Content management systems have grown more powerful and easier to use, but there are still some important factors for government users to consider.
The government has been trying for years to balance privacy, convenience and security for agencies' online customers. Can the latest efforts finally get traction?
Proponents say SDDC could revolutionize the data center, but real-world proof of its effectiveness is hard to find.
The benefits can be dramatic, but picking a solution is more complicated than just comparing features.
Bring-your-own device policies were envisioned as a way to save money during a time of budget cuts, but policies are pivoting as government gets increasingly security conscious.
If containers continue to advance into federal enterprise IT, they could spell the end of monolithic legacy applications.
From storage to security, the risks are significant — but ignoring the IoT is not an option.
Identity management is central to efforts to make a wide range of IT activities secure, but streamlining the process is essential.
The broker definition continues to evolve as new roles emerge and cloud deployments become more complex.
The key to the ongoing success of the Army's IT contracting vehicle is incorporating cloud and cybersecurity solutions into the next iteration.
Two vast risk management programs are gradually converging. How smoothly and quickly they can do so remains an open question.
Platform as a service offers obvious upsides, but agencies are still working through specific needs and uses.
Functionality and security don't have to be mutually exclusive, but agencies find the tension is still significant.
As costs have come down and capacity has soared, the benefits extend to both budgets and performance.
Obama administration officials are confident a solid foundation and a new team will support open-government plans even after the departure of two key leaders.
Sign up for our newsletter.
If agencies find themselves continually in fire-fighting mode with their security, they likely need a better security architecture -- not just another product.
CIOs can use hard data to help add value to the modernization discussion.
A government-backed school for cyber modeled on West Point or the Naval Academy could provide military and civilian agencies sorely needed operators.
More Opinion that Matters