Companies such as Comcast and Time Warner don't think the United States is ready for -- or even needs -- gigabit Internet, but Google Fiber and a host of independent initiatives suggest that they are faster and cheaper.
Smart cities aren't the stuff of science fiction. Governments -- in the heartland and on both coasts -- are using sensors, social media, big data and other technologies to provide better services to citizens.
From the NSA surveillance revelations to the troubled government healthcare website to a variety of issues that didn't make the mainstream news, here are the top tech policy stories that played out in 2013.
The agency is in the final stages of rolling out a new database that will let law enforcement search for and identify criminals by palm print, iris image and mug shot as well as fingerprints. Early results are very positive.
The vendor chosen in a no-bid process to build Healthcare.gov was fired from a similar project after missing deadlines and suffering security lapses for three years. Such obvious mistakes are unfortunately all too common in the private and public sector. Here are four simple ways to make sure you choose the right vendor for your IT project.
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security risk framework so audit reports could be prepared in a timely fashion.
More than a month after it went live, a couple of large questions remain about the U.S. Department of Health and Human Services' botched launch of HealthCare.gov.
In the early days of Healthcare.gov, I praised the Centers for Medicare and Medicaid Services for publishing a dataset with sample rates for every health plan participating in the federal health insurance marketplace.
Some localities are shying away from predicting who will commit a crime, even though the technology exists, in favor of when and where.
Five years after the FBI launched its National Data Exchange data warehouse initiative, more than three quarters of law enforcement agencies still aren't sharing. Here's why.
At Demo 2013, a firm called idealAsset showed off a product that helps would-be buyers and sellers of intellectual property find each other. Could this sort of matchmaking convince patent trolls to acquire IP by nobler means?
With the government closed for business, private-sector firms should consider poaching public-sector IT talent to fill open tech positions.
It isn't yet time to stock up on canned beans and bottled water, but a potential conflict with Syria--which hasn't been shy about attacking vulnerable U.S. infrastructure--should have your organization reviewing its disaster-preparedness plans.
By layering data from 311 and 911 calls over Census data, unemployment data and other poverty indicators, Buffalo uses data analytics to identify its most challenged neighborhoods and more effectively deploy resources for everything from neighborhood beautification to combatting crime and reducing fire hazards.
When the CIA opted to have Amazon build its private cloud, even though IBM could do it for less money, a tech soap opera ensued. Lost amid the drama, though, is a perfectly reasonable explanation why Amazon Web Services makes sense for the CIA--and why a disruptive AWS represents the future of the cloud.
Members of Judiciary Committee express concern over broad-ranging, secretive authorities under Foreign Intelligence Surveillance Act, push for bill to strengthen oversight, transparency.
Government IT officials tell House subcommittee that reforms are coming in fits and starts, but inconsistent reporting of struggling projects, data center discrepancies and fragmented CIO authorities combine to slow the process.
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun
Though roundly ridiculed when it debuted in 1995, Microsoft Bob, or something resembling the short-lived on-screen assistant, will ultimately return, vowed Bill Gates, co-founder and chairman of Microsoft.
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful, reactions.
Register for FREE now! »
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
Meg Whitman presents Unlocking IT with Big Data
During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
The New Way to Work Knowledge Vault
This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
Getting Ready for BlackBerry Enterprise Service 10.2
Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
Containerization Options: How to Choose the Best DLP Solution for Your Organization
This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
Mobile Apps and Devices Slash Customer Cycle Time
Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts