A California school district is piloting the app to increase student safety.
A majority of agencies plan to migrate to the state’s Allied Radio Matrix for Emergency Response network.
Antenna length and lack of mission-specific accessories seen as issues in otherwise satisfactory test.
Successful enhanced 911 system implementation takes a team approach.
Rhode Island is establishing a cyber-disruption response team to help restore critical IT systems following a disaster.
A new employee locator could aid Miami-Dade County, Fla., officials in coordinating responses to future disasters. The application plots where county employees live and work on a map that’s searchable by an employee’s identification number, name, address or ZIP code.
Washington Fire Chiefs association uses SharePoint to simplify collaboration on legislative and policy actions less expensively.
University of Maryland researchers are ready to test an application that streams audio and video of 911 calls to campus dispatchers.
Greater bandwidth gives Marietta, Ga., police officers and firefighters increased access to information and more time in the field.
Information portal provides federated search and automated audit capabilities, allowing law enforcement agencies to search disparate databases simultaneously.
State agencies look to collaboration to build an interoperable communications network within the next 10 years.
Web-based collaborative workspace provides version control and helps avoid misunderstandings.
GIS data from the Mormon Church will help the county shelter evacuees during disasters, receive disaster declarations and apply for public assistance.
Sensors will add chemical data to Rhode Island's common operating picture.
Web-based Disaster Volunteer Resource Inventory will help improve structure for incorporating volunteers in disaster response.
Volunteer radio operators provide situational awareness to emergency managers during and after disasters.
A window of broadband technology grants is open exclusively to jurisdictions receiving waivers.
Mass notification system also provides information about public health issues, disaster recovery and missing children.
The Montgomery County Department of Public Safety provides near real-time emergency and traffic incident information online.
The system lets Illinois officials quickly track diseases and respond accordingly.
The Dayville, Conn., Fire Company utilizes wireless tracking of firefighters to improve emergency response and post-incident accountability.
University of Southern California's text message tip program guarantees user anonymity while promoting campus security.
South Carolina's Web-based data management system simplifies the HAZUS updating process and provides redundancy in case of disaster.
YouTube Direct allows news outlets to review and manage submitted content, engage videographers.
Grant to fund development of a rapid, low-cost solution to determine identity with DNA.
System provides for two-way messages across phones, pagers, e-mail and text-messaging.
Alabama lets law enforcement, first responders share important data as incidents happen.
Standards for training, sheltering and emergency care as well as more focused funding among recommendations from the National Commission on Children and Disasters.
California Public Safety Communications (CAPSCOM) Strategic Plan expected in May 2010.
After major flooding caused the University of Hawaii to lose research project information, it purchased fire- and flood-resistant hard drives to aid future business continuity.
Consortium under consideration could give public safety agencies a unified voice in pursuing funding for broadband networks.
Nonprofit organization Save the Children commissioned a report that included a national report card of how well individual states meet children's needs during a disaster.
Palm Beach, Broward, Miami-Dade and Monroe, Fla., counties could see expedited coordination through use of an Internet-based coordination tool.
Law enforcement in St. Louis County sees significant savings from electronic filing of criminal complaints that incorporate electronic signatures and biometric officer authentication.
Non-U.S. citizens leaving the country from the Hartsfield-Jackson Atlanta International Airport and the Detroit Metropolitan Wayne County Airport will have their fingerprints taken.
The American Recovery and Reinvestment Act provides more than $500 million for port security, transit security, and fire station construction and renovation.
Electronic medical records, all-hazards alarms and smart airplanes all have a role in disaster preparedness.
"Just like you know how to drive, [It] ought to be mandated in our future population because the world keeps getting bigger and the world is not getting safer," he said.
Compatibility assessment program will make radio testing data available on the Web.
Science Applications International Corp. to support the Center for Domestic Preparedness with curriculum development assistance and instructors.
Manning will be responsible for integrating the Post-Katrina Reform Act measures across all levels of emergency management.
