Author Archive
John Moore
John Moore is a freelance writer based in Syracuse, N.Y.
Modernization
How many parties does it take to provide a single government login?
Identity management is central to efforts to make a wide range of IT activities secure, but streamlining the process is essential.
- By John Moore
Modernization
Cloud brokers, the sequel
The broker definition continues to evolve as new roles emerge and cloud deployments become more complex.
- By John Moore
Cybersecurity
Striking a balance with mobile device security
Functionality and security don't have to be mutually exclusive, but agencies find the tension is still significant.
- By John Moore
Cybersecurity
Can CDM change the game?
The Continuous Diagnostics and Mitigation program represents a dramatic shift from the government's traditional focus on certifying systems as secure and then rechecking them every so often.
- By John Moore
Modernization
17 hot companies to watch
From security and mobile to data management and open source, these firms are driving innovation in agency IT -- and growing their businesses in the process.
- By John Moore
Modernization
Collaboration tools: Making location moot
As agencies deal with travel restrictions and increasingly complex work teams, the technology options for bringing employees together are keeping pace.
- By John Moore
Modernization
Data center innovation: New ways to save energy
Revised thermal standards and an array of cooling techniques promise to reverse the data center power drain.
- By John Moore
Digital Government
Turning big data into better health outcomes
Federal entities are playing a number of roles in population health management as the practice continues to unfold.
- By John Moore
Modernization
Software-defined storage aims for ease of management
The successor to storage virtualization remains largely untested by agencies, but industry experts say the benefits will change that soon enough.
- By John Moore
Digital Government
Taking video analytics to the next level
The technology has become more common in the federal space and even in consumer settings, but it still has a long way to go.
- By John Moore
Modernization
VDI moves to the cloud
To counter the strain desktop virtualization can put on data centers and administrators, some agencies and vendors are turning to desktop as a service.
- By John Moore
Featured eBooks
Modernization
NFV: Turning network activities into software
Network functions virtualization promises to save time and money by running components such as firewalls and intrusion detection as virtual machines.
- By John Moore
Modernization
Encryption challenges move to the cloud
Cloud computing is expanding the data encryption and key management issues agencies face.
- By John Moore
Modernization
Agencies eye the possibilities of SDN
Software-defined networking is still in its infancy, but science-oriented networks already see the potential.
- By John Moore
Modernization
Social media: The next generation of archiving
Agencies have gotten into the habit of archiving email, but now they face the task of preserving another category of electronic documents: social media communications.
- By John Moore
People
Managing SLAs: Software tools are starting to catch on
The options for monitoring service-level agreements come in endless variety. The trick is figuring out which one to use.
- By John Moore
Cybersecurity
Biometrics go mobile
The iPhone's fingerprint scanner could usher in a new era of authentication for mobile devices, but agencies are a long way from abandoning pass codes.
- By John Moore
Digital Government
16 hot companies to watch
In areas ranging from analytics to workforce management, these firms are making their mark in federal IT.
- By John Moore
People
Back to the future with BPM
Business process management, a concept with roots that plunge more than 20 years into the past, is finding new roles in helping agencies through tough budget times.
- By John Moore
Modernization
Identity management heads for the cloud
The Federal Cloud Credential Exchange should simplify online credentialing of citizens, but systems that authenticate agency employees might be tougher.
- By John Moore