FedTech Magazine - Technology Solutions That Drive Government https://fedtechmagazine.com/rss.xml en DOD Designs Home-Grown Solutions to ID Management Matters https://fedtechmagazine.com/article/2018/11/dod-designs-home-grown-solutions-id-management-matters <span>DOD Designs Home-Grown Solutions to ID Management Matters</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 11/16/2018 - 07:53</span> <div><p>Defense Department CIO Dana Deasy <a href="https://fedtechmagazine.com/article/2018/09/dods-deasy-cac-will-be-here-while">made clear in September</a> that the Common Access Card “will remain the department’s principle authenticator for the foreseeable future.” </p> <p>CACs and personal identity verification cards have been the main federal solutions for identity management for years. While these proven authentication tools won’t disappear soon, but CACs and PIV cards are not the only solutions. Some agencies are <a href="https://fedtechmagazine.com/article/2018/11/creative-ways-authenticate-users-also-improve-cybersecurity">beefing up their identity management strategies</a> — and strengthening security in the process. Agencies whose employees work remotely turn to external cloud solutions and sophisticated key management systems to better control security.</p> <p>At the Pentagon, the CAC is a way of life. However, the department also has <strong>other authentication methods that augment it</strong>. </p> <p>DOD employees using government phones or tablets have to swipe their ID cards through portable smart card readers, which are easy to forget or misplace. </p> <p>To overcome that problem, the <a href="https://disa.mil/" target="_blank">Defense Information Systems Agency</a> developed <a href="https://iase.disa.mil/pki-pke/Pages/purebred.aspx" target="_blank">Purebred</a>, a key management server similar to the <strong>technology that supports mobile payment applications for smartphones.</strong></p> <p><a href="https://fedtechmagazine.com/article/2018/11/how-feds-can-get-most-ciscos-identity-service-engine" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Find out how feds can get the most from Cisco’s Identity Service Engine!</em></a></p> <h2 id="toc_0">How DOD Uses Purebred to Aid Authentication</h2> <p>Purebred stores user credentials as software certificates on mobile devices. About <strong>31,000 </strong>of DOD’s mobile devices now run it for access to unclassified systems. (A separate system authenticates users for access to classified networks via smartphones and tablets.)</p> <p><a href="https://www.army.mil/" target="_blank">U.S. Army</a> officials believe Purebred can improve security in several ways.</p> <p>“If a mobile user loses the Common Access Card, they have to go through the entire process of getting a new card,” says Rick Walsh, mobile program manager for the Army. “But if they lose a device with software tokens, they only lose a derivative of their credentials. <strong>We can start over without having to issue a brand-new CAC</strong>.” </p> <p>Because the Army assigns mobile devices to individual users, he adds, <strong>both the hardware and the user must be authenticated </strong>before someone can access a protected network. </p> <p>“If unauthorized people try to use the devices to access Army resources, they are blocked,” Walsh says. </p> <p>By contrast, when users share a common workstation in an Army office, CACs authenticate only the device credentials, making it possible for a user to buck security policies and loan a coworker a CAC and PIN to use. </p> <h2 id="toc_1">Agencies Pursue New Avenues for Identity Verification</h2> <p>DISA is considering making Purebred available to agencies outside of the Defense Department. Some civilian agencies use <strong>commercial products that rely on technology similar to the DISA solution</strong>. </p> <p>For example, the <a href="https://www.dea.gov/" target="_blank">Drug Enforcement Agency</a> and the <a href="https://www.fbi.gov/" target="_blank">FBI</a> have deployed <a href="https://www.cdwg.com/search/?key=HID%20Global%20ActivID&amp;searchscope=all&amp;sr=1" target="_blank">HID Global’s ActivID</a>, a security solution that uses derived credentials to authenticate users.</p> <p>“We see a fundamental shift in authorization techniques, from knowing a secret, like passwords or PINs, to using a multi-tude of factors related to someone’s identity and their operating environment,” says Jeremy Corey, DISA’s chief of cyber innovation and assured identity. “The latter is much more difficult for hackers to replicate.”</p> <p><img alt="Cybersecurity_IR_stayprotected_700x220%20(1).jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_stayprotected_700x220%20(1).jpg" /></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/alan-joch"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/jochphoto.jpg?itok=vT3N6nE7" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/alan-joch"> <div>Alan Joch</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=alanallegro&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Alan Joch has been an independent business and technology writer for more than a decade. His expertise includes server and desktop virtualization, cloud computing, emerging mobile applications, and cybersecurity.</p> </div> </p> </div> </div> </div> </div> Fri, 16 Nov 2018 12:53:27 +0000 phil.goldstein_6191 41831 at https://fedtechmagazine.com What to Do When the Cybersecurity Hiring Well Runs Dry https://fedtechmagazine.com/article/2018/11/what-do-when-cybersecurity-hiring-well-runs-dry <span>What to Do When the Cybersecurity Hiring Well Runs Dry </span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 11/14/2018 - 17:05</span> <div><p>The federal government is in hot competition with the private sector for potential cyberworkers. Agencies are <a href="https://fedtechmagazine.com/article/2018/11/agencies-should-think-creatively-find-cybersecurity-pros">testing unusual ways</a><strong> to stand above the crowd of public and private sector employers</strong> competing for a limited supply of professionals, using webinars, mentoring programs and <a href="https://www.youtube.com/" target="_blank">YouTube</a> to find them.