Philip Gabriel Pettersson indicted on charges including stealing source code of Cisco's Internetworking Operating System.
"I am getting phenomenal feedback from residents, at community meetings, who tell me that they've seen great changes in Newark," said Newark's Police Director Garry F. McCarthy.
Attorneys general seek the closure of Craigslist's "erotic services" section.
Alerting system provides for messages in multiple languages other than English.
"From advanced battery cars to hybrid-electric city buses, we're going put Recovery Act dollars to work deploying cleaner, greener vehicles in cities and towns across the nation that will cut costs, reduce pollution and create the jobs that will drive our economic recovery."
Applicants for licenses and identification cards will start getting personal attention.
Sixty-day public comment period for new regulations designed to make prescriptions filled online safer began Monday.
Urban search and rescue teams, expanded network of fusion centers and probationer and parolee database upgrades among projects receiving funding.
$29.1 fills authority's budget request for fiscal year 2008-2009.
New technology, federal stimulus funding, new governance structure with more first responder participation, recognition of regional deployments and calls for regional and state cooperation reinvigorate new push for statewide wireless interoperable communications network.
Training on a variety of environmental stewardship topics offered in exchange for feedback.
"The convention center's commitment to the environment is not only a preferred amenity, but more frequently a requirement for meeting planners looking to book their conventions."
Energy from municipal and agricultural waste, biofuels, 'green roofs' and other renewable energy projects encouraged.
California, New York, Florida and Texas top states with greatest number of scammers and victims.
At the time the loans were granted, Congress prohibited FEMA from forgiving any special CDLs.
Worm has infected Windows PCs that don't have the MS08-067 patch installed.
X-ray machines, vehicle license plate readers and Law Enforcement Tactical Centers among resources being deployed to secure the Southern border.
"Creating an energy-independent economy is our generation's moon-shot."
Fleet management, alternative fuels, green IT and innovative projects lead the way to achieving state's climate control goals.
"Things like training, disaster preparation, exercises, overtime oftentimes become the first thing to be cut in a tight economic season."
Margaret Hamburg to lead the Food and Drug Administration.
Requirements for smart grids aim to ensure security is built in from the beginning.
"There are many people who go up to first responders and say 'I have a piece of gear to say exactly where you're at.' We have followed a lot of those claims over the last year and half and some of those claims are perhaps a little bit more forward than they should be."
"We're leaving out a really important part of the homeland security enterprise and that's the first responders who are day to day out there securing the homeland with many other things that first responders do"
Improved self-contained breathing apparatus, CBRNE detection, lie-detection training, social networking, vehicle disabling and other efforts presented and discussed.
Useful first step lacks polish, prominence.
Over-classification of homeland security intelligence causes considerable confusion about what information can be shared with state, local and tribal law enforcement partners.
Salmonella Typhimurium from the peanut butter has infected 529 people.
DTV delay measure that should satisfy almost everybody heads to Obama.
To focus on growth in detainee population and the shift in arrest priorities.
There are several funding sources available, but they have to know what they want and be prepared to roll it out quickly.
The bill faced opposition over how the extension would be paid for.
"These populations are less aware of the transition, probably did not order coupons or did so quite late, and may not understand the implications of the change."
Virginia Tech Activates Alert System Following Stabbing
As states such as California continue to develop carbon emissions reduction targets, it will be essential to track and report on emissions reductions.
Software aimed at parents who want to keep their children safe behind the wheel as well as employers who want to reduce vicarious liability as a result of automobile accidents involving their employees.
The threat of cyber-terrorism is something of a microcosm of larger counterterrorism challenges.
"No one has a fundamental right to run a red light or avoid being seen by a camera on a public street."
Records management pays dividends for citizen service, transparency, environmental sustainability and operational consolidation.
Field identification, dispatch-to-field intelligence distribution, custom equipped handheld computers and other tools help Sheriff's Department become more effective.
Keys to greening IT include sustaining the effort, virtualization, energy management, buying green, telework and institutionalizing the drive.
