-
U.S. to sell $10B in seized bitcoin
December 20, 2017 | NewsAs the price of bitcoin is skyrocketing, the government looks to cash in.
-
DOD looks to analytics to fight fraudulent contractors
December 19, 2017 | NewsThe Defense Logistics Agency wants to beef up its Business Decision Analytics tool to catch supply chain fraud and crack down on "CAGE jacking."
-
Data prioritization, hybrid cloud help HHS auditors uncover fraud
| NewsA cloud-based platform for data sharing is giving auditors in the Department of Health and Human Services a major productivity boost.
-
Location intelligence powers next generation emergency response
| NewsBy infusing mobile, sensor-based data with geographic information, public safety officials can increase situational awareness and improve information analysis.
-
‘Ruthless preemption’ now live for FirstNet opt-in states
December 13, 2017 | NewsNon-emergency communications will be "shifted to another line" to make room for voice and data traffic from police, firefighters and other emergency personnel.
-
Traffic analysis at the intersection of AI and supercomputing
| NewsArtificial intelligence and high-end hardware can automatically analyze video data from traffic cameras and provide actionable information for decision-makers.
-
New tool offers unprecedented access to U.S. election data
| NewsAn interactive version of the 2016 Election Administration and Voting Survey lets users examine a wide range of election-related data at the state and local level, as well as compare jurisdictions side by side.
-
What’s government’s role in AI?
December 12, 2017 | NewsSenators explore government's role as both an end user and enabler of artificial intelligence.
-
Colorado puts technology in the driver’s seat
| NewsThe state is building the country's first production-grade, connected vehicle system in which real-time data is shared across vehicles, infrastructure and people.
-
The credit card industry got it right, agencies should do the same
| NewsBehavior analytics working in concert with data loss prevention, tagging, multi-factor authentication and a light human touch would allow agencies to verify when an intruder is pretending to be an employee.