Public Sector IT organisations are weary of vendor lock-in. And rightfully so: it is hard to buy cloud services from any supplier you choose and then freely manage these services as if they were part of your own extended private cloud. Main reason
Like many IT organisations, yours probably knitted a “cloud strategy” some years ago. But do you have a clear roadmap to execute the required changes at all levels (people, processes, technology, services) in a stepwise approach? If not, your strategy
It’s an exciting time to be in Government IT. Politicians and executives are constantly re-evaluating how IT services should be governed and delivered to public sector agencies. Their aim is not only to reduce the complexity and cost of technology
It’s hard to believe that, just a few years ago, most government employees could only access email from their primary desktop computers. Even those with the ability to access their enterprise e-mail accounts from other devices could only view
Recently The Economist suggested Miami’s skyline could one day resemble Manhattan. And this could happen sooner than later due to the influx of Latin Americans, as well as Chinese, Europeans and Americans who are moving to Miami, not only to enjoy the
The way information technology is being sourced and used within government and educational organizations has been changing at an increasingly rapid rate. We’re calling it the “3rd Platform” era. What does this mean? The 3rd Platform era is the era
Last week I had the opportunity to attend the 120th Annual International Association of Chiefs of Police (IACP) Conference and Expo in Philadelphia. It was an honor to attend this event and learn from experts about best practices in public safety as
First responders play a critical role every day in the communities where we live, work and play; and I am incredibly proud of Cisco’s commitment to thank, honor and support these heroes and their families. On Monday, Cisco was recognized by the
In order for government and enterprise organizations to keep their data secure from increasingly advanced cyber threats, security solutions and protocols are critical. However, these organizations must ensure that their chosen security solutions meet