Why Can’t Enterprise IT Be More Like Consumer IT: A New Day
In the final part of this series, DLT Solutions Engineering Team Lead, Matt Micene assures us that there is a happier future for Enterprise IT on the horizon. In part one of my two-part blog series...
View ArticleSoftware As The Technology Sequence Value
“Hello. I’m David.” “What can you do, David?” “I can do almost anything that could possibly be asked of me. I can assist your employees. I can make your organization more efficient… I can blend in...
View ArticleOpen Source Government & Engaged Citizens: Death Star Inspiration
In October, I used “We the People” as an example of how to get citizens engaged with government in an open manner. In November, those engaged citizens petitioned the government to consider building a...
View ArticleMatt Micene: Acquisition vs Operation
Good post from Dan Risacher on acquiring systems versus providing services in the DoD. Applies widely to all government acquisition and dovetails with my views. Maybe that’s why I like Dan. Defense...
View ArticleAre Your Features Really Your Requirements?
Last night, I was flipping through the manual for my new-to-me car looking for some guidance on resetting the trip computer data. This being my first “new” car in 10+ years, there’s lots of new gadgets...
View ArticleCEO Insight: Professional Services Enables Government Efficiency
Government spending and efficiency is not only a problem for officials, it’s also an issue we take seriously. In a hearing from January titled “Wasting Information Technology Dollars: How Can the...
View ArticleThe RHN Satellite Survival Guide
I’ll be posting a series of articles on tips, tricks and considerations on Red Hat’s RHN Satellite system life-cycle management tool. Each new post will get a link here, so they’ll be easy to find....
View ArticleSystem Considerations for RHN Satellite
This is part one of an ongoing series called, “The RHN Satellite Survival Guide.” tl;dr: DB and RPM storage are the big system design concerns, not memory or OS install. Average channel size is up to...
View ArticleWhy Best Practices Often Aren’t Best
I’m often asked for best practices by folks looking at new technology. Best practices should be something that, having been tested multiple times in many scenarios, provide the most likelihood of good...
View ArticleDoomed to Succeed
Constantly changing requirements are the bane of production at scale. Finding ways to balance the needed stability of a production environment while handling bugs and enhancements is the key challenge...
View ArticleCEO Insight: Contending with the New Normal in Public Sector
This is part one of my mid-year DLT State of the Union. We’ve reached the halfway point of 2013, which also signals the beginning of the federal fiscal year end (FFYE). This is a good time to take a...
View ArticleCan Software Save IT?
Seems like Fed IT innovators are tied to the rails as the big-iron locomotive careens down the track. A new MeriTalk study, “Innovation Inspiration: Can Software Save IT?,” tells us what we already...
View ArticleCEO Insight Part Two: Silver Linings in the New Normal
Welcome to part two of my DLT State of the Union. You can read part one here. With state and local IT budgets on the rebound and federal budgets shrinking, a “new normal” has emerged in the public...
View ArticleEnd of the Year as We Know IT
This is a guest post by Gary Winkler , President of Cyber Solutions & Services, Inc., and was originally posted on MeriTalk. Crazy times. Furloughs froze contracting shops and requiring...
View ArticleTechnical Debt & Vendor Lock-In
Vendor lock-in is either a key technology problem or an overhyped marketing missile depending on the point of view. I think there’s a definition problem at the heart of the agita over in the issue....
View ArticleChasing 9s
Uptime: sovereign of the SLA, king of the data center, eater of weekends, destroyer of budgets. Traditional IT architectures have been dominated with the overwhelming need to provide highly available,...
View ArticleThe 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 1
The pithy phrase “Months of boredom punctuated by moments of extreme terror” is thought to have originated early in the 20th century as a way to describe the experience of an infantryman living in...
View ArticleThe 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 2
This is the second of three installments on this topic. In our last post, we talked about the leading cause of network downtime: simple human error. These preventable errors result in nearly 80% of...
View ArticleThe Best Ways to Eliminate Boredom and Terror on Your Network: Part 3
In part one and part two of this series, we introduced why best practices for improving network configuration management are important and talked about the first three. These practices support the...
View ArticleHow Government Software Procurement is Not Like Buying a Car
I’ve been thinking about government IT requirements lately. In my mind, the process of getting something purchased in the government is a little like the following analogy. You need to buy a new car....
View Article
More Pages to Explore .....