FedTech - Technology Solutions That Drive Government https://fedtechmagazine.com/rss.xml en How to Break the Cultural Logjam on Federal Cloud Adoption https://fedtechmagazine.com/article/2018/04/How-to-Break-the-Cultural-Logjam-on-Federal-Cloud-Adoption <span>How to Break the Cultural Logjam on Federal Cloud Adoption</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-FCW-Cloud.jpg" width="1440" height="560" alt="John Everett of the Veterans Affairs Department " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 04/19/2018 - 13:24</span> <div><p>The White House wants agencies to <a href="https://fedtechmagazine.com/article/2017/12/white-house-releases-final-it-modernization-report">accelerate their adoption of commercial cloud capabilities</a>, and <a href="https://fedtechmagazine.com/article/2018/03/usdas-sheridan-cloud-way-out-infrastructure-death-spiral">numerous agencies</a> have <a href="https://fedtechmagazine.com/article/2018/03/navy-plans-complete-massive-cloud-migration-2021">gotten the message</a>. The problem that seems to get in the way though is a persistent one: cultural resistance to cloud migration.</p> <p>How can agencies overcome <a href="https://fedtechmagazine.com/article/2018/01/culture-change-sits-heart-successful-cloud-deployments">that hurdle</a>? Federal cloud leaders say that those who want to push their agencies to adopt cloud technologies need to <strong>educate agency IT leaders, reassure them about cloud security</strong> and minimize the influence of people who don’t see value in changing, in part by<strong> demonstrating “quick wins” in the cloud</strong>.</p> <p>Those were some of the key takeaways from keynote and panel discussions at <em>FCW</em>’s <a href="https://fcw.com/cloud" target="_blank">Cloud Summit: Accelerating Cloud Adoption in Government event</a> on April 18 in Washington, D.C.</p> <p><a href="https://www.linkedin.com/in/john-p-everett-b921763b" target="_blank">John Everett</a>, executive director for demand management in the Office of Information and Technology at the Veterans Affairs Department, says that many federal IT leaders and IT offices still think of cloud as purely an Infrastructure as a Service play, something that will get them out of their data centers and allow them to avoid thinking about space, power and cooling. Obviously, cloud is more than that, and includes Platform and Software as a Service implementations.</p> <p>The goal of cloud proponents in government, he said, is to<strong> “help move our culture from the stagnant one it is </strong><strong>in to</strong><strong> one that is vibrant and useful for our government organizations.”</strong></p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Cultural Hurdles to Government Cloud Adoption</h2> <p>Many IT leaders are still operating in the “culture of the unknown,” Everett said, in which they do not have a detailed understanding of their agency’s applications or systems or how they fit together. Agencies’ organizational cultures are often focused on their key IT systems and cloud is still not a priority, he said.</p> <p>A key stumbling block to cloud adoption is <strong>a lack of buy-in from agency leadership and key stakeholders</strong>, according to Everett. “If your leadership doesn’t understand cloud, they will be less likely to make decisions in your favor,” he said. “Leadership needs to be educated on what the possibilities are and how the cloud actually works.”</p> <p>Additionally, it is often difficult to move agencies from a capital expenditure model, in which agencies make outlays for servers and data center equipment, to an operational expense model suited to the cloud, <strong>in which agencies pay for what they use in terms of computing, storage </strong><strong>and</strong><strong> networking</strong>.</p> <p>Security is a major issue that agencies need to overcome, officials said. “If we don’t get a handle on that up front and make that a key part of the culture change, then we’ll never get that done,” Everett said.</p> <p><a href="https://www.linkedin.com/in/johnehale" target="_blank">John Hale</a>, chief of cloud services at the Defense Information Systems Agency, noted that<strong> security is a “huge concern” </strong>Defense Department officials have about the cloud. “It goes back to culture,” he said. “People don’t understand the security profile of a commercial cloud.”</p> <p>Hale noted that for a cloud service provider to work with the DOD, they first must get an authorization from the <a href="https://www.fedramp.gov/" target="_blank">Federal Risk and Authorization Management Program</a>, and then get a <a href="https://www.disa.mil/newsandevents/2016/dod-cloud-provisional-authorizations" target="_blank">DOD Cloud Provisional Authorization</a>. Hale noted that DOD builds on the FedRAMP certification and performs another “assessment to meet additional controls for housing DOD data,” Hale said. The additional certification <strong>should tell DOD IT leaders that the commercial cloud offering is certified to store agency data</strong>, he said.</p> <h2>How Agencies Can Make Headway on Cloud Migration</h2> <p>Everett said cloud proponents must find ways to minimize the influence of people who “don’t want change or don’t see value in the cloud” and who “keep the culture from moving forward.”</p> <p>Cloud supporters should actively communicate the benefits of the cloud: i<strong>ts lower costs, ability to be updated quickly and elasticity to accommodate different levels of computing and storage demands</strong>.</p> <p>Agencies should aim to <strong>minimize “server huggers” </strong>and their contractor support. And a great way to overcome resistance is to demonstrate quick wins, Everett said.</p> <p>Everett said a way to have the cloud gain favor in an agency is to clearly demonstrate the return on investment from a cloud migration. He cited a Vets.gov application that used to run in a VA data center but became the first native cloud app the VA used. “As soon as it went into the cloud<strong> we saw an 85 percent reduction in cost</strong> over what we were spending in a data center,” he said. There are roughly 358,000 regular users of that application, according to Everett and half of the VA’s healthcare apps run through the original app. Everett said it used to take the VA 90 days to make a change to the core app and now it takes about a day.</p> <p><a href="https://www.linkedin.com/in/edsimcox/" target="_blank">Ed Simcox</a>, deputy CTO of the Health and Human Services Department, said HHS has numerous cloud initiatives going on and has earned some quick cloud wins, including <strong>moving to DevOps environments</strong> for specific purposes that were very vendor-centric. That is the way a lot of agencies “are dipping their toe in the pool, per se,” he said.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Cloud</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/How-to-Break-the-Cultural-Logjam-on-Federal-Cloud-Adoption" data-title="#IT leaders from @DeptVetAffairs @USDISA and @HHSGov explain how to overcome cultural barriers to #cloud adoption. #fcwcloud #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/How-to-Break-the-Cultural-Logjam-on-Federal-Cloud-Adoption" data-title="#IT leaders from @DeptVetAffairs @USDISA and @HHSGov explain how to overcome cultural barriers to #cloud adoption. #fcwcloud #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/How-to-Break-the-Cultural-Logjam-on-Federal-Cloud-Adoption" data-title="#IT leaders from @DeptVetAffairs @USDISA and @HHSGov explain how to overcome cultural barriers to #cloud adoption. #fcwcloud #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>19</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> <div> <div>Performance marketing flag</div> <div>Off</div> </div> <div> <div>Tweet Text 3</div> <div>How #FedIT can get around server huggers and move to the #cloud. @DeptVetAffairs @USDISA and @HHSGov #IT leaders offer advice. #GovIT </div> </div> <div> <div>Tweet Text 2</div> <div>How #FedIT leaders can overcome cultural barriers to #cloud adoption. Hear advice from @DeptVetAffairs @USDISA and @HHSGov </div> </div> <div> <div>Shortened Url</div> <div>http://tech.mg/2i5DLS</div> </div> Thu, 19 Apr 2018 17:24:31 +0000 phil.goldstein_6191 40696 at https://fedtechmagazine.com Feds Can Turn to New Kinds of IT Infrastructure to Get Ahead of the Curve https://fedtechmagazine.com/article/2018/04/Feds-Can-Turn-to-New-Kinds-of-IT-Infrastructure-to-Get-Ahead-of-the-Curve <span>Feds Can Turn to New Kinds of IT Infrastructure to Get Ahead of the Curve</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-ITTransformation.jpg" width="1440" height="560" alt="Data Center servers " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 04/18/2018 - 09:21</span> <div><p>Federal agencies have a mountain of <a href="https://fedtechmagazine.com/article/2018/04/How-Feds-Can-Secure-Legacy-IT-Systems" target="_blank">legacy IT systems they are eager to upgrade</a>. They are also mandated to <a href="https://fedtechmagazine.com/article/2018/03/new-tech-and-policies-can-help-agencies-optimize-data-centers">consolidate and upgrade their data centers</a> and to embrace virtualization technologies as part of that process. And <a href="https://fedtechmagazine.com/article/2017/12/white-house-releases-final-it-modernization-report">the White Hosue has provided clear direction</a> that it wants agencies to be more aggressive in adopting commercial cloud technologies. </p> <p>New technologies are fueling innovation, along with efficiency and productivity gains in the private sector and the government. <strong>Digital transformation</strong> is changing the workplace significantly, delivering capabilities that enable government users to work from anywhere and collaborate more effectively.</p> <p>But such gains come at the cost of <strong>increased complexity</strong>. IT teams are required to manually configure every new technology — such as <a href="https://fedtechmagazine.com/article/2017/12/armed-forces-want-mobile-infused-future">mobile devices</a>, wearables and other <a href="https://fedtechmagazine.com/article/2017/10/iot-tech-sends-agencies-beacon-future">sensors</a> — that connects to an enterprise network. They must ensure both <a href="https://fedtechmagazine.com/article/2018/03/will-there-be-government-standard-iot-security">that these devices are secure</a> and that they access only the appropriate resources. As the number of devices has climbed, IT teams have had to devote more resources to keep pace with demand.</p> <p>Organizations in just about every industry are stuck on the same treadmill. Digital advancements such as <strong>mobility, cloud computing and the Internet of Things </strong>are increasing the speed of operations and opening new opportunities for innovations in areas such as collaboration and smart buildings, but they also add pressure on IT staff to manage increasingly complex digital footprints.</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP:</strong> Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>A Connected World Demands New IT Solutions </h2> <p><strong>“In a world where you’re connecting all people, devices and things, it’s complex,”</strong> says Laura DiDio, principal analyst at <a href="http://itic-corp.com/" target="_blank">Information Technology Intelligence Consulting</a>. “You have a lot more capabilities and intelligence, but there are also a lot more potential points of failure. And if something goes wrong, if everything is connected, that can have a domino effect.”