5G: Powering the Government鈥檚 Digital Transformation

5G technology has the capacity to speed data transfers and connect billions of devices at a time when mission success hinges on fast, secure access to data and people. 5G鈥檚 potential to enhance all government activities makes it an indispensable component of efforts to modernize IT systems and service delivery. Because of its low latency and capacity to carry vast amounts of data quickly and efficiently, 5G enables real-time access to information. As a result, it is facilitating the growth of smart cities, the use of artificial intelligence to improve government operations and the adoption of edge computing. The implications are profound for activities as varied as battlefield communications, military logistics and preparedness, and emergency response in situations where critical infrastructure is unavailable. Learn how government agencies can leverage all the resources in play to achieve the goal of open, interoperable and secure 5G networks 探花视频鈥檚 Innovation in Government庐 report.

 

The Unifying Nature of 5G Technology听

鈥5G technology is the first telecommunications standard that is cloud-native, making it critical for the government鈥檚 digital transformation. We now have a transport medium that aligns with and supports the flexibility, scalability and efficiency of cloud operating models and containerized functions and services. In addition, all aspects of a digital transformation strategy 鈥 including edge computing, artificial intelligence, cloud migration and application rationalization 鈥 center on data. With everything level-set architecturally to be cloud-native and containerized, 5G networks enable a common approach to managing data, and they also bring in a new capability for data sovereignty.鈥

Read more insights from Chris D. Thomas, technical strategist at Dell Technologies.

Why 5G Is Indispensable for Frontline Agencies

探花视频 IIG FCW 5G Digital Transformation Blog Embedded Image 2023鈥淧rivate 5G networks have distinct benefits for government, which is why DOD has stated that it is a strategic direction for the department. At Federated Wireless, we custom-build networks for high performance, scale and unlimited capacity using best-of-breed technology from a large ecosystem of suppliers. Private wireless networks provide strong security and control over where the data resides. Unlike a traditional cellular carrier that sends data through an off-site central core, private 5G networks are secure enclaves that are governed by zero trust architectures.鈥

Read more insights from Paul Battaglia, vice president of public sector at Federated Wireless.

 

The Key to Creating More Flexible 5G Networks听

鈥淛MA Wireless embarked on a project a couple of years ago to help bring 5G to the Marine Corps Logistics Base in Albany, GA. We were part of a team that deployed a 5G network and added applications to enable officials to modernize warehousing and logistics at the base. As a result of those improvements, the base has reduced labor costs by 61%. Additionally, it used to take three to five days for items to move from the dock to the shelf. That timeline has been slashed to about 36 minutes as the combination of the 5G network and updated application environment drives major efficiencies in logistics operations.鈥

Read more insights from Rishi Bhaskar, senior vice president and general manager at JMA Wireless.

 

Sharing Critical Information in Real Time听

鈥淭he deployment of 5G for government agencies requires a security approach that is independent from the underlying transport network. For our public safety and defense customers, we offer a security architecture based on Blackned鈥檚 TacticalCORE, which provides an over-the-top multidomain security layer, enabling authentication in contested environments and separate classified information spaces across the same infrastructure. All transport is considered untrusted with the ability to implement agency-specific encryption on the 5G network. This state-of-the-art security approach has already been accredited by the German BSI as NATO-restricted and enhanced security classifications are planned.鈥

Read more insights from Richie Obermayer, VP of technical sales at GuardSTACK Technologies.

 

How Agencies Can Reap the Benefits of 5G

鈥5G鈥檚 reliability and availability make it possible to build dedicated wireless networks that can be sliced so mission-critical applications run in separate areas while the government maintains full control over that network. Last but certainly not least, 5G networks have carrier-grade, built-in security standards, including SIM cards that are provisioned and activated for a specific network. Users cannot connect to the network without inserting a highly secure SIM into their devices.鈥

Read more insights from Derrick Frost, senior vice president of operations and general manager of private wireless at Kajeet.

 

Private Networks and the Evolving 5G Ecosystem

鈥淧rivate networks are well-suited to agency use cases for a number of reasons. First and foremost is security, which is the bedrock of every cellular network. Beyond the built-in security private 5G networks bring, they also have the capacity to add extra layers of security. The other components of a robust network include radio frequency technology and the latest 5G devices and radios. Once that foundation is in place, agencies can explore the wide range of use cases that a private 5G network can address. Deployments include standalone networks for first responders, border patrol agents and tactical response units, as well as secure, reliable networks for telemedicine providers.鈥

Read more insights from Derek Gallagher, CTO at Druid Software.

 

Download the full Innovation in Government庐 report for more insights from 5G thought leaders and additional industry research from FCW.

