FedTech Magazine - Technology Solutions That Drive Government https://fedtechmagazine.com/rss.xml en Marine Corps Partners with San Diego to Promote Smart City Vision https://fedtechmagazine.com/article/2019/03/marine-corps-partners-san-diego-promote-smart-city-vision <span>Marine Corps Partners with San Diego to Promote Smart City Vision</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 03/19/2019 - 12:06</span> <div><p>For nearly a century, the U.S. Marine Corps has <a href="https://www.mcrdsd.marines.mil/About/Depot-History/" target="_blank">called San Diego home</a>. In 1921, the Marine Expeditionary Advanced Base began operations in the city. Two years later, the <a href="https://www.mcrc.marines.mil/Units/12-Marine-Corps-District/" target="_blank">Marine Recruit Depot</a> for the West Coast moved from Mare Island Navy Shipyard in Vallejo, Calif., to the base in San Diego.</p> <p>Lately, <a href="https://www.miramar.marines.mil/" target="_blank">Marine Corps Air Station Miramar</a>, part of the Corps’ presence in the city, has taken steps to <strong>become energy independent from the city in the event of an energy disruption or shortage</strong>, <a href="https://www.dvidshub.net/news/304441/mcas-miramar-continues-progress-toward-energy-independence" target="_blank">as the Defense Visual Information Distribution Service reports</a>. </p> <p>“MCAS Miramar has nearly completed its microgrid system, which will be monitored and managed out of a newly-built Energy and Water Operations Center,” the publication notes. </p> <p>Now, the Marines are building on those efforts via <a href="https://www.sandiego.gov/sites/default/files/20190221_marinecorpsinstallationscommandmou.pdf" target="_blank">a new agreement</a> it signed with San Diego to collaborate on smart city technologies such as <strong>unmanned aircraft systems, smart streetlights, renewable energy and other applications</strong>.</p> <p>As part of the new memorandum of understanding between the city and the Marines, they agreed to work together to “foster collaborations between the parties on ‘smart city’ topics of mutual interest in support of each organization’s respective goals in the areas of <strong>protection, resilience, maintenance, mobility, operational reach and community</strong>.”</p> <p>“We’re building on the long tradition of collaboration between the U.S. military and the city of San Diego and taking that partnership to the next level for the betterment of the San Diego region,” San Diego Mayor Kevin Faulconer <a href="https://www.sandiego.gov/mayor/news/releases/city-san-diego-marine-corps-sign-cooperative-agreement-smart-city-initiatives" target="_blank">said in a statement</a>. “We will share our experiences, share our discoveries, and share how advanced technology can benefit the people we serve.”</p> <p>“We’re proud of supporting the community because we are the community,” Marine Corps Maj. Gen. Vincent Coglianese said at an event announcing the partnership alongside Faulconer, <a href="https://www.nbcsandiego.com/news/local/Marine-Corps-and-San-Diego-Agree-to-Create-Smart-City-506173881.html" target="_blank">according to NBC San Diego</a>. <strong>“We’re a part of San Diego.”</strong></p> <p><strong><a href="https://fedtechmagazine.com/media/video/feds-bust-common-myths-about-iot" target="_blank"><em>VIDEO: </em></a></strong><a href="https://fedtechmagazine.com/media/video/feds-bust-common-myths-about-iot" target="_blank"><em>Watch federal IT leaders bust some common myths about the Internet of Things. </em></a></p> <h2 id="toc_0">How San Diego Will Become Smarter in Tandem with the Marines</h2> <p>The agreements notes that the city and the Marine Corps will hold monthly conference calls and conduct semiannual in-person meetings to discuss smart city projects with which the parties have a mutual interest. They will also set up several working groups around protection and security, mobility, and public works. </p> <p>The agreement references ongoing projects at Marine Corps Air Station Miramar in San Diego that are focused on <strong>renewable energy and water conservation</strong>. The projects have implications for city mobility, energy and water, the MOU notes. “The projects include installing new solar panel fields and other infrastructure to make the base independent from the surrounding grid and water-reuse equipment,” <a href="https://statescoop.com/san-diego-and-marines-to-collaborate-on-smart-city-initiatives/" target="_blank">StateScoop reports</a>. </p> <p>Meanwhile, there are several existing city technology efforts that “have applicability to the military community throughout the region as well as potential unique applicability on” the Marines Corps’ local installations as well. </p> <p>Those efforts include smart streetlights. In 2017, the city installed <strong>3,200</strong> <a href="https://www.sandiego.gov/sustainability/energy-and-water-efficiency/programs-projects/smart-city" target="_blank">smart streetlights</a> with sensors that<strong> reduce energy costs by 60 percent</strong> and turn them into “a connected digital network that can optimize parking and traffic, enhance public safety and track air quality,” <a href="https://www.sandiego.gov/mayor/news/releases/city-san-diego-marine-corps-sign-cooperative-agreement-smart-city-initiatives" target="_blank">according to a city statement</a>.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-report.html" target="_blank"><img alt="Digital%20Transformation_IR_1%20(1).jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Digital%20Transformation_IR_1%20(1).jpg" /></a></p> <p>Another is the city’s <strong>Get It Done application</strong>, which it launched in 2016. The mobile app allows San Diegans to “easily report problems and request improvements for their neighborhoods,” according to a city statement. The app uses GPS data embedded within photos to “automatically update the address and location of problems,” the statement adds.</p> <p>San Diego and the Marines will work together on a variety of programs, including drones. Last year, the U.S. Transportation Department picked the city to advance the testing of drones, grow the innovation economy and create jobs, according to statement from the city. As part of the agreement, the city will request the inclusion of the Marines as one of the more than 20 partners in the San Diego region’s consortium for the pilot program.