Clickability tracking pixel

Hilton Collins

Hilton Collins is a former staff writer for Government Technology and Emergency Management magazines.

November 24, 2014

3 International Cities Where Technology Solves Local Problems

Municipalities use tech for everything from mapping disaster relief to improving energy use and street traffic.

November 7, 2014

County Land Information Portal Presents Detailed Picture of Parcels

St. Louis County, Minn.'s data retrieval system provides land records and geospatial information in one place.

October 17, 2014

4 Projects that Make City Life More Fun and Engaging

From projects that assist visually impaired pedestrians to games that motivate residents to exercise more often, these deployments emphasize the beauty, fun and tranquility in a bustling urban environment.

October 15, 2014

Digital.NYC Launches to Spur Innovation and Economic Growth

New York City's economic development corporation partnered with the private sector to create a platform for anyone interested in the local tech scene.

October 14, 2014

3 Driverless Car Projects that May Change How the World Travels

It's a given that autonomous cars are on the way, but the technology's early iterations will likely need a lot of improvement to handle busy environments.

October 6, 2014

Self-Healing Metal, Concrete Could Give Infrastructure a New Lease on Life

Concrete that automatically mends would mean streets and structures repair their own cracks, facilitating longer-lasting infrastructure that spares public-sector budgets from upkeep costs.

September 30, 2014

3 Ways Boston Plans to Fix Parking in the Wake of Haystack’s Demise

The app’s failure hasn't prevented the city and local start-ups from taking other steps to make finding and paying for city parking spaces a lot easier.

September 23, 2014

Innovative Public-Sector Technology Requires Change from the Bottom Up

Innovation at the bottom requires trying things and being imperfect, but is now what’s leading the country.

September 22, 2014

How Collaboration Leads to Public-Sector Innovation

Innovation is a perennial buzzword in government and technology circles, but it’s not easy to come by when government is used to doing things in traditional ways -- and it doesn’t come without risk.

September 12, 2014

California Takes Risks with Drought-Fighting Technology

Conservation groups worry that desalination intake pumps would kill natural life that’s a foundation for the underwater food chain and the excess salt desalination discharges back into the ocean.

September 8, 2014

4 Technology Projects That Will Change New York City Service Delivery

The city's integration of modern technology into everyday services indicates that tech is a large part of its growth and improvement efforts.

September 5, 2014

Product Review: Does LawBase Software Make Government Legal Pros’ Lives Easier?

Juggling documents and keeping track of appointments should be easier with this tool.

August 26, 2014

Is Government Ready for 3-D-Printed Guns?

The technology is here, but will guns from 3-D printers become a problem?

August 25, 2014

5 Technologies That May Supercharge the Air Force’s Attack and Defense

If successful, the Air Force’s projects could produce fighting men and women who are the envy — and fear — of other military forces.

August 18, 2014

How Modern Technology Is Changing Public-Sector GIS

The days of waiting weeks or months for new map data are being left behind and GIS data's becoming more accessible.

August 14, 2014

Are GIS Systems a Cybercrime Target?

Security experts at the Black Hat USA conference weigh in.

August 13, 2014

Homeland Security SWAMP Program Takes Aim at Software Bugs

Free platform from the Department of Homeland Security identifies software flaws, hoping to make a dent in the $100 billion U.S. cybercrime industry.

August 12, 2014

Cybercrime's Evolution is Forcing the Public Sector to Adapt

At Black Hat USA 2014, experts weigh in on the direction cybersecurity technology must take to protect systems.

August 7, 2014

Black Hat 2014: The Ten Commandments of Modern Cybersecurity

There should be more accountability — and less legal leeway — for the software vendors and their technology's source code.

August 4, 2014

3 Gadgets and Robots That May Change the Future

Sophisticated robotics and technology may subtly find their way into the office, the living room or the doctor's office.

July 15, 2014

Esri Names Climate Resilience App Challenge Winners

Developers designed free apps that use public geospatial data to help users make eco-friendly choices.

July 15, 2014

Commerce Department to Name Data Chief and Launch New Open Data Programs

U.S. Commerce Secretary, speaking at Esri meeting, says open data creates jobs and drives billions in revenue.

July 10, 2014

3 Technologies Claiming to Secure Messages in the Post-Snowden Era

Wickr, the Guardian Project and Tor exemplify the digital paranoia that's taking shape in the U.S.

July 3, 2014

3 Cities Where Mobile Apps Are Changing Parking

Baltimore, Chicago, and Miami Beach, Fla., are joining San Francisco, Los Angeles, and Washington, D.C., as smart parking innovators.

June 23, 2014

Will the Smartphone Kill Switch Murder Mobile Device Theft?

The nascent kill switch movement appears to be an outgrowth of anti-theft commitments smartphone manufacturers made earlier this year.

June 19, 2014

Will the Government Regulate Mobile Navigation Apps?

The government aims to clamp down on distracted driving, and navigation apps compel drivers to look at their smartphones while they're driving -- a possible safety hazard on roads.

June 10, 2014

Will Federal Privacy Laws Impede Health-Care Consumerization?

Emerging devices and apps could let patients take control of their health -- if HIPAA will let them.

June 9, 2014

Is the United States Government Ready for the Farm Drone Boom?

The bulk of drone usage will shift from military operations to agricultural applications soon, which couldn't make many farmers happier — if the Federal Aviation Administration doesn't ruin the party.

June 6, 2014

Neuromorphics: 3 Projects That May Lead to Microchips that Function Like Your Brain

Scientists and designers hope that this technology, when combined with existing processors in current gadgets, will make common machinery smarter.

June 3, 2014

World Governments Join Forces to Explore the Human Brain

This year, multiple international organizations are joining forces to develop a deeper understanding of the brain using innovative neurotechnologies.

May 23, 2014

Will 3-D Printing Produce Human Organs Nearly from Scratch?

A huge limitation to the advancement of 3-D printing of organic tissue has been supplying them with blood throughout the process. But enthusiasts have reason to hope.

May 22, 2014

Is Government Forcing a Secure Smartphone Revolution?

Five years ago, people didn't understand the need for secure devices; now audiences everywhere nod their heads in approval when the topic is broached.

May 14, 2014

Can Big Data Improve Lives?

California's geographic information officer says he's certain it can.

May 14, 2014

Hiring Innovative Employees in Data Analytics is Critical

Unfortunately, however, California's current organizational system isn't structured to attract that kind of employee to the state workforce.

May 8, 2014

From Wearable to Implantable: 3 Technologies Poised to Change How We Live

It’s nothing new — just ask anyone with a pacemaker — but multiple companies and manufacturers are developing implantable products that have the potential to be life altering.

May 2, 2014

3 Ways the Oculus Rift Could Change the Military

The company's upcoming virtual reality headset may arguably be the future of gaming, but could it also be the future of the military?

May 1, 2014

How Will Wireless Electricity Affect the Public and Private Sectors?

Wireless technology stands to benefit government and personal gadgets.

April 18, 2014

What Does Kim Kardashian Have to Do With State Government? Ask Darrell Steinberg!

During CIO Carlos Ramos' confirmation hearing, Sen. Darrell Steinberg awkwardly compared Kardashian’s 20.6 million-strong Twitter following to a robust, interactive platform that California could emulate.

