Subscribe

IT Perspective, Uncategorized
The federal IT landscape is continually changing – consolidation initiatives, the Joint Information Environment (JIE), security directives and policies, and technology adoption all add to its fluctuating nature. With all of these variables, it is important that federal IT pros are equipped with the right tools to gain a full understanding of the health and performance of their environment. But where do you even start?
Cloud Computing, Uncategorized
State CIOs can no longer afford to stay in the infrastructure business and are now aggressively pursuing cloud-based services. That was the resounding message from state CIOs at the NASCIO Mid-Year Conference in April.
Cybersecurity, Uncategorized
Why is identity such a complex problem to solve? That was the first question posed by moderator Nico Popp, Vice President of Information and Identity Protection with Symantec during a panel session on identity overload at the 2015 Symantec Government Symposium in Washington, D.C. To better understand the identity problem, Popp suggests we think of identity as a triangle. First, there is security.
News, Uncategorized
DLT is now an official SEWP V contractor. Yes, SEWP V is served! Effective May 1, DLT was awarded not one but two SEWP V, IDIQ/fixed-firm price contracts by NASA under Group A and D. This means federal buyers and their contractors now have an easier way to procure a wide variety of technology solutions – backed by the operational excellence and fast, flexible and responsive service you expect from DLT.
Digital Design
If you're an Autodesk user then you may be aware that how you purchase software and even what you can purchase is changing.
Data & Storage, Uncategorized
In today’s data intense environments, business and government agencies collect unprecedented amounts of data. It’s estimated that more than 50% of this data can be classified as confidential.  This sensitive, personal, financial, and health information is protected by several industry and governmental data privacy regulations, such as HIPPAA, PCI DSS, GLBA, and European Privacy Laws. Failure to keep this data secure can impact your organization immensely.