</p> <p>The Marines are not the only service branch interested in smart city partnerships. Lt. Col. Lloyd McDonald, commander of the 42nd Communications Squadron at <a href="https://www.maxwell.af.mil/" target="_blank">Maxwell Air Force Base</a> in Montgomery, Ala., <a href="https://fedtechmagazine.com/article/2019/02/qa-air-forces-mcdonald-how-maxwell-air-force-base-tests-smart-city-technology">tells <em>FedTech</em></a> that while the base’s smart city applications are “totally base-oriented,” the base has had “<strong>discussions with the city of Montgomery</strong> as they move forward with <a href="https://statetechmagazine.com/article/2019/03/montgomery-ala-lays-foundation-smart-city-projects">their own smart city project</a>.” </p> <p>“We’re looking at areas where our interests coincide, and where Defense Department rules for public-private partnerships might allow us to partner on different pieces of technology insertion that would benefit not only the base, but also the city,” he says.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Tue, 19 Mar 2019 16:06:10 +0000 phil.goldstein_6191 42321 at https://fedtechmagazine.com What Is Fog Computing? Tech That Can Spur Government IT Modernization https://fedtechmagazine.com/article/2019/03/what-fog-computing-tech-can-spur-government-it-modernization-perfcon <span>What Is Fog Computing? Tech That Can Spur Government IT Modernization</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 03/14/2019 - 12:48</span> <div><p>Federal agencies are <a href="https://fedtechmagazine.com/article/2019/02/iaas-vs-paas-vs-saas-what-cloud-strategy-right-your-agency-perfcon">clearly moving to the cloud</a> and are also increasingly adopting <a href="https://fedtechmagazine.com/article/2019/02/edge-computing-air-force-and-fema-take-advantage-intelligent-edge-perfcon">edge computing solutions</a>. But what sits between the cloud and the edge? <strong>Fog computing. </strong></p> <p>While fog computing and edge computing have many similarities, there are some clear differences. A key one is where fog sits and how it interacts with the cloud and edge devices.<strong> Fog brings cloud capabilities to the network edge. </strong>Both are intended to improve the latency of connections and applications and processing of data near the network edge.</p> <p>Like edge, fog computing is still relatively nascent in government. <a href="https://www.nist.gov/" target="_blank">The National Institutes of Standards and Technology</a> in March 2018 produced <a href="https://csrc.nist.gov/csrc/media/publications/sp/800-191/draft/documents/sp800-191-draft.pdf" target="_blank">a document that describes a conceptual model of fog computing</a> but does not definitively define it.</p> <p>The NIST document notes that “fog computing is a horizontal, physical or virtual resource paradigm that <strong>resides between smart end-devices and traditional cloud or data centers</strong>. This paradigm supports vertically-isolated, latency-sensitive applications by providing ubiquitous, scalable, layered, federated, and distributed computing, storage, and network connectivity.”</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/hybrid-cloud-infrastructure-report.html" target="_blank"><img alt="IT%20Infrastructure_IR_1%20(2)_0.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/IT%20Infrastructure_IR_1%20(2)_0.jpg" /></a></p> <h2 id="toc_0">What Is Fog Computing?</h2> <p>Michaela Iorga, NIST’s senior security technical lead for cloud computing, and one of the co-authors of the agency’s conceptual model of fog computing, notes that NIST perceives fog computing as a “logical layer model.” It is designed to enable ubiquitous access to shared, scalable computing resources, she notes. </p> <p>“Logically, <strong>fog computing is placed between cloud, which is a very centralized service, and the edge of the network fabric</strong>,” where smart end device and IoT devices sit, Iorga says. “Fog computing <strong>creates that extension of cloud functionality when you need it </strong>and brings that functionality closer to where latency is very important, and the geographical distribution is very important for the applications.”</p> <p>Fog computing not only brings cloud computing capabilities to the edge of an agency’s Local Area Network or IoT network, but it also interoperates with agency’s cloud environments, according to Grimt Habtemariam, federal cloud strategist at <a href="https://www.cdwg.com/content/cdwg/en/brand/cisco.html" target="_blank">Cisco Systems</a>, and Marcus Moffett, a senior systems engineer at Cisco.</p> <p>Fog, they note, enables IT teams “to create a consistent multi-cloud environment that can deliver the agility needed for application developers to innovate with speed and for government to unlock the power of the data generated at the edge.” </p> <p>Both fog and edge computing are “basically involved with the arraying of various kinds of computation, networking and storage elements in IoT networks between the bottom of the cloud and the top of the network side of intelligent sensors, actuators and end devices,” says Chuck Byers, CTO of <a href="https://www.openfogconsortium.org/" target="_blank">the </a><a href="https://www.openfogconsortium.org/" target="_blank">OpenFog</a><a href="https://www.openfogconsortium.org/" target="_blank"> Consortium</a>. “It’s really about how we respond to the specific challenges of IoT networks that make fully cloud-based hosting of that cognition less attractive.”</p> <p><a href="https://fedtechmagazine.com/article/2019/01/digital-twin-technology-what-digital-twin-and-how-can-agencies-use-it-perfcon" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Find out what digital twin technology is and how agencies can use it. </em></a></p> <h2 id="toc_1">Fog Computing vs. Edge Computing: What’s the Difference?</h2> <p>Fog computing and edge computing are closely related but separate concepts. “Technologically, we have seen that fog computing is a layer that helps you get everything that you need closer to the edge where the function is necessary,” Iorga says.</p> <p>The network edge refers to any location outside the data center where data is generated. <strong>Edge computing provides security, networking, compute and storage resources</strong>, Habtemariam and Moffett note. “It enables data collection and real-time data processing critical to helping organizations make decisions on time-sensitive data sets,” they add.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 14 Mar 2019 16:48:50 +0000 phil.goldstein_6191 42311 at https://fedtechmagazine.com HHS Uses AI Tools to Help Battle Diseases https://fedtechmagazine.com/article/2019/03/hhs-uses-ai-tools-help-battle-diseases <span>HHS Uses AI Tools to Help Battle Diseases</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 03/13/2019 - 10:27</span> <div><p>Artificial intelligence can be used in government for a whole lot more than <a href="https://fedtechmagazine.com/article/2018/06/hello-ill-be-your-chatbot-today-how-can-i-help-you">just chatbots</a>.