David Egts

Greater Cleveland Contact Info
5K followers 500+ connections

Join to view profile

About

David Egts is MuleSoft's first-ever Public Sector field CTO. He is the executive-level…

Articles by David

See all articles

Activity

Join now to see all activity

Experience & Education

  • Salesforce

View David’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Rochester Institute of Technology Graphic

    David & Melissa Egts Endowed Computer Science Scholarship

    Rochester Institute of Technology

    - Present 5 years

    Education

    - Established and funded RIT's first endowed scholarship to benefit women in computer science

  • AFCEA DC Graphic

    Steering Committee, Emerging Technologies Working Group

    AFCEA DC

    - 6 years 5 months

    Science and Technology

    - Planned and chaired breakout sessions with government and industry executives during the annual AFCEA DC Emerging Technologies Summits in 2013, 2014, and 2019
    - Received AFCEAN of the Month award for my contributions in 2013
    - Event activities resulted in funds for STEM college scholarships for graduating high school seniors

Publications

  • The Integrated Strength of Salesforce Service Cloud, Einstein, Data Cloud, and MuleSoft

    MuleSoft

    With digital experiences at our fingertips, customers expect personalized, efficient interactions across multiple channels and organizations that fail to deliver risk losing them. This is where the combined power of Salesforce Service Cloud, Einstein, Data Cloud, and MuleSoft come into play, creating a customer service ecosystem that’s truly greater than the sum of its parts.

    See publication
  • Data-Driven Empathy: Is Your Customer Support Team Ready for the “Centaur Team” Future?

    MuleSoft

    Customer service stands at a crossroads. The traditional model of overwhelmed agents struggling to meet customer demands is no longer sustainable. That’s where AI-powered centaur teams come into play.

    See publication
  • Public Sector Insights from the 2024 MuleSoft Connectivity Benchmark Report

    MuleSoft Blog

    While the 2024 MuleSoft Connectivity Benchmark Report paints a global picture of the integration and API adoption across industries, a closer look at the public sector reveals its own story – one filled with both obstacles and potential.

    See publication
  • 5 AI Predictions for 2024: Navigate the Hype Cycle and Embrace Your Inner Centaur

    MuleSoft Blog

    Artificial intelligence (AI) has been a hot topic of discussion in technical circles for years, but 2023 marks the year where it captured the attention and imagination of the mainstream. ChatGPT and similar technologies made AI accessible to the layperson, resulting in emotional reactions ranging from euphoria to despair and executive orders to ensure AI is safe, secure, and trustworthy.

    In August, Gartner placed generative AI at the Peak of Inflated Expectations for Emerging…

    Artificial intelligence (AI) has been a hot topic of discussion in technical circles for years, but 2023 marks the year where it captured the attention and imagination of the mainstream. ChatGPT and similar technologies made AI accessible to the layperson, resulting in emotional reactions ranging from euphoria to despair and executive orders to ensure AI is safe, secure, and trustworthy.

    In August, Gartner placed generative AI at the Peak of Inflated Expectations for Emerging Technologies, which begs the question, where will AI be in 2024?

    See publication
  • Why the public sector is prioritizing the customer experience amid new economic challenges

    Federal News Network

    In this new motion of navigating increased budget constraints and reduced resources, digital transformation initiatives that improve the customer experience are emerging from a nice-to-have to a must-do in today’s landscape. Now more than ever, the public sector is in need of more efficient solutions that ultimately help them do more with less and drive success now.

    See publication
  • Generative AI: 3 do's and don'ts for IT leaders

    The Enterprisers Project

    As generative AI increasingly finds its way into enterprise use, IT leaders must provide guidance. Here are some key factors—and recommendations—to consider.

    See publication
  • From Silos to Seamless: Improving the Student Experience in Higher Education

    MuleSoft

    Students expect their higher education institutions to have a 360-degree view of them when they register for classes, buy basketball game tickets, subscribe to a meal plan, and so much more. Unfortunately, this often isn’t the case. To access critical information, students need to engage with multiple systems and with possibly numerous logins.

    A 360-degree view creates a personalized, lifetime student journey – from admissions to alumni – through integration of disparate systems. The…

    Students expect their higher education institutions to have a 360-degree view of them when they register for classes, buy basketball game tickets, subscribe to a meal plan, and so much more. Unfortunately, this often isn’t the case. To access critical information, students need to engage with multiple systems and with possibly numerous logins.

    A 360-degree view creates a personalized, lifetime student journey – from admissions to alumni – through integration of disparate systems. The best way for higher education institutions to adopt a “Student 360” mindset is through integrating these systems and automating tedious processes.

    See publication
  • Using automation to improve employee experience

    The Enterprisers Project

    Remote and hybrid work can make it harder to express gratitude and recognize individual achievements. Consider this example of how Red Hat is using automation to do just that.

