Hilton Collins is a former staff writer for Government Technology and Emergency Management magazines.
From projects that assist visually impaired pedestrians to games that motivate residents to exercise more often, these deployments emphasize the beauty, fun and tranquility in a bustling urban environment.
New York City's economic development corporation partnered with the private sector to create a platform for anyone interested in the local tech scene.
It's a given that autonomous cars are on the way, but the technology's early iterations will likely need a lot of improvement to handle busy environments.
Concrete that automatically mends would mean streets and structures repair their own cracks, facilitating longer-lasting infrastructure that spares public-sector budgets from upkeep costs.
The app’s failure hasn't prevented the city and local start-ups from taking other steps to make finding and paying for city parking spaces a lot easier.
Innovation at the bottom requires trying things and being imperfect, but is now what’s leading the country.
Innovation is a perennial buzzword in government and technology circles, but it’s not easy to come by when government is used to doing things in traditional ways -- and it doesn’t come without risk.
Conservation groups worry that desalination intake pumps would kill natural life that’s a foundation for the underwater food chain and the excess salt desalination discharges back into the ocean.
The city's integration of modern technology into everyday services indicates that tech is a large part of its growth and improvement efforts.
Juggling documents and keeping track of appointments should be easier with this tool.
The technology is here, but will guns from 3-D printers become a problem?
If successful, the Air Force’s projects could produce fighting men and women who are the envy — and fear — of other military forces.
The days of waiting weeks or months for new map data are being left behind and GIS data's becoming more accessible.
Security experts at the Black Hat USA conference weigh in.
Free platform from the Department of Homeland Security identifies software flaws, hoping to make a dent in the $100 billion U.S. cybercrime industry.
At Black Hat USA 2014, experts weigh in on the direction cybersecurity technology must take to protect systems.
There should be more accountability — and less legal leeway — for the software vendors and their technology's source code.
Sophisticated robotics and technology may subtly find their way into the office, the living room or the doctor's office.
Developers designed free apps that use public geospatial data to help users make eco-friendly choices.
U.S. Commerce Secretary, speaking at Esri meeting, says open data creates jobs and drives billions in revenue.
Researchers have built robots with 3-D-printed limbs laced with organic skeletal muscles that can be controlled remotely with electric charges.
Wickr, the Guardian Project and Tor exemplify the digital paranoia that's taking shape in the U.S.
Baltimore, Chicago, and Miami Beach, Fla., are joining San Francisco, Los Angeles, and Washington, D.C., as smart parking innovators.
Society and the human workforce may feel this machinery's impact before most decision-makers realize what's happening — for good or for ill.
The nascent kill switch movement appears to be an outgrowth of anti-theft commitments smartphone manufacturers made earlier this year.
The government aims to clamp down on distracted driving, and navigation apps compel drivers to look at their smartphones while they're driving -- a possible safety hazard on roads.
Emerging devices and apps could let patients take control of their health -- if HIPAA will let them.
The bulk of drone usage will shift from military operations to agricultural applications soon, which couldn't make many farmers happier — if the Federal Aviation Administration doesn't ruin the party.
Scientists and designers hope that this technology, when combined with existing processors in current gadgets, will make common machinery smarter.
This year, multiple international organizations are joining forces to develop a deeper understanding of the brain using innovative neurotechnologies.
A huge limitation to the advancement of 3-D printing of organic tissue has been supplying them with blood throughout the process. But enthusiasts have reason to hope.
Five years ago, people didn't understand the need for secure devices; now audiences everywhere nod their heads in approval when the topic is broached.
California's geographic information officer says he's certain it can.
Unfortunately, however, California's current organizational system isn't structured to attract that kind of employee to the state workforce.
It’s nothing new — just ask anyone with a pacemaker — but multiple companies and manufacturers are developing implantable products that have the potential to be life altering.
The company's upcoming virtual reality headset may arguably be the future of gaming, but could it also be the future of the military?
Wireless technology stands to benefit government and personal gadgets.
During CIO Carlos Ramos' confirmation hearing, Sen. Darrell Steinberg awkwardly compared Kardashian’s 20.6 million-strong Twitter following to a robust, interactive platform that California could emulate.
The professionals involved in the creation of these machines have ambitious plans for them.
Stealthier malware and increasingly larger-scale cyberattacks give rise to unsettling possibilities about the world’s digital future.