April 15, 2014

What Do Government Robots Mean for the Future of Humans at Work?

The professionals involved in the creation of these machines have ambitious plans for them.

April 4, 2014

3 Scary Possibilities for Cybercrime’s Future

Stealthier malware and increasingly larger-scale cyberattacks give rise to unsettling possibilities about the world’s digital future.

March 14, 2014

RSA 2014: Do Cybersecurity Careers Have a Higher Purpose?

The need for information security specialists will only increase as breaches and cybersecurity issues become more dangerous and mainstream.

March 13, 2014

RSA 2014: Does Tight Security Threaten Privacy?

For local governments tasked with protecting taxpayers at the ground level, a good privacy policy and good security policy go hand-in-hand.

March 12, 2014

RSA 2014: Is Your Security Policy Out of Date?

Experts recommend building some flexibility into your security policy, and keeping it updated.

March 11, 2014

RSA 2014: 5 Things to Put in Your Cybersecurity Policy

The ever-changing digital landscape requires IT professionals to be vigilant about keeping their cybersecurity programs up-to-date.

March 10, 2014

RSA 2014: Can the Government Earn Back the Public’s Trust in the Cyberfight?

Cybersecurity is no longer a niche subject for IT aficionados; it is a government problem, in addition to a mainstream, societal problem.

March 4, 2014

RSA 2014: Comedian Stephen Colbert Joins NSA-Bashing

Famous for the faux right wing persona on his show "The Colbert Report," he chastised the American public for allowing the agency to go this far.

February 28, 2014

The Internet of Things Changes Everything for Security

At RSA conference, Cisco execs lay out security strategy for networked world.

February 6, 2014

Utah Network of Cameras and Sensors Keeps Traffic Moving

Utah tracks traffic and weather via thousands of sensors and cameras in its intelligent transportation system.

January 24, 2014

How Georgetown Plans to Eliminate One-Size-Fits-All Policymaking

The university hopes to build an institute that will harness data to help lawmakers enact more intelligent policies.

January 24, 2014

Data Innovation Day: How Can Data Improve Health-Care Delivery?

A key to improved health-care analysis could come from patients more than from doctors and policymakers.

January 13, 2014

CES 2014: Consumer Gadgets with Workplace Applications

Though CES doesn't focus on government, the convention's technology is so pervasive that much of it will likely find its way into the public sector one way or another.

January 8, 2014

CES 2014: Will Epson’s Moverio Smart Glasses Bring Augmented Reality to Government?

Though there currently aren't any government applications in development, the possibilities for the public sector are plentiful.

January 7, 2014

CES 2014: Upcoming Mobile and Wearable Tech for the Workplace

Intel plans for chip-sized computers, free mobile security and dual operating systems to revolutionize the tech industry.

December 23, 2013

GovTech Innovators: Ely Kahn, Big Data Entrepreneur

Kahn’s background qualifies him to talk about securely managing big data in the public sector.

December 20, 2013

Earthquake-Resistant Public Safety Building Protects Responders

Salt Lake City’s new building creates a safer working environment for emergency responders and EOC operations.

November 22, 2013

Video Game Puts the ‘Edge’ in First Responder Training

The Enhanced Dynamic Geo-Social Environment system allows responders to engage in simulated environments to build communication and coordination.

November 18, 2013

Terry Bledsoe Retires as CIO of Catawba County, N.C.

Bledsoe capped off seven years of service to the North Carolina county at the end of last month.

November 8, 2013

Is Your State Energy Efficient?

The American Council for an Energy-Efficient Economy releases its annual scorecard that ranks the states based on their energy efficiency performance.

October 30, 2013

GovTech Innovators: Deanna Grady, Learning Evangelist for

Online training company brings professional development courses to workers.

October 25, 2013

Michigan Launches Volunteer Cybersecurity Corps

Gov. Rick Snyder announces the Cyber Civilian Corps at the 2013 Michigan Cyber Summit.

October 24, 2013

How Can Robots Spice Up the Public Sector?

Robotics experts imagine government applications for robots

October 7, 2013

Cybersecurity Month Tips: How to Make Data Sharing Easier for Government

Government and the private sector both have built-in roadblocks to sharing cybersecurity information.

October 4, 2013

Technology Gives People as Much Power as States, Newsom Says

Calif. Lt. Gov. Gavin Newsom feels that technology has changed the game when it comes to citizens' ability to engage in their democracy.

September 27, 2013

Cities Lead in Government Innovation, Newsom Says

California Lt. Gov. Gavin Newsom says cities lead the way when it comes to innovation in government.

September 17, 2013

Is Privacy Dead? Gavin Newsom Thinks So

Speaking at an event last week on the role of open data in democratic governance, Calif. Lt. Gov. Gavin Newsom said that a hyper-open world may not be all bad.

August 22, 2013

Best of California Awardees Credit Teamwork and Collaboration

Winners of 2013 Best of California awards share best practices that have been crucial to their success.

August 21, 2013

Black Hat 2013: Is an IT Security Specialist's Work Ever Done?

With an ever-evolving cybersecurity landscape, are we any closer to winning the war against cybercrime?

August 20, 2013

Black Hat 2013: Cybersecurity Pros Weigh In on NIST Standards

What do private-sector cybersecurity professionals want included in updated standards from the NIST?

August 19, 2013

Black Hat 2013: Can Administrators Catch Up With Cybercriminals?

Network administrators face some long odds in protecting their networks -- to be considered successful, they need to block every attack.

August 16, 2013

Black Hat 2013: Is There a Difference Between Public- and Private-Sector Risk Management?

If chief security officers are turning into chief risk officers, will this new set of duties play out differently in government than in corporate environments?

August 15, 2013

Black Hat 2013: When Chief Security Officers Become Chief Risk Officers

Private sector IT security pros weigh in on the evolution of the chief security officer role.

August 9, 2013

5 Steps to Secure Government Networks

CEO Thinklogical Joe Pajer offers tips for government agencies to guard against cybercrime and improve their cyberfitness.

July 25, 2013

San Diego Comic-Con 2013: How Superheroes Would Protect Government

Last week, Government Technology visited Comic-Con International in San Diego and met a barrage of superheroes -- and we learned how they’d protect us from evil.

July 10, 2013

Four Things You Didn't Know About Employee Recognition

Rewarding government employees isn't always easy, but there are ways to do so effectively.

June 28, 2013

Crisis Cleanup Mapping Tool Coordinates Rebuilding Efforts

Volunteer disaster relief organizations use the open source platform to track residents who need help and to simplify coordination between response groups.

June 24, 2013

App Review: Buycott Gives the Inside Scoop

Buycott shares with public-sector decision-makers information about the corporate contractors with whom they do business.

June 20, 2013

Clark County, Nev., Recorder Opts For Mobility and Accessibility

The Recorder's Office has launched a new Web-based kiosk service and an updated version of its mobile website.

June 17, 2013

App Review: CDC’s 'Solve the Outbreak'

The CDC's new iPad app turns taxpayers into digital epidemiologists who solve cases involving mysterious illnesses.

June 11, 2013

4 Technology Insights from Citrix Synergy 2013

Challenges abound for governments when it comes to policy, mobility, virtualization and cloud computing.