</p> <p>The Department of Health and Human Services in January concluded a 14-week technology sprint known as The Opportunity Project (TOP) Health sprint. During the sprint, 10 teams <strong>delivered digital tools that were built with federal data and AI to enhance medical testing, explore new kinds of treatment and improve care via analytics for a variety of diseases</strong>. Federal agencies partnered with private sector organizations on the project, including <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoft.html" target="_blank">Microsoft</a> and <a href="https://www.cdwg.com/content/cdwg/en/brand/oracle.html" target="_blank">Oracle</a>. </p> <p>“At HHS, we recognize that Federal government alone cannot solve our most important and complex challenges,” HHS CTO Ed Simcox <a href="https://www.hhs.gov/cto/blog/2019/1/17/top-health-tech-sprint-unleashes-the-power-of-open-data-and-ai.html" target="_blank">said in a blog post</a>, adding, “the TOP Health sprint is a valuable step in leveraging skills from industry with public resources to promote better health outcomes.”</p> <p>HHS also conducted the project with <a href="https://presidentialinnovationfellows.gov/" target="_blank">the Presidential Innovation Fellows</a> (PIF), a program run by the General Services Administration. This past week, HHS released more information on one of the key challenges the sprint identified: AI approaches for facilitating an experimental therapy ecosystem. The challenge, according to the HHS blog post, sought to answer the question, <strong>how can we do better by leveraging standards and emerging technologies?</strong></p> <p>According to HHS, the program led to new insights on how sharing federal data with the private sector could be encouraged and monitored. Agencies were <strong>“interested in understanding and customizing datasets for various use cases, but were primarily focusing on internal government use,”</strong> according to <a href="https://www.hhs.gov/cto/blog/2019/03/05/deep-dive-how-a-health-tech-sprint-pioneered-an-ai-ecosystem.html" target="_blank">a separate HHS blog post</a>. And, the agency says, the “lightweight collaboration through TOP Health strengthened the intersection of government and industry.”</p> <p>Joshua Di Frances, executive director of the PIF program, said in a blog post that this collaboration across agencies and private companies shows there are new avenues for combining open federal data and AI technologies. “Through incentivizing links between government and industry via a bidirectional AI ecosystem, we can help promote usable, actionable data that benefits the American people,” he said.</p> <p><a href="https://fedtechmagazine.com/article/2019/02/how-robotic-process-automation-will-help-agencies" target="_blank"><em><strong>MORE FROM FEDTECH:</strong> Find out how robotic process automation will help agencies.</em></a></p> <h2 id="toc_0">HHS Turns to AI to Get Insights and Help Patients</h2> <p>According to a blog post by <a href="https://www.linkedin.com/in/gilalterovitz/" target="_blank">Gil Alterovitz</a>, a research affiliate with the Veterans Affairs Department, and <a href="https://www.hhs.gov/ash/advisory-committees/tickbornedisease/members/index.html" target="_blank">Kristen Honey</a>, innovator in residence at HHS’ office of the CTO, agencies and patient advocates who worked together on AI projects largely said that the sprint “allowed for an open exchange of ideas and the opportunity for further collaboration between the U.S. government and private sector companies.” </p> <p>By January 2019, seven TOP Health teams had delivered digital tools. The teams used data from the open-data portal <a href="https://www.data.gov/" target="_blank">data.gov</a> to “create <strong>digital products, apps </strong><strong>and</strong><strong> gamification inventions to improve clinical trials, experimental therapies, and data-driven solutions</strong> for complex challenges from cancer to Lyme and tick-borne diseases,” Alterovitz and Honey said. </p> <p>Among the tools was the Microsoft Healthcare Bot built by Microsoft Healthcare in Israel. The tool aims to “democratize clinical trials matching by helping patients and doctors find suitable trials quickly and easily” through <strong>conversational AI, advanced machine reading on clinical trials eligibility criteria, natural language processing </strong><strong>and</strong><strong> smart qualification</strong>. </p> <p>The Energy Department’s Oak Ridge National Laboratory had its SmartClinicalTrials team work on “a large knowledge graph representation for cancer clinical trials to enable discovery of new concepts from unstructured text.” </p> <p>And, Oracle Public Sector and Oracle Healthcare <strong>built a patient-centric solution for clinical trial matching</strong>. The solution matches patients battling cancer with clinical trial programs and uses AI to “provide a more simplified and personalized experience for determining treatment.”</p> <p>The private sector was looking to “minimize risk” when choosing which data sets to use among the vast quantities of available federal data, Alterovitz and Honey said. “Through the TOP Health process, multiple high-value datasets were unlocked from over a dozen collaborating agencies/departments.”</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-report.html" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Digital%20Transformation_IR_1.jpg" /></a></p> <h2 id="toc_1">Agencies Work with HHS to Provide Open Data</h2> <p>Several agencies were involved with TOP. The <a href="https://www.uspto.gov/" target="_blank">U.S. Patent and Trademark Office</a>, for instance, assembled a large set of invention topics to help inspire prospective inventors, including those with applications in the AI ecosystem and experimental therapeutics space.</p> <p>The VA offered access to de-identified cancer patients for use in matching to trials/therapeutics and analytical tools for AI and machine learning. </p> <p>HHS says the AI work allowed researchers to create new data sets, and they were<strong> able to derive fresh insights from the data</strong>. For example, the <a href="https://www.cancer.gov/" target="_blank">National Cancer Institute</a>, which is part of the National Institutes of Health, “generated three new data sets including data on: structured eligibility criteria, participants based on call samples to contact center, and medical professional-curated participant/trial match rating,” according to the HHS blog post. NCI also provided medical professional curation to make data sets and give guidance.