</p> <p>While the demands are growing exponentially, most federal IT teams are not getting additional resources, adds Raakhee Mistry, director of marketing for enterprise networks at <a href="https://www.cdwg.com/content/cdwg/en/brand/cisco.html" target="_blank">Cisco Systems</a>. Indeed, <a href="https://itdashboard.gov/" target="_blank">according to the federal IT Dashboard</a>, total government IT spending for fiscal year 2019 climbed to <strong>$83.4 billion</strong>, up <strong>2.6 percent</strong> from $81.3 billion in fiscal year 2018. </p> <p>“They’re spending upwards of 80 percent of their days just keeping the lights on,” she says. “But business leaders need them to move on to more strategic projects that enable new capabilities in their environment.”</p> <p>Rather than continuing to run in place, agencies are turning to new technologies to help them get ahead of today’s digital advancements. <strong>More flexible networks, real-time analytics, </strong><strong>hyperconverged</strong><strong> infrastructures, edge computing and faster storage</strong> are automating and simplifying complex digital environments so IT teams – and the users they support — can work smarter and faster, and be more agile.</p> <p>These solutions enable innovative capabilities such as workplace analytics that help organizations gain new insights on how users are working to foster greater productivity and efficiency. Digital advancements also s<strong>upport changing </strong><strong>workstyles</strong>. Users who can remain effective at their jobs from anywhere at any time are more likely to be satisfied, productive employees. Further, next-generation collaboration and communication solutions are powering a change in the workplace. Delivering better information-sharing and workplace flexibility fuels innovation.</p> <p>“There’s been a lot of turmoil and incredible innovation that’s come out of this transition,” says Krishnan Badrinarayanan, director of product marketing at <a href="https://www.cdwg.com/content/cdwg/en/brand/nutanix.html" target="_blank">Nutanix</a>.</p> <h2>Hyperconverged Infrastructure Can Help Feds Simplify IT </h2> <p>Many agencies also struggle to maintain an IT infrastructure that can keep pace with government mandates and changes in commercial technology. <a href="https://fedtechmagazine.com/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers">Hyperconverged</a><a href="https://fedtechmagazine.com/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers"> infrastructure solutions</a> from vendors such as Nutanix, Cisco Systems and <a href="https://www.cdwg.com/content/cdwg/en/brand/hpenterprise.html" target="_blank">HPE</a> can significantly change their IT operations to meet this challenge.</p> <p>Instead of following the traditional IT model with teams working in specialty areas — such as servers, storage and networking — <strong>hyperconvergence</strong><strong> collapses these silos and converts the parts of the infrastructure into one stack </strong>(virtualized network, hypervisor and software-defined storage) that can be quickly provisioned.</p> <p>A single team can <strong>stand up infrastructure on demand, automate and orchestrate the deployment of applications, ensure performance and scale up or down based on market demands,</strong> Badrinarayanan says. These capabilities support the rapidly changing demands of the digital workplace, ensuring that users have the tools they need to remain productive and efficient.</p> <p>Hyperconvergence offers the agility of a cloud services platform with the flexibility to adapt technology at the hardware level, choosing from an array of products that can be swapped in and out as needed without being locked in with a particular vendor.</p> <p>“It’s really offering choice and allowing the application development teams to pick the best-of-breed technologies while experiencing cloud-like behavior and benefits within the organization,” Badrinarayanan says.</p> <h2>Why Agencies Need a Next-Generation Storage Architecture</h2> <p><a href="https://fedtechmagazine.com/article/2017/05/data-and-predictive-analytics-help-feds-make-better-decisions">Data is at the heart</a> of digital transformation. Tools such as artificial intelligence and workplace analytics have the power to use data to improve operations, generate new services and help agencies achieve their missions. But<strong> storing this data is another challenge</strong>.</p> <p>“A next-generation data center cannot be, by its very nature, reliant on traditional storage infrastructure,” says Jeff McCullough, vice president of Americas partner sales at <a href="https://www.cdwg.com/content/cdwg/en/brand/netapp.html" target="_blank">NetApp</a>. Rather, agencies need <strong>a next-generation storage architecture</strong>, “one that is inherently agile, scalable and predictable,” he says.</p> <p>Storage speed, low-latency performance and the scalability to accommodate petabytes of data have become critical in today’s digital environment. Software-defined storage offers such benefits and allows storage resources to be abstracted from the underlying physical storage hardware for added flexibility, McCullough explains.</p> <p>Flash technology provides far greater read and write speeds than spinning disk storage, and advances such as <strong>Nonvolatile Memory Express</strong>, NVMe over Fabrics and storage class memory offer promising capabilities. But McCullough believes organizations should be able to adapt their storage based on their needs, moving data from flash to disk to cloud and back. “There’s not one single storage media to rule them all,” he says.</p> <p><em><a href="https://www.cdwg.com/content/cdwg/en/solutions/digital-workspace.html" target="_blank">Learn more</a> about how CDW solutions and services can help manage and secure your digital transformation efforts.</em></p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Data Center</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/fact-or-fallacy-can-hyperconvergence-scale-enough-help-feds"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_FF_Snyder-Hero.jpg?itok=zpH9atqh" width="124" height="94" alt="Hyperconverged infrastructure abstract image " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2018/02/fact-or-fallacy-can-hyperconvergence-scale-enough-help-feds"><span>Fact or Fallacy: Can Hyperconvergence Scale Enough to Help Feds? </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_F_Hayes-Hero.jpg?itok=AWy6scEN" width="124" height="94" alt="GAO’s Dominic Prate" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers"><span>How Hyperconvergence Simplifies Agencies&#039; Data Centers</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/new-tech-and-policies-can-help-agencies-optimize-data-centers"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FedTech--DCOI2018.jpg?itok=ko3taR7D" width="124" height="94" alt="Man working in data center" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2018/03/new-tech-and-policies-can-help-agencies-optimize-data-centers"><span>New Tech and Policies Can Help Agencies Optimize Data Centers</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/Feds-Can-Turn-to-New-Kinds-of-IT-Infrastructure-to-Get-Ahead-of-the-Curve" data-title="Why #FedIT needs next-generation #datacenter architecture to achieve #digitaltransformation. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/Feds-Can-Turn-to-New-Kinds-of-IT-Infrastructure-to-Get-Ahead-of-the-Curve" data-title="Why #FedIT needs next-generation #datacenter architecture to achieve #digitaltransformation. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/Feds-Can-Turn-to-New-Kinds-of-IT-Infrastructure-to-Get-Ahead-of-the-Curve" data-title="Why #FedIT needs next-generation #datacenter architecture to achieve #digitaltransformation. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>18</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/fedtech-staff"> <div>FedTech Staff</div> </a> </div> <div class="author-bio"> <p></p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> <div> <div>Performance marketing flag</div> <div>Off</div> </div> <div> <div>Tweet Text 3</div> <div>The path toward #digitaltransformation runs through next-generation #datacenter architecture in #FedIT. #GovIT </div> </div> <div> <div>Tweet Text 2</div> <div>#FedIT can achieve #digitaltransformation with hyperconverged infrastructure and other new #datacenetr architectures. #HCI #GovIT </div> </div> <div> <div>Shortened Url</div> <div>http://tech.mg/ZVs3z8</div> </div> Wed, 18 Apr 2018 13:21:56 +0000 phil.goldstein_6191 40691 at https://fedtechmagazine.com US, UK Governments Warn of Russian Cyberattacks https://fedtechmagazine.com/article/2018/04/US-UK-Governments-Warn-of-Russian-Cyberattacks <span>US, UK Governments Warn of Russian Cyberattacks</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 04/17/2018 - 12:49</span> <div><p>The United States and United Kingdom joined forces in an unprecedented move on April 16 to warn that <strong>Russian </strong><strong>cyberattacks</strong> are being launched against the network infrastructure of government and private business users. It was <strong>the first time the U.S. and U.K. governments have “issued joint advice to all sectors that might have been compromised,”</strong> <a href="https://www.theguardian.com/technology/2018/apr/16/us-and-uk-blame-russia-for-malicious-cyber-offensive" target="_blank">the <em> </em><em>Guardian</em> reports</a>.</p> <p>In the warning, <a href="https://www.us-cert.gov/ncas/alerts/TA18-106A" target="_blank">formally called a joint Technical Alert</a>, the Department of Homeland Security, FBI and the U.K.’s National Cyber Security Centre say that Russian state-sponsored cyberactors are engaged in a <strong>“worldwide cyber exploitation” of network infrastructure devices</strong>, such as routers, switches, firewalls and Network-based Intrusion Detection System devices. The targets are <strong>primarily government and private-sector organizations, critical infrastructure providers</strong>, and the internet service providers supporting these sectors, according to the warning.</p> <p>The warning also came <a href="https://biztechmagazine.com/article/2018/04/how-utilities-can-respond-russian-cyberattacks">a month after DHS and the FBI reported</a> that they had determined that “Russian government cyberactors” had launched “a multi-stage intrusion campaign” that targeted the networks of small commercial facilities in the energy and other critical infrastructure sectors.</p> <p>The new warning provides technical details on the nature of the attacks and <strong>steps that agencies and organizations can take to mitigate their vulnerabilities</strong>. Top American and British cybersecurity officials also warned about potential retaliation if any damage has been done.</p> <p>“When we see malicious cyberattacks, whether from the Kremlin or other nation-state actors, we are going to push back,” Rob Joyce, a special assistant to the president and the cybersecurity coordinator for the National Security Council, said in joint conference call with journalists by senior officials in Washington and London, <a href="https://www.nytimes.com/2018/04/16/world/europe/us-uk-russia-cybersecurity-threat.html" target="_blank">according to the <em>New York Times</em></a>. That would include<strong> “all elements of U.S. power available to push back against these kinds of intrusions,”</strong> he added, including “our capabilities in the physical world.”</p> <p><a href="https://fedtechmagazine.com/article/2018/02/dhs-jeanette-manfra-turns-her-focus-ecosystem-government-networks">Jeanette Manfra</a>, the assistant secretary for the office of cybersecurity and communications at DHS' National Protection and Programs Directorate, and other officials said on the call that agencies need to make sure their router software is patched and up-to-date. <strong>“Once you own the router, you own the traffic,” </strong>she said on the call, <a href="https://www.bloomberg.com/news/articles/2018-04-16/u-s-and-u-k-issue-joint-alert-warning-of-russian-cyber-attacks" target="_blank">Bloomberg News reports</a>.