112 results on '"Joch, Alan"'
Search Results
2. Taking telework to the next level.
- Author
-
Joch, Alan
- Subjects
TELECOMMUTING ,EMPLOYEE empowerment ,TECHNOLOGICAL innovations ,TRAINING of executives - Abstract
The article discusses ways for improving federal telework. With the report of the Office of Personnel Management (OPM) indicating managerial resistance as a challenge in increasing telework numbers, agencies are addressing the concern by combining new technologies with updated managerial training programs. The author recommends the creation of a common hardware policy for employees for resolution of technical concerns that affect productivity and divisions among on-premise and remote workers.
- Published
- 2012
3. 5 steps to building shared services.
- Author
-
Joch, Alan
- Subjects
INFORMATION technology ,INFRASTRUCTURE (Economics) ,ELECTRONIC government information - Abstract
This article offers suggestions on how to succeed as a shared services provider. It cites that the National Aeronautics and Space Administration (NASA) Shared Services Center in Mississsippi is one of the U.S. government's success stories and provides services such as information technology and financial management for NASA employees. It lists the key steps to building shared services such as developing a solid business base, locking down funding, and creating a support infrastructure.
- Published
- 2011
4. Making the case for Gov 2.
- Author
-
Joch, Alan
- Subjects
GOVERNMENT agencies ,ELECTRONIC government information ,SOCIAL media ,TOOLS - Abstract
The article discusses the steps adopted by U.S. government agencies to restructure their Gov 2.0 initiatives. The importance of identifying the goals of the projects clearly is stressed. Social site managers are advised to carefully evaluate tools for measuring Gov 2.0 schemes. Also mentioned is the responsibility of social network managers to promote the viability of their communities.
- Published
- 2011
5. Solving the mobile computing puzzle.
- Author
-
Joch, Alan
- Subjects
WIRELESS communications ,CLOUD computing ,DESKTOP video ,COMPUTERS ,COMPUTER security - Abstract
The article explains how technologies will be put together to make mobile wireless devices the dominant personal computing platform. Vision for mobile desktops is presented along with the focus on mobile devices. The public-sector push to private clouds is discussed in relation to the natural pairing of cloud technology and mobile applications. Virtual desktop infrastructure (VDI) technology is presented together with the visions and realities for the new personal computer, data management and security, and ubiquitous wireless networks.
- Published
- 2011
6. SOME LEAKS CAN'T BE STOPPED.
- Author
-
Joch, Alan
- Subjects
COMPUTER crimes ,COMPUTER security ,DATA protection ,ACCESS to information ,COMPUTER industry - Abstract
The article discusses damaging cyber crimes and an agency's vulnerability to inside security threats. The 2011 CyberSecurity Watch Survey conducted by Chief Security Officer (CSO) magazine shows that 38% of the crime is committed by outsiders, and 33% by insiders. It reports that one in five attacks across all industry sectors is caused by once-trusted employees and contractors. Data loss prevention technologies, which flourished in the wake of the WikiLeaks Scandal, data encryption, and limiting access to information are among topics discussed.
- Published
- 2011
7. things you need to know about cloud security.
- Author
-
Joch, Alan
- Subjects
CLOUD computing ,COMPUTER security ,GOVERNMENT agencies ,INFORMATION technology - Abstract
The article discusses four misconceptions concerning cloud computing security. It warns U.S. government agencies that they should not expect the Federal Risk and Authorization Management Program to eliminate all security problems. Meanwhile, Alan Paller, director of research at the SANS Institute emphasizes the importance of running reports everyday to ensure the effectiveness of continuous monitoring of information technology (IT) resources and activities.
- Published
- 2011
8. THIS TIME IT'S PERSONAL.
- Author
-
JOCH, ALAN
- Subjects
MOBILE communication systems ,WIRELESS communications ,INFORMATION technology ,MOBILE computing ,TECHNOLOGICAL innovations - Abstract
This article reports on how innovative mobile devices and wireless applications will transform the way enterprise information technology (IT) is being done. It lists down the changes that these new mobile computing devices will bring to enterprises who will use them, and how they will fuel the shift away from clunky personal computers (PCs). It then explains the innovations that will occur on the increasing adoption of mobile computing devices and wireless applications including better interconnectivity and increase of new operating platforms.
- Published
- 2010
9. 6 Ways to Share.
