State & Local

 
  • traffic

    New York redirects E-ZPass data for traffic analysis

    The city's Department of Transportation has been reusing RFID data from E-ZPass readers to manage city’s traffic nightmares.

  • graffitti

    Police seeing results with anti-gang software

    Atlanta's collaborative intelligence-sharing system tracks cases, alerts investigators to potential links between incidents and has nearly doubled the rate of indictments.

  • library

    Large-scale pilot to get a read on Super Wi-Fi

    The far-reaching technology, which uses white spaces in the TV broadcast spectrum, could be key in bringing wireless service to underserved areas.

  • Tableau

    Visual analytics help Florida tell the story of juvenile justice reform

    The state's Department of Juvenile Justice uses Tableau Software for an interactive view of juvenile programs that can be filtered from the statewide to county level.

  • scam

    Officials warn of spoofed health exchange websites

    The look-alike Web pages may be created by interest groups, private insurance companies and, sometimes, scammers looking to gather personal information.

  • Newport Beach

    Newport Beach's documents now go with the flow

    The California city uses Laserfiche 8 to automate the flow of 3 million pages of documents.

  • View of cell tower from behind barbed wire fence

    Managing cellular access means really managing it, sometimes daily

    A system to block contraband cell phones in prisons must be continually tuned to ensure that it covers the required footprint but does not step out of bounds.

  • Early surveyors in Alaska

    Digital mapping reaches the Last Frontier

    USGS and Alaska spearhead an effort to digitally remap topographical features of the state to benefit transportation planning, climate change science and emergency response.

  • Parchman

    Prisons get a new way to stop inmates from using cell phones

    A system from Tecore Networks lets prisons establish their own cellular base stations so they can keep prisoners from using illegal phones while giving legitimate users access.

  • PSIM

    Tech, tactics behind CitiWatch’s large-scale video surveillance system

    A video surveillance system that combines thousands of cameras requires more than technology to be effective.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • GameChanger: NoSQL

    Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.

  • The Power of Analytics for the Public Sector

    Agencies face the difficulty of managing the increasing complexity of the “information explosion”. Adopting analytics can help solve these issues and achieve desirable outcomes. Read this white paper and see how analytics solutions can help the Government evaluate excess data and unlock insights to create better informed decisions.

  • i2 Intelligence Analysis Platform

    IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.