    See publication
  • Sludge Doctor in the House? Three Tips for Creating a Better Healthcare User Experience

    GovCon Expert

    In his latest GovCon Expert feature, Egts provides an overview of how government agencies are pushing to overcome the barriers surrounding the digitization of citizen services. In addition, Egts also discusses the impact that a "sludge audit" could have to improve and digitize citizen experiences.

    See publication
  • How to Make Data Science Education More Approachable

    EdTech

    Open-source technologies can make it easier and more enjoyable to learn and teach computer science in higher education.

    Other authors
    • Hugh Brock
    See publication
  • Three Things to Keep in Mind as You Help Your Defense Customers Implement Open Source Software

    GovCon Expert

    David Egts discusses the three core elements to keep at the forefront of defense customers as they work to implement open source software and address the technological challenges involved with digital transformation.

    See publication
  • 4 metaverse tools that tackle workplace collaboration

    The Enterprisers Project

    Poised as the next hot technology in 2022, the metaverse is finding its way into the workplace with some surprising benefits. Consider these tools, which take virtual collaboration to the next level.

    See publication
  • Three Things I Just Learned About Government Digitization

    GovCon Expert

    David Egts provids a breakdown looking into the impact that the COVID-19 pandemic has made on the digitization of federal agencies as well as the crucial lessons that government contractors should take away from these initiatives to be successful in the future.

    See publication
  • How automation strategy can help you retain IT talent

    The Enterprisers Project

    Automation strategy matters greatly right now because it helps IT leaders improve not only resiliency but also talent retention. Here's how - and how to get started.

    See publication
  • How I learned to delegate without guilt

    The Enterprisers Project

    I used to think of delegation as a selfish, one-way act to take work off my plate and put it on others' plates. Then I learned delegation opens the door for people on my team to shine and advance.

    See publication
  • Unlocking the mysteries of science with Linux containers

    GCN

    Time spent on computer science could be better spent on scientific research. This is where Linux containers come in. Containers give agencies the ability to maximize their HPC workloads while making the process more efficient, repeatable and secure.

    Let’s take a look at why agencies should leverage containers today to further accelerate their HPC workloads.

    See publication
  • What Yogi Berra can teach us about hybrid cloud strategy

    The Enterprisers Project

    As Berra would say, "The future ain't what it used to be." 2020 certainly taught us to be nimble in the face of unpredictable events. Here’s how a hybrid cloud strategy built on an open source foundation can help.

    See publication
  • Remote work: 3 ways to supercharge your team in 2021

    The Enterprisers Project

    The New Year brings a new opportunity to energize your team members. Consider these creative tactics to boost creativity, collaboration, and engagement in the virtual workplace.

    See publication
  • 3 keys to managing cyber risk in state, county and city agencies

    GCN

    COVID-19 systemic stresses have made state and local organizations an easy target for industrious hackers. Earlier this year, city governments urged Congress to provide additional cybersecurity funds in the wake of rising threats. More recently, the Treasury Department issued a warning for businesses and schools to be wary of potential ransomware attacks as risks continued to rise.

    These attacks raise a serious question: How can agencies uphold an effective and proactive security posture…

    COVID-19 systemic stresses have made state and local organizations an easy target for industrious hackers. Earlier this year, city governments urged Congress to provide additional cybersecurity funds in the wake of rising threats. More recently, the Treasury Department issued a warning for businesses and schools to be wary of potential ransomware attacks as risks continued to rise.

    These attacks raise a serious question: How can agencies uphold an effective and proactive security posture while balancing all of the other priorities and challenges they’re facing? From remote working to staff shortages, agencies must stay on top of escalating threat levels while making do with less.

    Here are three key strategies agencies can employ to navigate through these security challenges and protect the organization.

    See publication
  • Zoom fatigue: I turned on my camera for this?

    The Enterprisers Project

    A "cameras by default" meeting policy could be burning out your team. Consider easing up on this rule to help manage stress and fight Zoom fatigue.

    See publication
  • What’s your cloud safety plan?

    GCN

    As agencies become increasingly dependent on multi- and hybrid cloud environments, they need a safety plan for their cloud strategies -- something to protect them from the potentially high egress costs involved in moving applications and data from one cloud to another.

    See publication
  • Remote working: 14 tips to improve emails at a critical time

    The Enterprisers Project

    As remote working becomes more prevalent, especially due to COVID-19, email becomes one of the most critical collaboration tools to coordinate work efforts of disparate teams. The downside of this critical tool is that everyone receives more and more email, so having yours stand out above the rest becomes more and more challenging – and ever more important.

    Building on my recent article on how to run more efficient meetings, I wanted to share my favorite tips to get more done via email.

    See publication
  • Adopting agile mindsets can help agencies ace their FITARA scorecards

    FedScoop

    With the next FITARA scorecards set to be released in June, agencies should look at this as a time to continue to build on the momentum they showed last year.