June 7, 2013

3 Tips for Application Virtualization Deployment

Indiana University successfully deployed application virtualization on its network; here are some tips for how you can do the same.

June 3, 2013

Dirty Jobs in Government: Corrections

Tightening prison security with biometrics.

May 24, 2013

Mark Russinovich: Software Whiz, Cybercrime Writer

Microsoft software guru Mark Russinovich uses his computer expertise to write successful technological thrillers.

May 24, 2013

Predicting Crime Using Analytics and Big Data

A unique approach to crime analysis may allow police officers to predict illegal activity.

May 14, 2013

GovTech Innovators: Robert Schmidt, Agency Information Officer for the California Department of Food and Agriculture

The California Department of Food and Agriculture tracks animal health and disease across the state to help authorities safeguard residents and the environment.

May 6, 2013

GovTech Innovators: Simon Taylor, Commvault Leader and Big Data Expert

According to Taylor, state governments are analyzing their own data to better understand their own internal activities, which can help them answer FOIA requests.

May 2, 2013

Can Researchers Influence Government's Cybersecurity Agenda?

Government, academic and private-sector cybersecurity experts are establishing a research agenda they hope will affect America’s developing cybersecurity approach.

April 23, 2013

Expert: Role-Based Monitoring is Best for Public Sector Networks

One expert recommends role-based monitoring to help protect public sector networks against internal and external threats.

April 22, 2013

Product Review: Necomimi Brainwave Cat Ears Liven Up the Workplace

This headset puts some fun in your workday… if your job allows that sort of thing.

April 12, 2013

4 Steps to Protect Data During Tax Season

In one expert's opinion, strong year-round security standards will also protect fragile data at tax time.

March 28, 2013

Integrating 311 and 911 Streamlines Operations

An integrated call center in Dyersburg, Tenn., streamlines citizen service requests and emergency calls.

March 26, 2013

RSA 2013: How Bad Will Cyber War Become?

Security experts say that cyber crime will get more dangerous, but they disagree on the severity.

March 25, 2013

RSA 2013: Hackers Await Government’s Embrace of Mobile Payments

Security experts at this year’s RSA conference discuss how dangerous this new area would be.

March 22, 2013

Are Web Apps Highly Susceptible to Attack?

According to one Web app security company, 99 percent of tested Web apps used by both the public- and private-sector are vulnerable.

March 22, 2013

RSA 2013: Is Obama’s Executive Order on Cybersecurity Too Vague?

Security experts discuss What the bill's literature means for data privacy in the private and public sectors.

March 21, 2013

RSA 2013: Is Partisan Gridlock the Future of Cybersecurity Legislation?

Security experts discuss whether White House discord and drama become the norm whenever cybersecurity is discussed.

March 20, 2013

RSA 2013: Will Obama's Executive Order on Cybersecurity Lead to More Data Sharing?

Experts say yes, but the relationship between the public and private sectors may not be perfect.

March 12, 2013

GovTech Innovators: Greg Griffiths, Government Video Conferencing Expert, NetOp

If the average consumer starts to expect more video and communication online personally, will that expectation transfer to the workplace?

March 8, 2013

The Big Apple Enhances Financial Transparency

The upgraded Checkbook NYC 2.0 reveals where money flows within New York City’s $70 billion budget.

March 1, 2013

Should Government Adjust Mobile Security Techniques?

Security pros urge the public sector to focus on mobile access control, not mobile device lockdown.

February 27, 2013

Mike Russo -- 2013 GT Top 25 Winner

Cybersecurity director, Florida Department of Highway Safety and Motor Vehicles

February 19, 2013

GovTech Innovators: Alan Silberberg, Founder, Gov 2.0 LA Conference

Silberberg shares how social media can help government improve citizen relationships.

February 15, 2013

Do Video Games Offer More than Fun Times?

In the last video in our series about the Computer History Museum, we look at the hidden value of video games.

February 14, 2013

Supercomputers Handle Massive Tasks in Government Agencies

In the fourth video in our series about the Computer History Museum, we look at the importance of supercomputers in the public and private sectors.

February 13, 2013

Data Storage: Older Methods Remain in Use Today

In the third of our video series about the Computer History Museum, we look at what data storage through time looks like.

February 12, 2013

How Has Mobile Technology Evolved?

In the second of our video series about the Computer History Museum, we look briefly at the vast array of computing machinery.

February 11, 2013

Where Did Technology Come From?

In the first of our video series about the Computer History Museum in Mountain View, Calif., we look briefly at the first 2,000 years of computing in society.

February 8, 2013

GIS-Assisted Disaster Relief in 2013 and Beyond

A GIS expert from Esri talks about how the technology is fueling improved disaster response.

February 1, 2013

Report: Mobile and Windows 8 Platforms Will be Targets in 2013

According to a new report from McAfee Labs, 2013 will see the rise of adaptable and frequent cyberattacks.

January 24, 2013

Comparing Hospital Infection Rates via Interactive Map

The California Department of Public Health's interactive map displays more than 300 hospitals in the state with symbols representing surgical infection rates for about a dozen procedures.

January 18, 2013

How Flu-Related Web Apps Help Protect Citizen Health

With more than 40 states experiencing widespread influenza infection, the Google Flu Trends and Flu Near You Web applications can help cities prepare.

January 11, 2013

GovTech Reviews: Videoconferencing on Google+ Hangouts

Google+ Hangouts are more dynamic and attention-grabbing than static video because the screen automatically switches to whomever is speaking.

January 10, 2013

Vigilant Network Monitoring Recommended for Public-Sector Cybersecurity in 2013

Security firm CEO says it’s important for governments to monitor their networks diligently, but they must think smart for their efforts to be useful.

January 7, 2013

GovTech Innovators: Eric Patten, Esri’s Maritime Mapping Expert

How do agencies use Esri technology for maritime operations and how might this change in the future?

December 21, 2012

GovTech's Top 10 Cybersecurity Stories of 2012

Stories about privacy violation, network security threats and changing malware were among the hottest cybersecurity Web items for 2012.

December 20, 2012

Will the Big Data Surge Improve State and Local Operational Intelligence?

Organizations worldwide accumulated 1.8 zetabytes of information in 2011 alone, and one expert says HHS will benefit most from so much data.

December 19, 2012

GovTech Innovators: Jon Rosenberg, Chief of California’s Healthcare Infections Map

Rosenburg and his colleagues work to simplify surgical infection rate data in the state’s hospitals.

December 17, 2012

Mapping Tool for Sandy Relief Efforts Created Using Amazon Web Services

Len Bundra, GIS director of the Toms River Municipalities Authority, thinks creatively to help those in need.

December 7, 2012

Will the Feds Change How They Handle Cybersecurity in 2013?

If successful, a continuous monitoring project at the White House could lay the foundation for additional operational changes in federal agencies.

December 6, 2012

Britain’s Facewatch Tool Puts Crime Reporting in Citizens' Hands

Two types of free technical crime reporting tools are available to businesses and consumers: an online module and more recently, a native app for mobile devices.

December 3, 2012

GovTech Innovators: Kevin Jackson, Federal Cloud Computing Expert

Using his cloud computing expertise, Jackson has co-authored books in the GovCloud series, which train and educate public and private users on cloud adoption.

