Learn about five steps your public sector agency can take to reduce ransomware and other cybersecurity attacks on Carahsoft's Community Blog.Read Article »
October 3rd, 2014
Recent events reminded government & industry of the real & dangerous consequences of insider threats. A cleared, trusted individual inside a government agency was able to gain access to highly sensitive and privileged information with severely damaging results.
October 1st, 2014
For many states, IT consolidation has been one way to achieve economies of scale that allow valued IT services to continue despite decreased budgets, hiring freezes, and limitations on purchasing. In Pennsylvania, state leaders were well positioned to achieve these types of cost benefits, as the commonwealth has been pioneering consolidation for years.
September 29th, 2014
It’s been two years since OMB’s Digital Government Strategy and nearly four years since the passage of the Telework Enhancement Act of 2010. Is the Federal government making the grade in mobility and telework or is it barely passing?
September 25th, 2014
Today, when we talk about citizen engagement, we’re no longer just referencing public forums or printed flyers. Digital is where everything is heading.
September 23rd, 2014
EMC Isilon’s Federal Market CTO, Audie Hittle, recently shared his insights on how big data initiatives are transforming government. According to Hittle, identifying insights from data, regardless of size, is the common thread across agencies.
September 19th, 2014
Kimberly Hancher has been a contributing member of the Federal Information Technology (IT) community for over 25 years. She began her career at the Department of Veterans Affairs managing technical support for mainframes, minicomputers, and local area networks supporting over 10,000 users. In addition, Mrs. Hancher managed large-scale software development activities, hardware and software deployments, and inter-agency data exchange projects.
September 17th, 2014
Securing sensitive data in the age of Big Data and the Internet Cloud is difficult. Because the average time to discover a breach made by an insider is 200 days, often the extent of the damage is never fully known.
September 15th, 2014
Since 2007, U.S. Army Corps of Engineers has been using georeferenced PDF files as a way to distribute NGA standard map products for demand-based replication. The small size (2-9 MB) makes it possible to disseminate the files across the Internet even with low bandwidth. The files support the distributed printing concept and enables customers to use local plotters to create standard products on demand.
September 12th, 2014
Thanks to open source software, citizens are now able to track bills, contact representatives & get involved with their community with the click of a button.