I recently read an article about a “good enough” network. I know this has come up in the past, but this time was in a much different context. Some people might believe that a “good enough” network is enough enough when you are moving data and web servers, but what about when it becomes the lifeline for the power grid? Read More »
I recently had the opportunity to visit with Bill Bransford. Bill is with Shaw Bransford & Roth P.C., a law firm in the DC area, and is also the host of FED TALK, a radio show that is taped live every other Friday at 11:00 a.m. I was one of the two guests on this past week, along with Tim Simon, to discuss technology in the federal government. Topics included Cloud Computing, Cybersecurity, Mobility and Telework, and the ever famous Bring Your Own Device to work discussion. Read More »
I’ve had some recent discussions with colleagues in the armed forces regarding cyber security and how they consider “cyber” to be the fourth warfighting domain along with land, air, and sea. They describe how cyber has its own terrain made up of computing resources. As I further thought through this concept I saw a striking resemblance between the network and air warfare. To elaborate on this thought I must first set the context around the concept of air supremacy.
There are probably many different variations of the definition of air supremacy but let’s just use “the degree of air superiority wherein the opposing air force is incapable of effective interference” for the purpose of this blog. I borrowed this definition from NATO. There are two key words in the definition, “degree” and “effective.” Prior to achieving supremacy one must first move from parity, through superiority to eventually supremacy. Air parity is the lowest degree in which a force can control the skies above friendly units. In other words, prevention of opposing air assets from overwhelming land, air, and sea units. Read More »
Let’s face it; today’s kids are more connected than ever before. In fact, according to a study by the Kaiser Family Foundation, children between the ages of 8-18 spend more than 7 ½ hours a day with those electronic devices, not including the hour and a half they spend texting, or the small amount (30 min) they actually talk on the cell phone.
And these kids are truly digital natives. To them, online access is ubiquitous and expected. Internet access is everywhere and like oxygen -- they rely on it, crave it. Whether they tweet, text, update statuses, post pictures, chat and video chat, kids are using their devices to connect, to explore, to share, and yes, to learn. In fact, a new study has shown that users of social networking sites (SNS) such as Twitter and Facebook, are better off socially, are more trusting of other people and are more civically engaged. Even in classrooms today, teachers have found that using technology has increased their student’s motivation, provided new outlets for student’s creativity, and helped the teachers become better organized. (Read more)
Last week I had the opportunity to attend the Citrix Synergy conference in San Francisco. The conference was buzzing with the latest innovations for desktop virtualization, data center and cloud.
Secure desktop virtualization infrastructure is compelling for government agencies seeking strategies to reduce costs, improve operational efficiency, and provide control and security of centralized desktops and mobile multi-media clients.