Connected data icons

Energy lab's Piranha puts teeth into text analysis

Nearly nine years in the making, the agent-based software, available to other agencies, clusters huge volumes of text documents into groups that are easily processed.

Consolidated data center under construction

As agency data centers close, measurement tools take center stage

Reaping efficiency from data center consolidation will require new technologies, including unified computing and business analytics, to measure performance gains and savings.

Government citizen services

Data-driven government's goal: Personalized service

Agencies need to create a tech strategy that supports convergence of cloud, big data, mobility and Web services, a Justice CTO says.

Data analytics

Attunity offers a path to secure file sharing with Hadoop

Seamless integration lets organizations move data in and out of Hadoop for improved business intelligence and analytics.

Presidents desk

5 tech priorities for the new administration

Here are five technologies the new administration should keep on the presidential blotter.

Fairfax County, Va., land use application

Fairfax County land-use solution puts big data on the map

Fairfax County built a big data application that lets agencies efficiently manage the complex volume of unstructured data that currently exists and allows for real-time search.

Data analytics

How to make big data more useful, reliable – and fast

Splunk promises to analyze and visualize machine data stored in Hadoop to quickly spot trends and statistical patterns for real-time decision-making.


Text analytics ready for the heavy lifting of agencies' data mining

Agencies that deal with the public in any way -- and what agencies don't? -- should be using this data mining technology now, experts say, because they'll be doing a lot of it in the future.

Researchers in biohazard suits

Canary in a data mine: How analytics detects early signs of bio threats

A DHS-funded collaborative mines data from poison centers, EMS reports, population, health care infrastructure, social media and other sources.

NOAA computer model of Hurricane Sandy

How models got a complex storm like Sandy mostly right

Weather forecasting is still an inexact science, but modeling techniques and high-powered computers help NOAA accurately predict the track of storms such as Sandy.

Pilots in airliner cockpit

NASA applies deep-diving text analytics to airline safety

The agency's Aviation Safety Program analyzes incident reports from pilots, air traffic controllers and others to find trouble before it strikes.

Google data center in Council Bluffs, Iowa

Where is all that agency data coming from?

Big data, cloud computing and video are increasing demand for data storage among federal agencies, according to a recent study.

Topic Resources

  • Understanding the Impact of Ultra-Dense Hyper-Scale Servers

    For years high performance computing (HPC) was largely associated with large-scale scientific workloads and with applied technical computing. However, new workloads such as digital media, analytics and various applications have made their way onto HPC server. Read this whitepaper to learn how and why the arrival of ultra-dense, hyper-scale design is poised to make the latest shift in the HPC market.

  • Technical Computing for a New Era

    Today, high performance systems are used to solve technical computing problems across a range of sectors. This is because technical computing is more accessible than ever thanks to a wave of recent innovations. Read this whitepaper to learn about the high-value challenges that supercomputing allows agencies to address and the advanced capabilities it offers.

  • i2 Intelligence Analysis Platform

    IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.