</p> <p>At the end of the day, the program is about helping patients, and HHS said user-centered feedback from a wide range of individuals guided the development of all the digital tools. </p> <p>For example, patient advocates such as Stephen Aldrich, the 63-year-old founder and former CEO of <a href="http://www.bio-era.net/" target="_blank">Bio Economic Research Associates</a>, a private research and advisory firm, provided valuable feedback and perspective. </p> <p>Aldrich was diagnosed with metastatic stage 4 adenocarcinoma of the esophagus in late March 2017. “My response to my fatal cancer diagnosis served as an inspirational case study for the sprint group,” Aldrich said, adding that he is <strong>hopeful for the future of experimental therapeutics via AI and open data</strong>.</p> <p>“I am extremely grateful to live at a time when what used to be a terminal cancer diagnosis can be turned into something much less threatening due, in no small part, to our exploding ability to gather and analyze personal genomic information,” Aldrich said. “I envision a day when all cancer patients have had their cancers fully sequenced, and enjoy direct control over their fundamental genomic and health data, enabling them to quickly identify the best potential treatment options for their unique cancers. Amazing cures are possible, if we enable them to happen.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Wed, 13 Mar 2019 14:27:34 +0000 phil.goldstein_6191 42306 at https://fedtechmagazine.com Best Practices for Sharing Information with Third-Party Systems https://fedtechmagazine.com/article/2019/03/best-practices-sharing-information-third-party-systems <span>Best Practices for Sharing Information with Third-Party Systems</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 03/12/2019 - 11:45</span> <div><p>The cloud <a href="https://fedtechmagazine.com/article/2019/02/iaas-vs-paas-vs-saas-what-cloud-strategy-right-your-agency-perfcon">brings many benefits to federal agencies</a>, including scalability of resources, cost savings and the ability to develop modernized applications. However, IT leaders need to ensure their agencies’ data is secure as they reap the benefits of these new architectures. </p> <p>As agencies move more of their information to the cloud, <strong>more of that data becomes visible to third-party information systems</strong>. </p> <p>The new federal <a href="https://cloud.cio.gov/strategy/#continuous-data-protection-and-awareness" target="_blank">Cloud Smart strategy</a> suggests that agencies make sure the third-party system provides access to its log data and notifies the partner agency immediately of incidents that could affect the agency’s cybersecurity. </p> <p>Agencies and their IT security teams should take a series of interconnected actions to ensure their data is secure when being shared with third-party systems, including <strong>access control policies, deploying multifactor authentication, separating authentication from access control</strong> and other best practices. </p> <p><a href="https://fedtechmagazine.com/article/2019/01/creative-cyberworkers-retain-their-place-workforce" target="_blank"><em><strong>MORE FROM FEDTECH:</strong> Find out why creative federal cybersecurity workers will have more job security. </em></a></p> <h2 id="toc_0">The Importance of Data Security When Sharing with Third Parties</h2> <p>Agencies are the <strong>custodians of their data and hold it on behalf of the public</strong>, the Cloud Smart strategy notes. “As such, each agency should determine its own governance model for cloud-hosted data that aligns with their identity and credential management systems,” it states. “Additionally, where a cloud solution is deployed by a vendor, a Service Level Agreement (SLA) should be in place that provides the agency with continuous awareness of the confidentiality, security, and availability of its data.”</p> <p>Meanwhile, the strategy explicitly adds, agencies should know if their data resides on third-party information systems, <strong>get access to log data on how their data is used and be notified promptly if a cybersecurity incident</strong> or other adverse event occurs. “Agencies should consider having an agreement with all providers, be they federal or commercial, regarding access to and use of log data for their information security operations,” the policy notes. </p> <p>Further, agencies should be aware of the third-party provider’s privacy policies for personally identifiable information and other sensitive information, as well as who within the provider has access to agency information, and what the provider’s internal security practices are. </p> <p>As <a href="https://www.isaca.org/Journal/archives/2017/Volume-6/Pages/risk-based-management-approach-to-third-party-data-security-risk-and-compliance.aspx?utm_referrer=" target="_blank">a blog post</a> from nonprofit information security organization ISACA notes, third parties include, but are not limited to, technology service providers; payroll services; accounting firms; invoicing and collection agencies; benefits management companies; and consulting, design and manufacturing companies. </p> <p>“Most third-party commercial relationships require sending and receiving information, access to the enterprise network and systems, and using the enterprise’s computing resource,” the blog post notes. “The risk posed at different levels and <strong>the impacts range from low to very significant</strong>.”</p> <p>When a third party stores, accesses, transmits or performs business activities for and with an enterprise or agency, the ISACA post adds, “it represents a probable risk” for the agency. The degree of risk and the material effects of a breach are highly correlated with the sensitivity of the data and how much data is being transferred. </p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="https://biztechmagazine.com/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> <h2>How to Enhance Data Security in Third-Party Systems </h2> <p>There are numerous best practices agency IT leaders should implement to safeguard data that may traverse or reside in third-party information systems. </p> <p><a href="https://www.cdwg.com/search/?key=ca&amp;searchscope=all&amp;sr=1&amp;ln=0&amp;b=CCF.COM" target="_blank">CA Technologies</a> offers a handful of smart, common-sense tips <a href="https://www.ca.com/content/dam/ca/us/files/ebook/five-best-practices-to-manage-and-control-third-party-risk.pdf" target="_blank">in a presentation</a> that can apply to agencies large and small. Agencies should: </p> <ul><li>Implement supporting processes and controls that <strong>define and enforce access policies for third-party privileged users</strong>. Essentially, you as an agency IT leader don’t want personnel at the third party to have unfettered access to your data.