August 2012- In these times of rapid innovation, more effective government requires investment to leverage technological advancements that can deliver next-generation services in a more efficient and transparent way. Investing to modernize government runs counter to conventional wisdom in a harsh economic climate that prompts mandates to slash budgets, but the increased need for government services across an expanding portfolio of processes and programs has made it unavoidable.
Virtualization 3.0 expands virtualization beyond just hypervisors and servers. Server virtualization has been the catalyst for the 3.0 era, and it has driven transformation into every aspect of the datacenter, such as storage, networking, and management. The virtualization of all aspects of the datacenter, not just compute, will create the foundation for the cloud model of computing.
Achieving this requires a holistic approach to virtualization and the ongoing management in order to create a unified, ...
Thirty-six percent of enterprise IT leaders surveyed said that implementing a private cloud is a high or critical priority for 2012, but Forrester research suggests that most of these companies aren't operationally ready to make this transition and need to take key operational improvement steps to get there.
Survey data suggests the main challenges are: 1)understanding the stark differences between traditional virtualization and infrastructure-as-a-service (IaaS) and 2)overcoming internal resistance to change.
As the U.S. economy continues to sputter, the federal government has intensified its focus on using IT to enable innovation and create new avenues for joint operations and operational efficiency.
Government agencies that want to harness the power of cloud computing, data center consolidation, cyber security, and energy efficiency can look to the HP FlexNetwork architecture, the industry’s only unified network architecture. With the HP FlexNetwork architecture, agencies can deploy solutions ...
April 2012- Want to eliminate spiraling cost and complexity of your IT infrastructure? Riverbed can help by delivering cloud services with LAN-like performance across your organization. In this whitepaper, we explore how WAN optimization from Riverbed can deliver on the promise of accelerated cloud performance for widely distributed enterprises.
January 2012- In this revealing study, Bloomberg Government discusses the need for the U.S. government and corporations to plug cyber-security gaps that threaten the economy, sensitive data and military communications. Bloomberg Government defense analyst Rob Levinson examines the ongoing efforts to expand the government's role in securing non-government systems, and discusses concerns over costs and privacy issues.
December 2010- Organizations of all sizes have dramatically lowered the cost of their application environments with enterprise open source solutions such as the JBoss Enterprise Application Platform. These enterprises and ISVs often chose JBoss Enterprise Middleware because of its broad portfolio, price point, performance and scalability, and flexibility. Not surprisingly, many customers have found professional support services can magnify the benefits of the open source technology system. Expert support services can provide faster problem resolution, innovative consultation, ...
March 2012- Federal agencies are refining program management practices in response to the Obama administration's Government Accountability Initiative. Learn more.
SolarWinds IT management products are used by virtually every civilian agency, state government, and branch of the military.
Discover why SolarWinds provides powerful and affordable IT management software to federal, state, local and education customers - from enterprise deployments to tactical networks supporting warfighters. Built by IT pros for IT pros, our products are downloadable, easy-to-use and maintain, and provide the power, scale, and flexibility required to manage today's complex, multi-vendor IT environments. <...
Continuous monitoring enables information security professionals and others to see a continuous stream of near real-time snapshots of the state of risk to their security, data, the network, end points, and even cloud devices and applications. Assessing security controls as well as ongoing monitoring of security controls are both directly assisted by continuous monitoring through vulnerability monitoring processes, which many organizations already have in place.
In this white paper SANS Analyst, Dr. E. ...
August 2011- In this age of compliance, most retailers do what’s required to become compliant, but often fail to improve security through these efforts. In fact, several organizations have achieved compliance but still have been breached—even though they had the data needed to head those breaches off before any significant damage was done. So how did they miss this critical evidence? Unfortunately, IT security teams are inundated with data from many sources that they cannot ...
Cyberwar fundamentally changes how government must handle security. Faced with increasingly sophisticated attacks from gangs of cyber criminals and foreign governments probing systems for sensitive data, threats frequently go undetected for days, weeks, and even months. And it's not just financial data being stolen. Terrorists and rogue governments may steal confidential data, including intelligence information, that exposes a country and its citizens to potential harm. Unfortunately, the traditional fortress approach no longer suffices.
This paper discusses strategies for retiring legacy applications. Retiring legacy applications can be tricky. Some are reusable. Some need to be retired. How do you tell which is which? Do you retire all the data or just the data required for business needs and regulatory compliance? How do you preserve the business context of the data? How do you secure it? How do you access key information after the application has been retired?
