Wikithon spurs gov engagement in mobile
Got an idea on how to improve government’s use of mobile technology? You’ll be welcome at the Mobile Gov Wikithon. Share this… Facebook Pinterest Twitter Linkedin Outlook
Got an idea on how to improve government’s use of mobile technology? You’ll be welcome at the Mobile Gov Wikithon. Share this… Facebook Pinterest Twitter Linkedin Outlook
The “bring your own device” (BYOD) philosophy is something that every public-sector agency IT department will have to deal with, if they haven’t already. Simply put, users want to use their own mobile devices for work-related communications and file sharing, and any network administrator who doesn’t have a plan in place may end up with a dissatisfied work force or, […]
DNS’ openness leaves it vulnerable to a variety of denial of service techniques, from brute-force floods to sophisticated recursive attacks. Share this… Facebook Pinterest Twitter Linkedin Outlook
NJVC’s Cloudcuity suite aligns with NIST measures for cloud interoperability, allowing agencies to move data and applications among multiple providers, company officials say. Share this… Facebook Pinterest Twitter Linkedin Outlook
Actually, yes, if departments take care in selecting providers and ensuring the availability and performance of the service, according to an IJIS Institute report. Share this… Facebook Pinterest Twitter Linkedin Outlook
A team at Eglin AFB used a software upgrade to its airborne system to let ground forces share real-time data. Share this… Facebook Pinterest Twitter Linkedin Outlook
Kopin’s Golden-I headset puts data at cheek-level, with the impression that it’s an arm’s length away, and responds to voice commands. Share this… Facebook Pinterest Twitter Linkedin Outlook
The Transportation Security Agency awards a contract for big data analysis as it pursues other screening technologies. Share this… Facebook Pinterest Twitter Linkedin Outlook
The company’s newest version integrates enterprise content management and business process management functionality across the entire Laserfiche product line. Share this… Facebook Pinterest Twitter Linkedin Outlook
Most experts agree that you can’t do it all by yourself, but there are practical measures agencies can take to shore up their networks against denial of service attacks. Share this… Facebook Pinterest Twitter Linkedin Outlook