New Emergency Management Agency secretary must be appointed by January.
Experience with border security, REAL ID, cyber security, public safety technology and interoperable communications will serve her well.
Office for Technology is taking steps to reduce spending, and procurement has slowed down due to the state's financial condition.
Field intelligence groups, fusion centers, PinPoint, CompStat and the Multiple Visual Initiative are tools to leverage intelligence.
Hackable virtual machines, clever malware, shifty cyber-criminals and other challenges faced by law enforcement online.
Non-points of entry along the U.S. border, small private planes and yachts and advanced technology are among the next targets of focus for Domestic Nuclear Detection Office cargo screening efforts.
Homeland security science and technology chief outlines priorities and current projects: interoperability, counter IEDs, cyber security, container scanners, personnel locators, biometric identification, vehicle disabling technology and a breathing apparatus.
Virtual Alabama uses geospatial data to aid first responders, educators and economic developers to name a few.
Solar energy technology uses smaller footprint that other implementations says solar energy company CEO.
State now accepting text messages stored on a mobile device as proof of licensure.
"We also learned of Web sites on the Internet that have chat rooms that glorify the use of drugs and where sellers go to encourage our children to try them."
"A common approach earlier was that bus manufacturers purchased hybrid components externally and attempted to adapt them to their own bus."
Five years ago, North Dakota had less than 0.5 megawatts of wind energy generation; a new facility will bring that amount to 475 megawatts.
"More than two hundred people have been exonerated through DNA analysis of crime scene evidence that was not tested at the time of trial."
"If Folsom Dam truly did break or Shasta Dam breaks or we have our massive hundred-year floods like they keep predicting, we could be that next region."
With hotline, shelter operators can check evacuees against state registry.
Alerts can include an approaching tornado, a telephone outage disrupting 911 emergency services, local roads overrun by flash floods, chemical releases or oil spills, or the urgent need to be on the lookout for an abducted child.
"These grants enable localities, state agencies and non-profit organizations to support programs that address a wide range of transportation safety needs."
The agency is working on solving the "biggest complaint about the security screening process."
"We faced a weapon which we had never, ever faced before in our life, [and] an inability to trace that evidence such we do with either DNA or firearms or fingerprints."
Scientists track flipped DNA sequence to United States Army Medical Research Institute for Infectious Diseases at Fort Detrick.
Transportation, public health, economic development and a school finder among rich geospatial applications now available.
Law Enforcement Terrorism Protection grants eliminated in favor of adjustments to the Urban Area Security Initiative and State Homeland Security Program.
Department of Finance and Employee Relations (DFER) to seek proposals for a secure and portable online personal health portfolio for state's employees in 2009.
Emissions of particulate matter have been reduced by up to 90 percent.
"It is critical that Connecticut actively engage in the ongoing dialogue in order to maintain its national leadership in the adoption and integration of [electric vehicles]."
High speed rail looks good, however funding and political realities need to be confronted.
The speed enforcement camera system is similar in look to red-light camera systems used elsewhere in Renton and around the country.
Program in line with the Million Solar Roofs and supports state's Global Warming Solutions Act.
"This is a positive development in Rhode Island's broader mission to promote environmentally responsible energy policies, while generating revenue for the state that can be used to fund other government programs."
In-car video and Project 25-compliant radios.
"Prevention is often difficult to measure, but with this issue, it's all in the data. We know we have saved lives, and not just the teen drivers."
If one decides to get a new television set, the question arises "What do I do with the old one?"
"I am pleased to announce that through the exceptional generosity of an anonymous donor my office is able to distribute the Child Project for use by 41 sheriffs' offices and police departments across the state of Maine."
Border security, critical infrastructure security, strengthening emergency preparedness and interoperable communications among priorities.
"The launch of the emergency notification system fulfills one of the recommendations called for in the report of the Chancellor's Emergency Preparedness Task Force."
Web 2.0 enables agencies to provide the next generation IT workforce with leadership experience, to be nimble and to reduce risk.