- Author
-
Joch, Alan
- Subjects
TRANSPARENCY in government ,INFORMATION sharing ,GOVERNMENT agencies ,DATA conversion ,AUTOMATION - Abstract
The article discusses six ways to achieve transparency and collaboration in information-sharing among government agencies. These include data dumping or the conversion of large volumes of data into a computer readable format and publishing them on public web sites, automating the collection and reporting of standardized information, and collecting and dispersing data feeds from individual organizations through a central warehouse. The pros and cons of each technology option are presented.
- Published
- 2010
10. Safe Travels.
- Author
-
Joch, Alan
- Subjects
GOVERNMENT agencies ,SMARTPHONES ,COMPUTER software ,CELL phones ,COST control - Abstract
The article discusses how U.S. government agencies could maximize the productivity of smart phones and other digital devices while keeping costs down and protecting them from security threats. It relates that some agencies like the U.S. Department of the Interior have opted to centralize the management for buying, provisioning, and securing mobile devices. It also recommends agencies to use virtual private network software and two-factor authentication to protect mobile devices, and eliminate ghost phones and choose a good pool plan to control costs.
- Published
- 2010
11. EXTREME MAKEOVER.
- Author
-
Joch, Alan
- Subjects
COMMUNICATION infrastructure ,DATA libraries ,COST control ,INFORMATION technology ,CONTRACTING out - Abstract
The article focuses on data centers and its required infrastructure maintenance to yield effective service to government and private industries. It states that the budget requirement for each data center makes it a primary candidate for deficit-cutting tactics such as building more data centers. According to the article, the need for more data centers can be replaced by outsourcing information technology work. It discusses that while concerns on outsourcing are being ironed out, agencies must look for ways such data integration to deal with the budget.
- Published
- 2010
12. 5 traps that can spoil virtualization savings.
- Author
-
JOCH, ALAN
- Subjects
CLIENT/SERVER computing ,VIRTUAL machine systems ,TECHNOLOGICAL innovations ,COST analysis ,INTERNAL auditing - Abstract
The article offers ways on how to keep unexpected costs from spoiling the server virtualization potential benefits. It is suggested to factor the cost of new system management tools into upfront return on investment and cost analyses to avoid unexpected cost overruns at the start of the virtualization. It is recommended to conduct audits with internal staff members or third-party consultants who will not gain by promoting overprovisioning. The advantages of using ManageSoft software with a database of vendor licensing policies are cited.
- Published
- 2009
13. Saying goodbye, step by step.
- Author
-
Joch, Alan
- Subjects
EMPLOYEES' workload ,CONTRACTORS ,EMAIL systems - Abstract
The article discusses the six-step check in/check out (CICO) de-provisioning process for outgoing employees and outside contractors in the U.S. National Aeronautics and Space Administration (NASA). CICO is described as a workflow process as well as a Web-based application. All departments playing a role in the departure of an employee receive electronic mail (e-mail) alerts from CICO. Creating work orders for NASA staff members to recover or deactivate assets used by a former employee comprises the fourth step in the process.
- Published
- 2009
14. Real ID: A moving target.
- Author
-
JOCH, ALAN
- Subjects
IDENTIFICATION card laws ,IDENTIFICATION cards ,DRIVERS' licenses ,GUIDELINES - Abstract
The article focuses on challenges surrounding the implementation of Real ID, a federal law in the U.S., aimed at setting a minimum standard for states' issuance of driver's licenses and identity cards. The legislation compels state governments to launch new technologies by the end of 2009 for securing driver's licenses against fraud and terrorist activities. According to Lisa Feldner, chief information officer of North Dakota argued that funding for the initiative was withheld due to the lack of clarity about the Real ID guidelines.
- Published
- 2009
15. NEW MANDATE.
- Author
-
JOCH, ALAN
- Subjects
RECONNAISSANCE operations ,INTELLIGENCE service ,COUNTERTERRORISM ,INFORMATION sharing ,INFORMATION resources management ,NATIONAL security - Abstract
The article focuses on the use of the information discoverability concept in homeland security for gathering anti-terrorism information across federal state and local jurisdictions in the U.S. The Intelligence Community Directive 501 issued in January 2009, states that intelligence personnel are responsible for discovering information deemed relevant to their work and are tasked with requesting for these information. According to Jeff Jonas, a member of the Markle Task Force on National Security in the Information Age and an IBM engineer, information sharing could be simplified by addressing information discoverability.
