Recently, John Chambers was in town for meetings of the U.S.-India Business Council, which he chairs. Chambers is now chairman of the board at Cisco Systems after having served as CEO for more than 20 years–an eternity in Silicon Valley. He spoke at a CXO breakfast attended by 20-plus government CXOs. Here are some highlights of his remarks. […]

Congress’ power of the purse, enunciated in Article I of the Constitution, is at the very heart of its authority and role in our democracy. That’s why I’m somewhat amused by all the concern, gnashing of teeth, press articles, and the like about President Trump’s recent release of his FY 2018 budget.






[…]

David Vennergrund offers eight paths to reach an enhanced, enlightened state for your data analytics efforts–a state that eases suffering, and provides deeper, more impactful experiences, both today, and with ever-increasing data volumes.






[…]

Windows 10

The Department of Defense’s decision to move to Windows 10 remains solid. As Microsoft’s most secure operating system ever deployed, Windows 10 offers significant security features baked right in. What’s slowing the effort at many agencies, however, is the actual migration process–it’s time-consuming, expensive, and unattainable within a year’s time frame. It doesn’t have to be, says Mike Wilkerson of VMware.






[…]

You may have heard the phrase “this is a marathon, not a sprint” used when discussing important programs launched by organizations. That might be the case with some business initiatives, but it doesn’t necessarily apply to Federal IT, says Jason Kimrey at Intel.






[…]

The 2016 Executive Leadership Conference (ELC) will gather #ChangeAgents for training and education and showcase examples of #ChangeAgents who are already making a difference today. We need to provide “safe spaces” to experiment on doing public service differently and better, says FCC CIO David Bray.






[…]

Often we’re so focused on locking down data access that we lose sight of whether our business can continue when data is lost, stolen, or compromised. Instead of asking if your network is secure, step back and ask yourself, “Is my network resilient?”






[…]

As Cloud Computing matures as an engine of cost savings, improved agility, and enhanced security, options have grown beyond the “one-size-fits-all” offerings available to early users. Organizations can choose between a mix of on-premises or off-premises clouds, or implementing hybrid architectures that combine the best features of all these choices into a tailored solution that meets their own unique needs. When […] […]

1 2 3 4