</p> <p>According to the <em>Guardian</em>, Ciaran Martin, the chief executive of the NCSC, which works closely with the surveillance agency GCHQ, said: “This is a very significant moment as we hold Russia to account.”</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>300-500 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/dhs-jeanette-manfra-turns-her-focus-ecosystem-government-networks"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_QA_Manfra-Hero.jpg?itok=l7uJ3Sqb" width="124" height="94" alt="DHS Assistant Secretary Jeanette Manfra " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2018/02/dhs-jeanette-manfra-turns-her-focus-ecosystem-government-networks"><span>DHS&#039; Jeanette Manfra Turns Her Focus to the &#039;Ecosystem&#039; of Government Networks</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/dhs-targets-cybersecurity-risks-it-supply-chains"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201803/Fedtech-SupplyChain-2.jpg?itok=bLXJhW33" width="124" height="94" alt="Chipsets being manufactured " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2018/03/dhs-targets-cybersecurity-risks-it-supply-chains"><span>DHS Targets Cybersecurity Risks in IT Supply Chains</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/04/cia-turns-fast-food-it-innovation-and-fbi-takes-note"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-CIA-2.jpg?itok=ARb3G_qO" width="124" height="94" alt="The entrance to the CIA New Headquarters Building (NHB) of the George Bush Center for Intelligence" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/04/cia-turns-fast-food-it-innovation-and-fbi-takes-note"><span>CIA Turns to Fast Food for IT Innovation, and FBI Takes Note</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/US-UK-Governments-Warn-of-Russian-Cyberattacks" data-title=".@DHSgov @cyber and @FBI join with @NCSC to warn of Russian #cyberattacks against #GovIT and private sector. #cybersecurity" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/US-UK-Governments-Warn-of-Russian-Cyberattacks" data-title=".@DHSgov @cyber and @FBI join with @NCSC to warn of Russian #cyberattacks against #GovIT and private sector. #cybersecurity" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/US-UK-Governments-Warn-of-Russian-Cyberattacks" data-title=".@DHSgov @cyber and @FBI join with @NCSC to warn of Russian #cyberattacks against #GovIT and private sector. #cybersecurity" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>17</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> <div> <div>Performance marketing flag</div> <div>Off</div> </div> <div> <div>Tweet Text 3</div> <div>.@DHSgov @cyber and @FBI team with @NCSC to warn about Russian #cyberattacks. #cybersecurity </div> </div> <div> <div>Tweet Text 2</div> <div>For the first time, @DHSgov @cyber and @FBI team with @NCSC to send out alert on Russian #cyberattacks. #cybersecurity </div> </div> <div> <div>Shortened Url</div> <div>http://tech.mg/X0jJM3</div> </div> Tue, 17 Apr 2018 16:49:13 +0000 phil.goldstein_6191 40686 at https://fedtechmagazine.com How Feds Can Secure Legacy IT Systems https://fedtechmagazine.com/article/2018/04/How-Feds-Can-Secure-Legacy-IT-Systems <span>How Feds Can Secure Legacy IT Systems</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-LegacyIT.jpg" width="1440" height="560" alt="Sailors use computers in the Learning Media Resource Center to check personal email aboard the aircraft carrier USS Carl Vinson." typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 04/17/2018 - 11:02</span> <div><p>Many agencies are <a href="https://fedtechmagazine.com/article/2018/04/usda-kicks-it-modernization-centers-excellence">moving ahead with plans</a> to <a href="https://fedtechmagazine.com/article/2018/03/how-your-agency-should-think-about-legacy-system-modernization-perfcon">upgrade legacy IT systems</a>, but it will take some time before many are actually replaced. In the meantime, they will be <strong>confronted with a clear but hard truth</strong>: Aging technologies <a href="https://fedtechmagazine.com/article/2017/04/study-confirms-conventional-wisdom-legacy-federal-it-breeds-cybersecurity-risks">are generally less secure</a>.</p> <p><a href="https://www.nist.gov/" target="_blank">The National Institute of Standards and Technology</a> knows this about as well as any agency in the federal government. Last month it issued a concrete offer of help to agencies to <strong>secure legacy systems from cyberattacks and make them more resilient</strong>.</p> <p>NIST released a draft version of the second volume of its Systems Security Engineering guide, <a href="https://csrc.nist.gov/CSRC/media/Publications/sp/800-160/vol-2/draft/documents/sp800-160-vol2-draft.pdf" target="_blank">Special Publication 800-160</a>, which gives agencies advice on <strong>guarding against advanced persistent threats</strong>. APTs, the guide notes, have the capability to breach the government’s critical systems, “establish a presence within those systems (often undetected), and inflict immediate and long-term damage to the economic and national security interests of the nation.”</p> <p>Ron Ross, a NIST fellow and one of the agency’s cybersecurity experts, writes in the guide that for the nation to survive and flourish in the 21st century it must develop “trustworthy, secure systems that are cyber resilient.”</p> <p>Ross notes: “Cyber resilient systems are those systems that <strong>have security measures or safeguards ‘</strong><strong>built in</strong><strong>’ as a foundational part of the architecture and design</strong> and moreover, display a high level of resiliency, which means the systems can <strong>withstand </strong><strong>cyberattacks</strong><strong>, faults, and failures and continue to operate</strong> even in a degraded or debilitated state — carrying out the organization’s mission-essential functions.”</p> <p>The guide is aimed at two distinct groups: IT staffs that are launching new systems or upgrading legacy systems in the normal course of maintaining them; and organizations that are using legacy systems to carry out day-to-day missions and business functions.</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP:</strong> Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>How to Engineer Cybersecurity Resiliency</h2> <p>Many federal IT leaders have long maintained that legacy systems are fundamentally insecure, largely because they do not receive regular security patches for outdated software and code. Indeed, <a href="https://fedtechmagazine.com/article/2017/04/study-confirms-conventional-wisdom-legacy-federal-it-breeds-cybersecurity-risks">an academic study released last year, “Security Breaches in the U.S. Federal Government,</a>” found that there is <strong>“a significantly negative relationship between the number of security incidents and the stock of new IT systems,”</strong> which was measured by the percentage of IT spending on new IT development over total IT investments for the past five years. For every 1 percentage-point increase agencies invest in new IT, there is a 5 percent decrease in security breaches, the study found.</p> <p>So how can agencies make their legacy IT more cyber-resilient? NIST’s guide offers four key principles (and a lot of technical advice as well):</p> <ul><li><strong>Focus on the mission or business. </strong>Cyber resiliency “maximizes the ability of organizations to complete critical or essential missions or business functions despite an adversary presence in their systems and infrastructure, threatening mission-critical systems and system components,” NIST says. Sometimes, legacy IT system components that are less critical to mission or business effectiveness are sacrificed to contain a cyberattack and maximize mission assurance, the report says.</li> <li><strong>Focus on the effects of the APT. </strong>NIST notes that “the resources associated with the APT, its stealthy nature, its persistent focus on the target of interest, and its ability to adapt in the face of defender actions make it a highly dangerous threat.” Those carrying out APT attacks can make it seem like the anomalous behavior is the result of human error, structural failure or a natural disaster. However, by focusing on APT activities and their potential effects, “systems engineers produce systems which can anticipate, withstand, recover from, and adapt to a broad and diverse suite of adverse conditions and stresses on systems containing cyber resources,” NIST says.</li> <li><strong>Assume the adversary will compromise or breach the agency. </strong>A fundamental assumption of cyber resiliency is that a sophisticated adversary cannot always be kept out of a system or be quickly detected and removed from that system, NIST says, “despite the quality of the system design, the functional effectiveness of the security components, and the trustworthiness of the selected components.” Agency IT security leaders need to acknowledge that most modern systems “are large and complex entities, and as such, there will always be weaknesses and flaws in the systems, operational environments, and supply chains that adversaries will be able to exploit.” As a result, a sophisticated adversary can penetrate an agency and achieve a presence within its infrastructure.</li> <li><strong>Assume the adversary will maintain a presence in the system or organization.</strong> Agencies must assume that the adversary presence may be a persistent and long-term issue, and recognize that the stealthy nature of the APT makes it difficult to be certain that the threat has been eradicated. Cyber resiliency also “recognizes that the ability of the APT to adapt implies that mitigations that previously were successful may no longer be effective.” Agencies must also recognize that even if they succeed in eradicating a threat’s presence, it may return. “In some situations, the best outcome an organization can achieve is containing the adversary’s malicious code or slowing its lateral movement across the system (or transitively across multiple systems) long enough that the organization is able to achieve its primary mission prior to losing its critical or essential mission capability,” NIST says.</li> </ul><p>The guide includes life cycle processes and cyber resiliency constructs that <strong>can be used for new systems, system upgrades or repurposed systems</strong>. They can be employed at any stage of the system life cycle and can take advantage of any system or software development methodology including waterfall, spiral or agile.</p> <p>“We had to address the question of what can we do today to secure the legacy systems we have,” <a href="https://www.cyberscoop.com/nist-cybersecurity-guide-legacy-systems-ron-ross/" target="_blank">Ross tells CyberScoop</a>.</p> <h2>IT Architectures Can Protect Key Assets</h2> <p>Agencies can architect their IT systems to be more resilient, Ross notes. In addition to continuing to harden perimeter defenses, agencies need to <strong>prepare for what happens when an attacker makes it through the walls</strong>.</p> <p>“The second dimension is what happens after they get in?” Ross tells CyberScoop. “How do we limit their access, limit the damage they can do or the data they can steal, limit their time on target?”