IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Sponsored

This page consists of content produced by a sponsor or produced by the e.Republic Content Studio in collaboration with a sponsor.
More Stories
  • Sponsored
    No-code ITSM software can enable state and local governments to automate processes and provide better self-service options to citizens while reducing the drain on limited resources.
  • Sponsored
    Digital twins have revolutionized the way businesses operate, and now, startups like Hayden AI are exploring new aspects of the groundbreaking technology to transform the way cities are designed and maintained, and ultimately enhance the quality of life for communities.
  • Sponsored
    Organizations are flocking to no-code IT service management solutions to alleviate the administrative burden often shouldered by IT employees. Here are five trends driving no-code ITSM software adoption.
  • Sponsored
    Hacktivists and Others Targeting Politically Sensitive Data Estates
  • Sponsored
    Experts offer insights and guidance for reporting risks in today’s highly distributed world.
  • Sponsored
    As intelligent transportation system (ITS) applications become more sophisticated, ensuring network uptime has become increasingly difficult for state departments of transportation (DOTs). Ciena’s Daniele Loffreda highlights how DOTs can add resiliency to their communications networks.
  • Sponsored
    As a tech leader with a wide-ranging career in the public and private sector, Ann Dunkin, chief information officer, U.S. Department of Energy, has served in roles that others have only dreamed of. In this Q&A, she provides a window into the mindset, qualities and support that have helped her succeed.
  • Sponsored
    Deborah (Deb) Snyder is a senior fellow with the Center for Digital Government (CDG) and the former chief information security officer (CISO) for New York state. In this Q&A, she discusses the importance of bringing new voices to cybersecurity and describes how she has done so in her role as a technology leader.
  • Sponsored
    Lydia Payne-Johnson has an extensive background in both the private and public sectors as an executive with experience in compliance, cybersecurity risk, data governance and consumer marketing. In this Q&A, Payne-Johnson, who is currently the director of IT security, identity management and risk for The George Washington University, shares her strategies for being prepared and staying on track in career and life.
  • Sponsored
    Eve Machol, Microsoft’s director of Airport and Transportation Industry Innovation, invites airport leaders to a webinar discussing the viability of digital twins to improve airport operations, the traveler experience and sustainability.
  • Sponsored
    A cyber risk score identifies an organization’s level of exposure to cyber crime and the liabilities that stem from IT vulnerabilities.
  • Sponsored
    "Forward!" It is Wisconsin's motto and what drives the Wisconsin Department of Safety and Professional Services (DSPS).
  • Sponsored
    Learn how Pima County, Ariz., is using iPaaS, an automation and integration tool, with their service management platform to supercharge their service delivery and eliminate the drain on IT resources.
  • Sponsored
    Preventing cyber criminals from gaining unauthorized access to their systems and infrastructure has never been more pertinent. Many breaches that occur are the result of configuration errors.
  • Sponsored
    Accurate and timely coverage maps are crucial to closing connectivity gaps.
  • Sponsored
    Government organizations at all levels are focused on modernization and digital transformation efforts. But not all modernization methods are created equal.
  • Sponsored
    Election cybersecurity is one of the hottest topics in the country today. It dominated both the 2016 and 2020 presidential elections, and most likely will continue to do so until state and local governments can demonstrate that their voting infrastructure and solutions are as secure and tamper-proof as possible.
  • Dustin Haisler is joined by Chris Radich, Celonis' vice president of Solution Engineering, Public Sector, to discuss process mining and how agencies can leverage this technology to improve their procedures and delivery of services.


Most Read
  1. Defending Your Castle: Best Practices for Smart Home Security
  2. Signal Priority Improves the Bus Ride in San Jose, Calif.
  3. High School Tech Director Advises Ed-Tech Skepticism, Intentionality
  4. Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
  5. Cleveland Looks to Accela Permit Tech to Boost Development