Innovation in Government: The Future of Technology with Dell

Advances in communications, data analytics and cloud ecosystems are supercharging efforts to modernize government. Leaders recognize that partnerships with industry are essential to their success with emerging technologies, including groundbreaking tools and techniques that help agencies tackle a wide array of challenges. The government is facing monumental challenges, such as the economy, climate change, public health and military preparedness. These large-scale, broad impact problems require new and innovative ideas to solve. Organizations such as the Computing Technology Industry Association (CompTIA) and the National Institute of Standards and Technology (NIST) have released guidance and strategies for agencies hoping to move past existing restrictions by updated legacy systems. 探花视频鈥檚 most recent Innovation in Government Report includes insights from industry experts at Dell Technologies on how emergent technologies can help government push past those boundaries, with deep dives on 5G, artificial intelligence, digital twins, edge computing and cloud ecosystems.

 

听A Secure Way to Use AI-Assisted Data Analytics

鈥淔ederated learning is becoming increasingly relevant given the emergence of ChatGPT and other AI-based technologies. Industry and government leaders recognize that it is essential to develop AI in an ethical, unbiased way that ensures information privacy and security. The only way to do that is to take a critical look at the technologies that are evolving and shape them in an intentional way. Right now, AI is not as secure as it could be. It is susceptible to the same vulnerabilities that affect other technologies. Therefore, agencies and their industry partners should focus on protecting data where it resides, instituting a zero trust architecture and securing AI algorithms.鈥

Read more insights from Ed Hicks, business development manager for federal and AI at Dell Technologies.

 

What the Evolution of 5G Means for Government 听

探花视频 IIG FCW August Future of Tech Dell Blog Embedded Image 2023 鈥5G is the first generation of cellular technology that鈥檚 cloud native, which means it has the flexibility to be fully virtualized and deployed in several different architectural designs, hosted on commercial servers. Agencies now have the ability to dynamically scale up or down depending on the network load at the moment. In addition, many large hyper-scaler cloud vendors are exploring ways to provide 5G as a service and combine the virtualized network function with cloud-hosted workloads, integrating the telco workload into the traditional IT stack.鈥

Read more insights from Greg Burrill, 5G/Networking Alliance Manager at Dell Technologies.

Taking Modernization to the Next Level with Digital Twins

鈥淒igital engineering is digital transformation applied to the realm of systems engineering. It is another path to IT modernization. Digital twins require the foundations of a digitally transformed environment and its elements of data management, agile development, DevSecOps and container-based orchestration. Digital twins focus on bringing data from the physical world into the digital arena, gleaning insights through artificial intelligence and then displaying those insights visually for users. Digital twins can deploy those conclusions in the physical world, measure the results of the changes and start the loop over again by feeding that data back into the digital arena.鈥

Read more insights from Ken Rollins, Technology Architect for Digital Engineering/Edge at Dell Technologies.

 

How Repatriation Fits into a Broader Cloud Strategy

鈥淲hen agencies simply lifted and shifted workloads into the cloud, they often experienced inefficiencies and cost overruns. Now that agencies are gaining a better understanding of cloud models and how to adapt their workloads to run efficiently in the cloud, they have begun to more carefully consider when it makes the most sense to put a workload into a public cloud and when it is better to pull it back to run on premises, known as cloud repatriation. Those decisions should be part of a larger strategy for appropriate workload placement.鈥

Read more insights from Manny Yusuf, Chief Cloud/Edge Architect at Dell Technologies.

 

Future-Ready Data Centers for Government Agencies

鈥淎 software-defined data center (SDDC) virtualizes all the infrastructure elements that government agencies are using and delivers them in an as-a-service model. Specifically, compute, networking, storage, security and services are abstracted and delivered as automated, policy-driven software. That virtualized, programmatic approach enables SDDCs to break down IT silos and simplify complexities. The benefits include gains in performance and availability and reductions in costs and security risks. An SDDC enables applications to be deployed more quickly and IT resources used more effectively through the use of cloud-based services.鈥

Read more insights from Manny Yusuf, Chief Cloud/Edge Architect at Dell Technologies.

 

A Flexible Cost Model for Cloud and Infrastructure

鈥淢aintaining visibility into IT operations is crucial for understanding and mitigating security risks as well as for better managing costs. Agencies might need to achieve a specific return on investment, meet certain efficiencies or comply with unique mission requirements. Regardless of the goal, a simplified cost model provides a comprehensive understanding of what it costs the agency to run workloads on premises, at the edge or in any cloud location. Dell APEX also allows agencies to maintain oversight of their IT environment and expenses when they are running a software factory and pushing out new capabilities on a continuous basis. Anytime something new is put in the cloud, it鈥檚 important to have visibility into its long-term costs so that agencies can avoid inefficiencies.鈥

Read more insights from Manny Yusuf, Chief Cloud/Edge Architect at Dell Technologies.

