June 12, 2011 /
Sometimes we come across a new word or phrase that is not only different, but intriguing. Which brings me to the topic of today's blog: What is a healthy cyber ecosystem?
May 29, 2011 /
Recently I decided, if you cant beat the spammers, I might as well just relax on Memorial Day Weekend and enjoy a good laugh on them.
May 21, 2011 /
This has been a rough week for our technology operations. The good news is that our critical Secretary of State systems are up and offices are open and helping customers.
May 14, 2011 /
I was recently asked: What is the next big thing in technology?
April 23, 2011 /
Youre never as good as you look when you're winning, and never as bad as you look when you're losing. I think that adage applies beyond sports to many aspects of life and business including the management of computer operations connected to the global Internet in 2011.
April 11, 2011 /
How important is social networking to leading companies right now? Very important. In some cases, it may even be the most important priority. Its time for state and local government agencies to reexamine these social networking trends and build new strategies to engage partners with social media.
March 27, 2011 /
What is FedRAMP? How does it help with cloud-computing environments? Can we use it here in our state? I expect these questions will be asked across America over the next few years in the halls of state and local governments.
March 20, 2011 /
Microsoft released the new Internet Explorer (IE) 9 this past week, and government enterprises across the world now have another important decision to make.
March 12, 2011 /
As Japan strives to recovers from the devastating earthquake and tsunamis, global governments are sending aid in a variety of forms.
February 26, 2011 /
As state leaders gather in Washington, D.C., this weekend for the 2011 National Governors Association (NGA) Winter Meeting, one topic on the agenda is cyber-security. Experts in the field will be addressing questions like: What threats in cyber-space do we now face? What are the potential ramifications of these cyber-threats? What steps can governments take now?