November 29, 2012

Financial Breaches Increase Amid Global Cyber Crime Wave

Threats report analyzes global hacking activity, finds that as network infiltration incidents increased, malware strains grew in prominence.

November 20, 2012

5 Questions with Ron Perez of the Cybersecurity Research Alliance

Perez discusses how the alliance's research differs from existing cybersecurity research, and the types of government agencies the CSRA aims to work with.

November 15, 2012

SeeClickFix Helps Superstorm Sandy Victims

The Web-enabled start-up's involvement is reducing 911 call volume and helping afflicted taxpayers take personal clean-up efforts into their own hands.

November 12, 2012

GovTech Innovators: Beth Blauer, Open Data Expert

Blauer, who previously oversaw Maryland's StateStat project, helps government departments use their data intelligently.

November 7, 2012

GovTech Innovators: EverFi’s Mike Fee Connects Government with Education

Through his company EverFi, Fee helps government bring online learning to America’s classrooms.

November 5, 2012

Election 2012: Embedded Polling Place and Election Info Helps Voters

Google and Microsoft create Voter Information Web tools that deliver election information to voters in one place.

October 29, 2012

Chicago Supercharges 311 Reporting

The Windy City partners with SeeClickFix to improve the public’s ability to submit and track 311 service requests.

October 25, 2012

GovTech Innovators: California's Phyllis Cheng Weathers Budgetary Struggles

Cheng likens the California Department of Fair Employment and Housing's activities to a phoenix rising from the budgetary ashes, and other departments can learn from its example.

October 17, 2012

What invention are scientists using to search for Bigfoot?

What invention are scientists using to search for Bigfoot?

October 15, 2012

GovTech Innovators: CultureNOW’s Abby Suckle Links Citizens to Public Art in Style

If you run a public art program that you want taxpayers to know about, then CultureNOW may supercharge your outreach efforts.

October 8, 2012

GovTech Innovators: Michael Staton, College Social Networking Evangelist

Hanging out with the co-founder of a company helping universities create private, internal social networks for their students.

October 1, 2012

Albuquerque Shares Public Art Digitally with Residents

Albuquerque, N.M., makes public art accessible to taxpayers via common Web tools and social media.

September 28, 2012

GovTech Innovators: Mark Russinovich, Thriller Writer and Microsoft Idea Machine (VIDEO)

Meet the author / IT expert who thinks up fictional cyberthreats that mirror real life.

September 27, 2012

QR Codes Used in Searches for Missing Children

Will QR codes become the next tool in the fight against child abduction?

September 26, 2012

Cities and Counties Try Facebook for Government

A look at how governments use Facebook to deliver services.

September 20, 2012

GovTech Innovators: Ben Berkowitz of SeeClickFix

Berkowitz’s company, SeeClickFix, makes 311 reporting collaborative and hassle-free.

September 18, 2012

Photo of the Week - Sustainable Living in Las Vegas

Using the Lytro camera means that focusing isn't so important in the moment -- it can be done after the picture is taken.

August 30, 2012

Virginia Turns to the Cloud for its Hosted E-Mail Archive

Virginia’s hosted email archiving saves time and aids e-discovery.

August 28, 2012

Photo of the Week - Earth's Hurricanes Since 1851

Data visualization expert John Nelson used publicly available data to create maps for more than 150 years of recorded tropical storms and hurricanes.

August 10, 2012

Report: Web Applications Are Attacked Every Three Days

The average attack incident lasts more than 7 minutes, according to an analysis done by Imperva.

August 10, 2012

Black Hat 2012: Can Cybersecurity Public-Private Partnerships Work? (VIDEO)

Security pros at the annual conference shared insight on the culture shock that can exist between the two groups.

August 9, 2012

Black Hat 2012: Can Cybersecurity Public-Private Partnerships Work?

Security pros at the annual conference shared insight on the culture shock that can exist between the two groups.

August 9, 2012

Black Hat 2012: The No. 1 Cybersecurity Problem (VIDEO)

Government Technology asked security professionals to name the biggest cybersecurity problem that plagues government today.

August 7, 2012

Black Hat 2012: Security Advice for Government (VIDEO)

We asked security pros what government agencies can do to deal with some of today’s most pressing security problems.

August 6, 2012

Black Hat 2012: Giving IT Pros the Tools to Fight Cybercrime (VIDEO)

What security professional learn at this popular annual conference.

August 1, 2012

New York City Agency Simplifies the Data Warehouse

A new lightweight version of NYC Human Resources Administration data warehouse gives users fast access to information they need.

July 26, 2012

Modern Cyberwar Requires Offensive Tactics, Says Ex-FBI Official

Security experts should engage hackers proactively and stop using obsolete metrics.

July 23, 2012

New Tech Brings New Issues to Public Safety Agencies

How are public safety departments handling employees’ changing attitudes toward technology?

June 15, 2012

3 Innovative Federal CIOs Respond to New Pressures

Health and Human Services, Homeland Security and Marine Corps CIOs discuss their management approaches.

June 6, 2012

Malware on the Rise Across Multiple Devices and Platforms in 2012 (Report)

McAfee report discloses trends in smartphone threats, spam and cybercrime.

May 30, 2012

Arkansas Cuts Time from Procurement Process

Arkansas’ online procurement system cuts paper usage by 117,000 pages a year, and reduces processing time from three months to less than six weeks.

April 25, 2012

States Aim to Launch More Mobile Apps

State governments are aggressively deploying mobile technology, but which approaches catch on best?

April 16, 2012

4 Priorities for Improving Cybersecurity in the U.S.

America needs to upgrade its risk management processes for cybersecurity, ex-White House staffer says.

March 22, 2012

Experts Discuss Online Warfare, Budget Strategies, Mobility Challenges (VIDEOS)

The hottest topics from the RSA Conference in San Francisco.

March 12, 2012

Cybersecurity Pros Share Industry Secrets, Insight

Industry representatives discuss future cyberthreats and their possible impacts at the RSA Conference.

March 5, 2012

Ex-Prime Minister Tony Blair: Secure Communications Need Protection

Blair urges policymakers to draft rules against disclosure by groups like WikiLeaks.

March 2, 2012

RSA 2012: FBI Chief Touts Partnerships in Cybercrime Fight

FBI Director Robert Mueller anticipates cyberattacks will soon be the biggest threat to the U.S.

February 29, 2012

Steve Nichols

CTO, Georgia

February 1, 2012

Video Camera Networks Link Real-Time Partners in Crime-Solving

More cities link private-sector cameras to public safety surveillance networks.

January 20, 2012

Tool Finds Holes in Domain Name System Security Extensions

The DNSViz tool creates graphs of network connections that helps viewers identify security vulnerabilities in domain name system connections.

December 19, 2011

Virginia Training Inmates for Green Jobs

A new Green Heating Ventilation and Air Conditioning program aims to give inmates marketable skills when they re-enter society.

December 1, 2011

Oregon, Montana, Utah and Colorado Partner to Share GIS Data in the Cloud

Four states are creating a project that could let governments host GIS data in the cloud.