The need for information security specialists will only increase as breaches and cybersecurity issues become more dangerous and mainstream.
Experts recommend building some flexibility into your security policy, and keeping it updated.
The ever-changing digital landscape requires IT professionals to be vigilant about keeping their cybersecurity programs up-to-date.
Cybersecurity is no longer a niche subject for IT aficionados; it is a government problem, in addition to a mainstream, societal problem.
Famous for the faux right wing persona on his show "The Colbert Report," he chastised the American public for allowing the agency to go this far.
At RSA conference, Cisco execs lay out security strategy for networked world.
Utah tracks traffic and weather via thousands of sensors and cameras in its intelligent transportation system.
The university hopes to build an institute that will harness data to help lawmakers enact more intelligent policies.
A key to improved health-care analysis could come from patients more than from doctors and policymakers.
Though CES doesn't focus on government, the convention's technology is so pervasive that much of it will likely find its way into the public sector one way or another.
Though there currently aren't any government applications in development, the possibilities for the public sector are plentiful.
Intel plans for chip-sized computers, free mobile security and dual operating systems to revolutionize the tech industry.
Kahn’s background qualifies him to talk about securely managing big data in the public sector.
Salt Lake City’s new building creates a safer working environment for emergency responders and EOC operations.
The Enhanced Dynamic Geo-Social Environment system allows responders to engage in simulated environments to build communication and coordination.
Bledsoe capped off seven years of service to the North Carolina county at the end of last month.
The American Council for an Energy-Efficient Economy releases its annual scorecard that ranks the states based on their energy efficiency performance.
Online training company brings professional development courses to workers.
Gov. Rick Snyder announces the Cyber Civilian Corps at the 2013 Michigan Cyber Summit.
Robotics experts imagine government applications for robots
Government and the private sector both have built-in roadblocks to sharing cybersecurity information.
Calif. Lt. Gov. Gavin Newsom feels that technology has changed the game when it comes to citizens' ability to engage in their democracy.
California Lt. Gov. Gavin Newsom says cities lead the way when it comes to innovation in government.
Speaking at an event last week on the role of open data in democratic governance, Calif. Lt. Gov. Gavin Newsom said that a hyper-open world may not be all bad.
Winners of 2013 Best of California awards share best practices that have been crucial to their success.
With an ever-evolving cybersecurity landscape, are we any closer to winning the war against cybercrime?
What do private-sector cybersecurity professionals want included in updated standards from the NIST?
Network administrators face some long odds in protecting their networks -- to be considered successful, they need to block every attack.
If chief security officers are turning into chief risk officers, will this new set of duties play out differently in government than in corporate environments?
Private sector IT security pros weigh in on the evolution of the chief security officer role.
CEO Thinklogical Joe Pajer offers tips for government agencies to guard against cybercrime and improve their cyberfitness.
Last week, Government Technology visited Comic-Con International in San Diego and met a barrage of superheroes -- and we learned how they’d protect us from evil.
Rewarding government employees isn't always easy, but there are ways to do so effectively.
Volunteer disaster relief organizations use the open source platform to track residents who need help and to simplify coordination between response groups.
Buycott shares with public-sector decision-makers information about the corporate contractors with whom they do business.
The Recorder's Office has launched a new Web-based kiosk service and an updated version of its mobile website.
The CDC's new iPad app turns taxpayers into digital epidemiologists who solve cases involving mysterious illnesses.
Challenges abound for governments when it comes to policy, mobility, virtualization and cloud computing.
Indiana University successfully deployed application virtualization on its network; here are some tips for how you can do the same.
Spotting energy loss with thermographic cameras.
Microsoft software guru Mark Russinovich uses his computer expertise to write successful technological thrillers.
A unique approach to crime analysis may allow police officers to predict illegal activity.
The California Department of Food and Agriculture tracks animal health and disease across the state to help authorities safeguard residents and the environment.
According to Taylor, state governments are analyzing their own data to better understand their own internal activities, which can help them answer FOIA requests.
Government, academic and private-sector cybersecurity experts are establishing a research agenda they hope will affect America’s developing cybersecurity approach.
One expert recommends role-based monitoring to help protect public sector networks against internal and external threats.
This headset puts some fun in your workday… if your job allows that sort of thing.