</p> <p>Of the <strong>300,000</strong> cybersecurity positions open in the U.S., about <strong>13,000</strong> are in the public sector, according to <a href="https://www.cyberseek.org/" target="_blank">CyberSeek</a>, a <a href="https://www.nist.gov/itl/applied-cybersecurity/nice" target="_blank">National Initiative for Cybersecurity Education</a> online tool that collects jobs data.</p> <p>The private sector can attract people with salaries and benefits that the government can’t always match, so public sector recruiters need to be creative. Leave behind the stereotypes and assumptions about where workers might come from, says Karen Evans, former director of the <a href="https://www.uscyberchallenge.org/" target="_blank">U.S. Cyber Challenge.</a> </p> <p>“In a tough market, you’ve got to try alternative approaches,” she says.</p> <p>Here are candidate pools that are often overlooked, but shouldn’t be:</p> <p><strong><a href="https://fedtechmagazine.com/article/2018/11/bombarded-attacks-feds-learn-spot-malicious-email" target="_blank"><em>MORE FROM FEDTECH: </em></a></strong><a href="https://fedtechmagazine.com/article/2018/11/bombarded-attacks-feds-learn-spot-malicious-email" target="_blank"><em>Find out how agencies are stepping up their phishing defenses! </em></a></p> <h2 id="toc_0">Liberal Arts Majors Can Offer Soft Skills  </h2> <p>Candidates with an academic background in English, psychology, geography, political science and even philosophy can i<strong>nject a cybersecurity team with much-needed soft skills</strong>. </p> <p>These potential workers bring research experience, written and oral communication skills, practice in collaborative thinking and a passion for learning — talents that form the foundation of the <a href="https://www.careeronestop.org/competencymodel/competency-models/cybersecurity.aspx" target="_blank">Labor Department’s Cybersecurity Competency Model</a>.</p> <p>A primary example: <a href="https://www.fbcinc.com/e/nice/speakerpopup.aspx?id=Q6UJ9A017VBV" target="_blank">Tyson Meadors</a>, director of cybersecurity policy for the <a href="https://www.whitehouse.gov/nsc/" target="_blank">National Security Council</a>, has an English degree, which, he’s told audiences, comes in handy when explaining highly technical topics to nontechnical audiences.</p> <h2 id="toc_1">Veterans Bring Unique Cybersecurity Skills </h2> <p>They sometimes lack a four-year degree, but veterans bring unique skills and experiences that fit particularly well with cybersecurity work: <strong>technical aptitude, people skills, collaboration, time management, problem-solving, and the ability work under pressure and within a team</strong>.</p> <p>Veterans are also eligible to receive free cybersecurity training through the <a href="https://niccs.us-cert.gov/training/federal-virtual-training-environment-fedvte">Department of Homeland Security’s Federal Virtual Training Environment</a>. </p> <h2 id="toc_2">Agencies Can Recruit Current Students for Cybersecurity Work </h2> <p>Some of the most talented cybersecurity candidates <a href="https://fedtechmagazine.com/article/2017/11/teenage-hacker-gives-cybersecurity-advice-dod-and-other-agencies">aren’t even in college yet</a>. Agencies can identify talented high school and new college students through programs like <a href="https://www.sans.org/CyberStartUS" target="_blank">CyberStart</a>, a SANS Institute offering that helps identify and foster cyber talent at a young age, and the U.S. Cyber Challenge, which offers camps, competitions and internship placement.</p> <p>Shadow work days, internships and the <a href="https://www.sfs.opm.gov/" target="_blank">Office of Personnel Management’s Scholarship for Service</a> program can help sell young talent on the benefits of a career in public service and prepare them for that career at the same time, says Evans. </p> <h2 id="toc_3">Keep Cyberworkers Engaged Once They Are on Board </h2> <p>Once an agency has found a promising candidate, keeping that person is another thing altogether, says <a href="https://chcoc.gov/content/angela-bailey-0" target="_blank">Angela Bailey</a>, chief human capital officer for the Department of Homeland Security.</p> <p>She and her team have made keeping cyber talent happy as much of a priority as getting them on board. Their tactics include <strong>pay incentives, such as student loan repayment and bonuses for certification, job flexibility, and ever-changing projects and responsibilities</strong> that keep the job interesting.</p> <p>If someone does choose to leave, DHS makes a point to stay in touch. “We hope to eventually lure that person back after they’ve done something in the private sector or at another agency, because we believe this is a team sport and everyone benefits from well-experienced talent,” Bailey says.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank"><img alt="Cybersecurity_IR_stayprotected_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_stayprotected_700x220.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/heather-b-hayes"> <div>Heather B. Hayes</div> </a> </div> <div class="author-bio"> <p> <div><p>Heather B. Hayes has been covering technology, business and education topics for more than 20 years and has written more than 2,000 published articles. She lives in Virginia.