    Adopting some of the principles that have become the hallmark of agile software development is a good start. Let’s take a closer look at how agencies can develop core agile principles to make their modernization efforts worthy of an "A" grade.

    See publication
  • 10 tips to run more effective meetings in 2020

    The Enterprisers Project

    The key to leading a productive meeting rather than a time-waster? Organization. Consider these tips before you schedule your next meeting.

    See publication
  • 3 ways to stop automation fear in government IT

    The Enterprisers Project

    Automation doesn't need to be anxiety-inducing for federal IT workers. Instead, it can bring order out of chaos and help people achieve a more meaningful work-life balance.

    See publication
  • 4 modernization best practices

    FCW

    Here are four best practices that federal IT administrators can adopt to keep their eyes on the future and effectively support their agencies' long-term modernization initiatives.

    See publication
  • Opening supercomputing to all agencies

    GCN

    Department of Energy Secretary Rick Perry wrote last May that “the future is in supercomputers,” but until recently, only a handful of agencies have been able to tap into that kind of power.

    See publication
  • Make the most of your cybersecurity capabilities before investing in more

    FedScoop

    Let’s take a look at how you can optimize your stack to make the most out of the technology you already have and strengthen your security posture.

    See publication
  • Seizing the Opportunity to Close the Cybersecurity Skills Gap

    Nextgov

    How the public sector could get a leg up on competing for cybersecurity talent.

    See publication
  • Four Myths About Open Source in Government

    Government Technology

    Despite its large following, open source software suffers from persistent misconceptions about cost, security and general acceptance.

    See publication
  • Bypassing Procurement Can Introduce Some Unwanted Visitors

    Nextgov

    The federal IT procurement safety net may be developing some holes. Many federal developers are forgoing traditional software purchasing in favor of going directly to the source and downloading code from tens of millions of open source repositories and libraries. While this can certainly expedite innovation, it also has the potential to expose agencies to security risks if they’re not careful.

    This backdoor approach to code procurement can let in some unwanted visitors through that door:…

    The federal IT procurement safety net may be developing some holes. Many federal developers are forgoing traditional software purchasing in favor of going directly to the source and downloading code from tens of millions of open source repositories and libraries. While this can certainly expedite innovation, it also has the potential to expose agencies to security risks if they’re not careful.

    This backdoor approach to code procurement can let in some unwanted visitors through that door: unknown and dangerous vulnerabilities that may have gone undetected in the code. Without the checks and balances of procurement, how can they be sure that the code they are downloading does not contain some form of malware or another bad actor? How can they stay agile while keeping their applications and networks safe?

    See publication
  • Federal IT’s 'Golden Gate' moment

    GCN

    The Golden Gate Bridge is one of our nation’s most famous landmarks, but it’s also a work in progress. First begun in 1933, the structural and aesthetic wonder is continuously being worked on to ensure its coat of “international orange” paint keeps its iconic sheen and protects the underlying steel infrastructure from erosion. It’s a monumental achievement that will never truly be finished.

    Digital transformation is federal IT’s equivalent of the Golden Gate Bridge. It’s not something…

    The Golden Gate Bridge is one of our nation’s most famous landmarks, but it’s also a work in progress. First begun in 1933, the structural and aesthetic wonder is continuously being worked on to ensure its coat of “international orange” paint keeps its iconic sheen and protects the underlying steel infrastructure from erosion. It’s a monumental achievement that will never truly be finished.

    Digital transformation is federal IT’s equivalent of the Golden Gate Bridge. It’s not something that can be defined by a singular goal, built and then left alone. Digital transformation is a journey of continuous innovation and improvement that extends beyond technology into the people and processes that drive agencies forward.

    Here are three important considerations as agencies begin their journey of transformation...

    See publication
  • The container future is here. It’s just not evenly distributed

    GCN

    Science fiction writer William Gibson once said, “The future is already here -- it’s just not evenly distributed.” He was explaining that things we once thought of as futuristic already were a reality for some people, but not everyone.

    He may as well have been talking about adoption of Linux containers within the federal government.

    While evidence suggests that the public sector’s interest in Linux containers continues to grow, many agencies remain on the fence. Whether due to…

    Science fiction writer William Gibson once said, “The future is already here -- it’s just not evenly distributed.” He was explaining that things we once thought of as futuristic already were a reality for some people, but not everyone.

    He may as well have been talking about adoption of Linux containers within the federal government.

    While evidence suggests that the public sector’s interest in Linux containers continues to grow, many agencies remain on the fence. Whether due to budget, lack of information or other constraints, government adoption of Linux containers has been slower than it has been in the commercial space. Many agencies continue to view containers as exclusively for the cool kids in Silicon Valley.

    So what’s the hold up when it comes to containers? Let us address some common concerns to help unsure CIOs better understand why and how they can make containers a part of their IT operations.

