We sat down with Pam Dyson, the CIO of the Securities and Exchange Commission to discuss what the SEC is responsible for and her duties as CIO of the agency.
Background and PerspectiveRead More...
GovernmentCIO has designed and deployed a DevOps pipeline and process that provides what has been coined “The Developer’s Sandbox.” The main objective of the sandbox is to provide as much of the full stack of DevOps to the developers as possible (e.g., static code analysis, integration testing, cRead More...
“Can I use my personal laptop for work instead of the one furnished to me by my employer?” “How about using my smartphone and tablet to access my company issued email account and voicemail?” “And what about using my own computer and software to perform work for the company?” These are questions rRead More...
Interview with Pam Dyson, Chief Information Officer at the Securities and Exchange Commission
Each year, Information Technology (IT) organizations seek to implement solutions that will reduce cost and improve service to their end users. Within this context, the experiences and benefits received from “Server Virtualization” efforts have clearly demonstrated the value of virtualization as a shared resources approach in IT services management.
Monday, September 19, 2016Omar Quintero
Monday, September 19, 2016Karen Coker
Tags: project management
Who isn’t looking for the next hot productivity tool these days?Read More...
Monday, September 19, 2016Dan Blitz
Tags: cloud computing
Government enthusiasm for cloud computing is palpable.Read More...
Monday, September 19, 2016Paul Beilke
Tags: cybersecurity, federal government
Whatever happened to the Trusted Internet Connection (TIC) initiative?Read More...
Monday, September 19, 2016John Miller
Tags: federal government, small business
While working as a Certified Business Analyst, I have noticed that clients frequently raise the same issues. Several of the myths and facts associated with these issues are outlined below.Read More...
Monday, September 19, 2016Idriss Mekrez
Tags: Federal IT, big data
People talk disparagingly of the data silo, a repository of fixed data that is not used during an organization’s daily operations.Read More...
Monday, September 19, 2016Anne Dunne
Tags: cybersecurity, cryptography
As consumers, retailers, and banks make more use of customer accounts and data thieves grow more sophisticated at hacking into them, it is increasingly important to develop methods of communication security that are not only reliable but also user-friendly.Read More...