 

Download the full Innovation in Government庐 report for more insights from emerging technology thought leaders and additional industry research from FCW.

Building a DevSecOps Culture

As software becomes more sophisticated, it plays an increasingly important role in all aspects of government operations. However, given the complexity and intertwined nature of modern software, any vulnerability could have wide-ranging consequences, which makes security of vital importance. The federal government has taken notice. A number of recent policy directives address issues related to the software supply chain, and key agencies are leading a governmentwide effort to promote secure software development, including the Executive Order on Transforming Federal Customer Experience and Service Delivery to Rebuild Trust and the Executive Order on Improving the Nation鈥檚 Cybersecurity. Learn how you can implement DevSecOps to support your journey to secure, innovative software in 探花视频鈥檚 Innovation in Government庐 report.

 

The Mindset Shift that Enables DevSecOps

鈥淚n an ideal world, technology and processes support team members鈥 ability to deliver on their particular talents. Before agencies implement DevSecOps methodologies, they should identify where their processes are getting bottlenecked and forcing people to either work around them or fundamentally change their behavior. Instead, we want to make it easy for employees to do the right thing. The goal is to enable people to focus on what they do best 鈥 regardless of where they operate in the stack or the tools they are using 鈥 so that agencies can build and deploy secure, modern apps.鈥

Read more insights from Alex Barbato, Public Sector Solutions Engineer at VMware.

 

How Generative AI Improves Software Security 听

探花视频 FCW July DevSecOps Blog Embedded Image 2023鈥淕enerative AI tools are becoming increasingly prevalent, providing interactive experiences that captivate the public鈥檚 imagination. These tools are accessible to anyone, offering a unique opportunity to engage and explore the creative possibilities enabled by AI technology. The technology doesn鈥檛 just train a model to recognize patterns. It can create things that are easy to understand: images, text, even videos. Sometimes the results are hilariously wrong, but other times the results are quite impressive, such as clear, concise answers to complex questions. Generative pre-trained transformer (GPT) technology, such as ChatGPT, has opened the doors for everyone to be an evaluator because the output is accessible and easy to critique.鈥

Read more insights from Robert Larkin, Senior Solutions Architect at Veracode.

Open Source is at the Heart of Software Innovation

鈥淓mbedding security into applications from the start is essential for streamlining and strengthening the entire development life cycle. Securing the software supply chain is a related effort that is of vast importance to government operations. Beyond securing individual applications, the ultimate goal is to build security into the pipeline itself. At each step and every handoff, we must be able to verify who has touched the software and who did what to ensure that the end result is what we intended to build and that nothing malicious has been injected along the way.鈥

Read more insights from Chris Mays, Staff Specialist Solutions Architect at Red Hat.

 

DevSecOps Needs Tool Diversity and Collaboration

鈥淎s DevSecOps methodologies and software factories grow in prevalence, agencies are recognizing that software development is a team sport 鈥 inside the agency, across departments and with external stakeholders. It touches many different teams, but getting everyone on the same page with tooling can be difficult. Different teams prefer different tools, and that makes collaboration hard. Modern software development brings security practices forward in the timeline while reducing duplication of efforts and improving real-time accountability. Success hinges on removing blockers, creating visibility and making sure collaboration is happening at every stage. In addition, encouraging input from different areas of the organization from the beginning and throughout development is vital for innovation.鈥

Read more insights from Ben Straub, Head of Public Sector at Atlassian.

 

Observability Speeds Zero Trust and Application Security

鈥淚n response to increasing cyberthreats, the government is speeding up the move to zero trust. This security model assumes that every user, request, application and non-human entity is not to be trusted until its identity can be verified. Zero trust principles require a layered defense that is more effective when rooted in observability. To develop an architecture that validates and revalidates every entity on the network, it is necessary to know what those entities are, how they鈥檙e communicating and how they typically behave so we can recognize deviations. Zero trust and observability technologies work together to create a more secure and resilient network environment by assuming that all requests for access are untrusted and continuously monitoring the network to detect and respond to potential threats.鈥

Read more insights from Willie Hicks, Public Sector Chief Technologist at Dynatrace.