    See publication
  • Open infrastructures give agencies cloud freedom

    GCN

    More than a few folks raised their eyebrows when the Department of Defense announced it would make a single award for its Joint Enterprise Defense Infrastructure project. On the surface, the DOD’s decision seems to fly in the face of conventional wisdom that maintains that reliance on one cloud provider can lead to a number of technical and economic challenges.

    While there are merits to the single-provider approach, it is not a strategy that will work for everyone. Indeed, most agencies…

    More than a few folks raised their eyebrows when the Department of Defense announced it would make a single award for its Joint Enterprise Defense Infrastructure project. On the surface, the DOD’s decision seems to fly in the face of conventional wisdom that maintains that reliance on one cloud provider can lead to a number of technical and economic challenges.

    While there are merits to the single-provider approach, it is not a strategy that will work for everyone. Indeed, most agencies may experience greater benefits from working with multiple cloud providers.

    See publication
  • Public cloud security doesn't end with the cloud provider

    GCN

    Over the past couple of years, initiatives like Cloud First and the Federal Risk and Authorization Management Program prompted government IT leaders to give public cloud platforms a second look. Public cloud providers have invested resources to ensure that their offerings are measurably more secure than they used to be. Even so, public clouds still pose a risk for agencies operating under strict privacy, security and compliance regulations.

    Despite the fact that many public cloud…

    Over the past couple of years, initiatives like Cloud First and the Federal Risk and Authorization Management Program prompted government IT leaders to give public cloud platforms a second look. Public cloud providers have invested resources to ensure that their offerings are measurably more secure than they used to be. Even so, public clouds still pose a risk for agencies operating under strict privacy, security and compliance regulations.

    Despite the fact that many public cloud providers have teams dedicated to providing security at the software-as-a-service, platform-as-a-service or infrastructure-as-a-service layers, agency IT professionals must play their part too. Their own teams must take responsibility for securing the last mile -- the stretch between where the cloud provider’s responsibility ends and the agency's responsibility begins.

    See publication
  • Mining cryptocurrency with Raspberry Pi and Storj

    Opensource.com

    Storj uses a proof-of-retrievability system allowing users "rent out" spare disk space and get paid monthly in Storj coin.

    See publication
  • How Open Source Tech Helps Feds Solve Workforce Turnover Issues

    FedTech

    As older federal IT workers retire, agencies can turn to open source technologies to help them preserve knowledge automation systems, gain flexibility and create a new agency culture.

    See publication
  • Book review: Up to no good with 'Raspberry Pi for Secret Agents'​

    Opensource.com

    Unlike the other Raspberry Pi books, Raspberry Pi for Secret Agents explores the features of the Raspberry Pi with a common theme that could be summarized by the title of Chapter 1: Getting up to No Good.

    See publication
  • Internet-enable your microcontroller projects for under $6 with ESP8266

    Opensource.com

    To get started with IoT (the Internet of Things), your device needs, well, an Internet connection. Base Arduino microcontrollers don't have Internet connectivity by default, so you either need to add Ethernet, Wi-Fi shields, or adapters to them, or buy an Arduino that has built-in Internet connectivity. In addition to complexity, both approaches add cost and consume the already-precious Arduino flash RAM for program space, which limits what you can do. The ESP8266 on the other hand can not only…

    To get started with IoT (the Internet of Things), your device needs, well, an Internet connection. Base Arduino microcontrollers don't have Internet connectivity by default, so you either need to add Ethernet, Wi-Fi shields, or adapters to them, or buy an Arduino that has built-in Internet connectivity. In addition to complexity, both approaches add cost and consume the already-precious Arduino flash RAM for program space, which limits what you can do. The ESP8266 on the other hand can not only provide Wi-Fi capabilities to existing Arduino projects, but it can also serve as a standalone microcontroller itself.

    See publication
  • New Year’s Resolution: Tackle the State CIO Top 10 Priorities with an Open Mind

    NASCIO

    While many of the NASCIO Top Ten Priorities have remained somewhat constant through the years, this may be the first time that each one can be addressed through the power of open source.

    See publication
  • How to get up and running with sweet Orange Pi

    Opensource.com

    As open source-powered hardware like Arduino and Raspberry Pi becomes more and more mainstream, its cost keeps dropping, which opens the door to new and innovative IoT and STEM applications. As someone who's passionate about both, I'm always on the lookout for new innovations that can be applied in industry, the classroom, and my daughter's robotics team. When I heard about the Orange Pi as being a "Raspberry Pi killer," I paused to take notice.

    Despite the sour sounding name, the Orange…

    As open source-powered hardware like Arduino and Raspberry Pi becomes more and more mainstream, its cost keeps dropping, which opens the door to new and innovative IoT and STEM applications. As someone who's passionate about both, I'm always on the lookout for new innovations that can be applied in industry, the classroom, and my daughter's robotics team. When I heard about the Orange Pi as being a "Raspberry Pi killer," I paused to take notice.

