Wikithon spurs gov engagement in mobile
Got an idea on how to improve government’s use of mobile technology? You’ll be welcome at the Mobile Gov Wikithon.
Got an idea on how to improve government’s use of mobile technology? You’ll be welcome at the Mobile Gov Wikithon.
The “bring your own device” (BYOD) philosophy is something that every public-sector agency IT department will have to deal with, if they haven’t already. Simply put, users want to use their own mobile devices for work-related communications and file sharing,…
DNS’ openness leaves it vulnerable to a variety of denial of service techniques, from brute-force floods to sophisticated recursive attacks.
NJVC’s Cloudcuity suite aligns with NIST measures for cloud interoperability, allowing agencies to move data and applications among multiple providers, company officials say.
Actually, yes, if departments take care in selecting providers and ensuring the availability and performance of the service, according to an IJIS Institute report.
A team at Eglin AFB used a software upgrade to its airborne system to let ground forces share real-time data.
Kopin’s Golden-I headset puts data at cheek-level, with the impression that it’s an arm’s length away, and responds to voice commands.
The Transportation Security Agency awards a contract for big data analysis as it pursues other screening technologies.
The company’s newest version integrates enterprise content management and business process management functionality across the entire Laserfiche product line.
Most experts agree that you can’t do it all by yourself, but there are practical measures agencies can take to shore up their networks against denial of service attacks.