Cloud & Data Center

Feds Look to AI Solutions to Solve Problems from Customer Service to Cyber Defense

Artificial intelligence will drive the next big wave of innovation in government technology, with solutions ranging from simple social media chatbots to deep-learning solutions for automating network defense.

(Visited 316 times, 136 visits today)

What’s New

Calculating Technical Debt Can Focus Modernization Efforts

Tracking technical debt isn’t just for agile developers. Figuring out the hidden, long-term costs of maintaining legacy systems is also key to understanding whether it makes economic sense to keep those systems running or shut them down for good.

One Big Risk With Big Data: Format Lock-In

Long-term big data projects demand developers take the long view because, as new technologies emerge, existing data formats can quickly become obsolete. Planning and design choices today are critical to ensuring you can adapt and adjust in the future.

What We’re Reading

Could FedRAMP Approvals Be Used to Buy All Government Technology?

A coalition of moderate House Democrats wants to expand a government-wide security certification process for cloud computing to all types of government information technology, according to a white paper released this week. The proposal from the New Democrat Coalition’s Cybersecurity Task Force would expand the FedRAMP model to non-cloud IT services.

One of Air Force’s Most Important Unclassified Systems is Now in the Oracle Cloud

One of the U.S. Air Force’s most important online portals is now running in the cloud.

MyPers, the Air Force’s personnel portal for 1.7 million active duty and retired airmen, civilian and reservists, began operating in July out of an Oracle-managed off-premise cloud specifically designed and secured to handle some of the Defense Department’s most sensitive unclassified workloads.

Electronic Threats from Above

Adversarial capabilities writ large have significantly improved vis-à-vis the United States (hence the necessity of the Defense Department’s so-called third offset strategy). One of these areas causing concern is that of the electromagnetic spectrum (EMS).

Dead Men May Tell No Tales, But IoT Devices Do

Privacy invasions related to the internet of things (IoT) are already becoming reality. In Arkansas, local law enforcement is trying to access the records of an Amazon Echo device as evidence in a murder investigation and has already compiled evidence based on the files of an IoT water heater.

Securing IoT Devices From Within

Security experts have long fretted about the rapidly expanding number of internet of things devices. While most such tools may not contain data that should be protected, many connect to the cloud and represent easy targets for hackers to gain access — not only to that device, but to all other devices connected to an IoT mesh.

(Visited 1,317 times, 1 visits today)