In September 2010 DoD issued initial guidance on transforming how the Pentagon would acquire things. This spending reform initiative kicked off many changes impacting integrators big and small. In November 2012 this initiative was updated and new guidance was issued. The full memo codifying this update is available here . In April 2013 a new memo [...]
Better Buying Power 2.0: Continuing the Pursuit for Greater Efficiency and Productivity in Defense Spending
ITIL is the Information Technology Infrastructure Library, a set of tips, techniques, processes and concepts for managing an IT enterprise. ITIL focuses on infrastructure, application development and operations. ITIL is without a doubt the most widely accepted approach to enterprise management. It provides a full set of best practices. I’ve come to believe that all [...]
DISA, a Combat Support Agency, provides, operates, and assures command and control, information sharing capabilities, and a globally accessible enterprise information infrastructure in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations. Their vision: Information Superiority in defense of the nation. DISA can’t operate [...]
DISA Mission Partnership Conference 2012, 7-10 MAY. The annual DISA mission partnership conference always provides a wealth of information for those who seek to contribute to the critically important DoD mission. Slides for most presentations at the conference are available at the DISA website at: http://www.disa.mil/news/conferences-and-events. We provide context on the event below: LGEN Hawkins, [...]
This paper on Open Source Software and Cyber Defense was prepared for the White House to generate dialog on the best means of leveraging open source software for the community. Data on the vulnerabilities detected in proprietary systems and in open source systems show that “Commercial Open Source software (COSS) is more secure and, when [...]
This paper, prepared for the White House, provided an overview of elements of Cloud-Computing-and-Cyber-Defense. It underscored a key point: cloud computing can be very bad for security. But if engineered well, it could be incredibly good for security.
CTOlabs.com has published a White Paper on Datameer’s User-Focused Big Data Solutions at: Datameers-User-Focused-Big-Data-Solutions . This report provides context on Big Data with a special emphasis on Datameer’s approach, which is centered on users. Datameer provides a complete analytics platform that supports users. Users see familiar interfaces and easy to manipulate interactive visualizations. They are [...]
If you build or integrate solutions and you want those to make a difference in the federal space you should check out this CTOlabs Pro analysis on Federal Cyber R&D Needs: Where should you invest your R&D funds for Federal Cyber Solutions.
This CTOlabs Pro analysis dives deep into the technologies needed for cyber operations. It outlines technological disciplines that must be mastered for mounting a successful defense in cyberspace as well as the items that must be “controlled, measured, audited and continually enhanced” for enterprise defense. It concludes with solutions to some of the most common [...]
This CTOlabs Pro assessment captures the key issues and priorities driving federal IT decisions. The top technologies/trends that are currently behind federal IT decision making and spending include data center consolidation, mobile/bring your own device, telework, cloud/virtualization, big data, and cybersecurity. This assessment also concisely introduces the essential security standards governing federal IT practices such [...]