This blog post is an excerpt from GovLoop’s recent guide, “Taking Government Cloud Adoption to the Next Level.”
Posts By Michael Steinberg
Implementing new digital solutions within your agency can be difficult, but it is necessary to keep up with constituent and employee demands. Learn more about how to overcome the challenges of digital transformation at your agency with GovLoop Academy’s recent training.
Learn how open source solutions allow agencies to balance security and efficiency when designing and using their IT systems.
Shared services is a beneficial way that agencies can improve effectiveness and efficiency. Learn from three agency leaders about the benefits, challenges, and best practices to navigating an organization through a transition to a shared services model.
Government IT systems are collecting and managing more data than ever today. If used properly, this data can be used to gain valuable insights into the management and mission critical decision-making processes at agencies. Learn more about how data management systems are the key to digital transformations in government.
Digital workplaces enabled by the cloud connect people, processes, and information. Find out how your agency can use them to improve agency efficiency and collaboration.
Cybersecurity is critical in government, but defending against evolving threats is extremely difficult for agencies. In GovLoop’s recent online training, three experts discussed how to use threat hunting to better understand hackers targeting your agency and protect against them.
In this months millennial spotlight, see how a state and local govie used an understanding of the locality, new technologies, and an innovation strategy to transform innovation practices in Texas municipalities.
Government has seen a lot of changes in the 100 days since the inauguration. Find out which developments were the most important for the federal IT community.
Learn how IT professionals in government are leveraging integrated platforms to keep systems secure and user friendly by focusing on protecting information, user profiles, web browsing, and email messaging.