Dell’s new XC series of web-scale converged appliances will be running Nutanix software, which allows agency IT managers to consolidate compute and storage into a single 2U chassis.
Using dotMaps, transportation officials in Chicago can quickly see city infrastructure projects to avoid conflicts and maximize efficiency.
The Defense Advanced Research Projects Agency is expected to launch a research effort to strengthen the resilience and security of military wide-area networks.
The Agriculture Department wants to set up an electronic organic integrity database to maintain information on operations that use the organic seal, by which the department ensures public trust of its organic programs.
Mozilla released what it calls the first browser for developers. Firefox Developer Edition includes tools for building, testing and scaling all from one place.
The Navy and Esri are combining the massive amounts of data available from satellite and other remote-sensing platforms with the analytic tools of geospatial information systems.
Dell and CGI announced a joint venture to offer virtual desktop, business analytics and identity management services to government and enterprise customers.
Unauthorized software not only increases the attack surface for adversaries, but it also hampers IT managers’ ability to fully secure their assets. Here are eight ways to get unauthorized software under control.
Government workers with overflowing inboxes may soon see some relief from Microsoft’s “Clutter” email management tool for Office 365 business users.
The FEMP Screening Map, developed by Energy Department researchers, combines big data and geospatial technology to determine whether renewable energy projects are cost-effective.