-
Hybrid IT and data security musts
June 23, 2017 | NewsThe key to an agency's successful cloud or hybrid IT implementation is to understand and maximize its cloud security posture in advance of the move.
-
Hybrid IT and data security musts
| NewsThe key to an agency's successful cloud or hybrid IT implementation is to understand and maximize its cloud security posture in advance of the move.
-
Analytics platform helps KC anticipate the needs of its citizens
| NewsWith Xaqt's MetroGraph, Kansas City, Mo., taps into its smart infrastructure -- as well as legacy and open data -- for real-time monitoring and data-driven predictions.
-
DHS wants you to build a better body scanner
| NewsOr a better algorithm, at least. A new challenge project aims to accurately assess passenger body scans for threats, cutting down on false positives and speeding up airport security lines.
-
DHS wants you to build a better body scanner
| NewsOr a better algorithm, at least. A new challenge project aims to accurately assess passenger body scans for threats, cutting down on false positives and speeding up airport security lines.
-
Automation error sends tremors through California
| NewsAutomated notification systems, updates to old data and a Y2K-type glitch combined to create a false alarm for a severe earthquake near Los Angeles.
-
Automation error sends tremors through California
| NewsAutomated notification systems, updates to old data and a Y2K-type glitch combined to create a false alarm for a severe earthquake near Los Angeles.
-
Popcorn Linux OS gives processors a common language
June 22, 2017 | NewsDeveloped by engineering researchers at Virginia Tech with support from the Office of Naval Research, Popcorn Linux may make it easier to upgrade and maintain complex, multicore systems.
-
A case-by-case DevOps strategy
| NewsDevOps tools can help government agencies speed up their IT processes, but agency officials caution against using them for all projects.
-
Explainer: How malware gets inside your apps
| NewsMalware can be inserted into applications by attackers who modify apps and republish them, by compromised in-app advertising or by corrupted development tools.