October 31, 2014

Uber + Haircut = ?

Answer: Shortcut

October 30, 2014

What Will CIO Priorities Look Like in 2015?

State CIOs voted on their top priorities for the coming year, reflecting little change from the past few years.

October 30, 2014

6 Cities and a County Share 311 Data, Best Practices

Local government officials team up to develop standards and a data repository for 311 centers.

October 30, 2014

Personalized Learning Pits Data Innovators Against Privacy Advocates

The question of how long vendors should be allowed to maintain and use student data cuts to the heart of the tensions that define the digital learning revolution.

October 30, 2014

Twitter, IBM Announce Data Analytics Partnership

Twitter data will be part of IBM's cloud-based Watson Analytics application, which brings big data analysis to business users.

October 30, 2014

Save or Delete? Official Email Policies Vary By State

State policies about whether employees should delete or save emails vary considerably, creating concerns among open government advocates.

October 30, 2014

GM, University of Michigan to Work on Connected Vehicle Corridor

Connected vehicle technology will wirelessly connect vehicles to each other, and to the Internet, with the promise of a reduction in accidents and other improvements in safety records.

October 30, 2014

Audi's Robot Car Posts Driverless Speed Record

The driverless car performed on the 4.57-kilometre circuit south of Frankfurt just as if a professional race driver had been at the controls.

October 30, 2014

3 Technologies that Could Boost Voter Participation

Next week's election may have one of the lowest voter turnouts ever. Can technology help boost voter participation? Here are three possible answers.

October 30, 2014

California Public Pensions Added to Open Data Website

The State Controller’s Office noted it has been collecting and publishing financial statements of public pension plans for 35 years, and now that data is on the open data website.

October 30, 2014

'Widespread Harm' Likely from Cyberattack in Next Decade

A majority of Internet experts think that by 2025, a major cyberattack will have caused widespread harm to a nation's security and capacity to defend itself and its people.

October 30, 2014

Walton County, Fla., Aims to Increase Wireless Access

A team of officials are exploring wireless options for the county, noting broadband access is both an economic development and quality-of-life issue.

October 30, 2014

What does lightning on Jupiter sound like?

Answer: whistling

October 30, 2014

Can an App Help Prevent Mass Shootings?

The Center for Health Care Services unveiled Mental Health & You, a crisis intervention tool that provides local and national resources for early intervention and treatment.

October 30, 2014

Government and the Marketplace: Bridging a Divide

Vendors and government buyers must work together to develop new forums designed to share perspectives on how each others’ world operates.

October 29, 2014

Photo of the Week - Can the SkyCruiser Bring the Gift of Flight to Everyone?

A new startup has developed a concept that would let everyday folks drive to a helipad or runway and take off for a further destination.

October 29, 2014

Unclassified White House Networks Hacked

The process hackers follow to infiltrate an organization has been called a Kill Chain, and security teams must find a way to detect and break this sequence of events.

October 29, 2014

How Well Can Technology Fight Ebola?

Efforts to halt the spread of the Ebola epidemic include a variety of tech tools. But their effectiveness remains unclear.

October 29, 2014

Will Education Ever Keep Up with Technology?

People are both driving technological changes and needing more help because of these changes, and according to one panelist at a recent Georgia event, teachers will never catch up; they should become facilitators of knowledge.

October 29, 2014

Data Breaches Jump in California and are Expected to Keep Climbing

The California Data Breach Report underscores the difficulties faced by companies who are constantly racing to secure sensitive information.