 

The Role of a Service Mesh in Zero Trust Success

鈥淔or large companies and government agencies, it鈥檚 safe to assume that a committed attacker is already inside their networks. Executive Order 14028 mandates that every federal agency develop a Zero Trust architecture because it is the most effective approach to mitigating what attackers can do once they鈥檝e made their way inside. What does Zero Trust look like at runtime? One of the key considerations is identity-based segmentation, which involves conducting five policy checks for every request in the system: encrypted connection between service endpoints, service authentication, service-to-service authorization, end user authentication, and end user-to-resource authorization.鈥

Read more insights from Zack Butcher, Founding Engineer at Tetrate and co-author of the NIST SP 800-200 series and SP 800-207A.

 

AI and the Journey to Secure Software Development

鈥淏y automating and optimizing DevSecOps workflows, we can still shift security left while relieving developers from the burden of some complex remediation. It begins with a workflow that leverages fully automated security scanning to rapidly identify vulnerabilities as well as providing suggested remediation for vulnerabilities and on-demand remediation training to educate developers on what they are getting into. The rapid evolution of artificial intelligence is making new advances possible. The opportunities go well beyond AI-assisted code creation. AI features are being expanded across the entire software development life cycle. When it comes to security, having AI assist by making code functionality clear or explaining a vulnerability in detail reduces the time required to remediate risk.鈥

Read more insights from Joel Krooswyk, Federal CTO at GitLab.

 

Scaling App Development While Meeting Security Standards

鈥淭he dream for any software development team is constant, stable releases. The faster teams get the work they鈥檝e created into production, the faster the agency can derive value from that work. When app development is stymied by cumbersome security reviews and stability testing and by the need to wait for a deployment window, innovation is stifled and the return on investment is delayed. If agencies want to have efficient, value-driving software development teams, those teams must be able to move with agility. A trustworthy, scalable DevOps pipeline that brings together testing and security in a seamless way allows teams to push out new apps and improvements quickly so government employees and citizens can have a seamless digital experience and the most up-to-date tools and information.鈥

Read more insights from Kyle Tobener, Head of Security and IT at Copado.

 

鈥攁n exciting day of exhibits, speaking sessions, and networking events. We look forward to showcasing new DevSecOps updates from our supporting panels featuring government, systems integrators, and industry thought leaders.

Download the full Innovation in Government庐 report for more insights from DevSecOps thought leaders and additional industry research from FCW.

Accelerating Mission Success with Technology

The pandemic triggered disruptions to supply chains, workforce management and other daily government operations. Rather than abating, those challenges have continued to evolve. The war in Ukraine has brought new security concerns, and financial uncertainties have made it even more imperative for government agencies to be able to pivot quickly. Digital transformation is essential to meet such ever-changing, unpredictable demands. Flexible, cost-effective technology solutions enable government agencies to analyze data for better decision-making in areas as diverse as cybersecurity, public health and military operations. Investments in modern technologies have the added benefit of making government work more attractive to talented professionals with innovative ideas and a willingness to try new approaches. Such people are a crucial element of any digital transformation. Learn how you can rethink every aspect of operations in ways that spur innovation and advance the ability to respond to new challenges and opportunities as quickly as they arise in 探花视频鈥檚 Innovation in Government庐 report.

 

How Connected Data Heals the Post-COVID Supply Chain

鈥淧ublic-sector leaders need to think big, start small and scale fast. The best approach is to pick a chunk of the business that is consequential and show everyone incremental results. Executive buy-in is also important but sometimes comes later, after several bottom-up iterations that are so successful they are impossible to overlook. The National Telecommunications and Information Administration鈥檚 new grants portal is an excellent example. The end-to- end, FedRAMP-authorized system gives NTIA and its customers the digital tools they need to apply for broadband grant programs and support the government鈥檚 management of the projects funded with the grants.鈥

Read more insights from Maj. Gen. (Ret.) Allan Day, Ph.D., Vice President of Logistics/Sustainment of Global Public Sector at Salesforce.

 

Technology Expands Access and Reduces Public Health Service Challenges

FCW May Mission Success Technology Blog Embedded Image 2023鈥淒igitization helps health workforce challenges as well as addressing the service backlog and supporting expanded access. Digital service delivery is far more efficient, freeing up clinician time to deliver health care in-person for patients who are unable or unwilling to access services digitally or when virtual encounters are not the most appropriate channel. And digitization done well provides rich, real-time data to better understand gaps and inequities and thus improve digital services and inform timely program and policy development.鈥

Read more insights from Karen Hay, Digital Transformation Leader of Global Public Health at Salesforce.

What the Talent Shortage in Aerospace and Defense Companies is Really Telling Us

鈥淨uick wins are essential. Quick wins are the battles in the bigger war of transforming your organization. These are the smaller localized wins within business units outside of large enterprise changes. They become easy-to-understand success stories that give teams a taste of how a transformed organization can thrive. They are powerful social proof that leaders can use to educate and inspire.鈥

Read more insights from Mike Mulcahy, Digital Transformation and Strategy Development Leader for Global Public-Sector Aerospace and Government System Integrators at Salesforce.

