Govplace’s Ryan McCullough featured on In Depth Radio Show

May 12th, 2010 by admin
Bookmark and Share
Ryan McCullough

Ryan McCullough

Ryan McCullough, VP of Federal Sales for Govplace, was recently featured on In Depth with Francis Rose on 1500 AM Federal News Radio.

McCullough discussed performance-based contracting, and how this changes the way agencies, and in turn, vendors do business.

To hear about the importance of agencies setting up measures for success on a contract, “blurring the lines” between prime and subcontractors, and addressing objections to cloud computing and data center consolidation, go here.

Overcoming Challenges in Public Sector Cloud Computing: Part 2 – Introduction to Infrastructure as a Service (IaaS)

April 2nd, 2010 by Dan Smith Dir. Pro. Services - Govplace
Bookmark and Share
Dan Smith

Dan Smith

In Part 1 of this series, we discussed some of the semantics and high-level definitions around cloud computing.  We also talked about cloud computing having five key characteristics, three delivery models, and four deployment modelsWhile the first Part of this series discussed the five key characteristics seen in typical cloud deployments, Part 2 will focus on the three delivery models, with special attention paid to Infrastructure as a Service (IaaS).  These three delivery models consist of:

  1. Software as a Service (SaaS),
  2. Platform as a Service (PaaS) and
  3. Infrastructure as a Service (IaaS)

As discussed earlier, these delivery models are often confused, so we’ll attempt to set the record straight on what each offering is supposed to provide, and tie in some examples of real-life use.

Read the rest of this entry »

Desktop Virtualization Cultural Challenges – Part 2

February 28th, 2010 by Damon Brown, Govplace CTO
Bookmark and Share
Damon Brown, CTO of Govplace

Damon Brown, CTO of Govplace

In part 1 of “Desktop Virtualization Cultural Challenges”, I discussed the need to consider user experience and perspective of technology.  The greatest technology in the world that fails to be adopted by the end user is a failed technology. Today, technology is pervasive in many individual’s personal and business lives. The kind of cell phone you carry, whether you are a MAC or PC user, can be a as much of a personal statement as the clothes you wear or the car you drive. Computer-based workers spend a large, if not the largest, portion of their waking day staring at a screen. Workers personalize their work area and computer desktops to fit their needs and individual tastes, making them an extension of their own personality. Read the rest of this entry »

Overcoming Challenges in Public Sector Cloud Computing: Part 1 – Fixing the Vernacular

January 22nd, 2010 by Dan Smith Dir. Pro. Services - Govplace
Bookmark and Share
Dan Smith

Dan Smith

Cloud Computing is one of the most overused terms in modern enterprise IT planning circles.  Everywhere I turn, clients are talking about needing a “cloud” environment from both their internal and external IT Services providers.  In some cases, cloud computing is absolutely the right strategy.  In others, it’s a disaster waiting to happen.  The only way to effectively harness the benefits of cloud computing (lower costs, more modularity and portability, and greater application flexibility being some) is to have clear communication and understanding of IT services between the organization’s business and their IT management components. Read the rest of this entry »

Mainframe Disaster Recovery without Tapes – Part 3

January 11th, 2010 by Dave Race
Bookmark and Share
Dave Race

Dave Race

In part 1 of my series on Mainframe Disaster Recovery without Tapes I covered “virtual tape libraries”. In part 2, I covered “the disaster recovery process”.  In this post I will address “additional challenges associated with mainframe disaster recovery without tapes”. 

So now we know how the solution works, but what do you do if you don’t have a remote DR site you can replicate to? Read the rest of this entry »

Virtualization Security – Part 2 – Hardening the Hypervisor’s Management Console

January 4th, 2010 by admin
Bookmark and Share

Part 1 of the series on Virtualization security covered “Hardening Virtual Machines”. In this post, “Hardening the Hypervisor’s Management Console” will be addressed.

It is important to make sure that you have properly secured the management console because all configuration tasks are performed through the management console. This includes configuring storage, controlling aspects of virtual machine behavior and setting up virtual switches or virtual networks. Read the rest of this entry »

Desktop Virtualization Cultural Challenges – Part 1

December 22nd, 2009 by Damon Brown, Govplace CTO
Bookmark and Share
Damon Brown, CTO of Govplace

Damon Brown, CTO of Govplace

The technology of desktop virtualization (VDI) is maturing rapidly and offering tremendous efficiencies.  Many times during conversations with other IT leaders, I refer to it as finally “mature for the masses”. But as we all know, successful IT initiatives are more about the people and processes than about the technology. Read the rest of this entry »

Transparency and Accountability through Performance-Based Engagement

December 11th, 2009 by Ryan McCullough, Govplace VP Federal Division
Bookmark and Share
Ryan McCullough

Ryan McCullough

The world of Federal Government IT has been buzzing about the concepts of Performance Based Acquisition (PBA) for the last several years.  The concept began nearly 20 years ago and it was almost a decade ago when OMB issued a mandate that agencies begin to issue a minimum percentage of their service contracting dollars utilizing performance based techniques.  Yet, after all of that, PBA has still not gained quite the momentum that it can or should.  A significant challenge behind all of this has been Read the rest of this entry »

Virtualization Security – Part 1 – Hardening Virtual Machines

December 7th, 2009 by admin
Bookmark and Share

So you’re thinking of, or have already virtualized your infrastructure. Whether it’s a datacenter consolidation project, a VDI initiative, or something smaller like a test lab implementation, some of the same rules apply when it comes to hardening or locking down the virtual environment.

To start, keep in mind that no environment is completely secure but there are many things you can do to make the systems secure. Read the rest of this entry »

Why IT Projects Fail – Part 4 (The Project Plan)

December 7th, 2009 by Jon Fullinwider, CIO Los Angeles County, Retired
Bookmark and Share
Jon Fullinwider

Jon Fullinwider

What gets measured gets accomplished!  Okay, we have an Executive Sponsor (Part 2) and a Project Team (Part 3) with the commitment and authority necessary to ensure the successful development and implementation of the project!  However, all too often, the project begins to fail when the project plan is ill defined, incomplete, not updated, developed but not used, not shared with the end-user or project team, does not have realistic completion dates, does not reflect all the project tasks or more importantly does not reflect a commitment by the customer/end-user for the time required to ensure a successful implementation within the business unit seeking the technology-based solution. Read the rest of this entry »

Contact Us Request a Consultation