</p> <p>Agencies can achieve that by <strong>shifting more to virtualized IT environments and can spin up new virtual machines</strong> on a regular basis. Since VMs are generated from a secure, hardened disk image, any malware that has made its way inside will be “flushed out of the system,” Ross says.</p> <p>Agencies also need to find ways to <strong>limit the ability of APTs to move within their systems</strong>, escalate their privileges and gain access to the network’s secure areas, CyberScoop notes. “There are many architectural and design decisions that can be used to protect your crown jewels,” Ross tells CyberScoop, citing measures such as<strong> domain separation and network segmentation</strong>.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7446" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>Over 1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/how-your-agency-should-think-about-legacy-system-modernization-perfcon"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201803/FedTech-MGT.jpg?itok=jXbWUDdF" width="124" height="94" alt="Census Bureau workers in the 1980s on cpmputers " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/03/how-your-agency-should-think-about-legacy-system-modernization-perfcon"><span>How Your Agency Should Think About Legacy System Modernization</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/modernizing-government-it-not-just-about-technology"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201803/FedTech-FedScoopModernization.jpg?itok=j3M-kefM" width="124" height="94" alt="Washington DC" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/03/modernizing-government-it-not-just-about-technology"><span>Modernizing Government IT Is Not Just About Technology</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/tony-scott-agency-cios-need-get-away-1970s-tech"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201803/Fedtech-TonyScott.jpg?itok=k9ePLNha" width="124" height="94" alt="Former Federal CIO Tony Scott " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/03/tony-scott-agency-cios-need-get-away-1970s-tech"><span>Tony Scott: Agency CIOs Need to Get Away from 1970s Tech</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/How-Feds-Can-Secure-Legacy-IT-Systems" data-title=".@usnistgov offers #FedIT #cybersecurity tips for defending legacy #IT systems. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/How-Feds-Can-Secure-Legacy-IT-Systems" data-title=".@usnistgov offers #FedIT #cybersecurity tips for defending legacy #IT systems. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/How-Feds-Can-Secure-Legacy-IT-Systems" data-title=".@usnistgov offers #FedIT #cybersecurity tips for defending legacy #IT systems. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>17</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> <div> <div>Performance marketing flag</div> <div>Off</div> </div> <div> <div>Tweet Text 3</div> <div>#FedIT needs to assume cyberattackers will get through. They need to plan for what happens after, says @usnistgov. #cybersecurity #GovIT </div> </div> <div> <div>Tweet Text 2</div> <div>Here’s how #FedIT can boost its cyber resilience, via @usnistgov. #cybersecurity #GovIT </div> </div> Tue, 17 Apr 2018 15:02:50 +0000 phil.goldstein_6191 40681 at https://fedtechmagazine.com FDIC Wants to Upgrade Workforce to Keep Pace with Changing IT https://fedtechmagazine.com/article/2018/04/FDIC-Wants-to-Upgrade-Workforce-to-Keep-Pace-with-Changing-IT <span>FDIC Wants to Upgrade Workforce to Keep Pace with Changing IT</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/Arlington-FDIC-office.jpg" width="1440" height="560" alt="The Federal Deposit Insurance Corporation&#039;s satellite headquarters campus in Arlington, Va." typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 04/16/2018 - 11:04</span> <div><p>As agencies prepare to use working capital funds to update IT or apply for funds from <a href="https://federalnewsradio.com/technology-main/2018/04/gsa-sees-100m-it-modernization-fund-as-glass-half-full/" target="_blank">a centralized Technology Modernization Fund</a> managed by the General Services Administration, it bears repeating that upgrading IT is <a href="https://fedtechmagazine.com/article/2018/03/modernizing-government-it-not-just-about-technology">not just about technology</a>.</p> <p><a href="https://www.fdic.gov/" target="_blank">Federal Deposit Insurance Corporation</a> CIO Howard Whyte understands that and says that a crucial piece of the IT modernization puzzle is<strong> upgrading the government’s workforce at the same time</strong>.</p> <p>President Donald Trump’s <a href="https://www.performance.gov/PMA/Presidents_Management_Agenda.pdf" target="_blank">Management Agenda</a>, which the administration <a href="https://fedtechmagazine.com/article/2018/03/presidents-management-agenda-emphasizes-it-modernization" target="_blank">released on March 20</a>, hammers home the importance of modernizing the workforce. Along with IT modernization; and data, accountability and transparency; the agenda names <strong>creating the “workforce of the 21st century”</strong> as a key driver of transformation. Even within the IT modernization pillar, the agenda notes that a key element of IT modernization is “building a modern IT workforce by <strong>recruiting, reskilling, retaining professionals able to help drive modernization with up-to-date technology</strong>.”</p> <p>Whyte says that is something the FDIC, as an independent agency, is going to keep in mind as it updates its IT. And it’s a lesson that all agencies, large and small, should heed. Without a modernized workforce, agencies will not be able to take advantage of the<strong> “bleeding edge” </strong>of technology: cloud, artificial intelligence and mobility, <a href="https://federalnewsradio.com/legacy-systems-month-2018/2018/03/fdic-includes-workforce-as-it-explores-it-modernization/" target="_blank">Whyte tells Federal News Radio</a>.</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>IT Workforce Needs Training to Master New IT </h2> <p>Although some federal IT leaders would argue that the cloud is not a novel technology and is <a href="https://fedtechmagazine.com/article/2018/03/usdas-sheridan-cloud-way-out-infrastructure-death-spiral">the way agencies can get out of managing data centers</a>, some agencies are <a href="https://fedtechmagazine.com/article/2018/04/fbis-most-wanted-list-info-commercial-cloud">still cloud laggards</a>.</p> <p>Whyte tells Federal News Radio that if agencies are going to move to the cloud they need to ensure they have staff members who are trained in<strong> vendor management, the different cloud technologies and the application stack</strong> of cloud service providers such as <a href="https://www.cdwg.com/content/cdwg/en/brand/google.html?cm_mmc=Vanity-_-google-_-NA-_-NA" target="_blank">Google</a> and <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoft.html" target="_blank">Microsoft</a>. “How do we get that information that we would normally walk downstairs and just be able to touch and feel when you are hundreds and potentially thousands of miles away from the new data center?” Whyte says.</p> <p>Agency IT departments need to create the correct <a href="https://fedtechmagazine.com/article/2018/01/opm-embraces-shared-services-improve-human-resources-it">human resources capabilities</a> for these new IT environments, Whyte argues. Employees need to <strong>get more training to help them adapt to new technologies and ways of executing their mission</strong>, he says, and it is not fair to expect them to be able to make that transition without that training. That’s especially true for data center workers who now will need to manage data in the cloud.</p> <h2>FDIC Works to Upgrade Applications, Data Management</h2> <p>The FDIC is <strong>taking an inventory of its legacy IT systems and capabilities, as well as its applications and data</strong>, as it seeks to consolidate and save money, Federal News Radio reports.</p> <p>The agency has long used several customized applications it has built and maintained itself. However, Whyte says the agency is moving to more agile development processes and wants to focus on delivering capabilities.</p> <p>He says the FDIC wants to do so across multiple divisions in the agency rather than have each organization run its own system. Doing so will allow the agency to <strong>reduce duplication</strong>, so Whyte’s office has been looking at application upgrade cycles and when certain systems will reach their end of life. Whyte says he is preparing for discussions with system owners and may redirect resources to some systems so others can be retired.</p> <p>The effort has revealed that the FDIC needs to <strong>get better at managing the life cycle of its IT systems</strong> and acknowledge that maintaining legacy systems drives up costs. “I would assume that there will be savings to be had,” Whyte says. “We are in a complex environment at the FDIC, like other federal organizations. As we look at retiring legacy applications or systems, there is bound to be savings. And we believe that we’ll be able to utilize those savings to invest in new technologies to better serve the corporation.”</p> <p>The FDIC is also going to explore where its data is stored, how it is used and how the agency can improve its data management, Whyte says.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Core</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/08/fdic-plans-bolster-cybersecurity-following-breaches-dhs-help"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech--dataprotection-USB-stick.jpg?itok=lN3ac7Zk" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2016/08/fdic-plans-bolster-cybersecurity-following-breaches-dhs-help"><span>FDIC Plans to Bolster Cybersecurity Following Breaches, with DHS Help </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/modernizing-government-it-not-just-about-technology"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201803/FedTech-FedScoopModernization.jpg?itok=j3M-kefM" width="124" height="94" alt="Washington DC" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/03/modernizing-government-it-not-just-about-technology"><span>Modernizing Government IT Is Not Just About Technology</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/tony-scott-agency-cios-need-get-away-1970s-tech"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201803/Fedtech-TonyScott.jpg?itok=k9ePLNha" width="124" height="94" alt="Former Federal CIO Tony Scott " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/03/tony-scott-agency-cios-need-get-away-1970s-tech"><span>Tony Scott: Agency CIOs Need to Get Away from 1970s Tech</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/FDIC-Wants-to-Upgrade-Workforce-to-Keep-Pace-with-Changing-IT" data-title=".@FDICgov CIO says that training is needed along with #ITmodernization. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/FDIC-Wants-to-Upgrade-Workforce-to-Keep-Pace-with-Changing-IT" data-title=".@FDICgov CIO says that training is needed along with #ITmodernization. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/FDIC-Wants-to-Upgrade-Workforce-to-Keep-Pace-with-Changing-IT" data-title=".@FDICgov CIO says that training is needed along with #ITmodernization. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>16</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> <div> <div>Performance marketing flag</div> <div>Off</div> </div> <div> <div>Tweet Text 3</div> <div>Why @FDICgov CIO Howard Whyte sees #ITmodernization as more than #tech upgrades. #FedIT #GovIT</div> </div> <div> <div>Tweet Text 2</div> <div>.