November 28, 2011

Breach of Illinois Water System in Doubt, but Vendor Verdicts Are In

Security vendors weigh in on the seriousness of the issue and what can be done to protect critical infrastructure systems.

October 31, 2011

Cloud Helps Illinois School Districts Stretch IT Dollars

IlliniCloud cloud computing consortium lets school districts share data for less money.

October 28, 2011

SeeClickFix Has National 311 Potential

SeeClickFix improves neighborhoods in New Haven, Conn. — and could serve as a national 311 platform.

October 27, 2011

Napolitano Gives Rundown on U.S. Cybersecurity Efforts

Web-based intrusions have increased 90 percent since 2009, and nation is cyberattacked thousands of times each day.

September 22, 2011

Can Government Telework Like a Private Company?

Former Sun Microsystems CEO Scott McNealy tells conference of government workers that “telework is what the world is about.”

September 21, 2011

Q&A: Future Wars to be Waged Online

Security expert Mark Russinovich talks about the complexities and ambiguities of cyber-warfare and cyber-terrorism.

September 14, 2011

Utah Abandons Four-Day Workweek, Not Savings and IT Goals

State legislators jettisoned the condensed 4/10 work schedule because of citizen complaints and meager savings.

August 26, 2011

GAO: FDIC Must Do More to Protect U.S. Financial Data

Federal Deposit Insurance Corp. must do more to safeguard the confidentiality, integrity and availability of internal financial systems and information.

August 23, 2011

California County’s Information Exchange Links Justice and Public Safety Agencies

A California data sharing system makes catching the bad guys easier.

July 25, 2011

Utah and China Forge Agreements for Sharing Technology

Technology partnerships could benefit economy and ecology of Utah and China.

July 18, 2011

Cyber Camp Develops Tomorrow’s IT Security Pros

Thirty five cybersecurity participants overtook control of networked services and cracked passwords during the 2011 U.S. Cyber Challenge Summer Camp at Cal Poly Pomona.

July 6, 2011

QR Codes Aim to Curb Drunken Driving in Texas

Texas anti drunken-driving campaign used QR codes to help drinkers think before getting behind the wheel.

June 13, 2011

Combating Billions of Cyber-Threats Requires International Collaboration

A report this month from the Center for a New American Security brings together thought leadership from an all-star lineup of security experts.

May 31, 2011

Cloud Security Continues to Concern Government IT Purchasers

The government IT purchasing to-do list includes secure cloud migration and increased network efficiency as budgets are projected to shrink this year.

May 31, 2011

Digital Cameras and Bluetooth Ease Travel Through Houston Airports

Modern technology may help the Houston Airport System take some hassle out of air travel.

May 16, 2011

PlayStation Network Breach Shows Government Agencies Need More Incident Data

Government IT officials who are following ongoing developments of the PlayStation breach said that more timely and granular data would help state governments protect citizens’ privacy.

May 11, 2011

California May Incorporate Cyber-Readiness into State Emergency Plan

California could be the first state in the nation to include cyber-readiness in its emergency plan, which includes disasters that could endanger citizens and infrastructure.

April 29, 2011

Enterprise Resource Planning Aids Streamlining, Transparency Efforts

Agencies ask ERP to help them solve transparency and business intelligence challenges.

April 20, 2011

Feds, Private Sector Claim New Govt. Strategy Protects Online Transactions

Federal officials unveil the National Strategy for Trusted Identities in Cyberspace, an initiative to create a network that facilitates secure transactions.

April 8, 2011

Social and Mobile Tech Vulnerable in 2010 as Cyber-Attacks Skyrocket

Symantec report provides data on cyber-threat activity that occurred in 2010.

April 1, 2011

Report: IRS System Weaknesses Put Public Data at Risk

Government Accountability Office says the IRS must remedy unencrypted networks, outdated software, faulty access control protocols.

March 28, 2011

Network Nightmare? Personal Phones on Agency Networks

CIOs grapple with the growing use of personal smartphones to access corporate networks.

March 18, 2011

Tax Credits — Not Mandates — Would Improve Cyber-Security, Industry Coalition Says

A coalition of industry groups asserts that tax credits and other incentives — not mandates — would improve cyber-security of private-sector networks.

March 4, 2011

Mobile Malware on the Rise, Report Says

Cloud security vendor’s report shows rise in mobile malware, changes in how public and private sectors go online.

February 17, 2011

Cisco Debuts Security Architecture at RSA Conference

Rising demand in the workplace for mobile computing and 24/7 access requires a new security architecture, Cisco Systems cyber-security executive says.

February 17, 2011

Dugan Petty

CIO, Oregon

February 14, 2011

Phishing Up, Spam Down in 2010’s Second Half

Malware as a service and combined attacks are on the rise as cyber-attackers evolve from e-mail spam, according to M86 Security Labs report.

February 7, 2011

Is an Internet Kill Switch a Good Idea?

County IT leaders mull the possibility of an Internet ‘kill switch.’

January 25, 2011

Ground Zero Reconstruction Facilitated by Mapping and Visualization Technology

The Lower Manhattan Construction Command Center keeps the public informed about post-9/11 rebuilding through its website.

January 20, 2011

2011 Challenges: Security for Virtualization, Smartphone and Data Management

Antivirus vendor Symantec predicts the emerging cyber-security challenges of 2011.

January 19, 2011

Stats Suggest Breach Reporting Should Be Mandatory

The U.S. would benefit from a mandatory reporting system for data breaches, Identity Theft Resource Center founder says.

January 17, 2011

Governments Save Money Using Managed Competition

Governments reduce costs by letting the public and private sectors compete for the same contracts.

January 10, 2011

WikiLeaks Danger Concerns City IT Leaders

Although many WikiLeaks disclosures came from the military, city government IT officials concede a similar data breach could happen to them.

January 4, 2011

Public Agencies Use Business Analytics to Improve Performance and Boost Transparency

Virginia and Miami-Dade County are among agencies using analytics to improve services.

December 6, 2010

Supply Chain Cyber-Security Could Be Weaker Than Thought

Seventy-one percent of supply chain organizations want feds to be more active in cyber-defense.

November 30, 2010

New Jersey Treasury Department Seeks to Bring Legacy Systems Into the 21st Century

Legacy systems have New Jersey hankering for a major electronic records renovation.

November 22, 2010

Smartphones a Bigger Cyber-Security Target in 2011?

Smartphone vulnerabilities, malware-as-a-service and more sophisticated Trojans will become bigger threats in 2011, cyber-security vendor predicts.

November 19, 2010

Airport Body Scans and Pat-Downs Raise More Privacy Concerns

Airport security expert says full-body scanners are a misguided safety measure.

November 18, 2010

New York City’s Digital Map Puts In-Depth GIS Data a Few Clicks Away

NYCityMap takes user input and generates maps that show nearby services and locations.

November 12, 2010

What’s the Price Tag for Smart Grid Security?

Adjusted forecast says smart grid cyber-security spending to total $6.5 billion through 2015.

November 5, 2010

Cyber Storm Drill to Yield New Lessons, Feds Say

After-action report of the Cyber Storm III national cyber-security exercise is due in 2011.

November 1, 2010

Technology Can Be a Tool for Student Success, and a Distraction at Home

National Bureau of Economic Research found that giving kids in the digital divide computers actually lowered their academic achievement.

