State & Local

 
  • police pursuit

    Police fire GPS 'cannon' to track suspects, reduce car chases

    The StarChase system includes an air launcher in the grill of a cruiser and sticky GPS devices that attach to a vehicle so it can be tracked.

  • Police line do not cross

    Police officers get their own private Facebook

    BlueLine, created by William Bratton, is a closed social media platform for law enforcement that lets officers interact and share best practices.

  • prisoner

    Prisons turn to analytics software for parole decisions

    Risk assessment programs weigh factors beyond the traditional considerations of parole boards and seem to be having an effect.

  • police laptop

    Fort Lauderdale fights crime with data analytics

    IBM researchers are working with the Florida city to develop an application that detects patterns and activities from a variety of data sources.

  • health exchange

    State health exchanges outpace HealthCare.gov

    As HealthCare.gov flounders, some of the health insurance exchanges that states established have been running smoothly.

  • Seattle

    One city fends off cyberespionage attacks, and collaboration is key

    Seattle's collaboration with the FBI and a DHS fusion center helped thwart attacks from China, but that kind of information sharing doesn't happen enough, a new report says.

  • skull

    Reminder: The Web is not the only source of malware

    A cloud-based Web filtering and policy enforcement service helped the city of Aspen sharply reduce browser infections, but it doesn't replace antivirus protection.

  • Aspen

    How Aspen's DNS services became more secure, reliable and cheaper

    Outsourcing Domain Name Services and Web policy enforcement to OpenDNS saves the Colorado city and county money while improving security.

  • license plate

    California pilots electronic license plates -- will other states follow?

    The state expects electronic plates to save money on processing registrations and mailing, though the plan has raised privacy concerns.

  • security

    Security tool keeps data safe across collaboration systems

    CipherPoint data security software prevents privileged IT administrators, attackers from accessing sensitive information across on-premise and cloud-based collaboration systems.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • GameChanger: NoSQL

    Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.

  • The Power of Analytics for the Public Sector

    Agencies face the difficulty of managing the increasing complexity of the “information explosion”. Adopting analytics can help solve these issues and achieve desirable outcomes. Read this white paper and see how analytics solutions can help the Government evaluate excess data and unlock insights to create better informed decisions.

  • i2 Intelligence Analysis Platform

    IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.