@FDICgov, CIO Howard Whyte knows that it’s not just about #cloud migration. #IT staff must be retrained. #FedIT #GovIT</div> </div> <div> <div>Shortened Url</div> <div>http://tech.mg/4h2CZE</div> </div> Mon, 16 Apr 2018 15:04:41 +0000 phil.goldstein_6191 40676 at https://fedtechmagazine.com SBA Sets Up an IT Sandbox in the Cloud https://fedtechmagazine.com/article/2018/04/SBA-Sets-Up-an-IT-Sandbox-in-the-Cloud <span>SBA Sets Up an IT Sandbox in the Cloud</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-Sandbox.jpg" width="1440" height="560" alt="IT sandbox illustration " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 04/13/2018 - 13:12</span> <div><p>Small Business Administration CIO Maria Roat has <a href="https://fedtechmagazine.com/media/video/elc-2017-small-business-administration-cio-maria-roat-keeps-her-agency-leading-edge">consistently pushed her team to ask, “Why not?”</a> which has led the agency to be a leader in cloud migration and IT modernization.</p> <p>Now, Roat wants to enable other federal agencies to <strong>embrace that spirit of experimentation</strong>. The SBA has deployed the cloud-based <a href="https://www.cio.gov/2018/03/15/innovation-sandbox-launch/" target="_blank">Innovation Sandbox</a>, which lets agencies test IT innovations.</p> <p>The SBA received funding from the <a href="https://www.cio.gov/" target="_blank">Federal CIO Council</a>’s Innovation Committee, which Roat serves as the chair on, to develop and implement the sandbox. The goal, Roat says, is to <strong>make it easier for agencies to safely test new technologies and methodologies</strong>.</p> <p>The basic premise is to<strong> “make it easy, make it simple,” </strong>for agencies to experiment, <a href="https://www.fedscoop.com/maria-roat-looking-spread-word-new-innovation-sandbox/" target="_blank">Roat tells FedScoop</a>. She is encouraging other agencies to get involved so that they can learn from each other.</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP:</strong> Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>What Will the SBA’s Innovation Sandbox Enable?</h2> <p>In a blog post, Roat writes that the Innovation Sandbox is an <strong>Infrastructure as a Service capability</strong> that allows for “simple, time-bound, <strong>hypothesis-based statistical experiments within a secure, controlled, cloud-based computing environment</strong>.”</p> <p>The goal, Roat says, is to enable and encourage “cross-agency collaboration to leverage modern tools and technologies to test hypotheses and share their findings, data, and experiences with colleagues across the government.”</p> <p>By taking advantage of available government data, the sandbox can <strong>enable new, collaborative efforts that will “bolster the conversation on government-wide data sharing and will highlight data sharing best practices,” </strong>Roat writes. These solutions can then be integrated within agencies more rapidly, boosting overall efficiency.</p> <p>“As agencies work together using the Innovation Sandbox, structural and cultural challenges will surface, identifying gaps that can inform recommendations for future activities,” Roat says.</p> <p>Roat notes to FedScoop that the idea of an IT sandbox is not new, and was primarily discussed in the past as a cloud-hosted space where agency data practitioners, primarily, could share and collaborate. However, as agencies started their shift to the cloud, there hasn’t been a great deal of “comfort” with the model.</p> <p>Roat launched a similar effort when she <a href="https://www.linkedin.com/in/maria-roat-49714115/" target="_blank">served as chief technology officer of the Transportation </a><a href="https://www.linkedin.com/in/maria-roat-49714115/" target="_blank">Department</a> and discovered that parties outside of the agency were interested. When she took over as chair of the Innovation Committee, she introduced <strong>the idea of a governmentwide sandbox, which the rest of the council embraced enthusiastically</strong>, FedScoop reports.</p> <h2>What Comes Next with the SBA’s Sandbox?</h2> <p>The sandbox environment is hosted in the SBA cloud, FedScoop reports, but is completely separate from the SBA’s main operations.</p> <p>Interested federal employees can use a portal to sign in and submit an “experiment.” However, it’s not a free-for-all. The submitter <strong>must have a hypothesis for the experiment</strong>, a number for <strong>how much computing power </strong>the testing will require, and it must be something that can be accomplished, part-time, <strong>in between two and four weeks</strong>. Interested parties are strongly encouraged to contact the CIO Council as soon as possible for planning purposes.</p> <p>The sandbox is not just for data experiments, but Roat tells FedScoop that data practitioners seem to be especially drawn to the concept. Her goal is to enable the creation of <strong>new innovations from existing data</strong>,<strong> </strong>and potentially have agencies come up with<strong> solutions that can scale across the government</strong>.</p> <p>At the conclusion of the pilot, the CIO Council will develop a report based on agencies’ experience using the Innovation Sandbox to “determine the need and feasibility for a sustained, federal-wide sandbox” and the council “will also identify best practices for agencies to create their own sandbox,” according to the blog post.</p> <p>Roat tells FedScoop that she wants agencies to <strong>feel like they can try something and fail fast</strong>, and not be afraid of that. “Like when you’re a kid — you get to build a sandcastle, and if you don’t like it, you get to try again,” she says.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Cloud</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/09/sba-highlights-importance-training-cloud-migrations"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201709/FedTech--SBA.jpg?itok=d6ZKro09" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2017/09/sba-highlights-importance-training-cloud-migrations"><span>SBA Highlights Importance of Training for Cloud Migrations</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/10/sba-tackles-tech-upgrades-multi-pronged-approach"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201710/FedTech--SBAModernization.jpg?itok=WwMJg7fi" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2017/10/sba-tackles-tech-upgrades-multi-pronged-approach"><span>SBA Tackles Tech Upgrades with Multi-Pronged Approach</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node--view-mode-teaser"> <div class="content"> <a href="/article/2017/12/what-items-are-feds-2018-it-do-lists"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201712/FedTech--2018-ToDo.jpg?itok=mponM9tc" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2017/12/what-items-are-feds-2018-it-do-lists"><span>What Items Are on Feds’ 2018 IT To-Do Lists? </span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/SBA-Sets-Up-an-IT-Sandbox-in-the-Cloud" data-title="#FedIT will get a safe place to experiment with data in @SBAgov’s #cloud-based Innovation Sandbox. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/SBA-Sets-Up-an-IT-Sandbox-in-the-Cloud" data-title="#FedIT will get a safe place to experiment with data in @SBAgov’s #cloud-based Innovation Sandbox. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/SBA-Sets-Up-an-IT-Sandbox-in-the-Cloud" data-title="#FedIT will get a safe place to experiment with data in @SBAgov’s #cloud-based Innovation Sandbox. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>13</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> <div> <div>Performance marketing flag</div> <div>Off</div> </div> <div> <div>Tweet Text 3</div> <div>Here’s how @SBAgov wants to use the #cloud to help agencies experiment. <br /> #FedIT #GovIT </div> </div> <div> <div>Tweet Text 2</div> <div>Like building castles in the sand: the story behind @SBAgov’s #cloud-based Innovation Sandbox. </div> </div> Fri, 13 Apr 2018 17:12:01 +0000 phil.goldstein_6191 40671 at https://fedtechmagazine.com How Feds Can Benefit from Composable Infrastructure https://fedtechmagazine.com/article/2018/04/how-feds-can-benefit-composable-infrastructure <span>How Feds Can Benefit from Composable Infrastructure</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/GettyImages-534110688.jpg" width="1440" height="560" alt="SDDC abstract image " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 04/12/2018 - 10:45</span> <div><p>A major part of the <a href="https://fedtechmagazine.com/article/2018/04/usda-kicks-it-modernization-centers-excellence">IT modernization push across government</a> is likely going to be revamping data centers. </p> <p>Thanks to the <a href="https://www.congress.gov/bill/115th-congress/house-bill/3243" target="_blank">FITARA Enhancement Act of 2017</a>, federal agencies received a two-year extension <strong>until Oct. 1, </strong><strong>2020</strong> to fulfill the requirements of the Data Center Optimization Initiative (DCOI), <a href="https://obamawhitehouse.archives.gov/sites/default/files/omb/memoranda/2016/m_16_19_1.pdf">begun in the summer of 2016</a> by the Obama administration. DCOI is <a href="https://fedtechmagazine.com/article/2016/08/federal-data-center-closures-will-push-agencies-retrain-it-staff">pushing agencies to close</a> <strong>at least 25 percent of their tiered data centers</strong> (the large data center facilities) and <strong>60 percent of their nontiered data centers</strong> (such as server rooms) by Sept. 30, 2018.  </p> <p>DCOI also is designed to <strong>spur virtualization.</strong> It says that agencies “shall continue to principally reduce application, system, and database inventories to essential enterprise levels by increasing the use of virtualization to enable pooling of storage, network and computer resources, and dynamic allocation on-demand.” Shifting to <strong>composable data center infrastructure and software-defined data centers (SDDC)</strong> can help agencies achieve those goals. </p> <p>Modern hybrid clouds shatter traditional data center boundaries. Workloads now <a href="https://fedtechmagazine.com/article/2018/02/how-agencies-can-optimize-their-data-centers-hybrid-it">flow to and from onsite facilities to public cloud infrastructure</a> and Software as a Service (SaaS) applications. That free-form flexibility may serve the changing demands of the agency, but it also forces CIOs to cope with growing IT complexity and new security considerations. Without a new approach to data center management, government IT leaders risk paying a higher price for their newfound agility, in the form of <strong>unnecessary costs and additional burdens on already strained IT </strong><strong>teams</strong>.</p> <p>For many agencies, composable infrastructure and software-defined data centers offer a better solution. These closely related strategies <strong>layer a software-based management console on top of virtualized computing, networking and storage to create one large, agile pool of IT resources</strong>. Think about composable infrastructure as treating each element and IT resource as a service, composing them in real time to meet demand.</p> <p>“People can just say, ‘Give me a cluster of 15 servers with 30 cores and provision that into a virtual private cloud,’” says Dan Conde, senior analyst with the Enterprise Strategy Group. “The virtual network overlay then ties everything together.”</p> <p>Feds are already adopting SDDCs. A <a href="https://www.cdwg.com/content/brands/emc/default.aspx" target="_blank">Dell EMC</a> survey of federal IT decision-makers and business decision-makers <a href=".https://fedtechmagazine.com/article/2017/03/feds-are-embracing-software-defined-data-centers-flexibility-cost-savings">released last year</a> found that early two-thirds of survey respondents <strong>(64 percent)</strong> say their organization has deployed software-defined solutions, while 85 percent reported progress adopting SDDCs.