-
Announcing the dig IT Award finalists
August 07, 2017 | NewsFrom mobile security to smarter transit to swarming drones, these 25 projects represent the best of discovery and innovation in government IT.
-
Tracking Flint’s water crisis through data
| NewsMichigan State University researchers are building a digital registry of individuals exposed to lead-contaminated water in Flint, Mich.
-
Tracking Flint’s water crisis through data
| NewsMichigan State University researchers are building a digital registry of individuals exposed to lead-contaminated water in Flint, Mich.
-
Wearables may lighten the load for Marines
| NewsBy transmitting their real-time supply needs to platoon leaders, Marines could carry only what they need for the immediate future.
-
Wearables may lighten the load for Marines
| NewsBy transmitting their real-time supply needs to platoon leaders, Marines could carry only what they need for the immediate future.
-
Is TIC necessary for FedRAMP-approved apps?
August 04, 2017 | NewsAgencies shouldn't have to use a trusted internet connection for accessing cloud environments that have already been approved by the Federal Risk and Authorization Management Program, one CIO argues.
-
Can tech arrest prisoners’ cellphone use?
| NewsThe Bureau of Prisons is asking for help identifying technologies and systems that can prevent inmates from using contraband wireless communication devices.
-
VA plans cloud-based app labs
| NewsIn order to better manage the increasing number of public and internal applications it uses, the Department of Veterans Affairs wants a cloud-based development and test environment.
-
Functional fabrics for emergency response
| NewsMaterials integrated with sensors and internet connectivity can solve issues facing soldiers in combat or training, first responders and victims and workers in refugee camps.
-
Inside the fight against malware attacks
| NewsCreated by researchers at University of Texas Arlington, the SEMU malware analysis system provides a comprehensive log of malware operations, making it easier for security analysts to understand what the malicious program was supposed to do.