 

How Digitizing Infrastructure Protects Against a New Generation of Cyberattacks

鈥淐hicago鈥檚 311 call center is an excellent example of transformation in action. It is the point of entry for residents, business owners and visitors to access information about city programs, services and events. Chicago 311 allows citizens to access that information without long hold times and with minimal impact on staff. Since its launch, Chicago 311 has become an essential resource for activities as varied as simple informational inquiries and requests for tree trimming and pothole repairs. More broadly, the service has shown how the right cloud platform can transform the traditional call center into a modern contact center that unlocks everything from back-office information to self-service capabilities across a single, secure and connected experience.鈥

Read more insights from Paul Baltzell , Vice President of Strategy and Business Development for State and Local at Salesforce.

 

Empowering Citizens Through Platform Investments

鈥淐IOs are facing the challenge of how to modernize by using platform technology. Most have moved into the cloud, but modernizing with a platform is a new way of thinking. It means deciding which platforms to adopt and which use cases to build onto these platforms. Modernization means reducing the technology stack. When agencies choose the right platform, they benefit from the use cases that are already on it so they don鈥檛 have to start from scratch.鈥

Read more insights from Scott Brock, Vice President of Strategy and Business Development for State and Local at Salesforce.

 

How Technology Investments Can Help Close the Talent Gap

鈥淎 November 2022 memo from the Office of the Secretary of Defense confirmed the seriousness of the situation with respect to retention after return-to-work policies went into effect. Focusing on our nation鈥檚 cybersecurity priorities, the statement called for expanding the workforce through apprenticeship programs and other nontraditional means of closing the talent gap. There is a solution: with the right investment in technology and talent, leaders can manage through the current challenges and achieve a posture where positive change is a constant, iterative and accepted part of the landscape.鈥

Read more insights from Dr. Michael Parker, Vice President of Business Development at Salesforce.

 

Download the full Innovation in Government庐 report for more insights from IT modernization thought leaders and additional industry research from FCW.

Partnerships for Public Sector Solutions

Systems integrators have evolved to simplify and streamline the process of deploying complex solutions to complex agency challenges. SIs have years of experience working with agencies on the kinds of systems that have many moving parts. Therefore, they have a clear understanding of agency missions and know how to navigate the government鈥檚 procurement process. However, SIs don鈥檛 work alone. They thrive by partnering with companies that have transformative new approaches for addressing the government鈥檚 needs, such as providing innovative digital services, supporting a hybrid workforce and protecting government networks from cyberthreats. In a recent report, research firm Quadintel states that the global systems integration market was valued at $327 billion in 2021 鈥渁nd is anticipated to grow with a healthy growth rate of more than 13% over the forecast period 2022-2028.鈥 SIs are well-suited to helping agencies make that shift in thinking. Learn how Sis can help your agency thrive by partnering with innovative companies in 探花视频鈥檚 Innovation in Government庐 report.

 

The Power of Embracing a Partner Mindset听

FCW March FSIs Blog Embedded Image 2023鈥淪uccess for integrators and their partners is delivering secure solutions that provide meaningful and impactful mission outcomes. Leidos invests heavily in testing and building relevant solutions for public-sector customers to ensure that innovative technologies are cost-effective, resilient, compliant with government requirements and best positioned to solve mission problems. Investing in a continuous innovation cycle is critical. Leidos and Red Hat recognize that we are in the business of continuous modernization. When Red Hat and other key partners offer innovative new solutions, our partnerships enable us to move fast in testing and proving that the technology works and can scale to meet the government鈥檚 needs. Leidos leverages innovative technology to drive great mission outcomes in our Aviation Security Product business unit (Security Enterprise Solutions). By using cloud-native AI/ML modeling solutions, Leidos had been able to achieve significant performance gains in our process for developing algorithms for security detection products, ultimately improving travelers鈥 experiences at airports.鈥

Read more insights from Peter O鈥橠onoghue, CTO of the Civil Group at Leidos, and Adam Clater, chief architect of the North America Public Sector at Red Hat.