    Despite the sour sounding name, the Orange Pi Zero intrigued me. I recently got my hands on one and in this article share my first impressions. Spoiler alert: I was very impressed.

    See publication
  • How agencies can take a page out of industry's open playbooks

    FCW

    How should the government move faster, partner faster, and collaborate faster? The answer lies not only in the technology that agencies procure, but in the processes and people they use to manage said technology. That includes the establishment of more open cultures and DevOps practices combined with broader use of open source software.

    See publication
  • Alexa, How Can Government Adopt Artificial Intelligence Faster?

    Nextgov

    As artificial intelligence moves to SaaS, some government agencies and workloads may miss out on the benefits because of security and privacy requirements, which may put the government at a disadvantage compared to commercial counterparts and consumers. By using open source and being transparent, industry and government can work together to ensure that the government can experience the benefits the private sector and consumers are already enjoying.

    See publication
  • How Automation Can Unleash Government IT Innovation

    Nextgov

    It’s been said 80 percent an organization’s budget is spent “keeping the lights on” with ongoing operations and maintenance. That leaves only 20 percent left over for innovation. Based on conversations I’ve had with government agency leaders, this is often a best-case scenario.

    Given today’s increased emphasis on cybersecurity, that 80 percent may be even higher with unfunded mandates to enhance security postures and reporting capabilities, leaving less and less room for innovation. And…

    It’s been said 80 percent an organization’s budget is spent “keeping the lights on” with ongoing operations and maintenance. That leaves only 20 percent left over for innovation. Based on conversations I’ve had with government agency leaders, this is often a best-case scenario.

    Given today’s increased emphasis on cybersecurity, that 80 percent may be even higher with unfunded mandates to enhance security postures and reporting capabilities, leaving less and less room for innovation. And security threats and attackers aren’t going to stop.

    Some agencies I’ve met with spend almost all their time on the patching “wash, rinse, repeat” cycle. By the time they’re done patching, they need to do it all over again, leaving no time left for innovation at all. What’s an agency going to do?

    Automate.

    See publication
  • Why Agencies Must Take a “Security First” Approach in 2016

    Nextgov

    While cybersecurity has always been a hot-button issue for the government, certain events from last year promise that, in 2016, security concerns have the potential to skyrocket beyond anything we’ve seen before.

    The questions, of course, are what is being done – and what else can be done?

    See publication
  • Why government can’t – and shouldn’t – contain containers

    GCN

    Much has been written about the “need for speed” in government IT circles. Today, agencies are under pressure to develop applications faster and with more flexibility than ever before. Both of these attributes are hallmarks of a Linux container.

    See publication
  • 6 tips for adopting open source

    GCN

    What’s the best way to increase your agency’s adoption of open source software and keep it secure? Here are six tips to get you there.

    See publication
  • How Linux containers can solve a problem for DOD virtualization

    Defense Systems

    How Linux containers and Docker can help address some of the drawbacks of traditional virtualization.

    See publication
  • 2 questions to ask before diving into infrastructure-as-a-service

    FCW

    A migration to IAAS can be daunting, and early planning is key to maximizing returns.

    See publication
  • Multilevel Security with Red Hat Enterprise Linux and SELinux

    Red Hat, Inc.

    9 part video series on how to install, configure, and use Multilevel Security on Red Hat Enterprise Linux 6 with SELinux.

    See publication
  • Deploy warfighter applications faster with open source Platform-as-a-Service

    Military Embedded Systems

    Up-and-coming Web startups are leapfrogging each other to market using Internet-hosted Platform-as-a-Service (PaaS) technologies. PaaS allows these startups to innovate rapidly by focusing more time on their mission and less time managing hardware and software. Can the warfighter benefit from PaaS too? Yes, if the warfighter controls the PaaS stack - and open source delivers that control.

    See publication
  • Industry Perspective: Accelerate Education With Open Source Cloud Techs

    Government Technology

    Distance learning is more popular than ever, and the reasons are many: Students can work full time while taking classes that fit their schedules; educators are no longer constrained by the economics of the physical classroom -- one professor can teach thousands of students simultaneously, or alternatively teach exotic, “long tail” subjects that wouldn’t be sustainable at a single university's campus; and holding classes virtually is significantly less expensive.

    Though distance learning…

    Distance learning is more popular than ever, and the reasons are many: Students can work full time while taking classes that fit their schedules; educators are no longer constrained by the economics of the physical classroom -- one professor can teach thousands of students simultaneously, or alternatively teach exotic, “long tail” subjects that wouldn’t be sustainable at a single university's campus; and holding classes virtually is significantly less expensive.

    Though distance learning has made significant strides over the years, there's still room for improvement -- and that's where open source platform-as-a-service (PaaS) can help.

    See publication
  • Secure Virtualization for Tactical Environments

    Military Embedded Systems

    Virtualization has proven its value in the data center, but can it work in tactical environments? Yes, but only if it’s secure.

