The systems, which can capture up to thousands of images per hour, are increasingly popular with police but are raising privacy conerns.
DARPA seeks proposals for new software that can scour social media and other sites to predict cyberterrorism events.
With troop drawdowns in Afghanistan, the Army will use computerized surveillance technology to improve perimeter security and help protect small units in remote outposts.
Top state IT leaders have adopted a new strategic plan aimed at putting a stronger emphasis on CIO leadership.
The Massachusetts Health Insurance Connector Authority is using LexisNexis identity management software to verify the residency information of people participating in the exchange.
Oracle's survey also finds a lot of C, D and F grades on how well public and private organizations handle their data.
The project is one of many at the U.S. Army's SouthCom that combines IT expertise from multiple agencies, including foreign ones, to support forces in the field.
The system integrates DataDirect Networks’ Web Object Scaler cloud storage appliance with YottaStor’s mobile computing and big data storage system called YottaDrive.
Alaska’s Enterprise Technology Services team used a unified computing system to quickly move existing services to a new data center, and validated its disaster recovery approach and failover capabilities in the process.
The NASA Earth Exchange lets scientists build in hours Landsat-based Earth models that used to take months.
For most agencies, server virtualization is a first step toward cloud computing. If you do it right, a move to the cloud is that much easier. However, if you make a mess of it, your journey to the cloud could be tougher.
The FBI asks experts for suggestions in how to add tattoos to its databases of fingerprints, DNA, voice signatures and iris scans.