Henry Kenyon

Posts by Henry Kenyon


Cybersecurity is on the top of many public and private sector IT agendas these days. But while organizations focus on the software and hardware to police networks, they often don’t consider the standards necessary to have all those defenses working together, or the possible cost savings that can be achieved through improved cybersecurity.

Standards and guidelines are often overlooked in the cybersecurity space in favor of cost savings, said Donna Dodson, deputy cybersecurity advisor at the National Institute of Standards and Technology. Keep reading →


Big data can mean a lot of things to different federal agencies. To the Department of Energy, big data not only means managing an information sharing network to promote big science, but also making the results of that research available to the public.

This information can be blended together in a variety of ways, depending on the end users’ needs, explained Robert Bectel, CTO and senior policy advisor at the DOE’s Office of Energy Efficiency and Renewable Energy (EERE). Speaking at a recent federal IT event, he explained that as one of the department’s technology evangelists, his goal is to make sure that taxpayers get the most out of their money by allowing federal workers to do the most on the job. Keep reading →

Government technology officials are working urgently to enable federal employees to work using their own mobile devices. That’s in spite of a thicket of management issues and security concerns that continue to hamper their efforts.

Though the path to adoption is proving cumbersome, the rationale is simple: Bring your own device (BYOD) programs are seen as a unique opportunity to reduce agency information technology costs. Keep reading →

The explosion of mobile devices and technologies can be overwhelming to many organizations, especially federal agencies concerned with saving money through increased efficiency while maintaining network security.

A newly released desktop virtualization system focused on the government sector seeks to resolve these issues by providing a scalable, secure, end-to-end capability that can allow organizations to manage a variety of devices across networks. Keep reading →

Federal and state government agencies have been launching programs allowing their employees to use their personal mobile devices at work to access data and business applications with an eye toward saving money. But many are often unaware of hidden costs associated with BYOD programs.

While these programs can provide all of advantages of mobility, unless managed carefully, they will not deliver their primary selling point: reduced costs. Keep reading →


The Army has awarded the Raytheon Company a $3.1 million contract to develop a computer defense technology that constantly changes a network’s characteristics to confuse attackers.

The Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR) program is applying a process known as cyber maneuvering to rearrange key network characteristics such as IP addresses, service ports and operating software to prevent intruders from getting a good look at it. Keep reading →

If a major global flu pandemic happens, U.S. government and international health care agencies will be hard pressed to manufacture enough vaccine fast enough to keep ahead of the disease. But a research program by the Defense Department’s research and development organization has recently demonstrated the ability to produce ten million of doses of vaccine in just one month.

The goal of the Defense Advanced Research Project Agency’s Blue Angel program is to produce large quantities of high-quality vaccine-grade protein in under three months to respond to a pandemic influenza outbreak. Keep reading →


As the federal government moves to widespread implementation of mobile device policies, the most attractive and cost effective approach appears to be personnel using their own personal devices to do their jobs.

But while BYOD policies make economic sense, the devil is in the details. This is especially important for the Defense Department and other federal organizations responsible for handling sensitive and classified data. Keep reading →


The Defense Department has launched a barrage of programs across the services to provide its civilian and uniformed personnel with mobile devices. Overseeing this vast and varied process is the Defense Information Systems Agency, which is responsible for running many of the department’s mobile pilot programs and setting up the infrastructure to provide applications and services to warfighters.

The head of DISA and top technology officers outlined how individual agencies fit into those efforts at the Defense & Security Mobile Technologies Symposium in Washington, D.C. last week. Keep reading →


A new, enterprise-class IT backbone in a box has become the latest solution for a highly digitized U.S. military and first responders to access tactical data networks quickly and maintain connectivity wherever they are.

Developed to operate in a variety of environments where infrastructure is lacking or nonexistent, Dell’s Tactical Mobile Data Center (TMDC), is a completely customizable, air deployable data center that can be loaded onto transport planes, ships, trucks or slung under helicopters. Keep reading →

Page 4 of 512345