Cloud computing provides a simple way for state and local government to access servers, storage, databases and other application services over the internet.
Knowing and articulating your weaknesses is always difficult, much less in the middle of an interview. When you have been trying to present yourself in the best possible light, being asked to reveal vulnerabilities to a potential employer might give you pause.
Fear is part of life and it’s something that everyone experiences. Let’s start addressing those fears together and become better for it.
Telework has fallen in and out of favor. This article briefly looks at the good, bad and ugly sides of telework and offers some ideas on how to make it work for you.
Have you ever worked for a manager who you would follow if they left the department or organization? What is it about these leaders who consistently attract and retain top talent?
Government reports often languish in perpetuity, stalling valuable information from making it into the hands of decision makers. But what if these critical reports could be generated, processed, and filed faster?
GovLoop sat down with Tomicah Tillemann, co-founder of the Blockchain Trust Accelerator, to understand how blockchain can be used to hold government’s accountable and who is leading in the federal space when it comes to blockchain. This is part II of our interview.
When it comes to adopting cloud services for functions such as HR or finance, concerns about security are often the biggest barrier. So how do you have a conversation around cloud when there are trust issues? We sat down with industry and gov experts to find out.
With the Emmy’s this past Sunday, Hollywood’s award season is underway. And in great news, more women and minorities took home the gold than ever before. But, what about Washington’s award season? How do we get more women and minorities recognized for their contributions to government? The answer is simple. Nominate them! The first step,… Read more »
State and local governments are turning their attention toward identity management, to ensure that critical organization data can only be accessed by the right people, at the right time and for the right reasons. But good identity management is easier said than done.