</li> <li>Improve user verification by<strong> operating multifactor authentication technology</strong>, so privileged credentials are more difficult to compromise, even if attackers use social engineering and phishing attacks. Two-factor or multifactor authentication is a must-have in today’s security environment.</li> <li><strong>Separate authentication from access control</strong>, in a form of least privilege access. This way privileged users “have only limited visibility to internal networks, minimizing the possible damage one user — or one set of stolen credentials — can inflict.”</li> <li>Prevent unauthorized commands and mistakes with “<strong>real-time policy enforcement</strong> as a first line of defense, protecting the infrastructure from malicious activity and mistakes.”</li> <li><strong>Monitor activity and investigate</strong> suspicious events to “quickly catch breaches, improve training when needed and continuously refine automation and processes.”</li> </ul><p>These are just a few of the ways agencies can safeguard data in third-party systems and ensure they are maintaining their responsibility as custodians of the data they hold in the public’s trust.</p> <p><em>This article is part of </em>FedTech's <em><a href="https://fedtechmagazine.com/capital" tabindex="-1">CapITal blog series</a>. Please join the discussion on Twitter by using the <a href="http://twitter.com/hashtag/FedIT" tabindex="-1" target="_blank">#FedIT</a> hashtag.</em></p> <p><em><a data-entity-type="" data-entity-uuid="" href="https://fedtechmagazine.com/capital" tabindex="-1" target="_blank"><img alt="CapITal blog logo" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/CapITal_Logo.jpg" /></a></em></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11626"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/Vida.jpg?itok=jr-RTi_t" width="58" height="58" alt="Adam Vida od CDW. " typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11626"> <div>Adam Vida</div> </a> </div> <div class="author-bio"> <p> <div><p>Adam Vida is a federal sales manager at CDW•G.</p> </div> </p> </div> </div> </div> </div> Tue, 12 Mar 2019 15:45:03 +0000 phil.goldstein_6191 42301 at https://fedtechmagazine.com NASA Helps Make Urban Drone Use a Growing Reality https://fedtechmagazine.com/article/2019/03/nasa-helps-make-urban-drone-use-growing-reality <span>NASA Helps Make Urban Drone Use a Growing Reality </span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 03/11/2019 - 11:58</span> <div><p><strong>Drones are closer to becoming part of the traffic stream </strong>in urban environments thanks to NASA.</p> <p><a href="https://www.nasa.gov/press-release/nasa-tests-urban-drone-traffic-management-in-nevada-texas" target="_blank">NASA recently selected two organizations</a>, the Nevada Institute for Autonomous Systems in Las Vegas and the Lone Star UAS Center for Excellence &amp; Innovation in Corpus Christi, Texas, to oversee demonstrations of NASA’s UAS Traffic Management (UTM) system. Residents of Reno and Corpus Christi can <strong>expect to see drones in the sky in the coming months as test flights commence</strong>.</p> <p>NASA’s leadership in this initiative may seem surprising, given the agency’s close association with and focus on space travel. But the UTM project hearkens back to NASA’s early history and involvement in the development of aviation technology, dating back to the 1915 founding of NASA’s precursor, the National Advisory Committee for Aeronautics. </p> <p>The agency had a hand in developing much of the aviation technology in use by the airline industry today.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/alexander-slagg"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/alex-slagg.jpg?itok=ingOHmnw" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/alexander-slagg"> <div>Alexander Slagg</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=museloose&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Alex is a content strategist at CDW, editing and managing digital and print content, with a special focus on security, networking and cloud technologies. He also blogs about creativity and the craft of writing. He currently lives in Chicago.</p> </div> </p> </div> </div> </div> </div> Mon, 11 Mar 2019 15:58:57 +0000 phil.goldstein_6191 42296 at https://fedtechmagazine.com Smaller Agencies Still Manage to Digitize Huge Volumes of Data https://fedtechmagazine.com/article/2019/03/smaller-agencies-still-manage-digitize-huge-volumes-data <span>Smaller Agencies Still Manage to Digitize Huge Volumes of Data </span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 03/08/2019 - 10:19</span> <div><p>In April 2018, the U.S. Government Publishing Office and the National Archives’ Office of the Federal Register announced that they had <a href="https://www.gpo.gov/who-we-are/news-media/news-and-press-releases/gpo-completes-digitizing-all-issues-of-the-federal-register" target="_blank">digitized every issue of the Federal Registe</a>r, dating back to the first one published in 1936. </p> <p>The Federal Register is the official journal of the federal government and contains agency rules, proposed rules, and public notices. <a href="https://www.govinfo.gov/app/collection/FR" target="_blank">The collection</a> totaled <strong>14,587 individual issues</strong>, which is nearly <strong>two million pages</strong>. To make them <a href="https://www.federalregister.gov/reader-aids/office-of-the-federal-register-blog/2017/01/federal-register-digitization-project" target="_blank">searchable online</a>, the Federal Register issues were scanned using optical character recognition technology. </p> <p>The GPO had reason to digitize the documents, since it is the is the government’s official, digital, secure resource for producing, procuring, cataloging, indexing, authenticating, disseminating and preserving the official information products of the government. </p> <p>Agencies large and small are<strong> using scanning and digital storage technologies</strong> to archive and preserve historical artifacts of all kinds. <a href="https://fedtechmagazine.com/article/2019/02/library-congress-uses-scanning-and-storage-tech-bring-rosa-parkss-story-life">The Library of Congress</a>, which houses more than <strong>168 million items</strong>, is an obvious example. However, there are many other smaller agencies that also benefit from digitization, and many are able to use commercial technologies to do so. </p> <p>Thomas Rieger, manager of digitization services at the library, notes that smaller organizations like local historical societies or libraries can<strong> perform high-quality document digitization with some very basic equipment today</strong>. “It’s gotten good enough to do that,” he says. However, major institutions like a university or the Library of Congress “need very sophisticated, very high-quality equipment to the job right.”