    See publication
  • Secure Virtualization with sVirt

    Red Hat, Inc.

    3 part video series on what sVirt is, how sVirt implements Mandatory Access Control and Multicategory Security isolation with SELinux on Red Hat Enterprise Linux and Red Hat Enterprise Virtualization, and how sVirt foils malicious attacks in a practical, reproducable example.

    See publication
  • SELinux user confinement in Red Hat Enterprise Linux 6: Easily letting users get their jobs done, and that's it

    Red Hat, Inc.

    7 part video series on how to use SELinux Mandatory Access Control to confine users on Red Hat Enterprise Linux 6.

    See publication
  • Confining Users with Predefined SELinux Security Policies in Red Hat Enterprise Linux 6

    Red Hat, Inc.

    In Red Hat Enterprise Linux 6, SELinux has been redesigned to make it much easier for system administrators to configure SELinux to confine Linux users. The default Targeted Policy now includes four predefined, role-based security policies for confined users. In addition, SELinux now includes a Policy Generator GUI that allows system administrators to quickly and easily customize existing SELinux policy modules or create new ones to define custom role-based security policies for confined…

    In Red Hat Enterprise Linux 6, SELinux has been redesigned to make it much easier for system administrators to configure SELinux to confine Linux users. The default Targeted Policy now includes four predefined, role-based security policies for confined users. In addition, SELinux now includes a Policy Generator GUI that allows system administrators to quickly and easily customize existing SELinux policy modules or create new ones to define custom role-based security policies for confined users.

    This paper describes the simplest way to confine users with SELinux in Red Hat Enterprise Linux 6 – using the predefined, role-based security policies that are included with the default Targeted Policy.

    Other authors
    See publication
  • Open and Secure Virtualization

    Military Information Technology

    Open source and open standards virtualization of servers and desktops is a powerful tool for the delivery of information assurance.

    (page 38)

    See publication
  • Managing the Explosion of Classified Data in PC-IG Deployments

    The Interservice/Industry Training, Simulation & Education Conference (I/ITSEC)

    Many have enjoyed substantial hardware acquisition cost savings by using PC-based image generators (PC-IGs). However, the PC-IG architecture presents many system administration challenges in environments that require processing data at multiple levels of security. Multiple levels of security normally require at least one system drive per channel (a.k.a. node) in the cluster. The compelling PC-IG cluster initial hardware cost savings can be significantly diminished by the labor and time required…

    Many have enjoyed substantial hardware acquisition cost savings by using PC-based image generators (PC-IGs). However, the PC-IG architecture presents many system administration challenges in environments that require processing data at multiple levels of security. Multiple levels of security normally require at least one system drive per channel (a.k.a. node) in the cluster. The compelling PC-IG cluster initial hardware cost savings can be significantly diminished by the labor and time required to change from one classification level to another. Other industries have been successful using off-the-shelf diskless booting and shared file system technologies, and the simulation industry can also embrace these same technologies to help ease the burdens involved in processing at multiple levels of security. This paper examines the management of classified data in visual simulation ranging from industry challenges to current and best practices inside and outside the simulation industry. These technologies with sample implementations are under investigation and the results will be presented.

    Other authors
    See publication
  • In Search of Storage

    Training & Simulation Journal

    This article explores and discusses a real-world test conducted at the U.S. Air Force's Distributed Mission Training (DMT) program in Mesa, AZ. Performance of the SGI CXFS shared file system technology i showcased in this multisimulator environment. Research exercises using large-area, geo-specific visual databases, such as for the U.S. Air Force’s DMT program, use databases that represent areas larger than 10 degrees latitude by 10 degrees longitude — about 600 miles square. Databases of…

    This article explores and discusses a real-world test conducted at the U.S. Air Force's Distributed Mission Training (DMT) program in Mesa, AZ. Performance of the SGI CXFS shared file system technology i showcased in this multisimulator environment. Research exercises using large-area, geo-specific visual databases, such as for the U.S. Air Force’s DMT program, use databases that represent areas larger than 10 degrees latitude by 10 degrees longitude — about 600 miles square. Databases of this size can easily grow to more than 75 gigabytes of data, and can be several times larger when including per-texel (texture element) correlated sensor simulations. Using the SGI CXFS shared file system technology was overwhelmingly successful.

    Other authors
    See publication
  • High Performance Storage Solutions for Visual Simulation

    White Paper - SGI

    This White-Paper takes an expanded look at the benefits of using a Storage Area Network (SAN) in a multisimulator visual simulation environment. In addition to discussing lessons learned since the first paper's publication, we also discuss the results of additional in-depth performance test.