In one expert's opinion, strong year-round security standards will also protect fragile data at tax time.
An integrated call center in Dyersburg, Tenn., streamlines citizen service requests and emergency calls.
Security experts say that cyber crime will get more dangerous, but they disagree on the severity.
Security experts at this year’s RSA conference discuss how dangerous this new area would be.
According to one Web app security company, 99 percent of tested Web apps used by both the public- and private-sector are vulnerable.
Security experts discuss What the bill's literature means for data privacy in the private and public sectors.
Security experts discuss whether White House discord and drama become the norm whenever cybersecurity is discussed.
Experts say yes, but the relationship between the public and private sectors may not be perfect.
If the average consumer starts to expect more video and communication online personally, will that expectation transfer to the workplace?
The upgraded Checkbook NYC 2.0 reveals where money flows within New York City’s $70 billion budget.
Security pros urge the public sector to focus on mobile access control, not mobile device lockdown.
Cybersecurity director, Florida Department of Highway Safety and Motor Vehicles
Silberberg shares how social media can help government improve citizen relationships.
In the last video in our series about the Computer History Museum, we look at the hidden value of video games.
In the fourth video in our series about the Computer History Museum, we look at the importance of supercomputers in the public and private sectors.
In the third of our video series about the Computer History Museum, we look at what data storage through time looks like.
In the second of our video series about the Computer History Museum, we look briefly at the vast array of computing machinery.
In the first of our video series about the Computer History Museum in Mountain View, Calif., we look briefly at the first 2,000 years of computing in society.
A GIS expert from Esri talks about how the technology is fueling improved disaster response.
According to a new report from McAfee Labs, 2013 will see the rise of adaptable and frequent cyberattacks.
The California Department of Public Health's interactive map displays more than 300 hospitals in the state with symbols representing surgical infection rates for about a dozen procedures.
Why aren't modern workplaces always generous with praise for their employees? Pearl discusses the reasons.
With more than 40 states experiencing widespread influenza infection, the Google Flu Trends and Flu Near You Web applications can help cities prepare.
The simple interactive map lets taxpayers find out who their local political representatives are, and is part of the state's larger GIS strategy.
Bivona-Tellez is tracking the spread of diseases with the help of GIS firm Esri.
Google+ Hangouts are more dynamic and attention-grabbing than static video because the screen automatically switches to whomever is speaking.
Security firm CEO says it’s important for governments to monitor their networks diligently, but they must think smart for their efforts to be useful.
How do agencies use Esri technology for maritime operations and how might this change in the future?
Stories about privacy violation, network security threats and changing malware were among the hottest cybersecurity Web items for 2012.
Organizations worldwide accumulated 1.8 zetabytes of information in 2011 alone, and one expert says HHS will benefit most from so much data.
Rosenburg and his colleagues work to simplify surgical infection rate data in the state’s hospitals.
Len Bundra, GIS director of the Toms River Municipalities Authority, thinks creatively to help those in need.
If successful, a continuous monitoring project at the White House could lay the foundation for additional operational changes in federal agencies.
Two types of free technical crime reporting tools are available to businesses and consumers: an online module and more recently, a native app for mobile devices.
Using his cloud computing expertise, Jackson has co-authored books in the GovCloud series, which train and educate public and private users on cloud adoption.
Threats report analyzes global hacking activity, finds that as network infiltration incidents increased, malware strains grew in prominence.
Perez discusses how the alliance's research differs from existing cybersecurity research, and the types of government agencies the CSRA aims to work with.
The Web-enabled start-up's involvement is reducing 911 call volume and helping afflicted taxpayers take personal clean-up efforts into their own hands.
Blauer, who previously oversaw Maryland's StateStat project, helps government departments use their data intelligently.
Through his company EverFi, Fee helps government bring online learning to America’s classrooms.
Google and Microsoft create Voter Information Web tools that deliver election information to voters in one place.
The Windy City partners with SeeClickFix to improve the public’s ability to submit and track 311 service requests.
Cheng likens the California Department of Fair Employment and Housing's activities to a phoenix rising from the budgetary ashes, and other departments can learn from its example.
What invention are scientists using to search for Bigfoot?
If you run a public art program that you want taxpayers to know about, then CultureNOW may supercharge your outreach efforts.