October 25, 2010

Researchers Warn of Newly Discovered Cyber-Threat

Researchers find that ‘advanced evasion techniques’ are a new class of cyber-threat that can break through most intrusion prevention systems.

October 19, 2010

8 Cyber-Security Recommendations to Fight Botnets

Combating botnets often inadequate in the public sector, vendor says.

October 8, 2010

Survey: Enthusiasm for Cyber-Security High, Preparation Lacking

Only one-third of companies consider themselves extremely prepared for cyber-attacks, while two-thirds are supportive of government critical infrastructure protection programs.

October 7, 2010

GAO Urges Faster Adoption of Obama’s Cyber-Security Review Recommendations

Federal agencies request more guidance on roles and benchmarks.

October 4, 2010

Web Apps and Governments Are Most Cyber-Attacked in 2010

Web applications are prolonged, persistent enterprise targets, not only because they are corruptible, but also because people are downloading corrupted Web apps at work.

October 1, 2010

What the Future IT Work Force Will Look Like

How technology is transforming tomorrow’s workers.

September 30, 2010

Access Requirements to Cyber-Security Data Sets Could See More Changes

Changes may come for those allowed to research and access data sets in the U.S. Department of Homeland Security’s cyber-defense.

September 20, 2010

Top 10 Network Security Threats

Vendor researcher includes USB drives, smartphones as top security risks.

September 3, 2010

Virginia Web Widgets Let Users Embed State Data on Site of Their Choice

One Virginia project makes accessing government information a matter of convenience.

August 23, 2010

More Public-Private Cooperation Needed for Better U.S. Cyber-Security, GAO Says

The 'two-way information sharing stream' for cyber-security data between the private and public sectors needs work, according to the Government Accountability Office's director of IT management issues.

August 13, 2010

3 Reasons Why Smartphone Security Is Neglected

Forget laptops and PCs: The next big targets for cyber-criminals could be smartphones.

August 12, 2010

Cyber-Threats to Supply Chains on the Rise, Officials Say

Supply chains are heavily dependent on IT, yet are difficult to secure because they often involve multiple networks working together.

July 19, 2010

Advanced Cyber-Attacks on the Rise in 2010, Report Says

Advanced cyber-attacks and spam are increasing, according to M86 Security Labs report.

July 8, 2010

Many Bosses Unaware of Personal Devices' Popularity at Work, Studies Say

There's a disconnect between bosses and their employees and how prevalent they believe consumer technology is in the workplace. The finding could have security ramifications.

June 29, 2010

New York City Department of Education Expands Its Time and Attendance System to Cope With Staff Overtime During H1N1 Scare

Education Department's work force management software made tracking employee work time easier during the H1N1 scare.

June 28, 2010

Americans' Awareness of Smart Grid Lagging, Survey Finds

Money and privacy among top concerns for those knowledgeable about the smart grid, survey of 1,000 online respondents finds.

June 27, 2010

Michigan's Award-Winning Approach to Securing the State's Wireless Network

Michigan Department of Information Technology upgrades the state's wireless network.

June 8, 2010

States Ponder Privacy Concerns as Smart Grid Deployment Takes Shape

Smart meters' tracking of energy use sparks privacy issues.

June 1, 2010

National Intelligent Transportation Vision Begins to Take Shape

Research on smart driving systems show how information technology can change the way people commute.

June 1, 2010

Research Improving Sensor Technology for Bridges and Roadways

Engineers and regulators believe investing in research for monitoring technology will improve the condition of America's roadways, bridges and other transportation infrastructure.

May 31, 2010

University Researchers Develop Bad Code With Good Intentions

University of Calgary computer scientists develop 'Typhoid' adware to study how malicious content can be stopped proactively.

May 24, 2010

U.S. Leads in Malicious Web Content, but Southern Neighbors Are Danger Zones

South America and Central America are perilous because they lead the world in the proportion of malicious to benign Web servers.

May 17, 2010

Majority of Federal Employees Don't Regularly Follow File Transfer Security Policies

Survey of federal IT workers finds that many of them don't adhere to file transfer policies or know that such protocols exist.

May 6, 2010

California Officials Debate Using Traffic Cameras to Help Close the State Budget Deficit

Automated speed enforcement systems could bring California more than $330 million.

May 3, 2010

Thousands of High-Tech Jobs, but Government Innovation Could Spur Growth

Research from TechAmerica Foundation shows California continues to lead states in most technology sectors.

April 28, 2010

Charlotte, N.C., and Mecklenburg County Seek Stimulus Funds for a Shared Broadband Network

North Carolina locals seek second-round Recovery Act funds for its city/county broadband network.

April 26, 2010

Survey: Security Concerns Don't Scare Young People Away from Risky Online Behavior

Poll of 1,000 18- to 24-year-olds found that at least half of them are willing to sacrifice security when it comes to file-sharing, social networking and online shopping.

April 22, 2010

St. Petersburg, Fla., Improves Procurement Process

One Florida city's purchasing department takes steps to improve the procurement process.

March 31, 2010

New Jersey Patent Bank Aims to Supercharge State's Economy

Searchable patent Web portal encourages entrepreneurial inventors and collaboration among researchers.

March 30, 2010

Making Voting Systems Open Source Could Forever Change Election Technology

Some transparency may be taking root in U.S. voting systems, as a California-based nonprofit is creating a suite of open-source election software that allows users to view and modify the underlying computer code.

March 29, 2010

The 10 Riskiest Cities for Cyber-Crime

Security firm says Seattle, Boston and Washington, D.C., top list of most dangerous U.S. cities for online activity.

March 18, 2010

Research Firm Predicts Federal Cyber-Security Market Surpassing $10.5 Billion by 2015

Five-year total spending on cyber-security expected to reach $55 billion.

March 4, 2010

Napolitano Announces Contest for Ideas to Promote Cyber-Security

Proposals for National Cybersecurity Awareness Campaign Challenge due April 30.

March 3, 2010

White House Declassifies Description of National Cyber-Security Program

Obama administration releases descriptions of 12 initiatives of the Comprehensive National Cybersecurity Initiative.

March 1, 2010

Gov. Deval Patrick and CIO Anne Margulies, Massachusetts

Gov. Deval Patrick and CIO Anne Margulies, Massachusetts

February 24, 2010

Internet Explorer 6 More Popular Than Newer Versions Despite Outdated Security

Zscaler's State of the Web report finds that roughly half of all organizations use Internet Explorer 6 even though it doesn't have the newest security features.

February 22, 2010

Government Agencies Among Those Hacked in Massive January Botnet Attack

More than 75,000 computer systems in at least 2,400 corporations and governments affected worldwide.

February 15, 2010

Washington, D.C., To Get Massive 'Cyber Shock' in Mock Cyber-Attack

The Bipartisan Policy Center (BPC), a nonprofit that develops multiparty solutions in public policy, will host Cyber Shockwave, a simulated cyber-attack on the United States, during an exercise Tuesday, Feb. 16, at the Mandarin Oriental Hotel in Washington, D.C.

February 9, 2010

Feds Will Spur Smart Grid Cyber-Security Investment Growth to $21 Billion by 2015, Report Claims

Smart grid security gets attention from stimulus funds and global utilities.

