions. ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide