-
The secret source for cyber hires
April 25, 2017 | NewsThe Scholarship for Service program produces top-quality cyber graduates who have committed to work in government. It's federally funded, but state, local and tribal agencies can reap the benefits.
-
How Atlanta manages its new traffic headache
| NewsCommuteATL, an online platform spun up after the I-85 bridge collapse, helps city officials manage traffic in near real time and provides live updates for drivers.
-
State CIOs look to agile
| NewsPreliminary findings from a new survey on agile development shows states see benefits for customer satisfaction, quality and transparency.
-
IoT is the glue holding our smart cities together
April 24, 2017 | NewsThe robust communications that smart cities are built on requires systematic evaluation and benchmarking to ensure effective delivery of public services.
-
DHS preps Cyber Incident Data Repository
| NewsCIDAR aims to identify trends, mitigate threats and calculate risks for enterprise risk managers and cybersecurity insurance companies.
-
GSA launches virtual assistant pilot
| NewsThe project will help make government information available to consumers via personal digital assistants such as Amazon Alexa, Microsoft Cortana, Google Assistant and Facebook Messenger.
-
Census powers up ahead of decennial headcount deadlines
| NewsThe bureau must scale up its systems, finalize partnerships to shore up its address records and award three IT contracts -- all in the face of looming budget questions.
-
Lafayette taps IoT for air quality data
April 21, 2017 | NewsCity government, industry and university partners are building an interactive smart city platform for Lafayette, La.
-
Moving toward a one-stop shop for FOIA requests
| NewsThe governmentwide portal for filing federal Freedom of Information Act requests aims to be interoperable with agencies' current systems.
-
A clean bill of health for data security
| NewsGovernment health care institutions and agencies can safeguard their confidential information and lower their risk of data breaches by following best practices around people, encryption and security policies.