Data modernization: 10 steps to a data strategy framework
Using data as a strategic asset is perhaps one of the most pronounced and highest priorities for most federal agencies, acting as a great stimulus for both intramural and extramural...
Get the latest thought leadership from CGI Federal experts.
Using data as a strategic asset is perhaps one of the most pronounced and highest priorities for most federal agencies, acting as a great stimulus for both intramural and extramural...
Artificial intelligence has been around in some form for decades, but the sudden advent of generative AI applications has pushed federal organizations to think more intently about it.
IT employees may not always realize how their work contributes to their agencies' mission. The CIO has an important role to play in keeping mission front of mind.
Methodically preparing for a cloud migration can make the actual transition go much more smoothly.
Quantum computing may be years or decades away from maturity, but IT and program owners dealing with big questions should start preparing for quantum now. Therefore, it is incumbent upon...
How can federal chief information officers (CIOs) and chief technology officers (CTOs) get the funds they need to allocate to innovation? By first establishing a solid base on which those...
In the ongoing battle to combat climate change, U.S. federal agencies are re-evaluating opportunities to reduce greenhouse gas (GHG) emissions across their operations. Executive Order 14057 and the accompanying Federal...
Cybersecurity is an endlessly challenging topic, and recently, the software supply chain has proven to be vulnerable. Executive Order 14028, which President Biden signed in May 2021, sets out a...
Thomas Edison knew a thing or two about innovation. But for all his prodigious output ( 1,093 patents!), his approach was purely pragmatic: “The value of an idea,” he said...
For decades, federal agencies and other organizations have improved their responses to ever-more sophisticated and aggressive cybersecurity threats in essentially the same way. They use blocking and tackling, or more...