NetCentrics CIO, Jim DeBardi, recently published an article in FCW, offering four recommendations for federal agencies looking to modernize via consolidation. Between scope, prioritization, staffing/leadership, process, and data-integrity demands, there are a number of challenges agencies must consider and overcome in order to successfully consolidate. In his article, Jim offers four steps that agency leaders should consider before starting down the consolidation path.
NetCentrics CEO, Cyndi Barreda, recently published an article in Federal Times titled, “How to take the ‘fear factor’ out of federal IT consolidations,” explaining that consolidation is about technology and cost savings, but a truly successful consolidation is also about people, cultural change, customer service, and maintaining the mission.
Ed Amiryar, a Sr. Systems Engineer for NetCentrics Corporation, recently published an article in NextGov titled, 5 Building Blocks Influencing the Cloud Evolution. Ed suggests that the combination of virtualization, software-defined networking, automation and AI, application containerization, and blockchain technologies can collectively result in more agile and nimble networks, systems, and data.
With the Modernizing Government Technology Act heading to passage as part of the final National Defense Authorization Act and the administration’s pending release of its IT Modernization report, it’s a matter of when — not if — federal agencies will modernize. Given that, it’s important that the government and industry understand what IT modernization really means and how it can be achieved. Here are five considerations that federal agencies and CIOs should think about.
Andrew Paulette, a Security Analyst for NetCentrics Corporation, has published an article in Tripwire titled Shadow IT: How do you protect what you don’t know you have? In this article, Andrew defines Shadow IT – the presence of unknown systems, data and assets on a network – and identifies the four primary factors behind the rise of Shadow IT. Andrew also lays out several important questions and considerations for organizations seeking to combat the threats posed by Shadow IT. Read the full article here.
By Matt Brown Knowledge management is a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets. These assets may include databases, documents, policies, procedures, and previously un-captured expertise and experience in individual workers. ~ Duhon, Gartner Group, 1998 What good is it to know something […]