No one denies that John Hancock signed the Declaration of Independence. An e-signature should provide same irrefutable verification for centuries to come.
Because supervisory control and data acquisition systems manage critical infrastructure, acceptance of risks in cloud-based SCADA system controls should approach zero.
Here are four ways agencies can align culture, process and tools to create a continuous cycle of innovation and agility.
Clean, validated data and automated processes can help agencies limit their exposure to costs associated with undelivered mail.
Workforce management technology might be beyond the budgets of smaller municipalities, but a shared services marketplace in Oakland County, Mich., puts it within reach.
America’s appetite for mobile information has moved the needle on digital local government from ‘because we can’ to ‘because we must.’
Agencies can gain valuable insight on the logistics of the Continuous Diagnostics and Mitigation program from the Department of Homeland Security’s experience with Phase I implementation.
While IT shops tend to focus on technical design aspects, understanding user experience can ensure rapid user adaption.
In order to bridge communication gaps among agencies delivering massive national services, fraud investigatory tools have to be comprehensive, flexible and affordable.
Encryption ensures that only the intended recipients of a government email would be able to open and read the content and its attachments -- a necessary requirement in health care, education and law enforcement.