</p> </div> </p> </div> </div> </div> </div> Wed, 14 Nov 2018 22:05:49 +0000 phil.goldstein_6191 41826 at https://fedtechmagazine.com Winter 2018 https://fedtechmagazine.com/magazine/issue/2018/11/winter-2018 <span>Winter 2018</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 11/14/2018 - 13:25</span> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/magazine/issue/2018/11/winter-2018" data-title="Winter 2018" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Nov</span> <span>14</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/magazine/issue/2018/11/winter-2018" data-title="Winter 2018" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fcm_mmc%3DVanity-_-Cisco-_-NA-_-NA%26zPage%3DProducts-e6c60130%26zContent%3DNetworking-and-Security---EN-b0cb3f11%26searchString%3Dexpandable-block-1%252Cexpandable-block-2%26cm_ven%3DSocialMedia%26cm_cat%3DSocial_Squad%26cm_pla%3DMKT18181adu0000P0000%26cm_ite%3DCisco" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/magazine/issue/2018/11/winter-2018" data-title="Winter 2018" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Wed, 14 Nov 2018 18:25:56 +0000 phil.goldstein_6191 41821 at https://fedtechmagazine.com Agencies Can Ward Off Ransomware with Simple Tactics https://fedtechmagazine.com/article/2018/11/agencies-can-ward-ransomware-simple-tactics <span>Agencies Can Ward Off Ransomware with Simple Tactics</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 11/14/2018 - 08:29</span> <div><p>Ransomware attacks this year come with a new twist: Not all attackers want the money.</p> <p>Instead, they’re using ransomware — malware that encrypts files and offers to decrypt, for a price — <strong>as a decoy while they launch other, potentially devastating attacks on a network</strong>.</p> <p>Federal agencies have been relatively successful in preventing the traditional forms of ransomware through diligent monitoring, but a watchful eye remains a requirement. The costs of an attack — for cleanup, lost productivity, reputational damage and expensive consulting contracts to security ­companies for forensic reports — can dwarf the amount of the ransom.</p> <p>Ransomware works because PCs can encrypt swaths of shared data valuable to the agency, but not all attacks end with negative results. Agencies that <strong>structure security properly can defang ransomware even if the system gets infected, no matter the motive</strong>.</p> <p><a href="https://fedtechmagazine.com/article/2018/11/bombarded-attacks-feds-learn-spot-malicious-email" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Find out how feds have stepped up their anti-phishing game! </em></a></p> <h2 id="toc_0">Agencies Need to Educate Employees on Ransomware Risks </h2> <p>Ransomware is the payload, but the attack almost always happens through <strong>social engineering</strong>: convincing someone to do something they shouldn’t, such as opening a file. One effective way to avoid ransomware is through an educated user community. No firewall or anti-malware tool will work as well as <strong>a smart user who won’t click on a ­suspicious link</strong>.</p> <p>No one message will catch all users, however, and no two users learn in the same way. To get the message across, <strong>employ multiple channels</strong>. A mandatory, short online course will catch some users; a screen saver that scrolls a reminder might catch a different group. A newsletter article might be helpful, but even better is a first-person story from a top executive about his or her personal experience with malware.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/joel-snyder"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/author/Joel_Studio_Headshot_180.jpg?itok=TYcy4rmk" width="58" height="58" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/joel-snyder"> <div>Joel Snyder</div> </a> </div> <div class="author-bio"> <p> <div><p>Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and author and is known for his unbiased and comprehensive tests of security and networking products. His clients include major organizations on six continents.</p> </div> </p> </div> </div> </div> </div> Wed, 14 Nov 2018 13:29:50 +0000 phil.goldstein_6191 41816 at https://fedtechmagazine.com A More Flexible Federal Workforce Will Stay on the Job Longer https://fedtechmagazine.com/article/2018/11/more-flexible-federal-workforce-will-stay-job-longer <span>A More Flexible Federal Workforce Will Stay on the Job Longer</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 11/13/2018 - 13:29</span> <div><p>Today’s federal employees go where the work takes them. Portable technology lets them stick to deadlines in the ­comfort of their own homes, and they’re able to conduct research in outer space.</p> <p>The government is leveraging this new flexibility, hoping to attract new IT employees who might have chosen the private sector, with its larger paychecks and infamously fun perks. For some, <strong>the chance to serve is a major attraction</strong>.</p> <p>That incentive becomes stronger as agencies adapt to what modern workers demand. As noted in “<a href="https://www.cdw.com/content/cdw/en/orchestration/modern-workforce.html" target="_blank">The Modern Workforce Insight Report”</a> by CDW, workers are <strong>using technology to make their jobs simpler and more efficient</strong> and, in the process, become better able to respond to customers.</p> <p>Technology that allows both employees and customers to fill out fewer forms, jump through fewer hoops to get information and achieve goals faster is slowly making its way into the federal system, boosting morale for workers used to running legacy equipment.