- Published
- 2009
16. Closing a security gap.
- Author
-
Joch, Alan
- Subjects
SECURITY systems ,COMPUTER security ,INFORMATION technology ,GOVERNMENT agencies ,LOCAL government - Abstract
The article reports on the need for government agencies in the U.S. to guard against hidden costs and performance shortfalls of managed security services. The function of managed-security service providers (MSSP) is to help information technology managers in local governments and federal agencies rein in costs, cope with shortages of technical talent and keep pace with stream of new vulnerabilities. It explains some factors agencies should consider when choosing MSSPs. It explores some pitfalls of managed security service to avoid when outsourcing security.
- Published
- 2008
17. How secure is your COOP?
- Author
-
Joch, Alan
- Subjects
EMERGENCY management ,CRISIS management ,INFORMATION technology ,SECURITY management ,COMPUTER systems - Abstract
This article addresses the securing of continuity-of-operations plan (COOP). COOP planers are now aware of information security vulnerabilities that can open up when primary information systems go down. William Pelgrin of the New York State Office of Cyber Security and Critical Infrastructure Coordination said agency managers must evaluate the circumstances before deciding whether to recover quickly or recover as securely as possible. COOP experts recommend information technologies that maintain security continuity throughout a period in which a government office is closed and workers regroup at secondary sites, telework centers and home offices.
- Published
- 2008
18. HOMELAND SECURITY'S cyber eyes.
- Author
-
Joch, Alan
- Subjects
GOVERNMENT agencies ,CYBERTERRORISM ,COMPUTER crimes ,COMPUTER networks ,GOVERNMENT corporations - Abstract
The article looks at the techniques used by U.S. government agencies in an effort to keep up with today's transnational cyberattacks. The U.S. Computer Emergency Readiness Team reported 12,986 cyberattacks against U.S. federal agencies in 2007 compared with 3,569 in 2005. Although authorities can track attacks back to certain regions or countries, they admit it is still hard to pinpoint individual perpetrators and determine whether attacks are approved by governments or are the acts of independent groups out for political and financial gain.
- Published
- 2008
19. Bridging the DIVIDE.
- Author
-
Joch, Alan
- Subjects
INFORMATION sharing ,FEDERAL government ,INTERPERSONAL relations ,AUDIT trails ,INFORMATION resources ,AUDITING - Abstract
The article explains the most common obstacles in setting up data-sharing programs among federal departments, and suggests ways to bypass them. Do not underestimate the value of personal relationships and develop programs based on personal interactions among related jurisdictions to promote trust. Agencies need to institute a series of checks and balances for further evaluating information, and if a local enforcement organization sees suspicious activity, there needs to be validation at that level by pulling in managers and experts. It reveals that audit trails that show people how their records are being used could help them monitor government and third-party activity and ease concerns.
- Published
- 2008
20. HOMELAND SECURITY'S HIGH-TECH GAMBLE.
- Author
-
Joch, Alan
- Subjects
COUNTERTERRORISM ,GLOBAL Positioning System ,CELL phones ,DETECTORS - Abstract
The article deals with the Cell-All project of the U.S. Department of Homeland Security's (DHS) Science and Technology Office of Innovation. Under the project, a portion of the population who uses cellphones would voluntarily use devices that included miniscule bio, radiation or chemical sensors that could detect dangers in real time. The sensors of the cellphones could detect the toxic substances released by terrorists and signal the threat to Washington, D.C. police through the Global Positioning System network. Comments from several people on the Call-All project are presented, including James Carafano, senior fellow at the Heritage Foundation, and Henry Willis, a policy researcher at Rand.
- Published
- 2007
21. VIRTUAL SERVERS, REAL THREATS.
- Author
-
Joch, Alan
- Subjects
CLIENT/SERVER computing ,COMPUTER security ,DATA visualization ,INFORMATION technology ,COMPUTER software ,COMPUTER systems - Abstract
This article discusses some security management challenges faced when adopting server visualization. According to the author, some information technology (IT) managers and consultants say agencies must be alert to new types of vulnerabilities. He suggests that IT departments must protect the central management module, known as the hypervisor. He discovers that sometimes the source of a vulnerability is not the virtualization technology; it is how agencies deploy the technology that creates the vulnerability. The author recommends the use of configuration management software to address security challenges.