Municipal wireless networks must focus on the multiple-use applications that will run on those networks.
The next challenge state IT officials face as those efforts begin to pick up speed is "to think hard about what it takes -- organizationally -- to do IT right because that is the big issue from the legislative perspective and certainly from the public's perspective"
New York State, University of North Carolina, the Department of Homeland Security and the National Cyber Security Alliance announce programs to educate the public in how to stay safe online
Cost cutting and economic development also seen as drivers as small and large cities deploy wireless broadband networks, study finds.
The goal of the warranty is to "promote the adoption of proactive risk management strategies and security policy compliance to protect the nation's critical computer networks from cyberattack"
Completes assignment in Jackson, Miss., and gets sent to Gulfport, La.
Part of "National Stop on Red Week"
Voice over IP brings help to patients in disaster
Latest in a list of countries that have such a center including the United States, the United Kingdom, Australia, Hong Kong and Japan
System helps officials know who is visiting the schools and maintain a safe environment.
The wireless network is part of the larger Tech Connect initiative to provide technology and training to low-income residents to help them take advantage of the opportunities offered by the Internet
Special dampening material can increase shock resistance up to 145 percent over drives without the material, according to company tests
"The way a team plays as a whole determines its success. You may have the greatest bunch of individual stars in the world, but if they don't play together, the club won't be worth a dime"
Company obtains a $13 million judgment against a group of New Hampshire spammers
"Security, even cyber security, cannot take the form of government dictates, but must be the product of strong partnership work and disciplined collaboration"
Last week, the Cyber Security Industry Alliance issued a report titled "Teaching Children Cyber Security and Ethics" calling for the creation of a national K-12 curriculum for teaching children how to use the Internet safely and ethically.
Looks to network to lower costs and improve service across city offices and mobile units.
At a time when consumers' personal information appears to be stored in a glass house with a revolving door, MyPublicInfo of Arlington, Va., is offering consumers with a tool that lets them know what information has been collected about them, who they might be confused with and what they can do about it
The Preserving Competition in Telecom Act 2005 would prohibit municipalities from competing with private Internet services, while the Community Broadband Act of 2005 would preserve a service that cities see as encouraging economic development.
Intermix agreed to pay $7.5 million over three years and is in the process of hiring a chief privacy officer
Student to help district create video warning would-be hackers of dangers of illegally accessing computer systems
Survey respondents identified "small time con artists and delinquent teenagers" as the greatest threat to Internet security
"The commission continues to believe that emphasis should be placed on encouraging industry to develop alternatives, such as e-mail authentication, in lieu of a requirement for subject line labeling"
New systems will have to meet the standard in January 2006 while federal agencies will have a year to upgrade existing systems to be comply with the new standard
Two thirds of computers hard drives examined still contained data easily retrievable using readily available data recovery software
Web-enabled application will provide call-takers with information on services and shelters closest to the victims location
The new news service is targeted toward consumers, while the DailyDigest remains the official record of FCC business for the day it covers.
Provides insight into the countries with the greatest number of computers pressed into service for illegal activity
Imagery covers the entire island of Kauai as well as the surrounding ocean and corral reefs
GAO urges IT staff to inventory existing IPv6-compatible equipment and developing a strategic plan for implementing IPv6; while NIST report outlines security issues with the implementation of voice-over IP networks
Over 900,000 customers of a British Internet service provider were blacklisted earlier this month by the Spam Prevention Early Warning System, because those customers' PCs had been unwittingly hijacked and turned into spam zombies.
"Firsthand experience has shown us that tips from the public play a vital role in helping law enforcement locate and ultimately arrest child abductors"
The way an agency handles customer information is also how it handles personal information belonging to agency staff.
