If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
The secret Foreign Intelligence Surveillance Court has ruled against a U.S. government request that it be allowed to hold telephone metadata beyond the current five-year limit as it may be required as evidence in civil lawsuits that question the data collection.
The CIA's decision to use Amazon's cloud is part of a broader IT shake-up to make the spy business more efficient.
Work is well underway on a study of big data technologies' impact on privacy rights, a senior Obama administration official said Monday, stopping short of saying that substantive new policy changes could be around the corner.
A major Oracle PeopleSoft ERP (enterprise resource planning) software project in California led by Accenture is running well over schedule and budget, according to the state's auditor.
Companies such as Comcast and Time Warner don't think the United States is ready for -- or even needs -- gigabit Internet, but Google Fiber and a host of independent initiatives suggest that they are faster and cheaper.
Smart cities aren't the stuff of science fiction. Governments -- in the heartland and on both coasts -- are using sensors, social media, big data and other technologies to provide better services to citizens.
From the NSA surveillance revelations to the troubled government healthcare website to a variety of issues that didn't make the mainstream news, here are the top tech policy stories that played out in 2013.
The agency is in the final stages of rolling out a new database that will let law enforcement search for and identify criminals by palm print, iris image and mug shot as well as fingerprints. Early results are very positive.
The vendor chosen in a no-bid process to build Healthcare.gov was fired from a similar project after missing deadlines and suffering security lapses for three years. Such obvious mistakes are unfortunately all too common in the private and public sector. Here are four simple ways to make sure you choose the right vendor for your IT project.
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security risk framework so audit reports could be prepared in a timely fashion.
More than a month after it went live, a couple of large questions remain about the U.S. Department of Health and Human Services' botched launch of HealthCare.gov.
In the early days of Healthcare.gov, I praised the Centers for Medicare and Medicaid Services for publishing a dataset with sample rates for every health plan participating in the federal health insurance marketplace.
Some localities are shying away from predicting who will commit a crime, even though the technology exists, in favor of when and where.
Five years after the FBI launched its National Data Exchange data warehouse initiative, more than three quarters of law enforcement agencies still aren't sharing. Here's why.
At Demo 2013, a firm called idealAsset showed off a product that helps would-be buyers and sellers of intellectual property find each other. Could this sort of matchmaking convince patent trolls to acquire IP by nobler means?
With the government closed for business, private-sector firms should consider poaching public-sector IT talent to fill open tech positions.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Red Hat Enterprise Linux - The Original Cloud Operating System
- Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse
- Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center
- Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper
- Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support... All Government IT White Papers
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Government IT Webcasts