- Published
- 2007
22. UP CLOSE AND IMPERSONAL.
- Author
-
Joch, Alan
- Subjects
PERSONAL information management ,DATA encryption ,INDEXING ,COUNTERTERRORISM ,INFORMATION resources management ,GOVERNMENT computer systems standards - Abstract
The article discusses the use of encrypted indexing techniques by security agencies in the U.S. in order to exchange information more freely, as well as ensuring privacy of personal data. This means that domestic agencies involved in anti-terrorism initiatives must preserve the privacy of innocent people while sharing information pertinent to fighting terrorism. A key aspect to this initiative is the use of anonymization techniques that store encrypted indexes of personal information in a central database storage.
- Published
- 2007
23. It's a wireless world.
- Author
-
Joch, Alan
- Subjects
CHIEF information officers ,MOBILE communication systems ,PUBLIC officers ,ORGANIZATION ,BUDGET ,DATA transmission systems - Abstract
The article presents tips to government chief information officers in the U.S. on how to make sure that the spread of mobile devices in the government does not drain the organization's budget or threaten its security. It says that as mobile voice and data communications become ubiquitous, agencies need to take extra steps to effectively manage the devices and their associated services. It mentions that costly service plans, maintenance overhead and new security vulnerabilities can quickly offset wireless benefits, according to agency managers.
- Published
- 2007
24. SECURITY GETS IMAGE-CONSCIOUS.
- Author
-
Joch, Alan
- Subjects
SECURITY systems ,ELECTRONIC surveillance ,COMPUTER software development ,DETECTORS ,CRIME prevention ,ELECTRONIC intelligence - Abstract
The article deals with video-analysis software (VAS) for video surveillance installations. VAS enhances the installation's ability to detect and deter criminal and terrorist attempts. VAS will also ease the burden of analyzing all the data that security videos and sensors generate. However, the accuracy of analytical algorithms still has to improve. Despite this challenge, the VAS has reduced the amount of false alarms and help security officials react to incidents before they happen by spotting suspicious activity. The technology continues to improve its programs to accurately differentiate normal movements and activities of human from that of suspicious activities.
- Published
- 2007
25. DEFEATING THE DUMPSTER DIVERS.
- Author
-
Joch, Alan
- Subjects
COMPUTER storage devices ,DATA disk drives ,CELL phone systems ,HARD disks ,RECORDS disposal - Abstract
The article reports that the increase of storage media, from thumb drives and cell phones to disk arrays, ensures disposal of decommissioned gear a much deceiving task. He says that when one send a sensitive personnel file to the recycling bin on his PC Windows desktop or reformat one's entire hard drive, the data that is created may seem to be gone, but from a cyberthief's point of view, it is certainly not forgotten. According to Richard Kissel, information technology security specialist at the National Institute of Standards and Technology, data-disposal policies that do not rely solely on encryption give agencies a comfort level required for today's security-conscious times.
- Published
- 2007
26. Rainy-day.
- Author
-
Joch, Alan
- Subjects
FLOOD damage ,INTERNAL revenue ,FLOOD damage prevention ,EMERGENCY management ,TELECOMMUTING - Abstract
The article cites the audit and lessons that the U.S. Internal Revenue Service learned from the floods that closed its headquarters in Washington, D.C. for more than five months in 2006. It cites the audit findings that commended the IRS for its actions that adequately protected sensitive data but found loopholes in the IRS continuity-of-operations procedures (COOP). These inadequacies are no plan for such damaging flood as experienced; computer-tracking procedures not part of the COOP; quick actions that left the IRS vulnerable to equipment and data losses; and lack of a more extensive telework infrastructure that created hardships among employees during the building closures. It cites the inclusions by IRS of the audit recommendations for its COOP and would advocate telecommuting.
- Published
- 2007
27. Cures for the compulsive GADGET GRABBER.
- Author
-
Joch, Alan
- Subjects
INFORMATION technology ,CHIEF information officers ,GOVERNMENT agencies ,TECHNOLOGICAL innovations ,TRADE shows - Abstract
The article explores the strategies adopted by U.S. companies and federal agencies when selecting and purchasing information technology for their business. Chief information officers (CIO) are usually responsible for distinguishing valuable technology from technology fad. Aside from relying on technology specialists to evaluate offerings, CIO forge closer ties with program managers to help them recognize high-technology innovation that could improve programs. the strategies can counteract the objectives of trade shows. According to Transportation Department CIO Dan Mintz, aside from trade shows as source of technology cravings highly hyped product introductions force agencies to weight a new product's appeal against disruptions that accompany major upgrades.
