Subscribe

Digital Design
We frequently write about BIM principles, use cases and best practices here on the DLT blog, but one area that often goes neglected in BIM are the soft skills or people skills. What is the role of a BIM manager anyway? How can you better achieve your project goals as design technology managers or support your personnel?
Big Data & Analytics
Public sector leaders are facing an uphill battle when it comes to managing data. Their needs are growing while their budgets are often shrinking. How can federal agencies do more with less? Leveraging enterprise open source solutions is part of the answer. They can help agencies close this gap and meet today’s needs—whether that’s analyzing warfighter data or building Smart Cities—while also planning for tomorrow’s challenges.
Cybersecurity
Faced with an endless barrage of threats and vulnerabilities, finding the time to develop a proactive risk mitigation strategy is an uphill struggle for government organizations. With so much energy focused  on protecting the perimeter and preventing network penetration, malicious actors (the enemy with no face) already inside your network often goes unnoticed (case in point, the 2015 OPM breach).
Digital Design
Look out for the pot hole! Did you know that one out of every five miles of highway pavement is in poor condition and in need of rehabilitation? If you’re a civil engineer, you’re probably not surprised. The bulk of highway system funding goes towards highway repair, and with good reason.
Cybersecurity
The Small Business Administration (SBA) is facing some tough challenges. According to a Report on the Most Serious Management and Performance Challenges Facing the SBA in FY 2018, the agency’s risk management and cyber posture is in need of “significant improvement”.
Cybersecurity
Containers offer many advantages for management, deployment, and efficient development of applications.  Like any technology, however, they are subject to attack from malicious actors, and require diligent security.  Vulnerabilities can appear in the container images themselves, in the registry where they are stored, or in the orchestration and deployment of the images.  Let’s take a look. Image Vulnerabilities & Countermeasures