How an Agile Government Can Improve Operations, Service, and Public Trust

This post first appeared on IBM Business of Government. Read the original article. Thursday, December 15, 2022 Dan Chenok “Imagine if clear definitions of missions, wide reliance on evidence, and carefully crafted guiding metrics informed collaboration via small cross-functional teams, who involved both customers and the public in innovating quickly and iterating on solutions to (more…)

The Future of AGILE GOVERNMENT

This post first appeared on IBM Business of Government. Read the original article. The Future of Agile Government.pdf G. Edward DeSeve In software development, agile techniques feature small, cross-functional, selforganizing teams that include customers working quickly to deliver solutions in increments that immediately provide value. The development is customer-centric and collaborative networks are used for (more…)

Partnering for Resilience

This post first appeared on IBM Business of Government. Read the original article. Partnering for Resilience.pdf Chris Mihm A practical approach to emergency preparedness. Government leaders increasingly agree that “rare unexpected events” are now neither rare nor unexpected. Indeed, they are shocks—more frequent and more destabilizing. One now follows closely on the heels of another, (more…)

Weekly Roundup December 4-9, 2022

This post first appeared on IBM Business of Government. Read the original article. Friday, December 9, 2022 Michael J. Keegan Articles & insights in public management & leadership that we have found of interest for the week ending December 9, 2022. Senate passed bill to ‘stop the government speak’ in agency documents. The Senate unanimously (more…)

Why security in cloud-native workloads starts at the container level

This post first appeared on Federal News Network. Read the original article. New, cloud-enabled approaches to application development require new approaches to securing them. Specifically, cloud-native applications typically employ containerization and microsegmentation of workloads to limit so-called east-west access of workloads. This includes communications among containers when they’re combined into an application. That strategy stands (more…)