Hanging out with the co-founder of a company helping universities create private, internal social networks for their students.
Government Technology hangs out with David Alan Grier, associate professor in the Elliott School of International Affairs at George Washington University who writes about science and technology policy.
Albuquerque, N.M., makes public art accessible to taxpayers via common Web tools and social media.
Meet the author / IT expert who thinks up fictional cyberthreats that mirror real life.
Technology at the Springs Preserve in Las Vegas teaches people environmentally friendly habits in harsh environments.
Will QR codes become the next tool in the fight against child abduction?
A look at how governments use Facebook to deliver services.
Berkowitz’s company, SeeClickFix, makes 311 reporting collaborative and hassle-free.
Using the Lytro camera means that focusing isn't so important in the moment -- it can be done after the picture is taken.
Virginia’s hosted email archiving saves time and aids e-discovery.
Data visualization expert John Nelson used publicly available data to create maps for more than 150 years of recorded tropical storms and hurricanes.
The average attack incident lasts more than 7 minutes, according to an analysis done by Imperva.
Security pros at the annual conference shared insight on the culture shock that can exist between the two groups.
Security pros at the annual conference shared insight on the culture shock that can exist between the two groups.
Government Technology asked security professionals to name the biggest cybersecurity problem that plagues government today.
We asked security pros what government agencies can do to deal with some of today’s most pressing security problems.
What security professional learn at this popular annual conference.
A new lightweight version of NYC Human Resources Administration data warehouse gives users fast access to information they need.
Security experts should engage hackers proactively and stop using obsolete metrics.
How are public safety departments handling employees’ changing attitudes toward technology?
Health and Human Services, Homeland Security and Marine Corps CIOs discuss their management approaches.
McAfee report discloses trends in smartphone threats, spam and cybercrime.
Arkansas’ online procurement system cuts paper usage by 117,000 pages a year, and reduces processing time from three months to less than six weeks.
State governments are aggressively deploying mobile technology, but which approaches catch on best?
America needs to upgrade its risk management processes for cybersecurity, ex-White House staffer says.
The hottest topics from the RSA Conference in San Francisco.
Industry representatives discuss future cyberthreats and their possible impacts at the RSA Conference.
Blair urges policymakers to draft rules against disclosure by groups like WikiLeaks.
FBI Director Robert Mueller anticipates cyberattacks will soon be the biggest threat to the U.S.
More cities link private-sector cameras to public safety surveillance networks.
The DNSViz tool creates graphs of network connections that helps viewers identify security vulnerabilities in domain name system connections.
The Minnesota GreenStep Cities program helps municipalities become more ecologically aware.
A new Green Heating Ventilation and Air Conditioning program aims to give inmates marketable skills when they re-enter society.
Four states are creating a project that could let governments host GIS data in the cloud.
Security vendors weigh in on the seriousness of the issue and what can be done to protect critical infrastructure systems.
IlliniCloud cloud computing consortium lets school districts share data for less money.
SeeClickFix improves neighborhoods in New Haven, Conn. — and could serve as a national 311 platform.
Web-based intrusions have increased 90 percent since 2009, and nation is cyberattacked thousands of times each day.
Former Sun Microsystems CEO Scott McNealy tells conference of government workers that “telework is what the world is about.”
Security expert Mark Russinovich talks about the complexities and ambiguities of cyber-warfare and cyber-terrorism.
State legislators jettisoned the condensed 4/10 work schedule because of citizen complaints and meager savings.
Federal Deposit Insurance Corp. must do more to safeguard the confidentiality, integrity and availability of internal financial systems and information.
A California data sharing system makes catching the bad guys easier.
Technology partnerships could benefit economy and ecology of Utah and China.
Thirty five cybersecurity participants overtook control of networked services and cracked passwords during the 2011 U.S. Cyber Challenge Summer Camp at Cal Poly Pomona.
Texas anti drunken-driving campaign used QR codes to help drinkers think before getting behind the wheel.
A report this month from the Center for a New American Security brings together thought leadership from an all-star lineup of security experts.
The government IT purchasing to-do list includes secure cloud migration and increased network efficiency as budgets are projected to shrink this year.
Modern technology may help the Houston Airport System take some hassle out of air travel.
Government IT officials who are following ongoing developments of the PlayStation breach said that more timely and granular data would help state governments protect citizens’ privacy.
