New Haven, Conn., has become an open-budget town by using OpenGov.com, web-based financial visualization software designed to make public financial data more transparent, interactive and easier to analyze.
A study of DDOS attacks over the last three months finds that attackers are using vulnerable servers to launch powerful attacks against government and other targets.
The State Department wants to build a web-based databank of foreign countries' performance indicators to be used for data-driven problem solving.
Big Switch Networks introduced its Big Cloud Fabric, a data center switching fabric that combines the operational advantages of SDN software with the economics of bare metal switch hardware.
Using Troop ID from ID.me, more than 200,000 military clients are using a single sign-on technique to verify their military affiliation at a number of the company's retail partners.
The increasing complexity and sophistication of cyberthreats is driving the use of automation in cybersecurity. Where does human intelligence fit in the picture?
The state of California and IBM will offer its state and local agencies a set of public, private and hybrid cloud-based infrastructure services designed to cut costs and pinpoint requirements.
Washington, D.C., announced a new online system for submitting and processing Freedom of Information Act requests to District agencies and new policies on transparency, open government and open data.
The Department of Veterans Affairs wants to connects health care personnel across the entire VA service network in an effort to reduce duplication and promote sharing of best practices.
The Census Bureau is conducting a digital transformation of its website using content optimization, search and market analytics to keep its focus on the preferences of its data customers.
Milwaukee County took advantage of a technology refresh to upgrade its backend completely, making use of software as a service and doing away with its aging server-based infrastructure.
Government agencies should anticipate the security implications of the Internet of Things and identify how to leverage this revolution for the benefit of all.