Profile of J. Nicholas HooverSenior Editor, InformationWeek Government
News & Commentary Posts: 1254
Articles by J. Nicholas Hoover
posted in February 2012
Large government contractor shutters cloud computing service and $200 million data center, less than a year after opening.
DHS plans a big push toward more agile development, where software is developed over a series of one- or two-week sprints.
Army's aggressive mobile device plans include a BYOD policy, new
authentication tools, and mobile virtualization technology.
After announcing impending reforms in 2010, the military is beginning to shake up how it manages IT.
While spending for most federal IT groups will be flat in 2013, Department of Veterans Affairs seeks budget boost to improve access to electronic health records, telehealth, and mobile devices.
Government agencies are embracing social media, using Facebook, Twitter, and other platforms to inform and interact with the public. Take a look at the best examples of social networking in government.
The White House budget proposal for fiscal 2013 would cut the Department of Defense's IT budget by 3.6%. But cybersecurity gets an increase.
President's fiscal 2013 budget proposal reduces federal IT spending by 1.2%, all of it attributable to cuts in military IT.
A national mobility strategy will attempt to replace ad hoc policies with a coordinated, cost-saving plan.
While other federal agencies struggle with outdated legacy systems, the new Consumer Finance Protection Bureau aims to keep lean with agile processes, cloud computing, and open source.
The General Services Administration on Tuesday released extensive new details on FedRAMP, a program the Obama administration hopes will accelerate the adoption of cloud computing and cut security costs.
National Institute of Standards and Technology's new IT Lab Director Chuck Romine says agency is focusing on big data, cloud computing, mobility, and cybersecurity in the coming year.
NSA is piloting secure smartphones now and plans broader adoption of commercially available devices that can access classified networks.