California could be the first state in the nation to include cyber-readiness in its emergency plan, which includes disasters that could endanger citizens and infrastructure.
Agencies ask ERP to help them solve transparency and business intelligence challenges.
Federal officials unveil the National Strategy for Trusted Identities in Cyberspace, an initiative to create a network that facilitates secure transactions.
Symantec report provides data on cyber-threat activity that occurred in 2010.
Government Accountability Office says the IRS must remedy unencrypted networks, outdated software, faulty access control protocols.
CIOs grapple with the growing use of personal smartphones to access corporate networks.
A coalition of industry groups asserts that tax credits and other incentives — not mandates — would improve cyber-security of private-sector networks.
Cloud security vendor’s report shows rise in mobile malware, changes in how public and private sectors go online.
Rising demand in the workplace for mobile computing and 24/7 access requires a new security architecture, Cisco Systems cyber-security executive says.
Malware as a service and combined attacks are on the rise as cyber-attackers evolve from e-mail spam, according to M86 Security Labs report.
County IT leaders mull the possibility of an Internet ‘kill switch.’
The Lower Manhattan Construction Command Center keeps the public informed about post-9/11 rebuilding through its website.
Antivirus vendor Symantec predicts the emerging cyber-security challenges of 2011.
The U.S. would benefit from a mandatory reporting system for data breaches, Identity Theft Resource Center founder says.
Governments reduce costs by letting the public and private sectors compete for the same contracts.
Although many WikiLeaks disclosures came from the military, city government IT officials concede a similar data breach could happen to them.
Virginia and Miami-Dade County are among agencies using analytics to improve services.
Seventy-one percent of supply chain organizations want feds to be more active in cyber-defense.
Legacy systems have New Jersey hankering for a major electronic records renovation.
Smartphone vulnerabilities, malware-as-a-service and more sophisticated Trojans will become bigger threats in 2011, cyber-security vendor predicts.
Airport security expert says full-body scanners are a misguided safety measure.
NYCityMap takes user input and generates maps that show nearby services and locations.
Adjusted forecast says smart grid cyber-security spending to total $6.5 billion through 2015.
After-action report of the Cyber Storm III national cyber-security exercise is due in 2011.
National Bureau of Economic Research found that giving kids in the digital divide computers actually lowered their academic achievement.
Researchers find that ‘advanced evasion techniques’ are a new class of cyber-threat that can break through most intrusion prevention systems.
Combating botnets often inadequate in the public sector, vendor says.
Only one-third of companies consider themselves extremely prepared for cyber-attacks, while two-thirds are supportive of government critical infrastructure protection programs.
Federal agencies request more guidance on roles and benchmarks.
Web applications are prolonged, persistent enterprise targets, not only because they are corruptible, but also because people are downloading corrupted Web apps at work.
How technology is transforming tomorrow’s workers.
Changes may come for those allowed to research and access data sets in the U.S. Department of Homeland Security’s cyber-defense.
Vendor researcher includes USB drives, smartphones as top security risks.
One Virginia project makes accessing government information a matter of convenience.
Ohio works to process multiple departments and vendors' financial documents and customer service calls.
The 'two-way information sharing stream' for cyber-security data between the private and public sectors needs work, according to the Government Accountability Office's director of IT management issues.
Forget laptops and PCs: The next big targets for cyber-criminals could be smartphones.
Supply chains are heavily dependent on IT, yet are difficult to secure because they often involve multiple networks working together.
Advanced cyber-attacks and spam are increasing, according to M86 Security Labs report.
There's a disconnect between bosses and their employees and how prevalent they believe consumer technology is in the workplace. The finding could have security ramifications.
Education Department's work force management software made tracking employee work time easier during the H1N1 scare.
Money and privacy among top concerns for those knowledgeable about the smart grid, survey of 1,000 online respondents finds.
Michigan Department of Information Technology upgrades the state's wireless network.
Smart meters' tracking of energy use sparks privacy issues.
Research on smart driving systems show how information technology can change the way people commute.
Engineers and regulators believe investing in research for monitoring technology will improve the condition of America's roadways, bridges and other transportation infrastructure.
University of Calgary computer scientists develop 'Typhoid' adware to study how malicious content can be stopped proactively.
South America and Central America are perilous because they lead the world in the proportion of malicious to benign Web servers.