    Other authors
  • The Use of a Storage Area Network in Multisimulator Visual Simulation Environments

    White Paper - SGI

    Over the past several years, technology has become available that has made it feasible for high-fidelity simulations to use large-area geographically specific (geo-specific) visual databases. The textures used in visual simulation applications have moved from geo-typical to to geo-specific. Geo-specific simply states that the texture being used to represent the real world is an image taken from aerial photography or from a satellite image of the geographical location being represented.…

    Over the past several years, technology has become available that has made it feasible for high-fidelity simulations to use large-area geographically specific (geo-specific) visual databases. The textures used in visual simulation applications have moved from geo-typical to to geo-specific. Geo-specific simply states that the texture being used to represent the real world is an image taken from aerial photography or from a satellite image of the geographical location being represented. Large-area geo-specific databases greatly increase the fidelity of the simulation but also greatly increase the hardware requirements and visual database management requirements. This paper takes a detailed look at the benefits of using a storage area network (SAN) in a multisimulator visual system environment.

    Other authors
  • Panoramic image-based rendering solutions for visualizing remote locations via the web

    Applied Imagery Pattern Recognition ’99

  • VideoNav: A System for Visualizing GPS-Correlated Panoramic Video

    1999 International Conference on Imaging Science, Systems, and Technology (CISST'99)

  • VENoM: Virtual Environment for Network Monitoring

    Symposium on Advanced Information Processing and Analysis

    Other authors
  • Virtual Assembly Using Two-Handed Interaction Techniques on the Virtual Workbench

    1998 ASME Design Engineering and Technical Conference

Projects

  • The Dave and Gunnar Show

    The Dave and Gunnar Show is a podcast about open source, privacy, security, robots, parenting, and internet ephemera. Check us out at http://dgshow.org and your favorite podcast application!

    Other creators
    See project
  • Aqueduct

    -

    The Aqueduct project provides automated changes to Red Hat Enterprise Linux based systems to meet security guidelines established by various agencies. These changes are in the form of Bash scripts and Puppet manifests. Each change is specific to the agency's auditing criteria and granular enough to allow the system owner to decide on changes at the line item level.

    Other creators
    See project

Honors & Awards

  • Peak Performers Club 2024

    Salesforce

    Peak Performers Club is a slot-based program based on a minimum requirement of 100% club (ACV) attainment. Nominations are based on club attainment, organizational representation, performance, and management discretion.

  • Top Chief Technology Officers to Watch in 2024

    WashingtonExec

    In the competitive, evolving world of government contracting, companies must stay ahead by keeping up with technology trends that drive customer solutions. It’s crucial for companies to adapt their solutions and capabilities to align with customer mission needs, ensuring they provide efficient, compliant tools to the government. As technology reshapes both industry and government, the importance of chief technology officers has surged.

    These professionals are key in modernizing IT…

    In the competitive, evolving world of government contracting, companies must stay ahead by keeping up with technology trends that drive customer solutions. It’s crucial for companies to adapt their solutions and capabilities to align with customer mission needs, ensuring they provide efficient, compliant tools to the government. As technology reshapes both industry and government, the importance of chief technology officers has surged.

    These professionals are key in modernizing IT infrastructure, advancing critical technologies, directing technology investments, recruiting and nurturing a top-tier technical workforce, and forecasting future technology focuses. Their technology strategies and solution development plans are vital in enhancing customer capabilities and distinguishing their organizations. WashingtonExec’s “Top Chief Technology Officers to Watch in 2024” list invites you to meet the CTOs who have the management and IT expertise to drive change from within.

  • Chief Technology Officers Making Waves in 2023

    Executive Mosaic

    Check out the list of the most influential chief technology officers working toward technological advancements in the government sector. The following list features esteemed Chief Technology Officers selected based on a comprehensive evaluation of their accomplishments, including their strategic vision, demonstrated impact on the industry, innovative contributions, and leadership prowess.

  • Federal 100

    FCW

    FCW and Government Executive honor the current and former government officials and industry stakeholders who have made historic achievements and advances across government.

    https://www.fcw.com/people/2022/02/announcing-2022-federal-100/361728/
    https://www.govexec.com/feature/evening-of-honors/

  • Top 20 Cloud Executives to Watch in 2021

    WashingtonExec

    Once a buzzword, now the norm, cloud has become the standard for digital environments everywhere. As government agencies implement, integrate and begin to rely on cloud and hybrid-cloud systems, IT leaders drive the push to adopt and maintain secure, cloud-based enterprises. We’ve identified those in industry and government who are ensuring the nation is equipped with the technology, platforms, software and applications it needs to drive productivity and build a foundation for advanced…

    Once a buzzword, now the norm, cloud has become the standard for digital environments everywhere. As government agencies implement, integrate and begin to rely on cloud and hybrid-cloud systems, IT leaders drive the push to adopt and maintain secure, cloud-based enterprises. We’ve identified those in industry and government who are ensuring the nation is equipped with the technology, platforms, software and applications it needs to drive productivity and build a foundation for advanced technologies — even through a pandemic.