</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the<em> FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>SDDCs Allow Agencies to Focus IT Resources on the Mission </h2> <p>Some consider composable infrastructure to be <strong>“infrastructure as code.”</strong> No matter how it’s defined, composable infrastructure and SDDCs <strong>accelerate the spinning up of services</strong>. IT managers can better <strong>focus budgets and staff on activities that directly benefit the agency’s mission</strong>, rather than ongoing maintenance and management of IT systems.</p> <p>That payoff applies to many types of traditional workloads, including those associated with ERP and database applications, but they’re particularly important<strong> for use cases that benefit from on-demand </strong><strong>provisioning</strong><strong>, such as DevOps</strong>. Teams can quickly provision the necessary resources for development and testing, and return computing, storage and networking services to the master resource pool when they’re no longer needed.</p> <p>“With a sea of dynamic IT resources, organizations can carve out ERP and DevOps workloads from the same infrastructure, rather than creating pockets built for specific applications,” says Chad Dunn, vice president of product management at Dell EMC. “That enables teams to customize operations more quickly, while also providing for greater data protection.”</p> <p>This modern approach also plays an important role in ongoing data center simplification and transformation by allowing IT managers to <strong>shrink hardware footprints and avoid overbuying of devices and software licenses to accommodate unexpected spikes in demand.</strong></p> <p>“Composable infrastructures are an answer to the over-provisioning that is common in traditional data centers,” says Neil MacDonald, vice president and general manager at <a href="https://www.cdwg.com/content/cdwg/en/brand/hpenterprise.html" target="_blank">Hewlett Packard Enterprise</a> (HPE). “Having pools of compute, storage and networking fabric to serve multiple needs means administrators can make sizing decisions centrally as opposed to guessing how much infrastructure they may need for each application group.”</p> <h2>Feds Can Choose from a Range of SDDC Options</h2> <p>HPE is one of a handful of vendors offering platforms for creating composable infrastructures. HPE Synergy combines computing, storage and networking capabilities <strong>via a single, unified API</strong>.</p> <p>“The unified API is key because it becomes a productivity multiplier,” MacDonald says. “Many organizations have attempted to automate the underlying infrastructure through the years, but the complexity of managing diverse device interfaces quickly swamped those efforts.” A unified API addresses that complexity, so agencies see the benefits of automation, he adds. </p> <p>To speed resource implementation and ongoing management, HPE Synergy<strong> offers templates for defining requirements and deploying resources programmatically, as well as for making changes and updates</strong>.</p> <p>“HPE Synergy views those lifecycle tasks and the provisioning of the physical infrastructure as an extension of code,” MacDonald explains.</p> <p>Dell EMC’s VxRack System SDDC integrates <a href="https://www.cdwg.com/content/cdwg/en/brand/vmware.html" target="_blank">VMware</a> <a href="https://www.cdwg.com/search/?key=vmware%20cloud%20foundation&amp;ctlgfilter=&amp;searchscope=all&amp;sr=1" target="_blank">Cloud Foundation</a> software for hyperconverged platforms with Dell EMC’s <a href="https://www.cdwg.com/search/?key=PowerEdge%20servers&amp;searchscope=all&amp;sr=1">PowerEdge servers</a>. The company’s <a href="https://www.cdwg.com/search/?key=VxRail%20&amp;searchscope=all&amp;sr=1">VxRail option</a> offers similar SDDC capabilities in a preconfigured appliance. VMware, a subsidiary of Dell Technologies, also sells <a href="https://www.cdwg.com/search/?key=VMware%20NSX&amp;searchscope=all&amp;sr=1" target="_blank">VMware NSX</a>, a virtualization and security platform for creating SDDCs.</p> <p><strong>“SDDC brings the same flexibility, </strong><strong>configurability</strong><strong> </strong><strong>and</strong><strong> agility seen in public clouds to their on-premises data centers,”</strong> Dunn says. “That’s important when resources need to remain in-house for reasons of cost, compliance and security.”</p> <h2>Decide Whether the SDDC Model Is Right for Your Agency </h2> <p>While composable infrastructures and SDDCs offer many potential benefits, analysts and vendors say <strong>agency IT managers need upfront preparation to fully capitalize on them</strong>. First, CIOs should undertake an <strong>honest assessment of whether their IT culture is ready to transform to a software-defined operating model</strong>, where separate teams of specialists will no longer oversee servers, networks and storage. Instead, virtual infrastructure administrators will manage all those areas, using their skills to automate IT environments. In some cases, an enterprise may decide to retain current staff, or may hire new talent for the role.</p> <p>Second, tailor long-term roadmaps for <strong>ongoing efficiency</strong> as the IT infrastructure evolves over time.</p> <p>“Enterprises will continue to encounter a range of different workloads with different requirements in the years ahead,” MacDonald says. “And that means a diversity of options for how to deploy them. The more flexible data centers become thanks to composable infrastructures, the more they will deliver valuable services moving forward.”</p> <p><em><a href="https://www.cdwg.com/content/cdwg/en/solutions/data-center/virtualization-and-sddc.html" target="_blank">Learn more</a> about how your agency can take advantage of SDDC solutions to optimize your data center environments. </em></p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Data Center</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7446" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/03/feds-are-embracing-software-defined-data-centers-flexibility-cost-savings"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech--SDDCs.jpg?itok=fDKdxL2u" width="124" height="94" alt="Data center abstract" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2017/03/feds-are-embracing-software-defined-data-centers-flexibility-cost-savings"><span>Feds Are Embracing Software-Defined Data Centers for Flexibility, Cost Savings </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/how-agencies-can-optimize-their-data-centers-hybrid-it"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_F_Wong-Hero.jpg?itok=hGb2FnNB" width="124" height="94" alt="David Rubin of DOJ " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2018/02/how-agencies-can-optimize-their-data-centers-hybrid-it"><span>How Agencies Can Optimize Their Data Centers via Hybrid IT</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/new-tech-and-policies-can-help-agencies-optimize-data-centers"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FedTech--DCOI2018.jpg?itok=ko3taR7D" width="124" height="94" alt="Man working in data center" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2018/03/new-tech-and-policies-can-help-agencies-optimize-data-centers"><span>New Tech and Policies Can Help Agencies Optimize Data Centers</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/how-feds-can-benefit-composable-infrastructure" data-title="How #FedIT can use #SDDC to optimize #datacenter operations:" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/how-feds-can-benefit-composable-infrastructure" data-title="How #FedIT can use #SDDC to optimize #datacenter operations:" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/how-feds-can-benefit-composable-infrastructure" data-title="How #FedIT can use #SDDC to optimize #datacenter operations:" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>12</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/fedtech-staff"> <div>FedTech Staff</div> </a> </div> <div class="author-bio"> <p></p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> Thu, 12 Apr 2018 14:45:11 +0000 phil.goldstein_6191 40666 at https://fedtechmagazine.com Air Force Aims to Outsource IT, Focus on Cybersecurity https://fedtechmagazine.com/article/2018/04/Air-Force-Aims-to-Outsource-IT-Focus-on-Cybersecurity <span>Air Force Aims to Outsource IT, Focus on Cybersecurity</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTch-AirForceCyber.jpg" width="1440" height="560" alt="Cadet 1st Class Jordan Keefer (center) coordinates cadet efforts to defend their network during the National Security Agency&#039;s Cyber Defense Exercise at the U.S. Air Force Academy in Colorado Springs, Colo., April 17, 2012. " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 04/11/2018 - 14:50</span> <div><p>The Air Force wants its IT personnel to drop the responsibilities of a help desk worker to take on <strong>the duties of a cyberwarrior</strong>.</p> <p>The service branch is undertaking a massive reorientation of its IT staff so that they <strong>focus less on day-to-day technology </strong><strong>maintenance</strong><strong> and operations and more on cybersecurity</strong>. The goal is to get the Air Force’s IT staff working on their core competencies related to the Air Force’s weapons systems and mission, and less on more mundane IT tasks. As part of the effort, the Air Force is <strong>outsourcing much of its IT operations to </strong><strong>industry</strong>.</p> <p>Lt. Gen. Bradford Shwedo, chief of information dominance and CIO for the Air Force, <a href="https://fcw.com/articles/2018/03/07/usaf-cyber-cio-williams.aspx" target="_blank">told <em>FCW</em> in March</a> that the service was moving ahead with its plan to convert IT professionals at every base into mission defense teams, or MDTs. <a href="http://www.tyndall.af.mil/News/Article-Display/Article/1458100/tyndall-mission-defense-team-declared-fully-operational/" target="_blank">As the Air Force explains</a>, such teams are “responsible for mission assurance at the base level” and focus “on defensive cyber operations of Air Force weapons systems.”</p> <p><strong>“We want our airmen transitioning from running email and boxes to focusing on cyberdefense,” </strong>William Marion, the Air Force’s deputy chief of information dominance and deputy CIO, <a href="https://www.cyberscoop.com/us-air-force-cybersecurity-cloud-outsource-it/" target="_blank">tells CyberScoop</a>. “Every time we move to the cloud, the intent is to free up cyber-operators for the Mission Defense Teams.”</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the<em> FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Air Force Shifts IT Personnel to Mission-Specific Cybersecurity</h2> <p>The Air Force has been <a href="https://www.fifthdomain.com/dod/air-force/2017/07/28/heres-how-the-air-force-is-fighting-in-the-cyber-domain/" target="_blank">building up the MDT initiative since last year</a>. As Fifth Domain <a href="https://www.fifthdomain.com/dod/air-force/2018/02/06/air-force-to-begin-cyber-squadron-roll-out-in-2018/" target="_blank">reports</a>, the teams are <strong>“specialized cyber teams within the cyber squadrons” that serve as the “beat cops” for the Air Force</strong>, “understanding the critical cyber terrain and networks of the wings and missions they’re assigned to.” Lt. Col. Steven Wieland, chief of the strategy branch within the Air Force’s chief information office, tells Fifth Domain the teams are an organic capability to Air Force wings, or command units, within the squadron structure.