IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Sponsored

This page consists of content produced by a sponsor or produced by the e.Republic Content Studio in collaboration with a sponsor.
More Stories
  • Sponsored
    Read how Terry Flannery, PhD and Interim Vice President for Marketing and Communication at Stony Brook University says schools are stepping up to the challenge.
  • Sponsored
    When President Joe Biden signed an executive order requiring all federal agencies to ramp up and improve their cybersecurity efforts, it immediately raised the question about whether these requirements would trickle down to state and local governments. Although the order covers only federal agencies, IT organizations across the public sector should expect this to prompt changes in security requirements and strategies.
  • Sponsored
    Thanks to state legislation passed last year, Indiana counties can now allow candidates to file campaign finance reports electronically. Managing candidate filings and enforcing campaign finance compliance is typically a complex process that requires valuable time and resources from elections staff. Modernizing and automating these processes helps ensure consistency and accuracy, reducing demands on employees and allowing them to focus on other aspects of running and managing elections.
  • Sponsored
    Service delivery and the individual experience within health and human services (HHS) is often very siloed and fragmented.
  • Sponsored
    After a multi-year journey working with the mission critical application technology providers and Criminal Justice Information Services (CJIS) officials across the US, Amazon Web Services (AWS) implemented a simple and technically robust approach to CJIS compliance. Now, agencies and organizations in all 50 states in the US can null.
  • Sponsored
    The Center for Internet Security (CIS) recently dropped the number of Critical Controls from 20 to 18. Some of us still think of them as the SANS Top 20, so that’s kind of a big deal.
  • Sponsored
    Hackers have many reasons why they want to target governments and many methods of how to attack. The challenge governments face is how to protect against threats while staying compliant.
  • Sponsored
    State and local governments are still revamping budgets and procedures to reflect new business models for the technology they use.

  • Sponsored
    Technology leaders must consider different stakeholders when making the case for cloud projects.
  • Sponsored
    After being hampered by legacy technologies and siloed systems while also experiencing a surge in demand for public services during the pandemic, many state and local agencies are now adopting cloud-based technologies and services to accelerate modernization.
  • Sponsored
    The pandemic has accelerated digital transformation in state and local government, as organizations quickly pivoted to stand up a remote work infrastructure and enhance digital service delivery.
  • Sponsored
    Bus transit will play a vital role in reviving city economies in the post-pandemic era. But in order to maintain safe, reliable and efficient bus service, cities must ensure dedicated bus lanes remain clear from illegally parked vehicles. Innovative computer vision technology, aided by machine learning, is making it easier than ever for cities to enforce parking and keep buses running on time.
  • Sponsored
    At Fujitsu, we believe that digital transformation in the public sector should be about delivering wider access to services, support and information.
  • Sponsored
    At Fujitsu, we’re working to leverage the power of digital to enable public-sector organizations to not only meet citizen expectations but exceed them.
  • Sponsored
    Dallas Area Rapid Transit uses the cloud to offer contactless electronic payments.
  • Sponsored
    Using predictive analytics based on data lake data, university leaders expect to provide a better student experience and see higher student retention rates, which will ultimately lead to higher graduation rates.
  • Sponsored
    5 ways to come back stronger with automation and hybrid cloud infrastructure.
  • Sponsored
    Hacked credentials and an old VPN were at the root of the Colonial Pipeline cyber attack. We’re taking a look at how cybersecurity basics can prevent future hacks and enhance security strategies.


Most Read
  1. CYBER.ORG Offers New AI Modules for Parents, Caregivers
  2. North Carolina to Test Connected Tolling on Private Vehicles
  3. Govineer Buys Utility Billing Tech Supplier TrueBill
  4. North Carolina Interns Help Identify Cyber Threats to State
  5. Opinion: 10 Tips for Teachers Using AI in Class