February 5, 2010

Federal Office Offers $50,000 Reward for Missing External Drive

National Archives and Records Administration conducts investigation.

February 1, 2010

Malware Record Set in 2009, Says PandaLabs

PandaLabs predicts 2010 will be worse as social Web apps, Windows 7 become prime targets.

January 29, 2010

Virginia Strengthens IT Security From Data Center to Desktop

Virginia unifies IT security policies and infrastructure across five major areas.

January 25, 2010

Big Data Center Migration Saves California Cash

Data center migration saving cash-strapped California $100,000 per month, according to technology officials.

January 20, 2010

Incomplete Data Breach Reporting Makes Tracking Hacks Tough, Organization Says

Agencies are reluctant to report data breaches, making security management difficult.

January 13, 2010

Defense Information Systems Agency Monitoring Network With Enterprise Tool

U.S. Department of Defense agency gets new enterprise network monitoring tool, more states could be next.

January 10, 2010

Salt Lake County, Utah, Video Campaign Urges Residents to Improve Their Health

Utah county's health department promotes citizen fitness on YouTube, Facebook.

January 8, 2010

CSI Computer Crime and Security Survey Shows Poor Security Awareness Training in Public and Private Sectors

Computer Security Institute survey also notes poor threat monitoring tools.

January 7, 2010

Mysterious Laptops Appear in Several Governors' Offices

Officials concerned that unsolicited computers contained malware.

December 31, 2009

2010 Cyber-Threat Forecast Sees Hacks Growing in Sophistication and Reach

Vendor anti-virus think tank predicts cyber-criminals will target emerging file sharing, social networking technology and mobile devices -- and leave old methods behind in the new year.

December 27, 2009

Houston High School Trains Students as 911 Phone Operators

A unique high school curriculum offers Houston students a career path in law enforcement and criminal justice.

December 16, 2009

IBM: SQL Injection Attacks Increasingly Threaten Public and Private Networks

Public-sector Web sites are among those vulnerable to construction of botnets.

December 10, 2009

Cisco Report Identifies Rising Security Threats on and off Social Media

Web 2.0 and other security dangers to governments.

December 7, 2009

CIOs Weigh Security Opinions with Federal Counterparts in CDW-G Report

Cyber-security concerns include password protection, external malware and lost mobile equipment.

December 4, 2009

Northrop Grumman Launches Cybersecurity Research Consortium

Carnegie Mellon, MIT and Purdue team up with Northrop Grumman to help fight security threats.

December 2, 2009

Many More Government Records Compromised in 2009 than Year Ago, Report Claims

Public-sector organizations see a drastic increase in breached records, but the number of data leaks appears to decline.

November 29, 2009

Five Tips for Outsourcing or Sharing IT Resources

Pennsylvania and Minneapolis are among successful shared services and outsourcing models.

November 20, 2009

Job Cuts, Budget Shortfalls Will Plague State and Local Governments in 2010, Report Says

State and local budget problems will wreak havoc on public- and private-sector employment as well.

November 11, 2009

Virus and Malware Prevention Is an Ongoing Battle

Governments must stay vigilant with IT security as viruses constantly change.

November 9, 2009

Web 2.0 Becomes More Popular at Work but Brings Risks Too, Report Says

Industry research claims that people use social networking applications more often on the job, but not without some danger involved.

November 2, 2009

Chicago Academy of Advanced Technology Opens

Chicago IT school trains future work force, concentrating on science and engineering.

October 26, 2009

Montana City Asks Job Applicants for Social Media Passwords, Draws Controversy

Bozeman officials rescind policy after coming under fire for requesting Facebook, Google passwords.

October 21, 2009

DHS Secretary Janet Napolitano to Americans: Cyber-Security is a Group Effort

Homeland Security secretary tells viewers in a live webcast that securing cyber-space is everyone's job.

October 15, 2009

DHS Official Says Government and Citizens Must Work Together in Cyber-Security Fight

People have personal stakes in cyber-security in a world with more sophisticated and pervasive attacks.

October 2, 2009

Five Anti-Malware Recommendations That Could Save Your Network

Malicious code comes hard and fast, so it helps to take some extra precautions when securing your network.

October 2, 2009

Report Says Open Source Code Grows More Secure

Report Says Open Source Code Grows More Secure

September 28, 2009

Michigan County Uses Managed Hosting Services to Increase Revenue

Wayne County data center expected to boost local economy.

September 25, 2009

Cloud Computing Gains Momentum but Security and Privacy Issues Persist

SaaS and other Web services attract state and local governments, but some host their own private cloud services.

September 24, 2009

Report: Application Vendors Take Too Long to Fix Dangerous Security Holes

Data indicates that the most popular programs are being left undefended by their creators.

August 16, 2009

Hand Scanners, Iris Readers and Fingerprint Readers Help Protect Networks

Biometric technology strengthens network security, saves time and eases help-desk headaches.

August 11, 2009

Are Private Clouds the Answer to Public-Sector Concerns?

Some agencies opt for internal clouds over vendor-hosted cloud computing.

July 30, 2009

Is Open Source Software More Secure than Proprietary Products?

Proponents say constant peer review creates more secure applications.

July 26, 2009

Emergency Managers and First Responders Use Twitter and Facebook to Update Communities

Los Angeles Fire Department, Philadelphia Emergency Management among agencies using social networking to send breaking news and preparedness information.

July 2, 2009

Utah Transit Riders Use Smart Cards to Pay Fares

Utah Transit Authority lets patrons pass contactless smart cards over electronic readers when boarding buses, trains or light rail cars.

July 1, 2009

SaaS in Public-Sector IT -- Part Two of Two

Government agencies eye software as a service to capitalize on Web 2.0 and change the way citizens and government interact.

June 30, 2009

SaaS in Public-Sector IT -- Part One of Two

New Jersey Transit and the Illinois Department of Natural Resources use software as a service to meet CRM needs and better serve the public.

June 9, 2009

SaaS Saves Millions for North Carolina

Software as a service saves North Carolina money by letting agencies test Web applications before they go live.

June 7, 2009

Information Security: Employee Errors Put Data at Risk

Government data security breaches include e-mail, Web site attachments.

May 20, 2009

Popular Smart Card Can Be Hacked, Researchers Show

Researchers reveal security flaws in the MIFARE Classic contactless smart card, used worldwide in access control and public transportation systems.

May 7, 2009

Cyber-Criminal Demands $10 Million Ransom After Breaching Virginia Medical Records

The FBI is searching for a malicious hacker who infiltrated the Virginia Prescription Monitoring Program and is threatening to sell medical information to the highest bidder.

May 4, 2009

Public-Sector Technology Officials Confused About Stimulus Funding, Survey Says

Dell survey: Federal, state and local IT professionals need more clarity on the stimulus package, and existing stimulus information is too general or nonexistent.

April 27, 2009

Nebraska Online Vehicle Tax Estimator Gives Citizens Tax and Fee Estimates

Nebraska public-private collaboration helps consumers estimate costs before automobile purchases.

April 23, 2009

Obama Cyber-Security Czar Melissa Hathaway Says Little on Federal Strategy

Melissa Hathaway, who spearheaded the national cyber-security audit, reveals few report details but says more information is on the way.