</p> <p>The Air Force in recent months has been sounding out notes about its willingness and need to outsource enterprise IT.</p> <p><a href="https://fcw.com/articles/2018/02/16/usaf-cyber-warfare.aspx" target="_blank">According to <em>FCW</em></a>, Shwedo said in February at an AFCEA event in Arlington, Va., that the Air Force is seeing “more and more bad guys using cyber as an asymmetrical attack access. So how do I get more guns to the fight? Enterprise IT as a Service.”</p> <p><strong>Outsourcing IT to contractors</strong> and industry is not just a cost-saving measure for Shwedo. It enables the Air Force to allow its personnel to<strong> actually take part in mission-specific cyberdefense</strong>. “I need to use blue suiters where blue suiters are suited for,” he said. “I can get contractors to do enterprise IT; I can’t get contractors to attack or exploit,” per the laws of armed conflict, <em>FCW</em> reports.</p> <p>Shwedo said that moving to an IT as a Service model would also allow the Air Force to better focus its training for IT personnel, because “the skills associated with running Enterprise IT as a Service and getting in a cyber dogfight are too different.”</p> <p>Speaking on March 6 after a panel discussion on disruptive technologies at the National Defense Industrial Association’s cyber symposium in McLean, Va., Shwedo said the personnel on the MDTs were still splitting their time between cyberdefense and traditional IT roles.</p> <p>“The bottom line is I’m going to pay a price per seat for every one of [my IT staff members], and we are converting our whole basically [IT team] into cyber folks, and we’re going to start getting after the weapons systems,” Shwedo said during his panel, according to <em>FCW</em>. “Whatever base they’re at, they’re going to hover over that weapons system, and their job is to get after the back doors of the weapons systems in that base, all the industrial control systems, etc.”</p> <h2>Outsourcing Technology Frees Up IT Staff</h2> <p>As the Air Force moves personnel toward cybersecurity, it is <strong>turning to industry to pick up the slack</strong>.</p> <p>As CyberScoop reports, the Air Force’s plan includes the biggest <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoft-interstitial.html" target="_blank">Microsoft</a> <a href="https://www.cdwg.com/content/brands/microsoft/office365.aspx" target="_blank">Office 365</a> enterprise in the world, a $293 million <a href="https://www.cdwg.com/content/cdwg/en/brand/oracle.html?enkwrd=oracle" target="_blank">Oracle</a> cloud system and <a href="http://www.nextgov.com/it-modernization/2017/09/air-force-will-dole-out-1-billion-cloud-migration/141217/" target="_blank">a $1 billion </a><a href="http://www.nextgov.com/it-modernization/2017/09/air-force-will-dole-out-1-billion-cloud-migration/141217/" target="_blank">spend</a><a href="http://www.nextgov.com/it-modernization/2017/09/air-force-will-dole-out-1-billion-cloud-migration/141217/" target="_blank"> on a mass cloud migration</a> over the next five years.</p> <p>The goal is to get industry to manage SharePoint portals and email servers, CyberScoop notes. “The strategic intent is to focus on our core competency,” Marion said.<strong> “Our core competency is ‘fly, fight, win’ in air and space. It is not to run email servers or configure desktop devices.”</strong></p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/11/army-air-force-and-marines-call-rugged-mobile-solutions-battlefield"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/Q0416-FT_Feat-Joch-Hero.jpg?itok=k3qNLfGv" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/digital-workspace/mobility">Mobility</a> </h2> <header class="link-node"> <a href="/article/2016/11/army-air-force-and-marines-call-rugged-mobile-solutions-battlefield"><span>The Army, Air Force and Marines Call Up Rugged Mobile Solutions for the Battlefield</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/09/air-force-pushing-upgrade-devices-and-systems-windows-10-2018"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech--AirForce--Windows10.JPG?itok=-xFOC-ja" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/software">Software</a> </h2> <header class="link-node"> <a href="/article/2016/09/air-force-pushing-upgrade-devices-and-systems-windows-10-2018"><span>Air Force Pushing to Upgrade Devices and Systems to Windows 10 by 2018 </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/01/air-force-cto-puts-focus-cloud-governance-and-cost"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/AirForce-1440.jpg?itok=y1DKhcI-" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2016/01/air-force-cto-puts-focus-cloud-governance-and-cost"><span>Air Force CTO Puts Focus on Cloud Governance and Cost</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/Air-Force-Aims-to-Outsource-IT-Focus-on-Cybersecurity" data-title="The @usairforce is going to outsource day-to-day #IT operations to spend more time on #cybersecurity." data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/Air-Force-Aims-to-Outsource-IT-Focus-on-Cybersecurity" data-title="The @usairforce is going to outsource day-to-day #IT operations to spend more time on #cybersecurity." data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/Air-Force-Aims-to-Outsource-IT-Focus-on-Cybersecurity" data-title="The @usairforce is going to outsource day-to-day #IT operations to spend more time on #cybersecurity." data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>11</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> <div> <div>Performance marketing flag</div> <div>Off</div> </div> Wed, 11 Apr 2018 18:50:52 +0000 phil.goldstein_6191 40661 at https://fedtechmagazine.com CIA Turns to Fast Food for IT Innovation, and FBI Takes Note https://fedtechmagazine.com/article/2018/04/cia-turns-fast-food-it-innovation-and-fbi-takes-note <span>CIA Turns to Fast Food for IT Innovation, and FBI Takes Note</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-CIA-2.jpg" width="1440" height="560" alt="The entrance to the CIA New Headquarters Building (NHB) of the George Bush Center for Intelligence" typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 04/10/2018 - 12:31</span> <div><p>When the CIO at the nation’s premier spy agency needed to explain a new business model to his IT team, <a href="http://www.executivegov.com/2017/03/profile-john-edwards-cio-of-the-cia-it-enterprise-director/" target="_blank">John Edwards</a> invited <strong>an executive from McDonald’s to the CIA to talk about the Big Mac</strong>.</p> <p>According to Edwards, the executive explained how all McDonald’s restaurants follow the same recipe for the signature hamburger, <a href="https://www.mcdonalds.com/us/en-us/about-us/franchising/support-system.html" target="_blank">despite being franchisees</a>. The CIA is taking an approach to IT that <strong>mimics the franchise model</strong> used by McDonald’s and other fast food chains, said Edwards, who has been <a href="https://fcw.com/articles/2016/03/16/cia-cio-lyngaas.aspx" target="_blank">in his post for a little more than two years</a>. The goal is to give the CIA’s <a href="https://www.cia.gov/offices-of-cia" target="_blank">different mission areas</a> <strong>more control in how they procure and use IT</strong>.</p> <p>Speaking April 5 at <a href="https://www.fedscoop.com/events/it-modernization-summit/2018/" target="_blank">FedScoop’s IT Modernization Summit </a>in Washington, D.C., Edwards noted that there is often a “material difference” between “enterprise IT” for the entire agency and “mission IT” used by specific agency mission areas, such as <a href="https://www.cia.gov/offices-of-cia/clandestine-service" target="_blank">the Clandestine Service</a>. Having the office of the CIO be responsible for all of that proved to be challenging, Edwards said.</p> <p>Each office wants to manage its own IT, Edwards said, so the CIA <strong>started to look at its different mission areas as franchisees, each with about five IT staff members</strong>. They are allowed to manage and run their own, mission-specific IT but, like chain restaurant franchisees, must maintain the overall brand. For the CIA, that means <strong>adhering to the agency’s strict IT security controls</strong> and not placing equipment or software on the agency’s network “that could compromise our network or our data,” Edwards said.</p> <p>Now, every CIA mission entity is a franchisee, Edwards said, noting that each quarter a different “franchise” is honored for its performance.</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP:</strong> Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>FBI Wants to Give Field Offices IT Flexibility</h2> <p>Speaking alongside Edwards, FBI CIO <a href="https://www.fbi.gov/news/pressrel/press-releases/gordon-bitko-named-fbi-chief-information-officer" target="_blank">Gordon Bitko</a> said that he has “tried to beg, borrow and steal” ideas from Edwards. While the FBI has not adopted the franchisee model from CIA, it has <strong>attempted to give its different components flexibility</strong>.</p> <p>Bitko noted that the law enforcement agency has <a href="https://www.fbi.gov/contact-us/field-offices" target="_blank">56 field offices</a>, and they deal with hundreds of different threats and all have “very specific, unique challenges.” Some deal with counterterrorism, while others have a focus on violent crime and child pornography. All of those efforts<strong> “span different needs, different data collected under different legal authorities,”</strong> Bitko said, which can lead to a “fragmented environment.</p> <p><img alt="FedTech-FBi-CIA.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FedTech-FBi-CIA.jpg" /><br /><span style="font-size: 11px; line-height: 20.8px;">FBI CIO Gordon Bitko, second from left, speaks alongside CIA CIO John Edawrds, third from left, about IT innovation. Photo credit: Phil Goldstein</span></p> <p>The FBI is trying to take a similar approach to the CIA, Bitko said, in that it is focused on <strong>delivering </strong><strong>a number of core</strong><strong>, shared IT services at the enterprise level,</strong> and allowing different field offices and mission areas to have <strong>more flexibility to pursue mission-specific IT</strong>.</p> <p>“I don’t like the term <a href="https://fedtechmagazine.com/article/2017/07/why-shadow-it-now-gets-second-chance-cios" target="_blank">shadow IT</a>, either,” Bitko said, hitting on a theme <a href="https://fedtechmagazine.com/article/2017/03/fbi-wants-make-most-shadow-it">he has discussed in the past</a>. Shadow IT — unauthorized technology services and apps that are procured outside of the IT department — is a “pejorative” term, Bitko said.</p> <p>“It connotes to people that you are doing something wrong and hiding it,” he said. <strong>“My goal is to empower them.”</strong></p> <p>While Bitko said the FBI has not gone down the CIA’s route on franchisees, by delivering a core platform of IT services to field offices, he said the FBI enables and encourages agents and IT professionals to<strong> “drive new technology at the mission edge.”</strong></p> <p>Like many agencies, Bitko said, the FBI is now an IT organization. “There isn’t a single thing we do at the agency that IT isn’t fundamental to our ability to be successful,” he said. His goal is to be able to allow mission areas to be on the “cutting edge, the pointy end of the spear.”