Survey of federal IT workers finds that many of them don't adhere to file transfer policies or know that such protocols exist.
Automated speed enforcement systems could bring California more than $330 million.
Research from TechAmerica Foundation shows California continues to lead states in most technology sectors.
North Carolina locals seek second-round Recovery Act funds for its city/county broadband network.
Poll of 1,000 18- to 24-year-olds found that at least half of them are willing to sacrifice security when it comes to file-sharing, social networking and online shopping.
One Florida city's purchasing department takes steps to improve the procurement process.
Searchable patent Web portal encourages entrepreneurial inventors and collaboration among researchers.
Some transparency may be taking root in U.S. voting systems, as a California-based nonprofit is creating a suite of open-source election software that allows users to view and modify the underlying computer code.
Security firm says Seattle, Boston and Washington, D.C., top list of most dangerous U.S. cities for online activity.
Five-year total spending on cyber-security expected to reach $55 billion.
Proposals for National Cybersecurity Awareness Campaign Challenge due April 30.
Obama administration releases descriptions of 12 initiatives of the Comprehensive National Cybersecurity Initiative.
Gov. Deval Patrick and CIO Anne Margulies, Massachusetts
Zscaler's State of the Web report finds that roughly half of all organizations use Internet Explorer 6 even though it doesn't have the newest security features.
More than 75,000 computer systems in at least 2,400 corporations and governments affected worldwide.
The Bipartisan Policy Center (BPC), a nonprofit that develops multiparty solutions in public policy, will host Cyber Shockwave, a simulated cyber-attack on the United States, during an exercise Tuesday, Feb. 16, at the Mandarin Oriental Hotel in Washington, D.C.
Smart grid security gets attention from stimulus funds and global utilities.
National Archives and Records Administration conducts investigation.
PandaLabs predicts 2010 will be worse as social Web apps, Windows 7 become prime targets.
Virginia unifies IT security policies and infrastructure across five major areas.
Data center migration saving cash-strapped California $100,000 per month, according to technology officials.
Agencies are reluctant to report data breaches, making security management difficult.
U.S. Department of Defense agency gets new enterprise network monitoring tool, more states could be next.
Utah county's health department promotes citizen fitness on YouTube, Facebook.
Computer Security Institute survey also notes poor threat monitoring tools.
Officials concerned that unsolicited computers contained malware.
Vendor anti-virus think tank predicts cyber-criminals will target emerging file sharing, social networking technology and mobile devices -- and leave old methods behind in the new year.
A unique high school curriculum offers Houston students a career path in law enforcement and criminal justice.
Public-sector Web sites are among those vulnerable to construction of botnets.
Web 2.0 and other security dangers to governments.
Cyber-security concerns include password protection, external malware and lost mobile equipment.
Carnegie Mellon, MIT and Purdue team up with Northrop Grumman to help fight security threats.
Public-sector organizations see a drastic increase in breached records, but the number of data leaks appears to decline.
Pennsylvania and Minneapolis are among successful shared services and outsourcing models.
State and local budget problems will wreak havoc on public- and private-sector employment as well.
Governments must stay vigilant with IT security as viruses constantly change.
Industry research claims that people use social networking applications more often on the job, but not without some danger involved.
Chicago IT school trains future work force, concentrating on science and engineering.
Bozeman officials rescind policy after coming under fire for requesting Facebook, Google passwords.
Homeland Security secretary tells viewers in a live webcast that securing cyber-space is everyone's job.
People have personal stakes in cyber-security in a world with more sophisticated and pervasive attacks.
Malicious code comes hard and fast, so it helps to take some extra precautions when securing your network.
Report Says Open Source Code Grows More Secure
Wayne County data center expected to boost local economy.
SaaS and other Web services attract state and local governments, but some host their own private cloud services.
Data indicates that the most popular programs are being left undefended by their creators.
Biometric technology strengthens network security, saves time and eases help-desk headaches.
Some agencies opt for internal clouds over vendor-hosted cloud computing.
Proponents say constant peer review creates more secure applications.
Los Angeles Fire Department, Philadelphia Emergency Management among agencies using social networking to send breaking news and preparedness information.
Utah Transit Authority lets patrons pass contactless smart cards over electronic readers when boarding buses, trains or light rail cars.