April 19, 2009

Hosted E-mail: What Government Needs to Know

Consumers love hosted e-mail, but governments aren't comfortable with applications they don't fully control.

April 16, 2009

End of Free Windows XP Support Mourned by Government

Microsoft says customers, including state and local governments, must now pay for IT support that previously was free.

April 6, 2009

Survey: Financial Crises Stoking Americans' Fear of Identity Theft

Unisys conducts international study and finds Americans fear identity theft and fraud-related crime most.

March 31, 2009

North Carolina and Virginia Law Enforcement Agencies Connect Via Internet Protocol-Based Solution

Voice over Internet protocol gives North Carolina and Virginia interoperability.

March 22, 2009

Patrick Quain: Riding a Wave of Consolidation in Arizona Government

Patrick Quain: Riding a Wave of Consolidation in Arizona Government

March 16, 2009

Bill Willis: North Carolina Deputy CIO uses ITIL to Drive Performance

Bill Willis: North Carolina Deputy CIO uses ITIL to Drive Performance

March 9, 2009

New DHS Cyber-Security Working Group Links Agencies

The U.S. Department of Homeland Security creates group for public and private-sector agencies so federal and local government can work together to reduce cyber-security holes.

March 3, 2009

Smartphones Boost Government Efficiency, Bring Security Risks

Police officers use Blackberrys in Hawaii to access motor vehicle and criminal databases.

February 24, 2009

ERP Systems Turn 10 Years Old for Local Governments

ERP systems in Sacramento County, Calif., and Phoenix still going strong after a decade.

February 22, 2009

Server Consolidation Boosts Utilization Rates for Atlanta's Fulton County

Fulton County's server sprawl solved with blade technology and virtualization.

February 18, 2009

New York State's MyBenefits Online Enrollment System Has Wisconsin Roots

Wisconsin creates a Web portal that makes it more convenient to apply for public health benefits.

February 12, 2009

Green Initiatives on Deck for California, Says State Senator Darrell Steinberg

Darrell Steinberg addresses green tech, but California's most urgent agenda is fixing the budget and saving jobs and government projects.

February 11, 2009

Chuck Norris Fan Hacks Electronic Road Sign

'Chuck Norris for President' touted on tampered electronic message board.

February 9, 2009

Melissa Hathaway to be Named Obama's Top Cyber-Security Official

President Obama recruits an aide from the Bush administration to head up his own cyber-security activities.

January 29, 2009

Schwarzenegger: IT Consolidation Good for California Taxpayers

California Gov. Schwarzenegger says a proposed IT consolidation and a centralized CIO office would save the state billions of dollars.

January 12, 2009

Washington Uses Web to Ease Voter Registration

Citizens can register to vote online, print voter-registration forms in several languages and view personalized information.

January 12, 2009

The Pros and Cons of Hosted E-Mail

Hosted e-mail will likely spread to more consumers and businesses in 2009. This may hold some surprises for government clients.

January 6, 2009

Obama's Twitter Account Hacked

Britney Spears' Twitter feed also compromised.

December 31, 2008

CIOs Try New Methods for Retaining and Attracting Qualified Workers

As the government work force ages, CIOs use internships, Second Life to find new workers.

December 28, 2008

Workplace Stress Increases Tension for IT Workers

Network security may be threatened by rising workloads and shrinking budgets.

December 18, 2008

Video Games Hone Triage Skills

British video game developer creates a prototype that sharpens first responders' triage skills

December 14, 2008

Technology Legislation: 2008 Bills and Their Potential IT Impact

Measures target security, privacy, broadband availability and other technology issues.

December 3, 2008

Network Security: San Francisco Incident Raises Questions for CIOs

Rogue administrator hijacks city network; experts tell how to maintain control of network resources.

November 14, 2008

Survey: Employee Data More Vulnerable Than Constituent Data

PricewaterhouseCoopers says governments must better protect employees' data, not just the public's data.

November 7, 2008

Obama and McCain Campaign Systems Hacked by Foreign Party

Sophisticated cyber-attacks hit the campaigns this summer and several files were stolen. The federal government believes that a foreign entity wanted information on the candidates' policy positions.

November 6, 2008

Data Center Solution Saves Blacksburg, Va., Time, Money and Headaches

Blacksburg, Va., implemented a disk-based backup system to replace a legacy tape-based predecessor. The results improved how the city handles data.

November 3, 2008

Wireless Parking Information Could Boost Public Transit Use

California uses wireless technology to tell commuters where to find parking in public transit lots.

October 31, 2008

Desktop Virtualization May Help Agencies Cut Costs and Energy Use

Desktop virtualization could improve end-user experience, reduce IT costs and reduce energy consumption, according to early adopters.

October 30, 2008

Report: Inadequate E-Mail Messaging Security in Most Organizations

E-mail messaging security leaves room for improvement in many large organizations, according to a survey of IT professionals.

October 19, 2008

Australia National Web Portal Links Citizens to Government Services

Australia prepares to move highly ranked portal into Web 2.0 world.

October 14, 2008

Report: PDF Files and Flash Ads Can Contain Malicious Code

Research indicates that pretty animations and downloaded documents can contain damaging code that infects personal computers.

September 22, 2008

Critical Steps for Securing Wireless Networks and Devices

Smartphones present new security threats for government agencies.

September 19, 2008

Report Claims Most Security Breaches Aren't Discovered Until Months Later

A vendor survey finds that most data breaches could have been prevented by common security measures.

September 1, 2008

Cyber-Attackers Target Web Applications, Study Says

Most vulnerabilities stem from Web applications, not browsers or servers, security survey says.

August 28, 2008

Advanced First Responder and Medical Capabilities Could Save Lives

Ryder Trauma Center develops technology that could change how triage is done.

August 18, 2008

Virtualization Raises New Cyber-Security Questions for Government

Growing use of virtual tools creates more infrastructure for agencies to manage and secure.

August 10, 2008

North Central Texas Council of Governments Offers Another Enterprise Resource Planning Package

Local governments can subscribe to enterprise resource planning solutions, but the price tags vary considerably.

July 8, 2008

Younger Employees May Bring New IT Security Challenges

Millennial generation will use Web 2.0 to work, study says. CIOs downplay the security impact.

June 13, 2008

IT Security Could Benefit from Public-Private Collaboration, Survey Says

State and local government agencies need to catch-up with the federal government and private sector in the realm of information security.

May 21, 2008

North Carolina Modernizes HR and Payroll Systems with Online Solution

New system lets state's 86,000 employees manage their own HR and payroll information online.

May 6, 2008

Wireless Security Report Card Gives San Francisco a D

Government scores lower than finance, retail, transportation and corporations in vendor's wireless security survey.

April 23, 2008

FCC's Emergency Alert Ruling May Spur Use of Cell Broadcast Technology

With SMS, a message is delivered point-to-point or from phone-to-phone, but cell broadcast delivers a message simultaneously from one point to many phones.

April 10, 2008

Wireless Security Report Card Gives San Francisco a "D"

Government scores lower than finance, retail, transportation and corporations in vendor's wireless security survey.

E.REPUBLIC Platforms & Programs