3 Challenges of Using Kubernetes at the Edge for Government IoT Programs

This article was originally authored by Alex Hisaka for the D2iQ blog. To read the original in its entirety, click HERE. The federal government and military are increasingly implementing Internet of Things (IoT) programs to help increase their reach and…

The Real Reason Why Automation Eludes the Government

At the heart of many government digital transformation initiatives is a simple concept – automation. Effectively, the more simple, redundant, and time-consuming tasks that can be automated, the more time that the government’s resource-strapped agencies and organizations have to focus…

How Kessel Run is “Winning” at Software

The Air Force Life Cycle Management Center’s (AFLCMC) Detachment 12, which goes by the operational name, “Kessel Run,” is one of the most innovative organizations within the Department of Defense (DoD). However, while many across the public and private sectors…

Agile 2: A New Hope

I definitely have a love-hate relationship with Agile.  It’s not that I’m a fan of the Waterfall methodology. Far from it.  But that’s a black-or-white logical fallacy.  There are more than two ways to do things.  And it is hard…

Improving the Provisioning Process to Accelerate the SDLC

While the movement away from the traditional waterfall approach to application development and towards the DevSecOps approach to application development does involve a large change in an organization’s culture and operations, it also is a shift that is facilitated by…

Culture and Aversion to Change Hampering Government DevSecOps Adoption

The speed at which innovation moves and technology advances is incredibly fast. A DevSecOps approach to application development can ensure that new capabilities and solutions can be brought to government employees and military personnel rapidly, at the speed of innovation.…

Can DevSecOps and Separation of Duties Coexist?

The cybersecurity concept of Separation of Duties (SoD) involves dividing up responsibilities and permissions so that no one individual has the access, information, or privileges necessary to perpetrate fraud. In fact, SoD is such an important part of government cybersecurity measures, that…

Three Application Development Predictions for 2022

With the start of the New Year just recently passed, and many Americans still getting used to writing “2022” on things, instead of “2021,” now is the perfect time to reflect back on the year that was. And it’s fair…

Target These Four Areas for Kubernetes Governance to Eliminate Cluster Sprawl

Kubernetes was originally designed to support workload consolidation in a single cluster. However, there are many problem scenarios that require a multi-cluster approach to optimize performance and results. These can include workloads across regions, limiting outage blast radius, compliance issues,…

Is a cATO Possible in Today’s Military?

In the last episode of the ContinuousX Podcast, hosts Rick Stewart and Michael Fitzurka of DLT were joined by Kaitlin Bulavinetz, the Chief of Staff to the Chief Software Officer of the United States Air Force, to talk about enabling…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.