</p> <p>Notably, Rieger says, the cost of a higher-end piece of scanning technology is amortized over time, and over a long period of time there actually is not that much cost difference between using <strong>“the very best equipment” and something that is off the shelf</strong>. </p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Fri, 08 Mar 2019 15:19:23 +0000 phil.goldstein_6191 42291 at https://fedtechmagazine.com Census Bureau Boosts Cybersecurity Efforts Ahead of 2020 Count https://fedtechmagazine.com/article/2019/03/census-bureau-boosts-cybersecurity-efforts-ahead-2020-count <span>Census Bureau Boosts Cybersecurity Efforts Ahead of 2020 Count</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 03/06/2019 - 08:36</span> <div><p><a href="https://www.census.gov/" target="_blank">The Census Bureau</a>, after coming under scrutiny last year that it was not doing enough or being transparent enough about its cybersecurity efforts ahead of the 2020 decennial census, has<strong> disclosed it will conduct a red team analysis of its systems</strong>. </p> <p>Atri Kalluri, the chief of the decennial IT division, said last month at <a href="https://www.census.gov/programs-surveys/decennial-census/2020-census/planning-management/program-briefings/2019-02-01-pmr.html" target="_blank">the regular Census Program Management Review meeting</a> that that the agency <strong>recently completed “red team” testing</strong>. A red team is an inside group that explicitly challenges an organization’s strategy or ideas and looks at them from the point of view of an adversary to find weaknesses and avoid mistakes.</p> <p>During the exercise, internal staff members <strong>played malicious actors and added fraudulent responses</strong> in a copy of 2018 field test data, <a href="https://federalnewsnetwork.com/cybersecurity/2019/02/census-adds-bug-bounty-red-team-testing-to-2020-cybersecurity-arsenal/" target="_blank">according to Federal News Network</a>. </p> <p>The goal was to test the accuracy of the Census Bureau’s <strong>self-response quality assurance system, which is designed to spot suspicious incoming data</strong>, according to the publication.</p> <p><a href="https://fedtechmagazine.com/article/2019/01/creative-cyberworkers-retain-their-place-workforce" target="_blank"><em><strong>MORE-FROM-FEDTECH:</strong> Find out why creative cybersecurity workers have a leg up. </em></a></p> <h2 id="toc_0">How Census Plans to Bolster IT Security</h2> <p>Meanwhile, the Department of Homeland Security will work with the intelligence community and private-sector vendors to launch census-specific threat support “similar to what was provided during the recent elections,” Kalluri said at the meeting. </p> <p>DHS will perform penetration tests for the bureau and will<strong> “go further with a red team assessment to evaluate the collective security of the people, processes </strong><strong>and</strong><strong> technologies of 2020 systems,” </strong>Kalluri said. The agency expects to provide an analysis of the results later this month, according to Federal News Network. </p> <p>The stepped-up efforts come amid scrutiny of the census. Last summer, 11 former U.S. cybersecurity officials <a href="https://www.law.georgetown.edu/icap/wp-content/uploads/sites/32/2018/07/Census-Cybersecurity-Letter.pdf" target="_blank">sent a letter</a> to the Commerce Department expressing their concerns about the Census Bureau’s cybersecurity preparations for the count.</p> <p>The letter was signed by several luminaries from the federal cybersecurity world, including J. Michael Daniel, former cybersecurity for the National Security Council; Matthew Olsen, former director of the National Counterterrorism Center; and Christopher Painter, former coordinator for cyber issues at the State Department.</p> <p>They wanted more information on<strong> whether two-factor authentication will be required for all access to census data</strong>, whether such information will always be encrypted while in transit and also while at rest, and how the bureau will use widely accepted cybersecurity measures in general. </p> <p>Ron Jarmin, the Census Bureau’s deputy director, warned in late January of the threat of a disinformation campaign amid the 2020 count, according to Federal News Network. Steven Dillingham, the agency’s new director, told staff he intends to carry out the nation’s population count with “the most professionalism and integrity possible.”</p> <p>When it reaches its peak of operations, the Census Bureau expects to have hired more than 1,500 specialists working out of six regional hubs. </p> <p>“We are engaged in efforts to ensure that this will be a greatly enlarged workforce that will be ready, willing and able to accomplish the mission of the 2020 census — to count everyone once, only once and in the right place,” Dillingham said, according to Federal News Network.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank"><img alt="Cybersecurity_IR_howstrong_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_howstrong_700x220.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Wed, 06 Mar 2019 13:36:29 +0000 phil.goldstein_6191 42286 at https://fedtechmagazine.com Energy Department Aims to Consolidate Email Systems https://fedtechmagazine.com/article/2019/03/energy-department-aims-consolidate-email-systems <span>Energy Department Aims to Consolidate Email Systems</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 03/05/2019 - 09:00</span> <div><p>For many federal agencies, <a href="https://fedtechmagazine.com/article/2018/02/feds-can-kick-start-cloud-migrations-email">migrating email systems to the cloud</a> has been the first step in a journey that IT leaders hope will bring them to greater efficiency and cost savings. At the Energy Department, that journey now involves<strong> controlling the sprawl of cloud email</strong>.