Organizational leaders have access to an overwhelming amount of data, and it’s up to them to decide how much to use and when to use it.
Search Results for: Cloud
3 Problems With Learning Today
A few months ago, the Office of the Comptroller of the Currency, a bureau within the U.S. Department of the Treasury, asked me to deliver a presentation entitled, “The Agile, Resilient Leader.” The good news, I told them, was that I had been reading several great books on that subject and was enthusiastic about puttingRead… Read more »
Enhancing Mobility and Security for Healthcare IT
Creating a vision of health care technology that can support the health of all Americans in smart and efficient ways is no easy task. Though much progress has been made across the health IT market, several challenges still remain – everything from dealing with cybersecurity and interoperability issues to health care modernization and more.
Embracing FITARA to Drive IT Visibility and Cybersecurity
Under FITARA, the visibility and intelligence that CIOs are expected to have about their agencies’ IT domains will also inform their CISOs about where critical assets exist that require better defenses and where vulnerabilities exist that require remediation.
Securing the Future of Collaboration
Collaboration tools (e.g., instant messaging and presence, web conferencing, voice and unified messaging, mobility, and pervasive video) provide organizations, teams, and individuals the ability to “labor together” to achieve common desired outcomes in a more effective manner.
A Modern Approach to Improving Budgeting Efficiencies for Government Organizations
You are closer to a modern budgeting system than you might think.
Improving The End User Experience
Application intelligence provides deep insight into the application’s end-user experience by answering the question: How are users actually using and experiencing the application?
The 4 Envelopes: Transparent Project Management Part 3
What a federal PMO might look like within a reorganized Office of E-Government and Information Technology within the Office of Management and Budget.
The Security Challenges of Multiple Access Points
The proliferation of access points has added to the problem of keeping information safe. Now data is being accessed from remote work centers and employees’ homes or positions in the field, plus mobile devices and more. Here are four main access points to watch out for.
Using Application Intelligence Like Pirates
The increased use of applications has led to more complex IT environments as agencies adopt cloud, mobile, and virtual technologies. The complexity means that managing application performance is more challenging than ever. What agencies need is greater visibility into their applications, and application intelligence can help with that.