Government agencies eye software as a service to capitalize on Web 2.0 and change the way citizens and government interact.
New Jersey Transit and the Illinois Department of Natural Resources use software as a service to meet CRM needs and better serve the public.
Software as a service saves North Carolina money by letting agencies test Web applications before they go live.
Government data security breaches include e-mail, Web site attachments.
Researchers reveal security flaws in the MIFARE Classic contactless smart card, used worldwide in access control and public transportation systems.
The FBI is searching for a malicious hacker who infiltrated the Virginia Prescription Monitoring Program and is threatening to sell medical information to the highest bidder.
Dell survey: Federal, state and local IT professionals need more clarity on the stimulus package, and existing stimulus information is too general or nonexistent.
Nebraska public-private collaboration helps consumers estimate costs before automobile purchases.
Melissa Hathaway, who spearheaded the national cyber-security audit, reveals few report details but says more information is on the way.
Consumers love hosted e-mail, but governments aren't comfortable with applications they don't fully control.
Microsoft says customers, including state and local governments, must now pay for IT support that previously was free.
Unisys conducts international study and finds Americans fear identity theft and fraud-related crime most.
Voice over Internet protocol gives North Carolina and Virginia interoperability.
Patrick Quain: Riding a Wave of Consolidation in Arizona Government
Bill Willis: North Carolina Deputy CIO uses ITIL to Drive Performance
The U.S. Department of Homeland Security creates group for public and private-sector agencies so federal and local government can work together to reduce cyber-security holes.
Police officers use Blackberrys in Hawaii to access motor vehicle and criminal databases.
ERP systems in Sacramento County, Calif., and Phoenix still going strong after a decade.
Fulton County's server sprawl solved with blade technology and virtualization.
Wisconsin creates a Web portal that makes it more convenient to apply for public health benefits.
Darrell Steinberg addresses green tech, but California's most urgent agenda is fixing the budget and saving jobs and government projects.
'Chuck Norris for President' touted on tampered electronic message board.
President Obama recruits an aide from the Bush administration to head up his own cyber-security activities.
California Gov. Schwarzenegger says a proposed IT consolidation and a centralized CIO office would save the state billions of dollars.
Citizens can register to vote online, print voter-registration forms in several languages and view personalized information.
Hosted e-mail will likely spread to more consumers and businesses in 2009. This may hold some surprises for government clients.
As the government work force ages, CIOs use internships, Second Life to find new workers.
Network security may be threatened by rising workloads and shrinking budgets.
British video game developer creates a prototype that sharpens first responders' triage skills
Measures target security, privacy, broadband availability and other technology issues.
Rogue administrator hijacks city network; experts tell how to maintain control of network resources.
PricewaterhouseCoopers says governments must better protect employees' data, not just the public's data.
Sophisticated cyber-attacks hit the campaigns this summer and several files were stolen. The federal government believes that a foreign entity wanted information on the candidates' policy positions.
Blacksburg, Va., implemented a disk-based backup system to replace a legacy tape-based predecessor. The results improved how the city handles data.
California uses wireless technology to tell commuters where to find parking in public transit lots.
Desktop virtualization could improve end-user experience, reduce IT costs and reduce energy consumption, according to early adopters.
E-mail messaging security leaves room for improvement in many large organizations, according to a survey of IT professionals.
Australia prepares to move highly ranked portal into Web 2.0 world.
Research indicates that pretty animations and downloaded documents can contain damaging code that infects personal computers.
Smartphones present new security threats for government agencies.
A vendor survey finds that most data breaches could have been prevented by common security measures.
Most vulnerabilities stem from Web applications, not browsers or servers, security survey says.
Ryder Trauma Center develops technology that could change how triage is done.
Growing use of virtual tools creates more infrastructure for agencies to manage and secure.
Local governments can subscribe to enterprise resource planning solutions, but the price tags vary considerably.
Millennial generation will use Web 2.0 to work, study says. CIOs downplay the security impact.
State and local government agencies need to catch-up with the federal government and private sector in the realm of information security.
New system lets state's 86,000 employees manage their own HR and payroll information online.
Government scores lower than finance, retail, transportation and corporations in vendor's wireless security survey.
With SMS, a message is delivered point-to-point or from phone-to-phone, but cell broadcast delivers a message simultaneously from one point to many phones.