</p> <p>The agency is moving to consolidate its enterprise email systems, thanks to <strong>$15 million</strong> in funding it r<a href="https://tmf.cio.gov/projects/#enterprise-cloud-email" target="_blank">eceived from the Technology Modernization Fund Board</a>.</p> <p>Currently, DOE operates <strong>64 separate email systems (of which 45 are on-premises)</strong>, servicing approximately <strong>184,387 mailboxes</strong> across the agency. In fiscal year 2018, DOE planned a limited move of 19 on-premises systems to cloud-based email systems. The TMF-funded project will accelerate the implementation of the agency’s enterprisewide cloud email system. </p> <p>That will allow it to reap large-scale operational benefits and cost savings via the consolidation, upgrade and migration effort for the <strong>26 remaining on-premises systems</strong>. </p> <p>“Historically over the years, quite frankly, email just grew up organically over time at the department,” Energy Department CIO Max Everett <a href="https://federalnewsnetwork.com/ask-the-cio/2019/02/how-energy-is-using-its-15m-loan-to-get-over-the-hump-to-move-to-cloud-email/" target="_blank">told Federal News Network</a>. “One of the results of that is we have a large number of email systems running around across the department. While headquarters and other areas have already moved onto cloud email, we had a number of different sites, for a lot of different reasons, some of them just geography, staffing, budget and other things, that had not made the move to cloud email.”</p> <p>Everett said that consolidating those systems will <strong>help with collaboration, especially for an agency that has a wide variety of missions spread across the country</strong>.</p> <p><a href="https://fedtechmagazine.com/article/2018/11/data-migration-process-how-agencies-can-successfully-move-data-modern-systems-perfcon" target="_blank"><em><strong>MORE-FROM-FEDTECH:</strong> Find out how your agency can successfully migrate data to modern architectures. </em></a></p> <h2 id="toc_0">DOE Sees Numerous Benefits in Cloud Email Migration</h2> <p>The department received its first installment of the TMF loan, <strong>$4 million</strong>, in late 2018. Everett told Federal News Network that the additional funds will help about one-third to one-half of the department migrate to cloud-based email systems. Additionally, he noted, even without the extra funding, from July to December, DOE moved about 6,000 email accounts to the cloud. </p> <p>According to the TMF, without this funding, DOE would need to conduct the migration of the remaining systems in a piecemeal fashion, subject to funding availability. The new project will be funded as a single effort and can be <strong>completed in three years, according to the TMF board and DOE</strong>. </p> <p>By the end of the project, the department will have migrated all on-premises email systems to Software as a Service cloud email. </p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/hybrid-cloud-infrastructure-report.html" target="_blank"><img alt="IT%20Infrastructure_IR_1%20(2)_0.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/IT%20Infrastructure_IR_1%20(2)_0.jpg" /></a></p> <p>“DOE anticipates it will have a greater ability to serve its mission more quickly across sites and capabilities, which will positively impact the American people,” the board states. “The operational benefits of this project include <strong>cost savings, increased efficiency, improved cyber posture and decreased operational risk</strong>.”</p> <p>The migration will happen in two phases. Some users will be move from an on-premises email system to one in their own cloud, and over time DOE will further consolidate email systems in a federated cloud, according to Federal News Network.</p> <p>The TMF funding will also allow the agency to <strong>change how it approaches managing technology</strong>, Everett said. </p> <p>“We are trying to understand what is our cost per service, for email, for a desktop and for all these different services that we do. That is really how we should be managing our IT,” he told Federal News Network. </p> <p>“Cloud email is a really great one. As someone who in his previous life actually administered Exchange, I knew all the different costs you have for having servers, backups, third party tools, licensing and on and on," he said. "So, when you move to cloud email, it really <strong>collapses a lot of those costs into some really basic understandable numbers</strong> of this is how much an email box costs. It’s a starter version of how you can get some of those costs shrunk down very quickly.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Tue, 05 Mar 2019 14:00:05 +0000 phil.goldstein_6191 42281 at https://fedtechmagazine.com Edge Computing: Air Force and FEMA Take Advantage of the Intelligent Edge https://fedtechmagazine.com/article/2019/02/edge-computing-air-force-and-fema-take-advantage-intelligent-edge-perfcon <span>Edge Computing: Air Force and FEMA Take Advantage of the Intelligent Edge</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/28/2019 - 13:57</span> <div><p>Federal agencies are adopting mobile solutions that allow workers in the field to achieve their missions. They are exploring and <a href="https://fedtechmagazine.com/article/2019/02/qa-air-forces-mcdonald-how-maxwell-air-force-base-tests-smart-city-technology">deploying Internet of Things technologies</a> and are enabling users to <a href="https://fedtechmagazine.com/article/2018/11/how-nsf-nasa-state-keep-tech-working-far-flung-employees">get online and process data in far-flung locations</a>, from Antarctica to war zones. </p> <p>Increasingly, more computing and data processing will be happening at the network edge, where devices and users are located. The federal government is gingerly entering the world of edge computing, which <strong>enables faster analysis of data and thus delivers insights in a more timely and relevant way.</strong></p> <p>Edge computing is defined by bringing compute capabilities to where the mission is taking place in the field, and means that data does not have to travel back to a data center to be processed. “In the military world, we call that the tip of the spear,” says Cameron Chehreh, COO and CTO of <a href="https://www.cdwg.com/content/cdwg/en/brand/emc.html#flash?cm_mmc=Vanity-_-EMC-_-NA-_-NA" target="_blank">Dell EMC Federal</a>.