SlideShare a Scribd company logo
1 of 1
Download to read offline
E C H          T R E N D S / I                                   T         A G E N D A




 'ffilT priorities
 for 2OO9
 Info sharing, indentity management,
 security, lPv6 are high on the list
 BYWILLIAM    JACKSON      I GCN STAFF          and IT administrators of the .govtoprlevel
                                                domain have until the end of the year to
 WHAT'S oN THE AGENDA for agency crackit. DNSsec                   helpsensurethe integrity
 information technology managers in oflnternet namesand addresses digitat-        by
 2oo9? Undoubtedly,the new administra- ly signing requests and responsesfrom
 tion will bring fresh challenges, there servers.
                                     but                 The technologymust be enabled
 is still unfinishedbusiness   from 2OOB  that on .govname serversthis year.But doing it
 must be addressed.                             right witl not be easy,said Paul Parisi, chief                     deadline for encrypting all laptop PCsand
   Someinitiatives are in the form of man* technology officer at DNSstuff. "The first                              removable medi4 but David Hollis, pro-
 dates - with deadlines * from Congress coupleof times you try it, it's not going to                               gram manager for the governmentwide
 or the Office of Management and Budget. work," he said.                                                           Data at Rest Tiger Team encryption effort,
 Others are technical matters that could          r Encrypting data at rest. OMB told                              said DOD was not expectedto meet that
 help agencies   carryout their missions more civilian agenciesin 2OO6that they should                             deadline. "Therehasbeena lot ofprogress,"
 effectively.                                   be encrypting sensitivedata on all mobile                          Hollis said."That being said,there is still a
   Here is a short list of imperativesthat will devices within 4,5 days of OMB's an-                               long way to goJ'
 likelydemand aftention administra- nouncement.But more than a year later,
                  the            of                                                                                  r Information sharing. A failure to
 tors and executives 2OO9.
                       in                       only about 3O percent oflaptop PCs and                             make meaningful connections among in-
   r Domain Name System Security E,x- handhelddevices              had beenprotected.The                           formation in various intelligence reports
 tensions.DNSsec atough nutto crack-
                      is                        DefenseDepartmentset a Dec. 31, 2OOB,                              has olten been cited as a reason why the



                                                                                                                 obviously there needs to be some dis*
                                                                                                                 cussion and clarification about whether
                                                                                                                 the content on that wiki is considered
                                                                                                                 official or not. But if we get it right, we
                                                                                                                 could generate some extremely rich
                                                                                                                 content as well as save the taxpayer
                                                                                                                 money by working collaboratively,itera-
                                                             I foresee more use of wiki technology by            tively for the good of all.
                                                             the government, eventually to enable                  In 2OO9 we will see lT take center
                                                             public-private collaboration in the area            stage as a government priority as the
                                                             of information sharing across a wide                new administration appoints a chief
                                                             range of subjects. Of course, like gov-             technology officer.
                                                             ernment-hosted social media networks,                We will see an increased emphasis on
                                                             this will require significant investment in         enterprise architecture and lT gover-
                                                             creating policies and frameworks that               nance as a way to plan, manage, and
                                                             work. For example, if the government                oversee the rapid forward movement of
                                                             hosts a wiki that the public can modify,            advanced technologies.




         o r . t 2 . o 9        {i (}li   -   F ii   as: :   f,+ "f   C*   !'{ 4tr *   "f *   i3   t{ fl Vo'S

More Related Content

Similar to Five IT Priorities For 2009 - Andy Blumenthal

Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoD
GovCloud Network
 
The Value of Smarter Datacenter ServicesOrganic web asset
The Value of Smarter Datacenter ServicesOrganic web assetThe Value of Smarter Datacenter ServicesOrganic web asset
The Value of Smarter Datacenter ServicesOrganic web asset
IBM India Smarter Computing
 
Data centerservicesjan2013
Data centerservicesjan2013Data centerservicesjan2013
Data centerservicesjan2013
Cynthia Sech
 
The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011
dvasilyev
 
The Information Advantage - Information Access in Tomorrow's Enterprise
The Information Advantage - Information Access in Tomorrow's EnterpriseThe Information Advantage - Information Access in Tomorrow's Enterprise
The Information Advantage - Information Access in Tomorrow's Enterprise
Elizabeth Lupfer
 
Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope
CGI
 
Adoption of cloud computing model in government
Adoption of cloud computing model in governmentAdoption of cloud computing model in government
Adoption of cloud computing model in government
icyhouse
 
Accenture technology-vision-2012-executive-summary
Accenture technology-vision-2012-executive-summaryAccenture technology-vision-2012-executive-summary
Accenture technology-vision-2012-executive-summary
Antonio Sánchez Zaplana
 

Similar to Five IT Priorities For 2009 - Andy Blumenthal (20)

Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
CMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPERCMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPER
 
Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoD
 
Cloud Readiness Index 2012 by the Asia Cloud Computing Association
Cloud Readiness Index 2012 by the Asia Cloud Computing AssociationCloud Readiness Index 2012 by the Asia Cloud Computing Association
Cloud Readiness Index 2012 by the Asia Cloud Computing Association
 
IT Transformation Plan
IT Transformation PlanIT Transformation Plan
IT Transformation Plan
 
The Value of Smarter Datacenter ServicesOrganic web asset
The Value of Smarter Datacenter ServicesOrganic web assetThe Value of Smarter Datacenter ServicesOrganic web asset
The Value of Smarter Datacenter ServicesOrganic web asset
 
The Value of a Smarter Data Centre
The Value of a Smarter Data CentreThe Value of a Smarter Data Centre
The Value of a Smarter Data Centre
 
The Value of Smarter Datacenter Services
The Value of Smarter Datacenter ServicesThe Value of Smarter Datacenter Services
The Value of Smarter Datacenter Services
 