    WashingtonExec’s Top 20 Cloud Executives to Watch in 2021 highlights leaders constantly on the cutting edge of tech innovation. They’ve been working on cloud adoption throughout their careers and are dedicated to providing customers with the environments they need to safely and efficiently meet mission needs. Plus, they bring the expertise, vision and problem-solving spirit that helped the nation meet IT challenges during a difficult year.

    https://washingtonexec.com/2021/04/top-20-cloud-execs-to-watch-in-2021/10/

  • Finalist, Industry CTO, WashingtonExec Chief Officer Awards

    WashingtonExec

    "The WashingtonExec Chief Officer Awards recognize the most impactful and innovative executives in government and industry sitting in the C-suite.

    The awards aim to fill a gap in the market of showcasing the technologists, security experts and business leaders making waves in government contracting from both sides of the sector.

    Rather than highlighting CEOs, who often see the spotlight, the Chief Officer Awards seeks to find the chief data officers, chief information security…

    "The WashingtonExec Chief Officer Awards recognize the most impactful and innovative executives in government and industry sitting in the C-suite.

    The awards aim to fill a gap in the market of showcasing the technologists, security experts and business leaders making waves in government contracting from both sides of the sector.

    Rather than highlighting CEOs, who often see the spotlight, the Chief Officer Awards seeks to find the chief data officers, chief information security officers, chief operating officers and others leading their organizations with innovation, expertise and thought leadership."

    https://www.businesswire.com/news/home/20200609005484/en/Finalists-Announced-Annual-WashingtonExec-Chief-Officer-Awards

  • President's Club

    Red Hat

    President's Club is a program sponsored by Red Hat's sales organization designed to drive performance and excellence across our sales teams by recognizing significant contributions from top sales and supporting associates.

  • FedScoop 50 Industry Leadership Award

    FedScoop

    "Each year, the FedScoop 50 Awards honor the best and the brightest who make the federal government more efficient and effective. These awards allow us to celebrate the outstanding achievements of our peers and acknowledge their tireless efforts to make a positive impact in the government community and in public service."

    https://www.fedscoop.com/fedscoop-honors-2018-fedscoop-50/
    https://www.fedscoop.com/events/fedscoop50/2018/

  • DC AFCEAN of the Month

    AFCEA DC

    Excerpt from now defunct http://www.afceadc.org/getinvolved/afcea-dc-award-winners/dc-afcean-of-the-month-david-egts-september-2013

    Dave was instrumental in helping the Emerging Technologies Working Group develop and implement the Emerging Technologies Symposium held in June 2013. Not only did he help provide ideas for content and identify and recruit speakers, he also developed the format used for all 6 of the technical breakout sessions. He created the outline for the session format…

    Excerpt from now defunct http://www.afceadc.org/getinvolved/afcea-dc-award-winners/dc-afcean-of-the-month-david-egts-september-2013

    Dave was instrumental in helping the Emerging Technologies Working Group develop and implement the Emerging Technologies Symposium held in June 2013. Not only did he help provide ideas for content and identify and recruit speakers, he also developed the format used for all 6 of the technical breakout sessions. He created the outline for the session format and created the debrief form, which all session leaders used to prepare their sessions, and debrief the audience from the main plenary stage.

    Dave lives in Ohio and rarely missed a working group meeting. He structured his business travels to DC around the Emerging Technologies Working Group meeting schedule so he could play an active role in person in the group. He is a leadership figure in the AFCEA DC emerging technologies working group community and brings a strong technical perspective to the discussions.

  • Chairman's Award

    Red Hat

    Unveiled at the 2006 Red Hat Summit, the Chairman's Award is an annual award to recognize Red Hat associates with contributions so strong, so superior, and worthy of merit and acknowledgment that they have been recognized by their peers to receive the award.

  • Government Solutions Architect MVP

    Red Hat

  • Most Valuable Player of the Quarter

    Silicon Graphics, Inc.

  • Systems Engineer of the Year

    Silicon Graphics, Inc.

  • Systems Engineering Circle of Excellence

    Silicon Graphics, Inc.

  • Systems Engineer of the Year

    Silicon Graphics, Inc.

  • Systems Engineering Circle of Excellence

    Silicon Graphics, Inc.

  • Systems Engineer of the Year

    Silicon Graphics, Inc.

  • Systems Engineering Circle of Excellence

    Silicon Graphics, Inc.

  • President's Award

    Concurrent Technologies Corporation

    Recognition as Concurrent Technologies Corporation's employee of the year.

  • Division Scholar in Computer Science

    University of Pittsburgh at Johnstown

  • Summa Cum Laude

    University of Pittsburgh at Johnstown

    Graduated first in class

Recommendations received

10 people have recommended David

Join now to view

More activity by David

View David’s full profile

  • See who you know in common
  • Get introduced
  • Contact David directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named David Egts in United States

Add new skills with these courses