A Collaboration That Far Exceeds the Sum of its Parts

鈥淚n 2020 KMPG and ServiceNow recognized that a large and newly formed Defense Department agency was facing a number of challenges in its efforts to transform its business, consolidate systems and processes, and modernize its technology. We began having conversations with the executive leadership and department heads across different lines of business to gain a clear understanding of their mission, current challenges and desired outcomes. As the ServiceNow program was being established at the agency, the customer required a robust governance and platform team to ensure utilization of development best practices and policy generation, platform management activities (e.g., upgrades) and a secure, scalable, federated development model. This technical rigor and governance structure supported the creation of a stable environment in which application development teams could configure and deploy new, unique applications rapidly.鈥

Read more insights from Kyle McKendrick, senior enterprise account executive at ServiceNow, and Daniel Gruber specialist managing director at KPMG.

 

Driving Modernization with Deep Strategic Partnerships

鈥淚n response to the challenges agencies face, Leidos has been focused on building deep strategic partnerships that help us create at-scale solutions for our government customers. These partnerships are characterized by a commitment to open lines of communication and transparency in terms of strategy and investments. We also operate in what we describe as a badgeless environment in which experts from different companies work side-by-side to engineer new capabilities and solutions.鈥

Read more insights from Derrick Pledger, senior vice president and CIO at Leidos.

 

Why Success in Zero Trust Requires a Team Effort

鈥淶ero trust focuses on the connection between users and the data, applications, networks and systems they want to access. In zero trust architectures, new administrative tools continually evaluate whether allowing an individual user to have a certain level of access privileges is the right thing to do. The approach gives agencies much more flexibility as they modernize because they can make decisions at a granular level that enable them to secure data and entire IT ecosystems.鈥

Read more insights from Meghan Good, vice president and director of the Cyber Accelerator at Leidos.

 

How Multi-Domain Operations Accelerate Modernization

鈥淏y design, multi-domain operations must involve a broad range of partners to achieve the desired mission outcomes, particularly as threats continue to rapidly evolve. Making such a shift allows military and civilian agencies to far more rapidly add new capabilities to individual systems. The approach also enhances agencies鈥 ability to partner with industry to harness the power of cross-domain, cross-agency and even cross-company digital synergies.鈥

Read more insights from Chad Haferbier, vice president of multi-domain operations solutions at Leidos.

 

Balancing Speed and Security with SecDevOps

鈥淎s one of the largest systems integrators, Leidos understands the government鈥檚 mission domain and individual agencies鈥 unique challenges. We also know where they are in their evolution. Some are still easing toward agile and SecDevOps, whereas others have fully embraced those approaches. Our partners in the commercial world are some of the fastest, most forward-leaning technologists.鈥

Read more insights from Paul Burnette, vice president and director of the Software Accelerator at Leidos.

 

Download the full Innovation in Government庐 report for more insights from SI cloud thought leaders and additional industry research from FCW.

Making the Most of MultiCloud

Experts make a clear distinction between hybrid and multicloud environments. The General Services Administration鈥檚 MultiCloud and Hybrid Cloud Guide notes that a multicloud architecture reflects the deliberate integration of services from multiple cloud service providers. By contrast, a hybrid architecture integrates public cloud, private cloud and on-premises infrastructure.

In a recent pulse survey of FCW readers, 49% of respondents said their agencies rely on hybrid cloud environments that combine public and private clouds with on-premises systems, and 39% said their cloud environments were based on private clouds. Only 8% identified themselves as multicloud. Multicloud environments are the natural evolution of the government鈥檚 move to the cloud. As technologies become more targeted and sophisticated, it is clear that a single product cannot meet all agency needs. Multicloud represents a highly individualized, fluid approach to capitalizing on everything cloud has to offer. Regardless of where they are on their journeys, agencies continue to benefit from advances in cloud technology. That鈥檚 because the same spirit of innovation that gave rise to the cloud is giving rise to new solutions for securing and managing cloud environments. Learn how your agency can determine an optimal cloud strategy in 探花视频鈥檚 Innovation in Government庐 report.

 

How the Mission Drives MultiCloud Success

IIG FCW MultiCloud JanFeb Blog Embedded Image 2023鈥淔or government agencies, security is a key consideration when adopting cloud technologies. The latest solutions can actually help agencies improve their security posture because of the specialized and deep focus that cloud providers bring to their mission of providing scalable and secure compute, network and storage infrastructure. At Google, we take a defense-in-depth approach to security and have over 1,000 professionals whose sole job is to ensure the security of our customers鈥 data and systems. They have made it their mission to prevent bad actors 鈥 whether people, companies or nation-states 鈥 from accessing customers鈥 data.鈥

Read more insights from Scott Frohman, Head of Defense Programs at Google Cloud.