- Published
- 2007
28. Talk isn't cheap.
- Author
-
Joch, Alan
- Subjects
INTERNET protocols ,RADIO (Medium) ,COMPUTER networks ,TELECOMMUNICATION ,STANDARDS - Abstract
The article focuses on a test project that will use special hardware on a high-speed Internet protocol data network to translate voice communications from incompatible radio systems in the U.S. Supporters of the P25 radio standard hope that whenever jurisdictions upgrade their radio systems they will choose P25 systems. However, the standard faces many challenges. System replacements happen slowly and cost is another hurdle. Another drawback is that P25 only addresses land mobile radios, while gateway and networking options tie together radios and video-conferencing devices.
- Published
- 2006
29. PUT SOME BITE BEHIND THE BARK.
- Author
-
Joch, Alan
- Subjects
COMPUTER security ,GOVERNMENT information ,INFORMATION resources management ,DATA protection ,SECURITY systems - Abstract
The article addresses the need for different government agencies in the U.S. to implement new information security policies. Majority of agencies say that federal security policies need so much auditing and documentation that they sap resources and might detract from agencies' efforts to secure their information systems. Several federal agencies received poor grades on report cards from the House Government Reform Committee for its failure to comply with the Federal Information Security Management Act. According to experts, several best practices related to security policies can help the government improve security and compliance.
- Published
- 2006
30. Terrorists brandish tech sword, too.
- Author
-
Joch, Alan
- Subjects
INFORMATION technology ,COMMAND & control systems ,INTERNET ,TECHNOLOGY & law ,TERRORISTS ,TECHNOLOGY - Abstract
The article reports on the new level of sophistication brought about by law enforcement and terrorist groups to the ongoing digital war due to modern computer and communications technology. The ability of terrorists to use modern technology is evidenced by the guide written by an Indonesian Islamic cleric to becoming an effective cyber thief. The fluid organizational structure of the Internet offers a communications foundation for command and control activities within centralized terrorist groups.
- Published
- 2006
31. Airborne data.
- Author
-
Joch, Alan
- Subjects
WIRELESS communications ,TELECOMMUNICATION systems ,TELECOMMUNICATION ,GOVERNMENT agencies ,GOVERNMENT purchasing - Abstract
The article presents guidelines for selecting broadband wireless services for U.S. government agencies. The fastest of the services is 3G or third generation. To gauge quality-of-service levels, agencies should run test projects before signing a long-term contract. Agencies should not automatically opt for consumer services that use public wireless networks but may not offer the performance necessary for critical uses. Agencies also need to consider the costs of upgrading their telecommunications infrastructure when they are shopping for 3G services.
- Published
- 2006
32. DEADBOLTS FOR DATABASES.
- Author
-
Joch, Alan
- Subjects
COMPUTER security ,DATA protection ,HEALTH insurance laws ,COMPUTER hackers ,DATABASES - Abstract
The article considers third-party tools as the last line of defense for keeping hackers away from sensitive information. The U.S. Defense Department reported in April 2006 that an intruder infiltrated one of its servers and riffled through the confidential health insurance records of more than 14,000 people. According to experts, the security features that come standard with database management systems (DBMS) is not enough to protect against data thieves. It was learned that managers also wrestle with regulations such as the Health Insurance Portability and Accessibility Act. Compliance burdens as well as the security shortcomings of DBMS are addressed by add-on security tools. Advantages of add-on tools include separation of administrative and auditing duties.
- Published
- 2006
33. Dial VOIP in case of emergency.
- Author
-
Joch, Alan
- Subjects
INTERNET telephony ,CRISIS management ,MOBILE communication systems ,TELECOMMUNICATION systems - Abstract
The article focuses on the integration of Internet Protocol (IP) telephony into the formal continuity-of-operations plans in the U.S. Business continuity plans are relying on technologies to keep organizations running in the aftermath of disasters and mundane incidents. The Department of Veterans Affairs turned to IP-enabled mobile communications trucks to keep Gulf Coast hospitals running. IP telephony provides resilience in emergencies because the networks that keep voice traffic flowing consist of distributed servers and connections. INSETS: Rolling communications;Getting help to VOIP callers.
