by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : August 2015
Some legacy systems will likely never move to modern platforms, but agencies must get smarter about what to migrate and how BY BRIAN ROBINSON TODIE? This summer's revelations of massive security breaches at the Office of Personnel Management not only set millions of feds on edge. The breaches also highlighted, yet again, agencies' reliance on legacy IT systems, some of which are decades old. The solution in most cases is to replace or at least upgrade them --- but that's much easier said than done. OPM Director Katherine Archuleta, who has since resigned, told congressional oversight panels in June that a large share of the blame for the breaches belonged with the legacy systems on which her agency depends, and they are proving tough to modernize. OPM CIO Donna Seymour told the same lawmakers that it was impossible to encrypt data in some of those systems. Some of the systems in question are more than 20 years old and written in Cobol, Seymour said. Getting them to the point at which they could be fully encrypted and accept other security measures, such as two-factor authentication, would require a full and very expensive rewrite of the software. GCN AUGUST 2015 • GCN.COM 17 TOOOLD