</p> <h2 id="toc_0">Agencies Use Tech to Help Feds Work More Efficiently </h2> <p><strong>Data analytics tools</strong>, such as those discussed in “<a href="https://fedtechmagazine.com/article/2018/11/feds-embrace-data-visualization-analyze-complex-information">Feds Embrace Data Visualization to Analyze Complex Information</a>,” create new ways to examine information so that employees can see formerly invisible patterns and, from them, find better ways to do their job. The <strong>videoconferencing</strong><strong> technologies </strong>described in “<a href="https://fedtechmagazine.com/article/2018/11/agencies-reach-outside-beltway-through-video">Agencies Reach Outside the Beltway Through Video</a>,” provide ways for workers to reach out to customers who can’t get to a physical office.</p> <p>Agencies are eagerly pursuing these new solutions, not only to work better and more efficiently, not just to improve the relationship with their primary customers, but also to keep talented workers in-house once they’re hired. <strong>More than one-third </strong>of government cybersecurity positions are open at any given time — slightly more than in the private sector — according to <a href="https://www.cyberseek.org/" target="_blank">CyberSeek</a>, an online provider of interactive job search tools and employment data.</p> <p>The ability to connect with other agencies and with customers in creative ways may give federal cyberworkers a reason to stay on for the long run. The push to innovate and modernize, supported by the <a href="https://www.whitehouse.gov/wp-content/uploads/2018/03/The-President%E2%80%99s-Management-Agenda.pdf" target="_blank">President’s Management Agenda</a>, is also an impetus for those workers to stay.</p> <p>Upgrading technology provides benefits beyond efficient workflow. It <strong>gives workers the flexibility to do what they need to do</strong>, wherever they need to do it, and creates an atmosphere that encourages them to stay.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/modern-workforce.html" id="" rel="" target="_blank" title=""><img alt="ModernWorkforce_IR_700x220_theoffice_0.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/ModernWorkforce_IR_700x220_theoffice_0.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/ryan-petersen"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/ryan-petersen-2013-headshot.jpg?itok=iV6msfy0" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/ryan-petersen"> <div>Ryan Petersen</div> </a> <a target="_blank" class="google-plus" href="https://plus.google.com/110888965639568833839/posts?rel=author"><span>Google+</span></a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=RyanPete&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Ryan has been a magazine and newspaper editor for 18 years, with the last 12 covering a variety of bases for CDW’s family of tech magazines. As Editor in Chief, he works on developing editorial strategy and is always on the lookout for new writing talent and sharing great stories with the IT world. In his spare time, Ryan enjoys spending time with his family, biking and obsessively following Iowa Hawkeye sports and Cubs baseball.</p> </div> </p> </div> </div> </div> </div> Tue, 13 Nov 2018 18:29:15 +0000 phil.goldstein_6191 41811 at https://fedtechmagazine.com Imagine Nation ELC 2018: HUD and GSA Discuss Factors in Cloud Migration for Federal Agencies https://fedtechmagazine.com/media/video/imagine-nation-elc-2018-hud-and-gsa-discuss-factors-cloud-migration-federal-agencies <span>Imagine Nation ELC 2018: HUD and GSA Discuss Factors in Cloud Migration for Federal Agencies</span> <div><p>The U.S. Department of Housing and Urban Development is migrating applications from a legacy mainframe, and the agency is weighing its modernization options. HUD Principal Deputy CIO Kevin Cooke discusses factors HUD is considering in its migration strategy, including the benefits of cloud services. GSA Secure Cloud Portfolio Director Jay Huie describes how federal agencies like HUD consult his agency to receive guidance on potential cloud migration projects.</p> <p>Check out more of our coverage from <a href="https://fedtechmagazine.com/imagine-nation-elc-2018" target="_blank" title="FedTech Imagine Nation ELC 2018">Imagine Nation ELC 2018</a> here.</p> <p> </p> </div> <span><span lang="" about="/user/95421" typeof="schema:Person" property="schema:name" datatype="">Mickey_McCarter_qjsu</span></span> <span>Tue, 11/13/2018 - 13:17</span> <div> <div>Tweet text</div> <div>.@HUDgov is pondering a modernization strategy that may include cloud migration. Here&#039;s what officials from HUD and @USGSA have to say about things to consider when federal agencies assess cloud services #cloud #ImagineNationELC </div> </div> <div> <div>Video ID</div> <div><p>1734112503</p> </div> </div> <div> <div>video type</div> <div><a href="/taxonomy/term/7396" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25515</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Cloud</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/media/video/imagine-nation-elc-2018-hud-and-gsa-discuss-factors-cloud-migration-federal-agencies" data-title=".@HUDgov is pondering a modernization strategy that may include cloud migration. Here's what officials from HUD and @USGSA have to say about things to consider when federal agencies assess cloud services #cloud #ImagineNationELC" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Nov</span> <span>13</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/media/video/imagine-nation-elc-2018-hud-and-gsa-discuss-factors-cloud-migration-federal-agencies" data-title=".@HUDgov is pondering a modernization strategy that may include cloud migration. Here's what officials from HUD and @USGSA have to say about things to consider when federal agencies assess cloud services #cloud #ImagineNationELC" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/media/video/imagine-nation-elc-2018-hud-and-gsa-discuss-factors-cloud-migration-federal-agencies" data-title=".