Winvale Blog
The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.
Kevin Lancaster leads Winvale’s corporate growth strategies in both the commercial and government markets. He develops and drives solutions to meet Winvale’s business goals while enabling an operating model to help staff identify and respond to emerging trends that affect both Winvale and the clients it serves. He is integrally involved in all aspects of managing the firm’s operations and workforce, leading efforts to improve productivity, profitability, and customer satisfaction.
Technology | Resources and Insight
By:
Kevin Lancaster
September 3rd, 2012
As part of the Federal Data Center Consolidation Initiative, federal agencies have been working hard to close data centers and move to a virtualized environment. According to FedScoop, in the past 90 days, agencies have closed 50 data centers. That is definitely a step in the right direction- bringing the government’s total to 318 since the launch of the initiative. In talks with Civilian and Defense agencies, we have seen great pressure that is coming down on enterprise IT staff to close these data centers. The definition of data center is any room that is devoted to data processing servers, i.e., including server closets (typically < 200 sq. ft.) and server rooms (typically < 500 sq.ft.) within a conventional building is considered a Data Center, just like larger floor spaces or entire buildings dedicated to housing servers, storage devices, and network equipment.
Technology | Resources and Insight
By:
Kevin Lancaster
August 23rd, 2012
The Department of Veterans Affairs (VA) recently announced that they will be increasing their spending in several areas of information technology. The increase is set to take place in FY2013, and will be directed towards cyber security, network security, and privacy. According to Washington Technology, the VA is planning “to spend $123.2 million in fiscal 2013, an increase from $109.5 million in 2012 and $121.4 million in 2011.” The increase in spending is due to the high demand of computer network privacy. In today’s world, privacy comes at a high price. As technology evolves and becomes easier to access, the concept is becoming less concrete and harder to sustain. Therefore, companies are taking painstaking strides to make sure their sensitive information is kept away from unauthorized individuals. Both the GSA and the VA Office have noticed the increase in the number of contractors specializing in IT security over the last few years.
Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.
Technology | Resources and Insight
By:
Kevin Lancaster
August 20th, 2012
Cyber security is a pervasive concern that is growing in threat level every day, especially for the US government, and now the director of the National Security Agency and U.S. Cyber Command Chief, Gen. Keith Alexander, has deemed the US as unready for these severe cyber assaults.
Technology | Resources and Insight
By:
Kevin Lancaster
August 16th, 2012
Criminal Justice organizations make up a large part of our Federal, State and Local Governments. As such, they are also a large consumer of IT. But do they have the same security standards as other agencies for IT services?
Technology | Resources and Insight
By:
Kevin Lancaster
August 13th, 2012
With 20% of the world’s population using social media, and that number is expected to increase rapidly over the next five years, the need for cyber security is becoming imperative. Social media networking websites like Twitter, Facebook, LinkedIn, and Google+ enable users to communicate in a moment’s notice. However, this instantaneous communication also allows for the people who want to attack/harm others to get their message to a much bigger audience in even quicker time. For example, take the hacktivist group “Anonymous.” When they launch a DDoS attack on a government agency they can secretly plan and grow the attack without being noticed. They can create hundreds of fake accounts and communicate using them and they can go unnoticed. Once they launch these attacks it’s too late unless the agency has something in place to protect them.
Technology | Resources and Insight
By:
Kevin Lancaster
August 9th, 2012
As customer service demands rise and organizations constantly need to achieve more with less, many IT Helpdesk departments are faced with this question: “To outsource or not outsource?” IT departments offloading their tier 1 support has become a more frequent trend in today’s public and private sector. Tier 1 Helpdesks allow your team to focus solely on complex issues that require desk side assistance. By specializing in IT and end user support service, Helpdesks can aid in delivering three main mission-oriented goals: Employees gain access to the help they need, when they need it. In-house IT staff can offload the headaches of day-to-day tier 1 support and focus complicated support issues that need hands on assistance. Organizations complement and extend IT resources without adding head count.
Copyright Winvale | All Rights Reserved