Data centerservicesjan2013
Data centerservicesjan2013Data centerservicesjan2013
Data centerservicesjan2013
 
Ideal gov-pres
Ideal gov-presIdeal gov-pres
Ideal gov-pres
 
Ideal Gov Pres
Ideal Gov PresIdeal Gov Pres
Ideal Gov Pres
 
The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011
 
The Information Advantage - Information Access in Tomorrow's Enterprise
The Information Advantage - Information Access in Tomorrow's EnterpriseThe Information Advantage - Information Access in Tomorrow's Enterprise
The Information Advantage - Information Access in Tomorrow's Enterprise
 
Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope
 
IDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-ChaosIDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-Chaos
 
Adoption of cloud computing model in government
Adoption of cloud computing model in governmentAdoption of cloud computing model in government
Adoption of cloud computing model in government
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
Cloud Computing for DoD & Government
Cloud Computing for DoD & Government Cloud Computing for DoD & Government
Cloud Computing for DoD & Government
 
Accenture technology-vision-2012-executive-summary
Accenture technology-vision-2012-executive-summaryAccenture technology-vision-2012-executive-summary
Accenture technology-vision-2012-executive-summary
 

More from Andy (Avraham) Blumenthal

More from Andy (Avraham) Blumenthal (20)

Campus Protests_ Time to Pay the Piper _ Andy Blumenthal _ The Blogs.pdf
Campus Protests_ Time to Pay the Piper _ Andy Blumenthal _ The Blogs.pdfCampus Protests_ Time to Pay the Piper _ Andy Blumenthal _ The Blogs.pdf
Campus Protests_ Time to Pay the Piper _ Andy Blumenthal _ The Blogs.pdf
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdfFree Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
 
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdfThe Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
 
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdfJewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
 
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdfBy Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
 
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdfReincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
 
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdfThe Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
 
The Occupation Game _ Andy Blumenthal _ The Blogs.pdf
The Occupation Game _ Andy Blumenthal _ The Blogs.pdfThe Occupation Game _ Andy Blumenthal _ The Blogs.pdf
The Occupation Game _ Andy Blumenthal _ The Blogs.pdf
 
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdfFinding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
 
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdfThe Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
 
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
 
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdfLove Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
 
Imagine Peace _ Andy Blumenthal _ The Blogs.pdf
Imagine Peace _ Andy Blumenthal _ The Blogs.pdfImagine Peace _ Andy Blumenthal _ The Blogs.pdf
Imagine Peace _ Andy Blumenthal _ The Blogs.pdf
 
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdfNobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
 
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdfIt Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
 
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdfHow To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
 
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdfL'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
 
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdfVictimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
 
My Supernova _ Andy Blumenthal _ The Blogs.pdf
My Supernova _ Andy Blumenthal _ The Blogs.pdfMy Supernova _ Andy Blumenthal _ The Blogs.pdf
My Supernova _ Andy Blumenthal _ The Blogs.pdf
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Five IT Priorities For 2009 - Andy Blumenthal

  • 1. E C H T R E N D S / I T A G E N D A 'ffilT priorities for 2OO9 Info sharing, indentity management, security, lPv6 are high on the list BYWILLIAM JACKSON I GCN STAFF and IT administrators of the .govtoprlevel domain have until the end of the year to WHAT'S oN THE AGENDA for agency crackit. DNSsec helpsensurethe integrity information technology managers in oflnternet namesand addresses digitat- by 2oo9? Undoubtedly,the new administra- ly signing requests and responsesfrom tion will bring fresh challenges, there servers. but The technologymust be enabled is still unfinishedbusiness from 2OOB that on .govname serversthis year.But doing it must be addressed. right witl not be easy,said Paul Parisi, chief deadline for encrypting all laptop PCsand Someinitiatives are in the form of man* technology officer at DNSstuff. "The first removable medi4 but David Hollis, pro- dates - with deadlines * from Congress coupleof times you try it, it's not going to gram manager for the governmentwide or the Office of Management and Budget. work," he said. Data at Rest Tiger Team encryption effort, Others are technical matters that could r Encrypting data at rest. OMB told said DOD was not expectedto meet that help agencies carryout their missions more civilian agenciesin 2OO6that they should deadline. "Therehasbeena lot ofprogress," effectively. be encrypting sensitivedata on all mobile Hollis said."That being said,there is still a Here is a short list of imperativesthat will devices within 4,5 days of OMB's an- long way to goJ' likelydemand aftention administra- nouncement.But more than a year later, the of r Information sharing. A failure to tors and executives 2OO9. in only about 3O percent oflaptop PCs and make meaningful connections among in- r Domain Name System Security E,x- handhelddevices had beenprotected.The formation in various intelligence reports tensions.DNSsec atough nutto crack- is DefenseDepartmentset a Dec. 31, 2OOB, has olten been cited as a reason why the obviously there needs to be some dis* cussion and clarification about whether the content on that wiki is considered official or not. But if we get it right, we could generate some extremely rich content as well as save the taxpayer money by working collaboratively,itera- I foresee more use of wiki technology by tively for the good of all. the government, eventually to enable In 2OO9 we will see lT take center public-private collaboration in the area stage as a government priority as the of information sharing across a wide new administration appoints a chief range of subjects. Of course, like gov- technology officer. ernment-hosted social media networks, We will see an increased emphasis on this will require significant investment in enterprise architecture and lT gover- creating policies and frameworks that nance as a way to plan, manage, and work. For example, if the government oversee the rapid forward movement of hosts a wiki that the public can modify, advanced technologies. o r . t 2 . o 9 {i (}li - F ii as: : f,+ "f C* !'{ 4tr * "f * i3 t{ fl Vo'S