@HUDgov is pondering a modernization strategy that may include cloud migration. Here's what officials from HUD and @USGSA have to say about things to consider when federal agencies assess cloud services #cloud #ImagineNationELC" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fcm_mmc%3DVanity-_-Cisco-_-NA-_-NA%26zPage%3DProducts-e6c60130%26zContent%3DNetworking-and-Security---EN-b0cb3f11%26searchString%3Dexpandable-block-1%252Cexpandable-block-2%26cm_ven%3DSocialMedia%26cm_cat%3DSocial_Squad%26cm_pla%3DMKT18181adu0000P0000%26cm_ite%3DCisco" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"> We have had a number of conversations with GSA on cloud transformation, looking at application rationalization and trying to see what makes sense in terms of going to the cloud. </a></p> <img src="/sites/fedtechmagazine.com/files/styles/photo_quote_thumb/public/2018-11/KevinCooke1.jpg?itok=pmgkXTgM" width="60" height="60" alt="Kevin Cooke" typeof="foaf:Image" /> <p class='speaker'> <span>Kevin Cooke</span> Principal Deputy CIO, HUD </p> </div> </div> Tue, 13 Nov 2018 18:17:43 +0000 Mickey_McCarter_qjsu 41801 at https://fedtechmagazine.com Q&A: IT Expert Dave Powner Marks His Final FITARA Scorecard https://fedtechmagazine.com/article/2018/11/qa-it-expert-dave-powner-marks-his-final-fitara-scorecard <span> Q&amp;A: IT Expert Dave Powner Marks His Final FITARA Scorecard</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 11/13/2018 - 11:34</span> <div><p>The <a href="https://www.congress.gov/113/plaws/publ291/PLAW-113publ291.pdf" target="_blank">Federal Information Technology Acquisition Reform Act</a> calls for a semiannual rating of agencies’ IT modernization status. The report card covers several areas, including data center optimization, portfolio review, CIO authority and the use of working capital funds. </p> <p>In his role as director of IT management issues at the <a href="https://www.gao.gov/" target="_blank">Government Accountability Office</a>, Dave Powner outlined the results for Congress and the public, detailing where agencies still need to improve. <a href="https://www.fedscoop.com/dave-powner-gao-leaving-august/" target="_blank">As he enters the private sector</a> after 16 years with the GAO, Powner reflects on the scorecard’s value with <em>FedTech</em>. </p> <p><a href="https://fedtechmagazine.com/article/2018/10/fitara-2018-tech-and-policies-agencies-need-comply-perfcon" target="_blank"><em><strong>MORE FROM FEDTECH: </strong> Find out how agencies can best comply with FITARA in 2018! </em></a></p> <h2><strong style="color: #c74037;">FEDTECH: </strong>Why was FITARA necessary in the first place? </h2> <p><strong>POWNER:</strong> The main reason was to <strong>elevate the role of the CIO</strong>. Often, CIOs have the responsibility without the appropriate authority to carry it out. What happens when there is a big failure or a security breach? Who gets called in front of Congress? The head of the agency and the CIO, and that’s potentially who ends up getting let go. But do they have the authority to secure and oversee everything? Not always.</p> <h2><strong style="color: #c74037;">FEDTECH: </strong>Who was in charge if the CIO wasn’t? </h2> <p><strong>POWNER: </strong>The business side would be responsible for the IT. There are many examples like that, too many. What you want to do is put the security and the technology under the CIO, and let the CIO effectively manage those things. We would be better off as a government if we had that — you’d get the right governance over the technology. Probably the worst-case example was the Coast Guard’s electronic health record failure, where the CIO was not part of the governance team. <strong>You really want IT people associated with the technology and security.</strong></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11291"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/2016-04-08%2016.05.48.jpg?itok=eGeZcR1m" width="58" height="58" alt="Elizabeth Neus " typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11291"> <div>Elizabeth Neus </div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=e_neus&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Elizabeth Neus is the managing editor of<em> FedTech</em>. Before joining <em>FedTech</em>, Elizabeth was a reporter for Gannett, covering health care policy and medicine. As a Gannett editor, she worked on publications and magazines focusing on everything from defense to agriculture to travel to shopping. The Washington Nationals are her team; 80s Brit pop is her sound.</p> </div> </p> </div> </div> </div> </div> Tue, 13 Nov 2018 16:34:09 +0000 phil.goldstein_6191 41796 at https://fedtechmagazine.com How NSF, NASA, State Keep Tech Working for Far-Flung Employees https://fedtechmagazine.com/article/2018/11/how-nsf-nasa-state-keep-tech-working-far-flung-employees <span>How NSF, NASA, State Keep Tech Working for Far-Flung Employees</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 11/12/2018 - 09:41</span> <div><p>When researchers go outside in Antarctica during winter, they must bundle up from head to toe to protect themselves — and their mobile devices as well — against the frigid cold.</p> <p>“The standard operating procedure for electronic cameras, smartphones and tablets is to keep them under one’s parka to stay warm. Pull them out long enough to use, and then put them back,” says Patrick D. Smith, manager of technology development and polar research support at the <a href="https://www.nsf.gov/" target="_blank">National Science Foundation</a>.</p> <p>Not all government workers in need of modern technology sit behind desks in air-conditioned offices.<strong> Some work in distant and potentially hostile locations:</strong> in foreign countries at war, at the North and South Poles and even in space.