workforce

The power of big data like cloud computing and mobility – has emerged as a transformational technology force, but one that poses a host of planning questions for senior government agency officials. Peter Mell, a senior computer scientist for the National Institute of Standards and Technology, devoted many months assessing the potential and the pitfalls of big data for NIST. He recently shared what he learned and what executives need to understand about big data in an interview with AOL Government’s Wyatt Kash.

Mell outlined some of the misunderstandings and tradeoffs associated with large scale data sets agencies are likely to encounter as they move beyond classic relational databases. He also talked about the importance cloud computing plays in facilitating big data analytics. And he shared with our readers a comprehensive slide presentation that puts many of the questions about big data and related security implications into perspective. Keep reading →

How will the wide-scale adoption of always-on connected devices change the environment for federal leaders?

Of the five trends I outlined in my last post, the first, always-on connected devices, is so fundamental, so important, so paradigm-shifting, that it is quickly becoming invisible. Keep reading →

This is the last in a series of profiles featuring 2012 U.S. Government Information Security Leadership Award (GISLA) winners. The winners received the awards in October from (ISC)2 a nonprofit serving certified information security professionals and administrators.

As the systems that support space missions continue to grow in scale and complexity, so does the need to keep improving the processes used to assess system vulnerabilities. At the same time, those processes have to remain flexible, reliable and still meet a host of complex continuous monitoring guidelines. Keep reading →

This one in a series of profiles featuring 2012 U.S. Government Information Security Leadership Award (GISLA) winners. The winners received the awards in October from (ISC)2 a nonprofit serving certified information security professionals and administrators.

As chief information officer of the US Department of Agriculture’s Food Safety and Inspection Service (FSIS), Janet Stevens understands why cybersecurity isn’t just about firewalls and malware protection. Keep reading →

This is the first in a series of profiles featuring 2012 U.S. Government Information Security Leadership Award (GISLA) winners. The winners received the awards in October from (ISC)2 a nonprofit serving certified information security professionals and administrators.

During a time of significant demand for — and an equally significant shortage of — skilled cyber security professionals, Commander of the Army Reserve Information Operations Command (ARIOC), Col. John Diaz assembled and led a 10-person cadre that set a training strategy into motion that systematically transforms ARIOC’s workforce into elite combat-ready cyber warriors. Keep reading →


Government agencies and departments are learning to live with travel restrictions and discovering innovative alternatives amid an anti-conference trend brought on by budget restrictions and well-publicized abuses.

But some managers fear the trend will inhibit federal workers’ ability to stay current with new technology field advancements or to consult with experts in the private sector via site visits, professional seminars and annual conferences. Keep reading →


For all the progress made advancing integrated intelligence with data from the days of Desert Storm to Operation Iraqi Freedom, Dawn Meyerriecks says the intelligence community must embrace analytics and mission-focused technology to stay on an innovative track.

She made the declarations during a keynote at a conference incorporating key players in cybersecurity, cloud computing and mobile government in Washington, D.C. on Wednesday. She also said the US government has to reach outside its borders for most of the necessary talent. Keep reading →

Some companies, famously, have game rooms for employees. Most organizations require that their employees abstain from gaming while at work, and some go so far as to block not only gaming Websites, but many social sites as well.

When employees bring their own smartphones to work, however, and when they connect to the internet using their own networks, employers cannot simply block a site on their own server and think they’ve solved the problem of distracting technology. Keep reading →

Three years ago, the satirical news site, The Onion, published a story titled “Report: 90% Of Waking Hours Spent Staring At Glowing Rectangles.”

One early paragraph reads:

Researchers were able to identify nearly 30 varieties of glowing rectangles that play some role throughout the course of each day. Among them: handheld rectangles, music-playing rectangles, mobile communication rectangles, personal work rectangles, and bright alarm cubes, which emit a high-pitched reminder that it’s time to rise from one’s bed and move toward the rectangles in one’s kitchen.

_____________________________________________________
This is the third in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________
Though the article clearly has a mocking tone, there is a clear reason for interacting as we do with those glowing rectangles: some are merely the technological membrane through which we interact with other people, while others are the entry-ways to the technological world in which we create or consume media of all kinds, from music and videos to personal and professional email and documents.

And precisely because people have access to their music, to their pictures, to their personal social networks all the time, they expect to be able to access that content and those networks all the time, even when (a) their devices cannot connect to their private network or (b) their devices alone are not able to display the media they want to consume – because their batteries are drained, for example, or because the particular device is not optimized for the type of media they need.

The Benefits of Connecting

There are numerous reasons that employees may want to connect their personal devices (BYOD) to their work computers or office networks. First, if space is an issue on their hard drives, they can play music from their MP3 players (there is debate about music’s impact on productivity). Even if the issue is not space, but rather simply installing personal applications and/or data on a work machine, connecting an external player may be seen as a good work-around.

Second, personal devices run out of power and many can recharge through USB cables. Outlet space is often limited, especially in cubicles, which now comprise 70% of office spaces according to one report. In those circumstances, it seems logical to charge devices in series rather than in parallel.

Finally, and perhaps most persuasively, work is rarely confined to a single machine and the small devices people take with them everywhere are the perfect, and sometimes preferred media for storing documents that will be edited on multiple machines. And why not? Windows phones, iPhones, and Android phones all carry gigabytes of space that are available for those large PowerPoint presentations and image files that no one wants to send through email.

The Dangers of Connecting and How to Minimize Them

There are three main perils of connecting personal devices to work computers and networks. The primary concerns, of course, are malware and spyware. These twin dangers become more apparent whenever new viruses are discovered on Android phones, or the full implications of iPhone apps are realized.

Of secondary, but not insignificant, concern is that employees could use their personal devices to skirt the spirit of the official use-policy, if not its letter. For example, sites that place a toll on an organization’s bandwidth-Pandora, for example, or YouTube-may be blocked on workstations, but employees could run similar apps from their phones-Spotify and/or Amazon Prime Videos.

> Finally, there is simply the productivity issue. Do the media and applications that personal devices bring into the workplace ultimately boost, depress, or have no impact on productivity?

As with accessing work data, there are three ways that organizations can regulate connecting personal devices to work assets.

First, organizations can ban the practice entirely. Second, they can use technological filters, for example by requiring any device to have security enable before it can connect to a network or computer. Third, organizations can have only policy filters in place.

The most important point, however, is that the leadership addresses this issue in their mobile device use-policy and that all employees understand the risks in connecting their devices to work computers and networks.

Gadi Ben-Yehuda (Twitter: @GBYehuda) is Director for Innovation and Social Media at the IBM Center for the Business of Government.

Keep reading →


Data is often compared to water: people talk about data purity, data flow, and of course, data leaks.

One of the ways that companies try to avoid data leaks is through keeping tight control over the pipelines through which data moves, but when most (or all) of an organization’s employees carry smartphones through which they access data, it’s like having a spigot in every pocket. Organizations then face a choice: limit the functionality of devices by restricting their access to data, install technological filters on the devices to minimize the chance of a leak, or trust their employees to safeguard their devices and the data that they either hold or can access, or some combination of the latter two.
_____________________________________________________
This is the second in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________ Keep reading →

Page 2 of 9123456...9