GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IT Content

Standardize to Improve IT Efficiency

Standardize to Improve IT Efficiency

There are 8 factors to consider when building a standardized operating environment.  Delivering the best customer experience means that public sector organizations must deliver services at a much faster pace…

Learn More
Validating the Integrity of Computing Devices

Validating the Integrity of Computing Devices

Organizations are increasingly at risk of cyber supply chain compromise, whether intentional or unintentional. Cyber supply chain risks include counterfeiting, unauthorized production, tampering, theft, and insertion of unexpected software and hardware. Managing…

Learn More
Bridging the Digital Divide: Broadband Workforce Considerations for the 118th Congress

Bridging the Digital Divide: Broadband Workforce...

There is a possibility that there will be workforce challenges associated with the broadband deployment projects that are being funded under existing legislation. The 118th Congress may give some thought to…

Learn More
IRS Needs to Complete Modernization Plans and Fully Address Cloud Computing Requirements

IRS Needs to Complete Modernization Plans and...

The Internal Revenue Service (IRS) relies extensively on Information Technology (IT) to annually collect trillions of dollars in taxes, distribute hundreds of billions of dollars in refunds, and carry out…

Learn More
Information Technology: Education Needs to Address Student Aid Modernization Weaknesses

Information Technology: Education Needs to Address...

The Department of Education started the Next Gen program to improve how student aid is managed. One of the most important Next Gen projects is a system development effort that…

Learn More
AimBetter a groundbreaking RTPS: Real-Time Problems Solving solution on the GSA USA Federal Portal.

AimBetter a groundbreaking RTPS: Real-Time...

Regardless of the company, an IT specialist is the one who will have to come up with quick solutions in order not to impair the workflow. Sometimes this task can…

Learn More
Service-As-A-Software: Elevating Expertise in Problem Solving

Service-As-A-Software: Elevating Expertise in...

“Service-as-a-Software: Elevating Expertise in Problem Solving” introduces a groundbreaking paradigm, challenging the dominance of “software-as-a- service.” This novel approach merges human expertise and automation tools to tackle intricate challenges requiring…

Learn More
Overview and Considerations of Access Control Based on Attribute Encryption

Overview and Considerations of Access Control...

Encryption technology can be incorporated into access control mechanisms based on user identities, user attributes, or resource attributes. Traditional public-key encryption requires different data to have different keys that can…

Learn More
How the US Government Can Reduce IT Costs

How the US Government Can Reduce IT Costs

The US federal government has made significant investments in IT across its agencies to catch up to technology adoption rates in the commercial sector. And while government IT is growing…

Learn More
Build Greater Capacity with an Enterprise 5G Network

Build Greater Capacity with an Enterprise 5G...

Enterprise 5G networks are crucial for data sharing capabilities and the rapid deployment of reliable, high bandwidth communications. Many Federal agencies are currently involved with modernizing government communications and network…

Learn More
Information Technology and Cybersecurity: Evolving the Scorecard Remains Important for Monitoring Agencies’ Progress

Information Technology and Cybersecurity: Evolving...

For fiscal year 2023, the federal government plans to spend over $122 billion on IT investments. GAO has made approximately 5,400 recommendations to improve IT management and cybersecurity. As of…

Learn More
Implementing Preventative Segregation of Duties with NextLabs

Implementing Preventative Segregation of Duties...

Segregation of duties (SoD), also called separation of duties, is a fundamental aspect to sustainable internal controls and risk management, particularly within federal government and military environments. The purpose of…

Learn More
Threat Intelligence Evolution: Strategies for Safeguarding Government and Critical Infrastructure

Threat Intelligence Evolution: Strategies for...

Threats to IT infrastructure and individuals are becoming more sophisticated and harder to identify, especially on mobile devices. Research shows major advanced persistent threat (APT) and nation state actors are…

Learn More
Broken Projects – Quickly

Broken Projects – Quickly

Encounters with technology project management’s “Broken Project” are nearly inescapable. Such projects exhibit budget overruns, performance issues, and scrutiny from upper management. “Troubled” projects result from excessive deviations in time,…

Learn More
Accelerate Cybersecurity Mandate Compliance

Accelerate Cybersecurity Mandate Compliance

In the push to comply with a multitude of cybersecurity mandates, federal agencies are faced with challenges of cost, complexity, and delays to achieve full compliance. Failure to fully implement…

Learn More