</p> <p>Federal IT leaders <strong>supply these remote workers with the basic IT services, technology and support they need</strong>, despite their distance and lack of accessibility. When traditional broadband and phone service are not available, agencies provide users with <strong>satellite internet access and deploy IP phone systems in those faraway locations.</strong></p> <p>They use remote management tools to troubleshoot IT equipment and <strong>take advantage of cloud services</strong>, which give remote users access to necessary applications while reducing the amount of technology infrastructure to manage.</p> <p>“There’s technology that makes it easier to do things remotely, but there are some physical limitations you can’t overcome,” says Linda Cureton, CEO of IT consulting firm <a href="http://www.muse-technologies.com/" target="_blank">Muse Technologies</a> and former CIO of NASA.</p> <p><a href="https://www.nasa.gov/" target="_blank">NASA</a> officials provide technical guidance to the International Space Station, orbiting 240 miles above Earth, but the astronauts must <a href="https://fedtechmagazine.com/article/2018/10/how-nasa-helps-astronauts-print-space">fix printer jams</a> or install new equipment themselves. </p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/wylie-wong"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/wylie-wong.jpg?itok=gph_Y-uT" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/wylie-wong"> <div>Wylie Wong</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=WylieWong&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Wylie Wong is a freelance journalist who specializes in business, technology and sports. He is a regular contributor to the CDW family of technology magazines.</p> </div> </p> </div> </div> </div> </div> Mon, 12 Nov 2018 14:41:40 +0000 phil.goldstein_6191 41791 at https://fedtechmagazine.com Agencies Should Think Creatively to Find Cybersecurity Pros https://fedtechmagazine.com/article/2018/11/agencies-should-think-creatively-find-cybersecurity-pros <span>Agencies Should Think Creatively to Find Cybersecurity Pros</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 11/09/2018 - 10:24</span> <div><p>There was a time when the <a href="https://www.dhs.gov/" target="_blank">Department of Homeland Security</a> tried to fill vacant cybersecurity positions with the “post and pray” approach, says Angela Bailey, the agency’s chief human capital officer.</p> <p>“We posted everything to <a href="https://www.usajobs.gov/" target="_blank">USAJobs­.gov</a> and prayed that the best possible candidate just happened to read it,” she explains.</p> <p>No longer.</p> <p><strong>“Now we go straight to where the talent is,” </strong>Bailey says. The agency has developed proactive, highly targeted recruiting to chase passive applicants, “the ones that didn’t even know they wanted to work for us.”</p> <p>Of the <strong>300,000</strong> cybersecurity positions open in the U.S., about <strong>13,000</strong> are in the public sector, according to <a href="https://www.cyberseek.org/" target="_blank">CyberSeek</a>, a <a href="https://www.nist.gov/itl/applied-cybersecurity/nice" target="_blank">National Initiative for Cybersecurity Education</a> (NICE) online tool that collects employment data.</p> <p>Competition is high for qualified candidates, so <strong>agencies are testing unusual ways to stand above the crowd of public and private sector employers</strong> competing for a limited supply of professionals, using webinars, mentoring programs and <a href="https://www.youtube.com/" target="_blank">YouTube</a> to find them.</p> <p><strong><a href="https://fedtechmagazine.com/article/2018/11/bombarded-attacks-feds-learn-spot-malicious-email" target="_blank"><em>MORE FROM FEDTECH: </em></a></strong><a href="https://fedtechmagazine.com/article/2018/11/bombarded-attacks-feds-learn-spot-malicious-email" target="_blank"><em>Find out how agencies are stepping up their phishing defenses! </em></a></p> <h2 id="toc_0">Agencies Must Understand the Changing Cybersecurity Job Market</h2> <p>The challenge has grown more difficult over the past several years, according to Karen Evans, former national director of the <a href="https://www.uscyberchallenge.org/" target="_blank">U.S. Cyber Challenge</a>, a DHS-supported program designed to enhance the size and quality of the cybersecurity workforce.</p> <p>“There is a whole different set of skills that you need to have today,” Evans says, including knowledge of <strong>cloud security architecture and familiarity with the Internet of Things</strong>. “The question is, how do you know what skills you actually need to have? I think that’s where everybody really is struggling right now.”</p> <p>This new reality means that agencies must be <strong>pragmatic and innovative in their efforts to identify, attract, hire and keep talented personnel</strong>.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/heather-b-hayes"> <div>Heather B. Hayes</div> </a> </div> <div class="author-bio"> <p> <div><p>Heather B. Hayes has been covering technology, business and education topics for more than 20 years and has written more than 2,000 published articles. She lives in Virginia.</p> </div> </p> </div> </div> </div> </div> Fri, 09 Nov 2018 15:24:39 +0000 phil.goldstein_6191 41771 at https://fedtechmagazine.com Data Migration Process: How Agencies Can Successfully Move Data to Modern Systems https://fedtechmagazine.com/article/2018/11/data-migration-process-how-agencies-can-successfully-move-data-modern-systems-perfcon <span>Data Migration Process: How Agencies Can Successfully Move Data to Modern Systems</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 11/09/2018 - 09:57</span> <div><p>The Trump administration’s new “<a href="https://fedtechmagazine.com/article/2018/09/white-house-unveils-new-cloud-smart-strategy">Cloud Smart</a>” strategy encourages federal agencies to continue moving data to the cloud. The strategy also notes that data migration planning is an essential element of such moves.