A generation ago, Wi-Fi revolutionized workforce mobility. 4G gave birth to innovative applications such as Uber and FaceTime. [And we know 5G — the fifth-generation technology](/capabilities/technology-solutions/5g-wireless/) standard for broadband cellular networks — will bring disruption as well…
We have so many subject matter experts at GDIT – people who have spent their entire careers focused on a technology or a capability and who have seen its evolution over time, largely because they’ve been part of it along the way. Recently, I had the pleasure of speaking to Mike Wagner, a vice presi…
Robotic process automation (RPA), generative AI and IT service management (ITSM) are all transformative technologies and approaches whose impact is made exponentially more meaningful alongside effective AI operations (AI ops).
AI ops, of course, is the practice of using [artificial intelligence a…
Post-quantum cryptography (PQC) encryption is a method of securing data with algorithms that cannot be easily broken by quantum computers. It’s meant to address the core weakness of current encryption standards, and makes encryption more complex and, therefore, much harder for quantum computers to b…
It is estimated that there are more than *18 billion* connected Internet of Things (IoT) devices operating in the world today – and that number is expected to [approach *30 billion*](https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/) in just the next five years. Clearly, s…
Law enforcement agencies have an enormous amount of data they have to go through on a daily basis just to execute their mission of protecting the American people and staying ahead of the threat. There is a real effort to be proactive to safeguard and secure our country. But to do that, technology l…
Zero Trust capabilities are expanding across customer mission sets. GDIT’s Vice President of Cyber Solutions for the Defense Division, John Sahlin, and our Senior Director of Emerging Technology, Tim Gilday, recently sat down to talk about the importance of Zero Trust at the Edge – where limited ba…
DEFENSE Project Enigma: Ensuring Digital Dominance for the U.S. Space Force The United States Space Force (USSF), the newest of the Armed Services, is tasked with securing the nation’s interests in, from and to space. Critical to that objective is the ability for USSF personnel to utilize a mission …
CYBER Zero Trust Implementation at the VA Prioritizes Cyber Resiliency Zero Trust Implementation at the VA Prioritizes Cyber Resiliency > Metrics 9.1SDM 1000+ 1MP 2000+ 280000+ customers systems devices VA facilities employees true The Department of Veterans Affairs is taking a proactive approach…
Mission Partner Environments (MPEs) allow the military and trusted partners to communicate, collaborate and share sensitive, classified information securely and in real-time. And as technology continues to rapidly evolve, building and maintaining MPEs is both more complex and more important than eve…