This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
There's no immediate end in sight to trouble that has hit the U.S. State Department's computer system for processing visa applications and caused problems for thousands of people worldwide.
An agreement in Congress to allocate $17 billion to the Department of Veterans Affairs includes money for a major tech upgrade.
The organizers of the FirstNet LTE public safety network have the frequencies and standards they need to build the system, and they know where the money's coming from. They know how to get there from here, but it won't be a quick trip.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around $111,000, for a method to identify users on the Tor network.
A State Department database crash has delayed the issuing of passports and visas worldwide.
Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are.
The U.S. Department of Justice is preparing to charge Chinese military officials with hacking US companies to obtain trade secrets.
Michigan's Kitchen Cabinet is a monthly meeting of savvy CIOs from different industries who share ideas and promote tech innovation within their state.
Government culture and compensation can make the private sector more appealing for young technologists, contributing to a talent shortfall at a time when the feds need IT expertise more than ever -- as the Healthcare.gov fiasco painfully illustrated.
Technology chiefs in the federal government say they struggle with their role within their departments and agencies. A bill passed in the House and pending in the Senate could give federal CIOs more authority, though.
Ever since President Obama signed the Open Data Executive Order, government agencies have been making their vast data stores available to the public. These once-secret data sets are proving a valuable business resource, too.
Companies such as Comcast and Time Warner don't think the United States is ready for -- or even needs -- gigabit Internet, but Google Fiber and a host of independent initiatives suggest that they are faster and cheaper.
Smart cities aren't the stuff of science fiction. Governments -- in the heartland and on both coasts -- are using sensors, social media, big data and other technologies to provide better services to citizens.
From the NSA surveillance revelations to the troubled government healthcare website to a variety of issues that didn't make the mainstream news, here are the top tech policy stories that played out in 2013.
The agency is in the final stages of rolling out a new database that will let law enforcement search for and identify criminals by palm print, iris image and mug shot as well as fingerprints. Early results are very positive.
The vendor chosen in a no-bid process to build Healthcare.gov was fired from a similar project after missing deadlines and suffering security lapses for three years. Such obvious mistakes are unfortunately all too common in the private and public sector. Here are four simple ways to make sure you choose the right vendor for your IT project.
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security risk framework so audit reports could be prepared in a timely fashion.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts