Works in Progress

Blog archive

Upcoming FCW Feature

May 10 Reinventing the Enterprise II – Network

IT now touches nearly every aspect of government operations, in uses that will only expand and deepen in the coming years with more social networking, information sharing, and Web-based applications such as cloud computing. Yet the identity management methods that control network access to these dozens and even hundreds of applications and systems are typically handled as discrete, one-off operations. Such a stovepiped approach is extremely inefficient to develop and maintain, inconvenient for users, impedes data sharing and collaboration, and increases security risks. This primer will help executives understand the costs of fragmented identity management and how to make the business case for investments to create and participate in a more integrated, governmentwide system.

Writer: John Moore, jmwriter AT twcny DOT rr DOT com

Posted by John Zyskowski on Mar 30, 2010 at 12:20 PM


Featured

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above