With a new generation of municipal Wi-Fi coming online to support smart city infrastructure, parking management turns out to give a good bang for the buck.
Cisco is betting that a new generation of municipal Wi-Fi, incorporating the Internet of Things, will enable smarter management of city infrastructure and better delivery of city services.
Company's Data ONTAP software will provide a storage and data management foundation.
The NSTIC programs, which received more than $7 million in grants, range from military, civilian and commercial authentication initiatives to one aimed at protecting children’s privacy online.
Pentaho Business Analytics 5.0 provides an open, unified platform to access, integrate and blend any data, in any environment, across a full spectrum of analytics.
Utah's state government cut its number of servers from 1,864 to 591 and saved $4 million on its IT budget.
This week's Biometric Consortium Conference showcases a wide range of hardware and software solutions for personal identification/authentication applications in government.
NGA-backed consortium demonstrates show how hybrid, geospatial clouds can be assembled for disaster response.
Atlanta's collaborative intelligence-sharing system tracks cases, alerts investigators to potential links between incidents and has nearly doubled the rate of indictments.
The state's Department of Juvenile Justice uses Tableau Software for an interactive view of juvenile programs that can be filtered from the statewide to county level.
The look-alike Web pages may be created by interest groups, private insurance companies and, sometimes, scammers looking to gather personal information.
The California city uses Laserfiche 8 to automate the flow of 3 million pages of documents.
A system to block contraband cell phones in prisons must be continually tuned to ensure that it covers the required footprint but does not step out of bounds.
A system from Tecore Networks lets prisons establish their own cellular base stations so they can keep prisoners from using illegal phones while giving legitimate users access.
A video surveillance system that combines thousands of cameras requires more than technology to be effective.