Most importantly, educate people, since they are the weakest security link
9 AM to 1 PM Thursday, April 28, 2005 at the capitol
$19 million committed to interdisciplinary study of computer security over five years
"A Director-level position does not have the sufficient stature or programmatic authority for accountability, or to reach across sectors"
"If the mail server stops, we start getting calls from Costa Rica and South Africa within ten minutes"
Pleaded guilty to breaking into the network and attempting to cover his tracks
Wi-Fi Hot Zone to provide free wireless Internet access to a portion of downtown with a one-hour time limit
Personal data belonging to 8,900 Nevada motorists stolen
U.S. Senate to hold hearings on security of personal data after recent leaks; FCRA revision in the works
'States that utilize technology will be better equipped to react and respond to an outbreak, whether it's a disease or a bioterrorism event'
Newer methods of budgeting, that focus on outcomes instead of total dollars spent could be good news for information technology initiatives
'We're fostering an open forum where IT vendors, IT managers, and the Linux development community can discuss and define the capabilities required in future Linux desktops'
Mozilla, Firefox, Safari, Opera allow sites to be spoofed using non-English characters
Can you deliver your vision of what you are doing in a three- to six-floor elevator ride? The great communicators are the great simplifiers.
Mapping solution helps city improve government collaboration and address the sources of criminal activity.
Prosecutors use of graphics and recorded interviews took statements out of context and improperly influenced the jury to convict him of murder, defense claims
Includes vulnerabilities for all platforms
Internet service providers, the Federal Trade Commission (FTC) and private citizens cooperate to track the origin of spam.
"We don't [have to charge passengers for wireless access] because our system gives us the flexibility and controls to realize ROI in other ways"
Customizable e-mail updates and additional property tax information available
Continuing education credit available, former White House Cyber Security Advisor, Howard Schmidt, to present
County strategies for dissemination and marketing of e-government services, attracting, training and retaining staff
Megan's Law Web site and automated palm print system among awards given at Best of California 2004
Bugs range from buffer overflows, over-information-leak and path-truncation vulnerabilities to safe_mode restriction bypass vulnerabilities
Forty-four security flaws found affect applications that vary in popularity
Ann Garrett named Information Security Executive of the Year 2004
Cyber Security Industry Alliance offers 12 steps to immediately improve national cyber security efforts
Screensaver pulled from the Web when Internet service providers started to block access to the download site just a week after it was launched.
"Long term, you don't want to be in a position of having your IT -- particularly a Web site -- be so complex that you can't develop it yourself." -- Clark Kelso, California CIO
Case management and calendaring software free for up to 100 users
Spam over Internet telephony not prevalent yet, experts say
"We used imagination and the latest technology to create, at little cost, a free public service that will enhance the park experience for downtown workers, residents, and tourists." -- Paul Hudson, chairman, Community Redevelopment Agency of Los Angeles
Available information includes details of incident locations and the identity, criminal history and outstanding warrants of suspects
Governor Schwarzenegger created the California Performance Review (CPR), to help the state government increase efficiency, reduce costs and create the 'first 21st century government.'
Shares techniques using digital video surveillance and learns how to track e-mail
Andy Purdy, deputy cyber-security director under previous National Cyber Security Division head, assumes top role
Dianah Neff talks about Philadelphia's citywide wireless project and answers participants' questions
"We want to promote the use of wireless to strengthen the city's economy and to transform our neighborhoods. That is key to this administration. That is key to the success and health of Philadelphia going forward." Dianah Neff
The computer's ID is stored on a chip and encrypted to limit access to a special processor
Coating Prevents Electromagnetic Radiation from Escaping from Devices Containing Sensitive Data
Preliminary crash information available online
The W64.Shruggle "proof-of-concept" virus' impact limited to systems running 64-bit versions of Windows
The "paper", which is made of copper and plastic, keeps wireless signals inside buildings while allowing cellular signals to pass through
"We were putting [the city council] in the good news business.... They were no longer the person who their constituents had to call and complain."
Student hackers infuriate university authorities by compromising the school's network.
Implant replaces ID cards for access to restricted areas.
Court rules in favor of defendant who copied customers' email without consent
Court replaces reporters with microphones in misdemeanor cases
Police, fire and EMS personnel to be linked by one communications system