- Published
- 2006
34. New ways to police the enterprise.
- Author
-
Joch, Alan
- Subjects
DATA protection ,COMPUTER security ,INTERNET fraud ,NETWORK routers ,DOWNLOADING ,FIREWALLS (Computer security) - Abstract
The article focuses on new ways to reduce data overload and false alarms offered by intrusion detection and prevention systems. Technology researcher IDC Research estimates sales of network-based detection and protection rose up to 39 percent in 2005. Several computer threats include botnets, phishing schemes in e-mails and other machinations that mimic legitimate traffic. Some technologies include Cisco IDS technology, routers, firewalls and other network components. INSET: Advice from the frontlines, by Alan Joch.
- Published
- 2006
35. OPTIONS ON DEMAND.
- Author
-
Joch, Alan
- Subjects
BUSINESS partnerships ,COMPUTER software ,COMPUTER systems - Abstract
The article reports on the partnership formed between Callidus Software Inc. and Sun Microsystems Inc. to match the software company's incentive processing software with Sun's grid computing system. This type of processing requires an infusion of IT resources followed by periods of downtime and the alignment with Sun will also provide Callidus with new markets. According to Shanker Trivedi, chief marketing officer of Callidus, they will provide an application that is harmless to the IT department. INSETS: On-premise apps ready or not for on-demand, by Alan Joch;Variations on the on-demand theme, by Alan Joch.
- Published
- 2006
36. Power trip.
- Author
-
Joch, Alan
- Subjects
CONSUMER education ,PURCHASING of personal computers - Abstract
The article offers a step-by-step guide to buying the perfect high-end personal computers.
- Published
- 2006
37. NO TIME FOR OPEN SOURCE in the SERVICE-ENABLED ENTERPRISE.
- Author
-
Joch, Alan
- Subjects
OPEN source software ,COMPUTER software ,SOFTWARE architecture ,COMPUTER programming ,COMPUTER industry ,COMPUTER software industry - Abstract
The article reports that open-source applications are attractive for service-oriented architecture for the same reasons they become the platforms of choice for other development projects. Open-source applications are not always a choice for more leading-edge projects, although they may be taking areas such as Web server development. Also, developers are less likely to use open source because they are concerned about support and the long-term roadmap for many open-source projects.
- Published
- 2006
38. DATA ON Demand! ODER HERE.
- Author
-
Joch, Alan
- Subjects
SEMANTIC networks (Information theory) ,MOBILE communication systems ,WORLD Wide Web ,INFORMATION technology ,HIGH technology industries - Abstract
The article discusses the success of the Vodafone Group PLC in deploying Semantic Web technology. The technology enables mobile phone users to download content more easily. Semantic Web standards promise an end to complicated, hard-wired mappings among data sources that can become inflexible integration nightmares. Vodafone uses its document markup language to integrate its Vodafone Live Web site with the third party providers that create content for the portal.
- Published
- 2006
39. Communications breakdown.
- Author
-
Joch, Alan
- Subjects
EMERGENCY management ,COMMUNICATION & technology ,INTERNETWORKING ,TELECOMMUNICATION ,INTERNET protocols ,CELL phone systems ,COMMUNICATION ,TECHNOLOGY - Abstract
The article focuses on the efforts being done by emergency response teams in the U.S. in 2005 to enhance their communications strategies and technologies. The U.S. National Institute of Standards and Technology and Project Safecom created the P25 Conformity Assessment Program to better promote the adoption of interoperability standards for radio systems. Several state, local and federal jurisdictions turn to interconnection devices that connect two-way radio communications with incompatible handsets and land line and cellular telephones. Other options for better communication reliability include expanded Internet protocol networks.
- Published
- 2005
40. Software that keeps score.
- Author
-
Joch, Alan
- Subjects
DASHBOARDS (Management information systems) ,GOVERNMENT agencies ,FEDERAL government ,COMPUTER software ,PERFORMANCE evaluation ,PERFORMANCE - Abstract
This article presents information on a score card program used by different government agencies in the U.S. The programs usually include management dashboards, which display easy-to-read summaries of performance metrics that executives can use to keep tabs on their organizations. Federal government adherents of scorecards and dashboards include a wide range of departments, including Commerce, Defense, Energy, Health and Human Services, and Transportation, among others. Although different versions exist, the basic concepts are similar from implementation to implementation. Score card projects determine the relevant performance data points for a particular agency, and manual or automated processes then collect operational data and create performance summaries.
- Published
- 2005
41. Tailor-made for applications development.
- Author
-
Joch, Alan
- Subjects
MANUFACTURING processes ,COMPUTER software ,PRODUCT design ,PRODUCT quality - Abstract
Discusses key issues concerning intertwined methodologies that offer formal processes for improving software quality and managing schedules in the U.S. Personal Software Process; Team Software Process; Implications for computer software and product development. INSET: People, not tools, matter most..