May 2011- This whitepaper by the Ogren Group examines issues related to endpoint security compliance management. A new generation of network-based compliance management tools is available which can help enterprises obtain real-time compliance information, automate the remediation of security deficiencies, improve security, and save money. Ogren Group evaluates the capabilities of ForeScout CounterACT to meet enterprise needs. This whitepaper includes two case studies of organizations using ForeScout CounterACT and describes the results that these organizations have obtained.
May 2011- This whitepaper by Spire Security explains the advantages, disadvantages and limitations of 802.1x as it relates to network access control (NAC). In practice, 802.1x has proven to be costly and cumbersome to roll-out, particularly for large organizations. Furthermore, 802.1x does not include or address many important features of a full-blown NAC system. This whitepaper includes a case study of a large U.S. defense agency that tried rolling out 802.1x and then, after discovering significant ...
March 2011- Agency CIOs will be challenged to find the resources and budget to invest in FDCCI and will need to show a return on investment (ROI). This is a clear situation where proper planning and execution, coupled with the introduction of new technologies such as virtualization and cloud computing, can provide significant long-term value to agencies.
March 2011- Virtualization is a critical technology that executives need to understand and incorporate into their agency’s business strategy, and is one of the Pillar technologies that help transform the old data center into the Dynamic Data Center. Virtualization has already been shown to provide significant advantages in reducing costs and improving operational capabilities. It has become a critical time in the data center’s evolution to move from viewing the introduction of Virtualization from a ...
March 2011- Data center consolidation is not only an essential step in the path to a Dynamic Data Center, it is also a federal initiative mandated by the Office of Management and Budget (OMB) for all executive agencies. The federal executive needs to understand not only how to meet or exceed OMB’s requirements, but also develop a comprehensive consolidation plan that will provide their agency with the capabilities necessary to meet future mission requirements while reducing ...
The Federal Government data center is rapidly evolving to provide
new services and capabilities that can greatly enhance the value
of the agency’s enterprise infrastructure.
New technologies such as Cloud Computing, Infrastructure/Software as a Service (IaaS or SaaS), and Virtualization have the ability to transform the existing agency enterprise into a 21st Century infrastructure that is agile and service oriented.
Business continuity solutions for the Dynamic Data Center go beyond the old concept of a backup capability to increasing the overall ability to better serve customers on a daily basis through greater flexibility and the
addition of new and differentiated services. This Pillar document provides the agency executive reader with:
• An easy to understand overview of what business continuity is and how important it is to their agency’s future operational readiness ...
January 2011- Accelerating Secure Networks for the Federal Government (Riverbed security features and capabilities) -Wan Op -Identifying Security is a concern for all enterprises. Organizations in many industries - from government to financial services to healthcare - have to protect sensitive information, and in many cases comply with specific regulations to ensure the proper safeguarding of data. Recent security breaches have fueled significant growth in the number of security offerings and standards in the marketplace. This paper ...
January 2011- Federal, state, and local government agencies are making the strategic choice to consolidate remote site IT infrastructure into central data centers. The stumbling block to consolidation, however, is the severe impact on application performance as seen by remote users. Relocating local servers to a data center and connecting them across a wide area network (WAN) link often results in order-of magnitude slowdowns to response times and data transfer rates. At these levels of delay business ...
High-performing, secure, and scalable, the Red Hat Enterprise Virtualization portfolio delivers virtualization functionality with the management tools organizations need — at a fraction of the cost of competing virtualization solutions.
Red Hat Enterprise Virtualization builds on the Red Hat Enterprise Linux® platform trusted by millions of organizations around the world for mission-critical workloads. This latest generation of virtualization technology — including the kernel-based virtual machine (KVM)–delivers a secure, robust virtualization platform with unmatched performance ...
This paper describes the performance and scaling of industry-standard Java applications running in Microsoft Windows Server 2008 guests under Red Hat Enterprise Linux 5.4 using the KVM hypervisor. The host system was deployed on a Dell PowerEdge R710 G6 server equipped with 72 GB of RAM and comprising dual sockets each with a 2.66 GHz Intel Xeon X5550 (Nehalem) processor with support for hyper-threading technology, totaling 8 cores and 16 threads.
the paper illustrates the low virtualization overhead of ...
Virtualization has begun to transform the way that enterprises are deploying and managing their infrastructure, providing the foundation for a truly agile enterprise, so that IT can deliver an infrastructure that is flexible, scalable, and most importantly economical by efficiently utilizing resources.
The x86 architecture has proven to be the dominate platform in enterprise computing, moving from its humble beginnings in desktop systems to now, powering the large enterprise applications that run businesses ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services