Content management systems have grown more powerful and easier to use, but there are still some important factors for government users to consider.
The government has been trying for years to balance privacy, convenience and security for agencies' online customers. Can the latest efforts finally get traction?
Proponents say SDDC could revolutionize the data center, but real-world proof of its effectiveness is hard to find.
The benefits can be dramatic, but picking a solution is more complicated than just comparing features.
Bring-your-own device policies were envisioned as a way to save money during a time of budget cuts, but policies are pivoting as government gets increasingly security conscious.
If containers continue to advance into federal enterprise IT, they could spell the end of monolithic legacy applications.
From storage to security, the risks are significant — but ignoring the IoT is not an option.
Identity management is central to efforts to make a wide range of IT activities secure, but streamlining the process is essential.
The broker definition continues to evolve as new roles emerge and cloud deployments become more complex.
The key to the ongoing success of the Army's IT contracting vehicle is incorporating cloud and cybersecurity solutions into the next iteration.
Two vast risk management programs are gradually converging. How smoothly and quickly they can do so remains an open question.
Platform as a service offers obvious upsides, but agencies are still working through specific needs and uses.
Functionality and security don't have to be mutually exclusive, but agencies find the tension is still significant.
As costs have come down and capacity has soared, the benefits extend to both budgets and performance.
Obama administration officials are confident a solid foundation and a new team will support open-government plans even after the departure of two key leaders.
Sign up for our newsletter.
The Federal Cloud Computing Strategy takes a thoughtful approach to IT modernization.
No matter how "smart" a cybersecurity system and program is, there will always be a vulnerability if it's designed to play defense.
To support long-term modernization initiatives, agencies must invest in skilled staff and open, automated and collaborative processes.
More Opinion that Matters