</p> <p>“Cloud technology adoption requires that agencies prioritize migration planning, sustainment, and organizational maturity in order to realize the full benefit of these services,” <a href="https://cloud.cio.gov/strategy/" target="_blank">the strategy states</a>. </p> <p>Yet for data migrations to be successful, agency IT teams need to<strong> rigorously plan out such migrations</strong>, consider their scope, examine the agency’s existing infrastructure and data, and <strong>determine how data will be structured once it’s moved into a more modern architecture</strong>. Such processes need to be deliberate and involve strong IT governance as well as technology, experts say.</p> <p>“You can’t possibly pick up all of your infrastructure, applications and data and move it to the cloud overnight,” <a href="https://www.accenture.com/us-en/company-dave-mcclure" target="_blank">says Dave McClure</a>, the principal director of Accenture Federal Services, who leads its CIO leadership agenda. “It’s a multiyear adventure, if you will.”</p> <p><a href="https://fedtechmagazine.com/article/2018/10/fitara-2018-tech-and-policies-agencies-need-comply-perfcon" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Discover how agencies should approach FITARA compliance in 2018!  </em></a></p> <h2 id="toc_0">How Can Agencies Successfully Undertake Data Migrations?</h2> <p>There are numerous questions agency IT leaders should ask themselves and their staff when undertaking a data migration process. As Valeh Nazemoff, executive vice president and co-owner of Acolyst, a business technology performance management consulting firm, <a href="https://fcw.com/articles/2015/05/07/comment-big-data-6-questions.aspx" target="_blank">notes in <em>FCW</em></a>, these include asking why the data needs to be migrated, what it’s currently used for and which staff will be involved.</p> <p>Additionally, Nazemoff says, agencies should consider the timing of a migration, <strong>where the data should go once it is moved and how it will be migrated</strong>.</p> <p>McClure, <a href="https://www.linkedin.com/in/damcclure/" target="_blank">who was formerly</a> the associate administrator of citizen services and innovative technologies at the General Services Administration, agrees, and says most agencies need to consider the target for migration of legacy databases into the cloud and <strong>why that is necessary.</strong> “What is that going to get us?” he says. “Is it getting us more cost savings? Is it getting us better security because it’s more secure? Is it getting us better performance so that mission side is happier with the process tools and service delivery tools that are available in the cloud environment?”</p> <p>Once agencies get a handle on the scope of their migrations and why they want to move data, they should <strong>collect critical infrastructure and application data</strong>. That will help them determine whether data is structured or unstructured and if it is embedded in legacy proprietary systems, McClure says.</p> <p>“What is the data that I need to move and why? Just having those strategy discussions about that is pretty important,” he says.</p> <p>Agencies should also undertake a <strong>deep analysis of the value stream, cost savings and performance improvement that come from moving specific applications to the cloud</strong>, he adds. That enables agencies to develop a roadmap of what is going to be moved, when, how and why.</p> <p><a href="https://fedtechmagazine.com/article/2018/10/imagine-nation-elc-2018-use-government-data-innovation-possible-revenue" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Find out how agencies can use government data to drive innovation! </em></a></p> <h2 id="toc_1">The Types of Data Migration for Agencies to Consider</h2> <p>There are several different kinds of data migrations agencies can undertake. Here is a quick breakdown on a few of the major ones:</p> <ul><li><strong>Cloud Migration: </strong>Agencies undertaking cloud migration usually do so because it grants them higher reliability and greater availability of their data, McClure notes. Legacy systems put agencies in danger, <a href="https://fedtechmagazine.com/article/2018/10/how-feds-can-address-legacy-it-achieve-it-modernization" target="_blank">according to a recent Accenture survey of 185 federal IT executives</a>; <strong>58 percent </strong>of those surveyed say their agencies experienced two to three major disruptions or outages over the past decade, and <strong>just 4 percent</strong> avoided any discontinuities within that time frame. Agencies also move data to the cloud for greater security protections than exist with legacy systems, in part because cloud service providers continuously update security protections. Compute power is also relatively inexpensive, delivering cost savings, McClure notes. And cloud enables agencies to <strong>achieve compliance goals and increase transparency in reporting on their data</strong>. <p></p> <p> The biggest fears with cloud migration are <strong>data loss and a lack of interoperability among different cloud platforms</strong>. “How easily does that data reconcile and become transferrable back to another system? What guarantee do I have that it’s actually my data and that it’s not infiltrated with other data as well?” McClure says. Agencies also need to contend with potential cloud service disruptions and costs associated with new cloud services.