 

Choosing the Right Cloud Tool for the Job 听

鈥淎dding multicloud environments into an agency鈥檚 IT portfolio does come with challenges. In particular, it can create complexity for security teams that must protect the agency鈥檚 identities, devices, data, applications and infrastructure. Traditional cybersecurity tools weren鈥檛 designed for multicloud environments, and it can be difficult to transition from existing tools to platform-specific and cloud-native ones, but doing so is essential for taking full advantage of cloud鈥檚 market-leading security capabilities.鈥

Read more insights from Jason Payne, CTO at Microsoft Federal.

Seamlessly Embracing a MultiCloud Environment

鈥淐hoosing the right cloud solutions can be a daunting task, but knowing what steps to take can significantly streamline the process. Agencies should begin by clearly identifying their business and functional requirements and considering their security needs. Doing so will make it possible to evaluate which cloud service provider (CSP) is positioned to offer the best capabilities for the best cost. Throughout the process, agencies should keep in mind that enterprise data is their single most important asset.鈥

Read more insights from James Donlon, Director of Solution Engineering for Government and Education at Oracle.

 

The Move to MultiCloud by Default

鈥淎utomation is essential for multicloud management. Agencies can begin by automating activities and sharpening their skills in their own data centers. Once government IT professionals work with a platform to automate activities in the data center, they can then automate deployments to various clouds and make the process as efficient as possible. When automation is done correctly, agencies also give themselves the ability to move workloads smoothly between environments, whether they want to bring a workload back into the data center or move it to another cloud. The fact that the workload was built on an automation platform means agencies are already a step ahead when it comes to getting that deployment done and reaping the benefits of a multicloud environment.鈥

Read more insights from Adam Clater, Chief Architect of the North America Public Sector at Red Hat.

 

A Smarter Approach to Cloud Adoption

鈥淭he cloud-smart strategy is to migrate then modernize most workloads because the speed of cloud adoption and the consolidation of operating constructs is crucial. Such an approach also reduces costs, migration manpower and training burdens. In fact, most workloads can move to the optimized cloud of choice as-is if the right abstraction and workload management capabilities are employed. Once applications are in the cloud, they are easier to modernize.鈥

Read more insights from Jeremiah Sanders, Senior Transformation Strategist at VMware.

 

Download the full Innovation in Government庐 report for more insights from these cloud thought leaders and additional industry research from FCW.

The Open Source Revolution in Government

Open source technology accounts for a significant portion of most modern applications, with some estimates going as high as 90%, and it is the foundation of many mainstream technologies. Its strength lies in the fact that a vibrant ecosystem of developers contribute to and continually improve the underlying code, which keeps the software dynamic and responsive to changing needs. Enterprise open source software further augments these community-driven projects by providing enterprise-grade support and scalability, while retaining the innovation and flexibility driven by the open source development model. By providing the best of both worlds, such solutions represent a powerful arsenal of tools for addressing government鈥檚 most pressing challenges. In a recent pulse survey of FCW readers, 93% of respondents said they were using open source technology. And more than half of respondents to FCW鈥檚 survey see open source as an integral resource for strengthening cybersecurity. That number reflects a positive trend toward a better understanding of open source software鈥檚 intrinsic approach to security. The power of enterprise open source technologies lies in a combination of collaboration, transparency and industry expertise. As agencies expand their use of such technologies, they maximize their ability to achieve mission success in the most secure, agile and innovative way possible. Learn how the combined power of community-driven innovation and industry-leading technical support is expanding the government鈥檚 capacity for transformation in 探花视频鈥檚 Innovation in Government庐 report.

 

Why Open Source is a Mission-Critical Foundation

IIG FCW Open Source Revolution November Blog Embedded Image 2022鈥淥pen source transforms the way agencies manage hybrid and multi-cloud environments. The most critical technology in the cloud, across all providers, is Linux. Everything is built on top of that foundation 鈥 both the infrastructure of the cloud and cloud offerings. Given the right partner, the promise of Linux is that it provides a consistent technology layer for agencies across all footprints, including multiple cloud providers, on-premises data centers and edge environments. From that foundation, agencies and their partners can build portable architectures that leverage other open source technologies. Portability gives organizations the ability to use the same architectures, underlying technologies, monitoring and security solutions, and human skills to manage mission-critical capabilities across all footprints.鈥

Read more insights from Christopher Smith, Vice President and General Manager of the North America Public Sector at Red Hat.

 

How Open Source is Expanding its Mission Reach

鈥淭he real power of open source technologies was revealed when they cracked the code on being highly powered, mission-specific, distributed systems. That鈥檚 how we are able to get insights out of data by being able to hold it and query it. Today, open source innovation is being accelerated by the cloud, and the conversation is still changing, with people now demanding that their open source companies be cloud-first platforms. Along the way, the open source technologies that start in the community and then receive a boost of commercial innovation have matured. The most powerful ones are expanding their ability to address more of the government鈥檚 mission needs. They are staying interoperable and keeping the data interchange non-proprietary, which is important for government agencies.鈥

Read more insights from David Erickson, Senior Director of Solutions Architecture at Elastic.

