Take Control of Your Workplaces With Archibus IWMS on AWS
The term "Integrated Management Workplace System" (IWMS) was first used by Gartner in 2004 to refer to a program that could manage and integrate all business and workplace requirements into a single, centralized solution. Since then, a number of solutions have emerged with the aim of bringing together various operational and organizational areas that had previously tended to operate in isolation from one another.
How To Approach Cloud Native Application Security and Why Snyk is the Best Solution for Your Needs
The development world has changed, and organizations are still adapting to developing in the cloud. Cloud native technology and containers are now at the forefront of software development, meaning that software no longer exists and operates locally. However, despite these quick advancements, cloud native application security still lags behind.
This article will cover how you should approach cloud native application security and why Snyk is the best solution for your needs.
Microsoft’s Federal Security CTO on the Impact of OMB’s Zero Trust Strategy
Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and IT infrastructures.
Bolstering Multi-Cloud Security With Identity Management
As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and identities and their increasing volumes of permissions, privileges, and entitlements expose organizations to new attack vectors.
A Deeper Dive Into NetDocuments Government Contract Vehicles
You’ve gathered requirements, evaluated technologies, gotten all the right people to sign off on acquiring new technology, and now comes the hard part — procurement. IDIQs, BPAs, GWACs...the contracting officer is throwing out a bunch of complex terms, options, and estimates of how long it will take to get through negotiations. NetDocuments believes our public sector customers should have contracting options that are a lot like our solutions — easy to use.
Tech Transforms podcast: Web 3.0, Gamification, CIA Innovation, Getting Ahead of the Adversary
On the Tech Transforms podcast, sponsored by Dynatrace, we have talked to some of the most prominent influencers shaping critical government technology decisions. From supply chain to machine learning, this podcast explores the way technology advancement intersects with human needs.
In March 2022, we sat down with these government technology visionaries:
3 Ways Procurement Teams Can Make Smarter FFYE IT Purchasing Decisions
The 2018 federal busy season, or FFYE, is upon us. With almost one-third of agency dollars being awarded during the last quarter of the fiscal year, this is peak buying season and the busiest time of year for federal procurement officers.
The Five Elements of Application Performance Management
Every federal IT pro understands the importance of network monitoring, systems management, database performance monitoring, and other essential functions. The IT infrastructure must be working optimally to ensure overall performance.
What about application performance?
Digital Design Month: What the Autodesk and ESRI Partnership Means for Government Infrastructure
Late in 2017, Autodesk and ESRI announced a new partnership to “advance infrastructure planning and design”. The relationship was positioned as helping build a bridge between building information modeling (BIM) and GIS technologies.
But what does the relationship mean for government infrastructure projects?
Taking 3D Contextual Design to the Next Level
Federal Agencies are Playing a Game of Hope with Two-Factor Authentication
Shortly after the federal government suffered it’s largest and costliest data breach ever at the Office of Personnel Management (OPM), a post-mortem analysis found that the breach was entirely preventable, and the exfiltration of security clearance files of government employees and contractors could have been prevented through the implementation of two-factor authentication for remote log-ons.