</p> </li> <li><strong>Database Migration:</strong> With database migrations, agencies often need to <strong>overcome the challenge of data stored in proprietary systems with embedded logic and rules around its use</strong>. “The movement of a database to a cloud environment may not be as seamless as one expects if you don’t understand how that data and those business rules and logic will behave when they move to an entirely different infrastructure and entirely different way of storing and computing data,” McClure says. <p></p> <p> Agencies should ensure that new databases have a track record of being able to perform just as well or better than what was in place before. In many cases, databases are not transferable to the cloud, McClure warns, meaning agencies <strong>need to figure out new database systems or cloud applications</strong> that can perform the same functions more efficiently. </p> </li> <li><strong>Application Migration: </strong>The “lift and shift” migration of applications to the cloud from traditional data centers is often difficult, McClure says, and agencies often need to<strong> re-architect apps in cloud environments</strong>. Accenture recommends to federal clients that they also consider <strong>moving nonproduction environments to the cloud</strong> because they tend to have less migration complexity and often account for a large chunk of an agency’s IT budget. Doing so gives agency IT teams experience with the cloud without having to move core operating systems or mission apps first. <p></p> <p> Agencies may need to renew old software, McClure says, and in some cases, software may no longer be supported. If that is the case, it may make more sense to look for a Software as a Service solution that can replace existing software.</p> </li> </ul><h2 id="toc_2">What Is Data Migration Testing and Why Is It Important?</h2> <p><a href="https://www.softwaretestinghelp.com/data-migration-testing/" target="_blank">According to the Software Testing Help blog</a>, data migration testing involves “a verification process of migration of the legacy system to the new system with minimal disruption/downtime, with data integrity and no loss of data, while ensuring that all the specified functional and non-functional aspects of the application are met post-migration.”</p> <p>Essentially, agencies need to undertake a<strong> health assessment on whether apps and data are fit for the cloud or other new environments</strong>, McClure says. Agencies need to look at technical issues, as well as those related to migration costs, risks, business values, and complexity of the transfer and re-orchestrating of the data to work in cloud environments.</p> <p>Such data migration testing is designed to give agencies a clear sense of the relative complexity or simplicity of moving data. McClure says agencies should not begin any data migration until they perform that analysis, which Accenture dubs a Fit for Cloud Assessment. </p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-report.html" target="_blank"><img alt="Digital%20Transformation_IR_1%20(1).jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Digital%20Transformation_IR_1%20(1).jpg" /></a></p> <h2 id="toc_3">Data Migration Tools Agencies Can Use</h2> <p>There is no shortage of tools for agencies to examine their infrastructure and data. Unfortunately, McClure says, agencies often do not have a complete picture of their infrastructure, apps and data. Once that inventory is done, data migration becomes more doable, according to McClure, and “the roadmap of what is moved when, where, why and how becomes easier to decipher.”</p> <p>Agencies often have a lot of “dark” data that is unknown to IT teams and departments wide reporting mechanisms. To get a handle on their data, agencies can turn to <strong>extraction, transformation </strong><strong>and</strong><strong> loading (ETL) tools</strong>, which are often associated with data warehouses. Such tools are designed to extract, examine and clean data, and learn how it is being used.</p> <p><a href="https://www.cdwg.com/content/cdwg/en/brand/ibm.html" target="_blank">IBM</a>, <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoft-interstitial.html" target="_blank">Microsoft</a>, <a href="https://www.cdwg.com/content/cdwg/en/brand/oracle.html" target="_blank">Oracle</a> and <a href="https://www.cdwg.com/search/?b=crd'" target="_blank">SAP</a> are among the key ETL vendors, McClure says. Other vendors, such as <a href="https://www.cdwg.com/search/?key=powercenter&amp;searchscope=all&amp;sr=1" target="_blank">Informatica</a>, <a href="https://www.cdwg.com/search/?key=qlik&amp;ctlgfilter=&amp;searchscope=all&amp;sr=1" target="_blank">Qlik</a> and <a href="https://www.cdwg.com/content/cdwg/en/brand/netapp.html" target="_blank">NetApp</a>, offer similar tools.</p> <p><a href="https://searchitchannel.techtarget.com/feature/Top-five-data-migration-tools" target="_blank">As TechTarget notes</a>, there are also <strong>several categories of file migration tools</strong>, including host-based file-level migration; host-based block-level migration; network-based file-level migration; network-based block-level migration; and array-based block-level migration.</p> <p>No matter the tool, McClure says, agencies need to understand the data they want to move and why, and then do so in a way that minimizes risk and addresses the most common issues associated with remediation problems: changing from one database scenario to another or one infrastructure or application set to another. </p> <p>“It requires that careful analysis so that the risk factors are lowered and the chances of success are tremendously improved,” he says.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Fri, 09 Nov 2018 14:57:53 +0000 phil.goldstein_6191 41766 at https://fedtechmagazine.com