If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
The National Security Agency cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The U.S. Supreme Court has agreed to hear a controversial software patent case after a federal appeals court ruled that an abstract idea is not patentable simply because it is tied to a computer system.
An IT specialist working for the U.S. National Science Foundation has pleaded guilty to theft of government property for redirecting more than US$94,000 in government funds for his personal use, the U.S. Department of Justice said.
A congressional hearing Wednesday on the botched rollout of HealthCare.gov was largely a forum for Republican critics of U.S. government involvement in the health-care industry and other large social programs.
HealthCare.gov, the U.S. government's insurance-shopping website, had to deploy a user queuing feature Monday because of heavy traffic, just days after the U.S. Department of Health and Human Services announced the troubled site was working well for a majority of users.
The vendor chosen in a no-bid process to build Healthcare.gov was fired from a similar project after missing deadlines and suffering security lapses for three years. Such obvious mistakes are unfortunately all too common in the private and public sector. Here are four simple ways to make sure you choose the right vendor for your IT project.
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security risk framework so audit reports could be prepared in a timely fashion.
More than a month after it went live, a couple of large questions remain about the U.S. Department of Health and Human Services' botched launch of HealthCare.gov.
In the early days of Healthcare.gov, I praised the Centers for Medicare and Medicaid Services for publishing a dataset with sample rates for every health plan participating in the federal health insurance marketplace.
Some localities are shying away from predicting who will commit a crime, even though the technology exists, in favor of when and where.
Five years after the FBI launched its National Data Exchange data warehouse initiative, more than three quarters of law enforcement agencies still aren't sharing. Here's why.
At Demo 2013, a firm called idealAsset showed off a product that helps would-be buyers and sellers of intellectual property find each other. Could this sort of matchmaking convince patent trolls to acquire IP by nobler means?
With the government closed for business, private-sector firms should consider poaching public-sector IT talent to fill open tech positions.
It isn't yet time to stock up on canned beans and bottled water, but a potential conflict with Syria--which hasn't been shy about attacking vulnerable U.S. infrastructure--should have your organization reviewing its disaster-preparedness plans.
By layering data from 311 and 911 calls over Census data, unemployment data and other poverty indicators, Buffalo uses data analytics to identify its most challenged neighborhoods and more effectively deploy resources for everything from neighborhood beautification to combatting crime and reducing fire hazards.
When the CIA opted to have Amazon build its private cloud, even though IBM could do it for less money, a tech soap opera ensued. Lost amid the drama, though, is a perfectly reasonable explanation why Amazon Web Services makes sense for the CIA--and why a disruptive AWS represents the future of the cloud.
Members of Judiciary Committee express concern over broad-ranging, secretive authorities under Foreign Intelligence Surveillance Act, push for bill to strengthen oversight, transparency.
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- All Government IT Webcasts