- Published
- 2005
42. Long arm of the law.
- Author
-
Joch, Alan
- Subjects
ELECTRONIC data processing ,INFORMATION storage & retrieval systems ,LAW enforcement ,ASSOCIATIONS, institutions, etc. ,COUNTERTERRORISM ,NATIONAL security - Abstract
This article deals with the cross-border data sharing technologies used by law enforcement organizations to prevent terrorism and other threat to national security. Law enforcement agencies throughout England, Wales and Scotland are sharing information through the National Automated Fingerprint Identification System, which connects the computers and fingerprint scanning systems of nearly 50 police forces and agencies. It can compare more than 8 million fingerprints per second. Another technology that is used is the Semantic Web technology. The technology could help organizations that share data across borders deal with another country's IT authorities, who could impose data formatting rules and data dictionaries. INSET: Data that speaks for itself.
- Published
- 2005
43. 7 steps to build the perfect desktop.
- Author
-
Joch, Alan
- Subjects
PERSONAL computers ,PURCHASING ,MACRO processors ,MOTHERBOARDS ,LIQUID crystal displays - Abstract
The article provides tips and factors to consider in purchasing a desktop personal computer. First is the performance of processors. Standard business applications, such as Microsoft Office programs, run effectively on midrange 3.4 GHz processors, which can cost hundreds of dollars less in higher-performing 3.8 GHZ or 4 GHz processors financial analysts and engineers need. In addition to CPU speed and vendor, computer buyers should consider the consequences of virus and worm attacks. They should choose processors with Intel's Execute Disable Bit or AMD's Enhanced Virus Protection. Motherboards are another somewhat arcane area where it pays to pay attention. Top vendors of enterprise-class motherboards include Asus Computer International, Intel and MSI Computer. Computer performance hinges on having adequate memory, but deciding how much is enough is always a crapshoot, especially for information technology managers. Vendors and distributors say 51M of RAM should be the minimum amount for current mainstream users. Although CPUs usually get the most attention from buyers, a more important component for positive user experiences is the display. Bigger displays mean less eyestrain, better readability and easier navigation among windows. INSET: A cool duo.
- Published
- 2005
44. A room with a view.
- Author
-
Joch, Alan
- Subjects
INFORMATION technology ,INFORMATION resources management ,TELECOMMUNICATION ,HIGH technology - Abstract
This article discusses changes in command centers in the U.S. Command centers can pull in more raw data than ever thanks to an increasing wired world that features surveillance cameras on highway overpasses, biosensors, countywide geographic information system maps and instantaneous voice communications. But that is a cause for new concerns. A data floor might slow response times for emergency operations center (EOC) managers. Emergency response officials throughout the U.S. are grappling with ways to build a cohesive, central view of their jurisdictions, especially under the pressure and time constraints of an unfolding crisis situation. Technologies, including specialized Web portals and customized search engines, may ease data integration and bring order to incident response. For Arlington County, data assimilation begins with the standard Internet protocol network that officials launched in 2004. The network sends voice, data and video via a single communications pipeline. County officials also consolidated the 911 call center and EOC into a central emergency management department. Now, if a homeland security emergency arises, the county can package disparate information for officials working at the tech-laden command center. INSET: Portal powers Anaheim's center.
- Published
- 2005
45. ENTERPRISE MODERNIZATION.
- Author
-
Joch, Alan
- Subjects
APPLICATION software ,UPGRADING of personal computers ,BUSINESS enterprises ,ENTERPRISE resource planning ,WEB services - Abstract
Reports on the considerable number of enterprises that have opted to update rather than discard their legacy applications. Varieties of modernization projects; Modernization campaigns of EMI Music North America and the American Automobile Club Insurance Agency; Lower cost entailed by re-hosting or code conversion; Requirement for those using Web services approach to upgrade their legacy application's user interface, business logic and database into separate components.