</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Core</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/04/fbis-most-wanted-list-info-commercial-cloud"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-FBIHQ.jpg?itok=dTOrx134" width="124" height="94" alt="FBI headquarters at night " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2018/04/fbis-most-wanted-list-info-commercial-cloud"><span>On the FBI’s Most Wanted List: Info on Commercial Cloud</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/08/its-not-top-secret-intelligence-community-encourages-data-sharing"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201708/FT_Q317_TQA_Tynan_hero.jpg?itok=-yR6438q" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2017/08/its-not-top-secret-intelligence-community-encourages-data-sharing"><span>It&#039;s Not Top Secret: The Intelligence Community Encourages Data Sharing</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/10/why-intelligence-agencies-are-so-interested-ai"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201710/FedTech--AI.jpg?itok=JDfOgKKh" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/software">Software</a> </h2> <header class="link-node"> <a href="/article/2017/10/why-intelligence-agencies-are-so-interested-ai"><span>Why Intelligence Agencies Are So Interested in AI</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/cia-turns-fast-food-it-innovation-and-fbi-takes-note" data-title="How is the @CIA’s #IT department like @McDonalds? In more ways than you’d think. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/cia-turns-fast-food-it-innovation-and-fbi-takes-note" data-title="How is the @CIA’s #IT department like @McDonalds? In more ways than you’d think. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/cia-turns-fast-food-it-innovation-and-fbi-takes-note" data-title="How is the @CIA’s #IT department like @McDonalds? In more ways than you’d think. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>10</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> Tue, 10 Apr 2018 16:31:49 +0000 phil.goldstein_6191 40651 at https://fedtechmagazine.com USDA Kicks Off IT Modernization via Centers of Excellence https://fedtechmagazine.com/article/2018/04/usda-kicks-it-modernization-centers-excellence <span>USDA Kicks Off IT Modernization via Centers of Excellence</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201804/FedTech-GSA-CoE.jpg" width="1440" height="560" alt="Joanne Collins Smee and Chris Liddell " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 04/09/2018 - 12:56</span> <div><p>After months of planning, the government’s new IT modernization “<a href="https://fedtechmagazine.com/article/2018/01/white-house-aims-propel-tech-modernization-centers-excellence">Centers of Excellence</a>” are being put to use.</p> <p><strong>The Agriculture Department kicked off the effort to use the CoEs last week,</strong> according to Joanne Collins Smee, who heads the General Services Administration’s Technology Transformation Services, the unit running the CoEs.</p> <p>The five CoEs are based around <strong>cloud adoption, IT infrastructure optimization, customer experience, service delivery analytics and contact centers</strong>. The goal of the centers is to accelerate modernization by leveraging private sector expertise and talent, and to provide agencies with consulting and IT engineering services to radically improve the way they design services and interact with their citizens.</p> <p>In mid-March, <a href="https://fedtechmagazine.com/article/2018/03/gsa-awards-contracts-it-centers-excellence">the GSA awarded five contracts</a> to help the USDA go through a discovery and assessment phase of using the CoE model to determine how best to move forward on modernization.</p> <p>The CoEs are kicking off at the USDA, but the GSA wants to use the lessons learned there and <strong>apply them across the government</strong> as agencies <a href="https://fedtechmagazine.com/article/2017/12/white-house-releases-final-it-modernization-report">fulfill the recommendations</a> of the White House’s <a href="https://fedtechmagazine.com/article/2017/12/white-house-releases-final-it-modernization-report">IT modernization report</a>, which was released in December. Collins Smee, speaking April 5 at <a href="https://www.fedscoop.com/events/it-modernization-summit/2018/">FedScoop’s IT Modernization Summit</a> in Washington, D.C., said that the CoEs are designed to handle “some of the big rocks we have in the federal government” via centralized talent and will do so in an “industrialized manner.”</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP:</strong> Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>USDA Starts on IT Modernization Path</h2> <p>The USDA and the GSA have developed an “incredible working relationship,” Collins Smee said, praising the work of Agriculture Secretary Sonny Perdue, Deputy Secretary Steve Censky and <a href="https://www.usda.gov/media/press-releases/2018/02/02/perdue-names-new-leaders-usdas-departmental-administration" target="_blank">CIO Gary Washington</a>.</p> <p>Washington and his team have <strong>focused on effecting change at the “root level” of the agency,</strong> Collins Smee said. Washington’s office hit upon a “brilliant idea” the GSA will now use at other agencies, she added.</p> <p>The USDA ran a<strong> “top talent” contest for 10 IT leaders</strong> across the agency who will now be <strong>embedded in the CoEs for the next two years </strong>and who will report to Collins Smee. She said these employees are “leaders already recognized in IT at USDA.”</p> <p>“They will continue to have the DNA and really effect that cultural change within the organization,” Collins Smee said. “Never mind the other stroke of brilliance is they know where everything is buried with the organization, right? They’re top talent across USDA. It was a brilliant idea, and we were noodling on this thing about culture change and how do we effect the best culture change.”</p> <p>Chris Liddell, <a href="https://www.washingtonpost.com/news/post-politics/wp/2018/03/19/christopher-liddell-named-white-house-deputy-chief-of-staff-for-policy-coordination/?utm_term=.809858607bdf" target="_blank">deputy chief of staff for policy coordination at the White House</a>, said the journey the government is on is<strong> “probably the biggest IT modernization” of all </strong><strong>time</strong>, since it involves 2 million federal employees and updating technologies that in some cases are decades old.</p> <p>Liddell, speaking alongside Collins Smee, said that the effort is “orders of magnitude bigger than past modernizations,” though he acknowledged that it builds on <a href="https://fedtechmagazine.com/article/2017/01/what-obama-administrations-technology-legacy">efforts of the Obama administration</a>. Liddell formerly ran the White House’s American Technology Council and is a strategic member of the Office of American Innovation, serving as one of the administration’s point people on IT modernization.</p> <p>Technology has evolved faster in the private sector than the government has been able to adopt new IT, Liddell said. “On a relative basis, we’re falling behind,” he added.</p> <p>A key goal of the Trump administration is to<strong> set up the “institutional capacity that will effect change over the long term,”</strong> Liddell said. He noted that IT modernization is not something that is likely to be solved in a year or two, or even in an administration. That’s why the CoE model is critical, so that best practices can be spread across the government.</p> <p>Collins Smee, who spent a dozen years in various rolls at <a href="https://www.cdwg.com/content/cdwg/en/brand/ibm.html" target="_blank">IBM</a> before coming into government in January 2017, said she wasn’t expecting to find the “caliber of technical talent” that exists in the government — people who are “incredibly smart and want to do good things.” The goal is to harness that power, she said.</p> <h2>The Goals of Federal IT Modernization</h2> <p>Liddell agreed that there are “lots of people doing great things” across the government to upgrade IT, but that they were “not necessarily coordinating with each other.” The Office of American Innovation set up weekly meetings last year with lots of stakeholders to coalesce around a common set of terminology, goals and objectives, Liddell said. <strong>Those efforts don’t change </strong><strong>culture</strong><strong> but enable it</strong>, he said.</p> <p>Agencies should <strong>upgrade their technology so that they can update citizen-facing services,</strong> Liddell said. “The economics of what we do is important,” he said. “But if we did nothing else than make citizen-facing services better, that would be a huge contribution. If we can make their lives 5 to 10 percent better by digitizing services, or making digital services from 2005 more circa 2020, that would make the individual, average person’s life fundamentally better, and that would be a massive contribution.”</p> <p>Collins Smee acknowledged that the government is “not going to bring in hordes of more IT people.” Agencies need to enhance the capabilities of IT workers who are already in place, and the CoEs are part of the effort to “get the outcomes citizens deserve,” she said.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25506 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Core</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/white-house-maps-out-vision-it-modernization-centers-excellence"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FedTech--WhiteHouse6.jpg?itok=DsYHJG5j" width="124" height="94" alt="The White House in winter " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/02/white-house-maps-out-vision-it-modernization-centers-excellence"><span>White House Maps Out Vision for IT Modernization Centers of Excellence</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/01/white-house-aims-propel-tech-modernization-centers-excellence"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/%5Bcurrent-date%3Acustom%3AYm%5D/FedTech--Agriculture.jpg?itok=QFv5eD9R" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/01/white-house-aims-propel-tech-modernization-centers-excellence"><span>White House Aims to Propel Tech Modernization with Centers of Excellence</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/03/how-your-agency-should-think-about-legacy-system-modernization-perfcon"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201803/FedTech-MGT.jpg?itok=jXbWUDdF" width="124" height="94" alt="Census Bureau workers in the 1980s on cpmputers " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/03/how-your-agency-should-think-about-legacy-system-modernization-perfcon"><span>How Your Agency Should Think About Legacy System Modernization</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/04/usda-kicks-it-modernization-centers-excellence" data-title=".@USGSA Joanne Collins Smee: #ITmodernization Centers of Excellence are designed to handle “some of the big rocks we have in the federal government.”" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/article/2018/04/usda-kicks-it-modernization-centers-excellence" data-title=".@USGSA Joanne Collins Smee: #ITmodernization Centers of Excellence are designed to handle “some of the big rocks we have in the federal government.”" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fitok%3D7yMVgPSp%26destination%3D%2F%253Fitok%253D7yMVgPSp%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/04/usda-kicks-it-modernization-centers-excellence" data-title=".@USGSA Joanne Collins Smee: #ITmodernization Centers of Excellence are designed to handle “some of the big rocks we have in the federal government.”" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Apr</span> <span>09</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"></a></p> <p class='speaker'> </p> </div> </div> Mon, 09 Apr 2018 16:56:18 +0000 phil.goldstein_6191 40646 at https://fedtechmagazine.com