Role-based access control, first formally proposed by NIST scientists in 1992, has become the standard for managing access to IT resources and has saved the U.S. economy billions of dollars.
A top Army official details some of the exact steps the service is taking to move and restructure the e-mail accounts of more than 1.5 million users as part of the service's continuing enterprise e-mail initiative.
The Defense Department is deploying thin clients to breathe new life into a sluggish electronic health records system.
The Government Accountability Office identified major challenges to ensuring the cybersecurity of an intelligent, interconnected power grid.
A smart, networked energy grid offers a host of energy- and money saving benefits, but it presents an enticing target to all sorts of miscreants. How to reap the good while avoiding the bad?
By focusing on core systems, your downsized organization could become an expert at providing resources to other agencies, which could lead to new, highly focused growth.
Cloud computing is like a force of nature that will continue to grow even if there is a change in the White House in two years, according to two former federal IT leaders.
Funding is a concern for the Federal Aviation Administration’s NextGen system, but the program enjoys momentum for now.
With the county flat broke and the local automobile industry reeling from the economic downturn, Wayne County, Mich., got creative in leaving the IT Stone Age behind.
Recovering and reallocating unused IPv4 addresses will not significantly extend the life of the address pool or delay the need to transition to IPv6, says the Internet numbers registry.
Faced with dwindling resources, Wayne County, Michigan officials had to take innovative steps in order to deliver quality, cost-effective taxpayer services.
With smart PIV cards now in the hands of most federal workers and contractors, agencies are being told to put them to use both for physical and logical access control. The technology is available, but some hurdles remain to fully implementing systems.
Although the expansion of the Internet makes the move necessary, the new protocol will make it more difficult to filter out spam.
Unified communications technologies promise to deliver improved situational awareness for first responders and homeland security agents by putting critical data into users' hands.
Unified communications takes many forms, depending on its developer, from pervasive technology to app-orientation.