If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
An Arizona lawmaker is eyeing an unusual way of reigning in the National Security Agency, which has been under fire for questionable surveillance practices: Block it from operating in her state.
The browser cookies that online companies use to track Internet customers for targeted advertising are also used by the National Security Agency to track surveillance targets and break into their systems.
The U.S. Department of Justice is investigating a report alleging that Dell computers have been sold to the Syrian regime despite the trade embargo in place, according to a July filing by Dell to the U.S.A Securities and Exchange Commission (SEC) that was made public this week.
Politics collided with technology this year as stories about U.S. government spying stirred angst among U.S. citizens and foreign governments and the flawed HeathCare.gov site got American health-care reform off to a rocky start. Meanwhile, the post-PC era put aging tech giants under pressure to reinvent themselves.
The National Security Agency cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The vendor chosen in a no-bid process to build Healthcare.gov was fired from a similar project after missing deadlines and suffering security lapses for three years. Such obvious mistakes are unfortunately all too common in the private and public sector. Here are four simple ways to make sure you choose the right vendor for your IT project.
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security risk framework so audit reports could be prepared in a timely fashion.
More than a month after it went live, a couple of large questions remain about the U.S. Department of Health and Human Services' botched launch of HealthCare.gov.
In the early days of Healthcare.gov, I praised the Centers for Medicare and Medicaid Services for publishing a dataset with sample rates for every health plan participating in the federal health insurance marketplace.
Some localities are shying away from predicting who will commit a crime, even though the technology exists, in favor of when and where.
Five years after the FBI launched its National Data Exchange data warehouse initiative, more than three quarters of law enforcement agencies still aren't sharing. Here's why.
At Demo 2013, a firm called idealAsset showed off a product that helps would-be buyers and sellers of intellectual property find each other. Could this sort of matchmaking convince patent trolls to acquire IP by nobler means?
With the government closed for business, private-sector firms should consider poaching public-sector IT talent to fill open tech positions.
It isn't yet time to stock up on canned beans and bottled water, but a potential conflict with Syria--which hasn't been shy about attacking vulnerable U.S. infrastructure--should have your organization reviewing its disaster-preparedness plans.
By layering data from 311 and 911 calls over Census data, unemployment data and other poverty indicators, Buffalo uses data analytics to identify its most challenged neighborhoods and more effectively deploy resources for everything from neighborhood beautification to combatting crime and reducing fire hazards.
When the CIA opted to have Amazon build its private cloud, even though IBM could do it for less money, a tech soap opera ensued. Lost amid the drama, though, is a perfectly reasonable explanation why Amazon Web Services makes sense for the CIA--and why a disruptive AWS represents the future of the cloud.
Members of Judiciary Committee express concern over broad-ranging, secretive authorities under Foreign Intelligence Surveillance Act, push for bill to strengthen oversight, transparency.
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 20, 2013.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Bring Networks and Applications Closer--Cisco ONE
- A series of sweeping trends is placing new requirements on the tried-and-true network model--requiring network infrastructure and applications to communicate. Get the open...
- Lippis Research Reviews the Cisco Catalyst 2960-X
- In this Lippis Report Research Note, Lippis Research reviews the latest edition of the "most popular access switch on the planet" -- the...
- Design Guide--Scaling Up to a Campus-Wide LAN
- Is it time to scale your network environment to a campus wired LAN? Here's the framework you need to set up your LAN...
- Comprehensive Security: Cisco Catalyst 2960 Series
- With a rich and comprehensive set of security features, Cisco Catalyst 2960-X and 2960-XR Series Switches can help you address networking megatrends such...
- Be Energy Efficient--The Cisco Catalyst 2960 Series
- How much energy could be saved if all 230 million Layer 2 and 3 fixed managed switch ports sold in 2012 were as... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- Vblock™ Specialized System for SAP HANA® Overview video from DJ Long about the new Vblock Specialized System for SAP HANA®.
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- All Government IT Webcasts