 

The Open Source Community鈥檚 Commitment to Security 听

鈥淎 central tenet of software development is visibility and traceability from start to finish so that a developer can follow the code through development, testing, building and security compliance, and then into the final production environment. Along the way, there are some key activities that boost collaboration and positive outcomes, starting with early code previews, where developers can spin up an application for stakeholders to review. Other activities include documented code reviews by peers to ensure the code is well written and efficient. In addition, DevOps components such as open source, infrastructure as code, Kubernetes as a deployment mechanism, automated testing, and better platforms and capabilities have helped developers move away from building ecosystems and instead focus on innovation.鈥

Read more insights from Joel Krooswyk, Federal CTO at GitLab.

 

The Limitless Potential of an Open Source Database

鈥淥ne of the most important elements of any database migration is ensuring that proper planning and due diligence have been performed to ensure a smooth and successful deployment. In addition, there are some key considerations agencies should keep in mind when moving to open source databases. It is essential to start with a clear understanding of the business case and objectives for adopting an open source approach. Agencies also need to decide how the database should function and what it should do to support their digital transformation. Then they must choose the optimal method to deploy the database.鈥

Read more insights from Jeremy A. Wilson, CTO of the North America Public Sector at EDB.

 

Modernizing Digital Services with Open Source

鈥淎 composable, open source digital experience platform (DXP) enables agencies to overcome those challenges. Open source technology is continuously contributed to by a community of developers to reflect a wide array of needs across organizations in varying industries and of varying sizes. A composable approach allows agencies to assemble a number of solutions for a fast, efficient system that is tailored to their needs. When agencies combine a composable DXP with open source technology, they have access to best-of-breed software and the ability to customize the assembly to suit their requirements. An enterprise DXP will enable agencies to achieve a 360-degree view of how constituents are engaging with their digital services and gain valuable data to understand how to enhance their experience. Finally, a composable, open source DXP provides a proactive approach to protecting against security and compliance vulnerabilities.鈥

Read more insights from Tami Pearlstein, Senior Product Marketing Manager at Acquia.

 

Creating Secure Open Source Repositories

鈥淧rotecting the software supply chain requires looking at every single thing that might come into an agency鈥檚 environment. To understand that level of visibility, I like to use the analogy of a refrigerator. All the ingredients necessary to make a cake or pie are in the refrigerator. We know they are of good quality, and other teams can use them instead of having to find their own. At Sonatype, our software equivalent of a refrigerator is the Nexus Repository Manager. A second aspect of our offering, called Lifecycle, allows us to evaluate the open source components in repositories at every stage of the software development life cycle. One piece of software can download a thousand other components. How do we know if one of those components is malicious?鈥

Read more insights from Maury Cupitt, Regional Vice President of Sales Engineering at Sonatype.

 

Better Data Flows for a Better Customer Experience

鈥淎 more responsive and personalized customer experience isn鈥檛 much different from the initial problem set that gave birth to Apache Kafka. When people interact with agencies, they want those agencies to know who they are and how they鈥檝e interacted in the past. They don鈥檛 want to be asked for their Social Security number three times on the same phone call. They also expect that the information or service they receive will be the same whether they are accessing it over the phone, via a mobile app and on a website. To elevate the quality of their service, agencies must be able to stream information in a low-friction way so different systems are consistent with one another and up-to-date at all times, regardless of the communication channel an individual uses. President Joe Biden鈥檚 executive order about transforming the federal customer experience is based on this capability. The most successful companies across industries have figured out how to do it, and for the most part, they鈥檝e done it with open source software.鈥

Read more insights from Jason Schick, General Manager of Confluent US Public Sector.

 

An Open Source Approach to Data Analytics

鈥淔or the past 40 years, agencies have used data warehouses to collect and analyze their data. Although those warehouses worked well, they were limited in what they could do. For instance, they could only handle structured data, but by some estimates, 90% of agencies鈥 data is unstructured and in the form of text, images, audio, video and the like. Furthermore, proprietary data warehouses can show agencies what has happened in the past but can鈥檛 predict what might happen in the future. To achieve the government鈥檚 goal of evidence-based decision-making, agencies need to be able to tap into all their data and predict what might come next.鈥

Read more insights from Howard Levenson, Regional Vice President at Databricks.

 

Download the full Innovation in Government庐 report for more insights from these open source thought leaders and additional industry research from FCW.