Government IT

Government IT | News, how-tos, features, reviews, and videos

surveillance, spying, cameras, IP cameras

UK seeks end to end-to-end encryption

It could put an end to end-to-end encryption: The U.K. government wants telecommunications providers to help it tap their customers' communications, removing any encryption the provider applied.

cog systems d4 secure htc a9 splash screen

NSA suggests using virtualization to secure smartphones

The U.S. National Security Agency is now suggesting government departments and businesses should buy smartphones secured using virtualization, a technology it currently requires only on tablets and laptops

ransomware

Information governance for counties and municipalities

Most county and municipal governments don't have formal information governance programs, but adoption of IG would reduce risks, lower costs and vastly improve quality of services in these organizations.

cloud migration

Federal CIOs tackle the next phase of cloud migration

Many government agencies have already moved basic applications and services to the cloud, but when it comes to the next wave, CIOs must take a hard look at their systems and negotiate flexible contracts with vendors.

Open Media Project increases government transparency with technology

Real politics and law making isn’t riveting nor easy to follow. Long debates and votes scheduled at varying times make government hard to follow. How can the public stay abreast of legislation on issues that matter to them with...

AIr Force Distributed Common Ground System

An agile Air Force slashes time to roll out new IT capabilities

Can an organization really cut development time by more than 70 percent by embracing the agile philosophy and open architectures? The intelligence-gathering arm of the U.S. Air Force says it's done just that.

Yellow umbrella among many black umbrellas

HIPAA as an umbrella for county/municipal cybersecurity

Many county governments have departments or divisions that qualify as "covered entities" under HIPAA. For those organizations, it makes a great deal of sense to cover the entire enterprise under the umbrella of HIPAA rather than...

Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity

Dallas emergency management officials continue to investigate a hack that activated all 156 emergency tornado sirens citywide for about 90 minutes early Saturday.

05 payment

How these three alternate payment models are driving healthcare IT

APM’s are driving population health management and improvement in healthcare outcomes. Their success depends on key technology and data investments.

tablet with skull and crossbones cybersecurity

County and municipal cybersecurity, Part 2

This is Part 2 of a two-part series for municipal executives and managers on cybersecurity. Included is a discussion of information governance (IG) and a look at frameworks, standards and regulations, including NIST, HIPAA, ISO27000...

trump govt employees twitter

Trump again uses iPhone to tweet, backtracking from 2016 pledge

President Donald Trump now uses an iPhone to broadcast his famous early-morning tweets, even though last year he urged supporters to boycott Apple.

p1170191 1

Trump’s son-in-law, Jared Kushner, prepares for Cobol, cloud, mainframes

The White House on Monday announced an "Office of American Innovation" to oversee a revamp of federal IT operations; the effort will be led by President Donald Trump's son-in-law, Jared Kushner.

cybersecurity

County and municipal cybersecurity, Part 1

This is the first part of a two-part series on cybersecurity for county and municipal organizations. In Part 1, I define major issues and obstacles specific to municipal government. In Part 2, I will offer solutions. This article was...

mars puffer robot

NASA tests foldable, robotic scout for Mars

The next NASA rover to head to another planet might take along a robotic scout that can fold up its wheels and tuck itself away or unfold and pop up like a piece of origami.

5 reasons why China will rule tech, 2017 edition

In 2010, Computerworld looked at five reasons why China will rule in technology. In 2017, the case for China has grown stronger.

datarescue group nh2

Coders and librarians team up to save scientific data

A group of students, computer programmers and other volunteers gathered on a snowy night at a former mill in Dover, N.H., to participate in a nationwide data rescue effort to archive scientific data that could be lost.

secusuite for samsung knox 1

BlackBerry readies a more secure version of the Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

SDG&E vanadium redox flow battery

San Diego installs massive flow battery that can power 1,000 homes

San Diego Gas & Electric unveiled a new pilot energy storage substation that utilizes a vanadium redox flow (VRF) battery storage system that can store up to 2 million watts of electricity.

wind turbines renewable energy

Here’s what Trump’s budget means for renewable energy

While President Trump’s budget proposal is just that – a spending plan for Congress to consider – industry experts say it could translate into big cuts for renewable energy.

cobol

Cobol plays major role in U.S. government breaches

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology.

Load More