</p> <p>The armed forces are using edge computing since so many of their users are deployed away from home bases and data centers. But edge computing is also relevant to civilian agencies like the <a href="https://www.fema.gov/" target="_blank">Federal Emergency Management Agency</a>, which also deploys users into the field to respond to disasters. Those users need to have low-latency data processing and communications, meaning that it takes a short time for them to get a response from the network. Edge computing enables that.</p> <p>Dell and <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoft.html" target="_blank">Microsoft</a> are two of the leading-edge computing vendors in government right now, but there are other players as well. In late November, <a href="https://www.cdwg.com/content/cdwg/en/brand/nutanix.html" target="_blank">Nutanix</a> announced <a href="https://www.nutanix.com/press-releases/2018/11/28/nutanix-xi-iot-brings-intelligence-edge/" target="_blank">the general availability</a> of <a href="https://www.nutanix.com/products/iot/" target="_blank">Xi IoT</a>, a new edge computing service offered as part of the company’s <a href="https://www.nutanix.com/press-releases/2018/11/28/nutanix-introduces-xi-cloud-services-modern-multicloud-era/" target="_blank">Xi Cloud Services</a>. </p> <p>Nutanix claims that Xi IoT eliminates complexity, accelerates the speed of deployment and allows developers to focus on the business logic powering IoT applications and services.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-report.html" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Digital%20Transformation_IR_1.jpg" /></a></p> <h2 id="toc_0">What Is Edge Computing?</h2> <p>Edge computing is about “getting smarter sensors, smarter data and that <strong>compute capacity closer to the data so you can get better insights as this data is traversing your network</strong> into what might ultimately be an enterprise cloud,” Chehreh says.</p> <p>Natalia Mackevicius, director of program management for Microsoft <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoftazure.html" target="_blank">Azure</a> Stack, echoes that concept, and notes that the intelligent edge is the “continually expanding set of connected systems and devices that gather and analyze information close to the physical world where data resides, to deliver real-time insights and immersive experiences that are highly responsive and contextually aware.”</p> <p>In practical terms, that means that these connected systems and devices will help agencies across<strong> “a huge array of mission goals,”</strong> Mackevicius says, such as tracking water quality, improving emergency management, speeding maintenance of vital equipment and bringing insight into complex real-world logistics problems.</p> <p><iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="394" src="https://www.youtube.com/embed/1vFdnhsI1Nk" width="700"></iframe></p> <p>“Enabling intelligent cloud and intelligent edge solutions requires a new class of distributed, connected applications and will ultimately deliver breakthrough outcomes across every aspect of citizen services, military operations, and overall mission impact,” Mackevicius says.</p> <p>Cloud/edge applications are built as a single solution, yet run in a distributed manner, according to Mackevicius. They are optimized to take advantage of both robust cloud capabilities and edge locality. At the network edge, <strong>applications are contextually aware and can run in both connected and disconnected states</strong>.</p> <p>“For agencies operating outside the continental United States, where the network may be unreliable or less secure, the option to transition between connected and disconnected states will dramatically expand options for using technology to address local problems,” Mackevicius says.</p> <p><a href="https://fedtechmagazine.com/article/2019/02/federal-cloud-first-agenda-will-pay-new-ways-agencies" target="_blank"><em><strong>MORE-FROM-FEDTECH: </strong>Learn how embracing a cloud computing architecture can benefit your federal agency. </em></a></p> <h2 id="toc_1">The Benefits and Drawbacks of Edge Computing</h2> <p>Agencies are increasingly deploying cloud computing solutions, but now must deploy and manage devices and network assets all the way out to the network edge, Chehreh says.</p> <p>It is very straightforward to manage assets if agencies have them in an enterprise data center, via a singular or cohesive pool of technology resources, he says. As agencies move out to the edge, those technology resources begin to diversify and fragment. However, with edge computing, agencies can <strong>manage devices at the network edge “as one common virtual enterprise,” </strong>Chehreh says, “because as long as I can touch the device, I can manage it.”</p> <p>That adds in complexity in terms of cybersecurity and tampering, Chehreh says. “But you can <strong>unlock greater power of your data and your information and manage it in a more cohesive, virtual manner</strong> if you choose common platforms, both hardware and software, to build your ultimate solution from,” he adds.</p> <p>As agencies deploy IoT devices, they may be running them in environments like on ships, in airplanes or in areas with less connectivity or network infrastructure than in the continental U.S. Dell is working with Microsoft to bring the tactical Azure Stack into airplanes to create the next generation of the country’s air defense network.</p> <p>“It allows you to take the power of edge computing and tactical cloud into areas where you haven’t been able to take them before, so that you can <strong>produce great results from a mission perspective</strong>,” Chehreh says. “And then, when you can connect back to networks, you can harness further the data you have collected and the information you have analyzed already at the tactical edge, but now fuse it with your enterprise data to <strong>create a more holistic picture</strong>.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 28 Feb 2019 18:57:55 +0000 phil.goldstein_6191 42271 at https://fedtechmagazine.com Spring 2019 https://fedtechmagazine.com/magazine/issue/2019/2/spring-2019 <span>Spring 2019 </span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/28/2019 - 10:21</span> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/magazine/issue/2019/2/spring-2019" data-title="Spring 2019" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>28</span> <span>2019</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://fedtechmagazine.com/magazine/issue/2019/2/spring-2019" data-title="Spring 2019" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/magazine/issue/2019/2/spring-2019" data-title="Spring 2019" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Thu, 28 Feb 2019 15:21:28 +0000 phil.goldstein_6191 42266 at https://fedtechmagazine.com