- Published
- 2005
46. PC refresh strategies evolve.
- Author
-
Joch, Alan
- Subjects
DATA transmission systems ,COMPUTER networks ,INFORMATION technology ,COMPUTER operating systems ,SYSTEMS software ,INFORMATION resources management - Abstract
The article focuses on desktop modernization. The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) is undergoing a sweeping modernization that will not only give its employees the newest desktop hardware, applications and operating systems but also will narrow standard configurations to about four images or basic computing footprints. The ATF is not alone in trying to work out the complexities of desktop modernization, which requires discipline and centralized control and must recognize individual needs so employees do not upgrade systems themselves. It is a task made difficult by quickly changing technology and plug-and-play products that make guerilla customizations easy. Changes in desktop modernization practices in the headquarters of the Department of the Army became a priority after the September 11, 2001 terrorist attacks and eventually led to the Desktop Realignment Initiative, a multiyear effort focused on centralized management and revisions to its standard hardware and software configurations. The Army's Information Management Support Center (IMCEN) manages about 8,500 Army personal computers (PC), which will grow to 10,000 in Fall 2005 and nearly 15,000 in about two years. The backbone of the refresh effort is a network that connects IMCEN support staff to the desktop PC. That allows them to service PC and load new software without a lot of touch labor. INSETS: State guarantees service levels;TF's upgrade advice;Air Force PC program making headway, by Frank Tiboni.
- Published
- 2005
47. WEB SERVICES: STANDARDS BREED LIKE CRAZY….
- Author
-
Joch, Alan
- Subjects
WEB services ,COMPUTER software developers ,APPLICATION software ,COMPUTER software ,COMPUTER systems ,ELECTRONIC data processing personnel - Abstract
Focuses on the familiarity of Web service standards by software managers and developers. Reasons why standards matter in the Web services world; Emergence of a specifications trifecta; Features of the trifecta. INSET: Relief from an OASIS..
- Published
- 2005
48. Security on demand.
- Author
-
Joch, Alan
- Subjects
SECURITY management ,SPECIAL events ,SECURITY systems ,TECHNOLOGY ,NATIONAL security - Abstract
This article discusses the new technology tools and protocols used in special-event security in the U.S., as of March 2005. Since 1998, the highest level special events are deemed National Special Security Events (NSSE), a distinction now conferred by the U.S. Department of Homeland Security. The NSSE designation sets off a series of security protocols that require establishing a steering committee of federal agencies and local officials in the affected geographical area. In addition to greater expertise, a new attitude permeates special-event security forces. The military is also becoming a more common participant in domestic security, with fighter aircraft and other resources monitoring the sky over a special event. Nonmilitary technology is also having an impact. Such technology includes a wide array of devices, ranging from communications systems to explosive detectors, video surveillance systems and even atmospheric monitors that use computer models to predict the movement or airborne chemical or biological agents. Cellular services provider Nextel now has an emergency response team that can quickly supplement wireless communications for special events. The team's equipment includes satellite cell sites on light trucks, usually called SatColts, which can quickly move to target areas to provide additional wireless phone coverage for public safety officials. INSETS: Street-smart geek;Sky-high tech.
- Published
- 2005
49. Open-source users find rewards in collaborative development.
- Author
-
Joch, Alan
- Subjects
OPEN source software ,COMPUTER software ,CROSS-platform software development ,COMPUTER software development - Abstract
Focuses on open-source software development in the U.S. Advantages and benefits of collaborative development of open-source software; Challenges in protecting intellectual property and guarding against unknowingly distributing destructive code. INSET: It works when a developer gets stuck by Alan Joch..
- Published
- 2005
50. Refresh without the headaches.
- Author
-
Joch, Alan
- Subjects
ENTERPRISE application integration (Computer systems) ,SYSTEMS engineering ,GOVERNMENT agencies ,COMPUTER software ,INFORMATION technology - Abstract
This article focuses on the significance of employing systems integrators to upgrade information-technology (IT) systems installed in U.S. government agencies. As former CFO of Falls Church, Virginia, Shirley Hughes faced difficulties when the agency was required to update its IT resources. She found the solution in 2000 when she led the installation of a local-area network, a specialized financial software package and 100 desktop computers to replace an antiquated network and incompatible multiple software systems for Falls Church community. With the help of a systems integrator and an ongoing leasing arrangement with a local IT supplier, Falls Church received updated technology while Hughes ensured that she had a plan to use when all the new technology became outdated. Whether they are part of local government or the federal bureaucracy, IT managers understand the significance of keeping technology fresh without affecting tight budgets. This realization is leading them to form partnerships with systems integrators, who, in turn, are finding new ways of attracting revenue from the public sector. Government agencies and integrators rely on two major solutions to keep technology upgrades moving forward: large-scale leasing arrangements, and performance-based contracts. INSET: Forging stronger government and integrator ties.
- Published
- 2004
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.