Software has taken on an outsized role in military operations. Today’s advanced weapons systems are software and network-enabled. And software is relied upon for virtually every mission in some way – whether just in the gathering of intelligence, mission planning,…
3 Challenges of Using Kubernetes at the Edge for Government IoT Programs
This article was originally authored by Alex Hisaka for the D2iQ blog. To read the original in its entirety, click HERE. The federal government and military are increasingly implementing Internet of Things (IoT) programs to help increase their reach and…
The Real Reason Why Automation Eludes the Government
At the heart of many government digital transformation initiatives is a simple concept – automation. Effectively, the more simple, redundant, and time-consuming tasks that can be automated, the more time that the government’s resource-strapped agencies and organizations have to focus…
How Kessel Run is “Winning” at Software
The Air Force Life Cycle Management Center’s (AFLCMC) Detachment 12, which goes by the operational name, “Kessel Run,” is one of the most innovative organizations within the Department of Defense (DoD). However, while many across the public and private sectors…
Agile 2: A New Hope
I definitely have a love-hate relationship with Agile. It’s not that I’m a fan of the Waterfall methodology. Far from it. But that’s a black-or-white logical fallacy. There are more than two ways to do things. And it is hard…
Improving the Provisioning Process to Accelerate the SDLC
While the movement away from the traditional waterfall approach to application development and towards the DevSecOps approach to application development does involve a large change in an organization’s culture and operations, it also is a shift that is facilitated by…
Survey Shows IT Leaders Think Open Source as Secure as Proprietary Software
Each year, Red Hat surveys IT decision-makers about the state of enterprise open source. And the company surprisingly encounters one or two results that it didn’t expect in the survey results, despite its thousands of interactions with IT professionals throughout…
Culture and Aversion to Change Hampering Government DevSecOps Adoption
The speed at which innovation moves and technology advances is incredibly fast. A DevSecOps approach to application development can ensure that new capabilities and solutions can be brought to government employees and military personnel rapidly, at the speed of innovation.…
King County Uses Azure to Help Secure Resident Health Data
King County is Washington State’s most populous county, with more than 2.2 million residents. For the Department of Community and Human Services, ensuring that these residents have access to critical social and health services is top of mind. Hampered by…
Can DevSecOps and Separation of Duties Coexist?
The cybersecurity concept of Separation of Duties (SoD) involves dividing up responsibilities and permissions so that no one individual has the access, information, or privileges necessary to perpetrate fraud. In fact, SoD is such an important part of government cybersecurity measures, that…