State & Local

 
  • big data

    Pentaho blends data at the source for better decision-making

    Pentaho Business Analytics 5.0 provides an open, unified platform to access, integrate and blend any data, in any environment, across a full spectrum of analytics.

  • ID

    5 pilots to take trusted online ID plan to the next stage

    The NSTIC programs, which received more than $7 million in grants, range from military, civilian and commercial authentication initiatives to one aimed at protecting children’s privacy online.

  • eyes

    Biometric ID coming to a government office near you

    This week's Biometric Consortium Conference showcases a wide range of hardware and software solutions for personal identification/authentication applications in government.

  • Haiti

    Disaster response simulation shows how to share cloud-based geospatial data

    NGA-backed consortium demonstrates show how hybrid, geospatial clouds can be assembled for disaster response.

  • traffic

    New York redirects E-ZPass data for traffic analysis

    The city's Department of Transportation has been reusing RFID data from E-ZPass readers to manage city’s traffic nightmares.

  • graffitti

    Police seeing results with anti-gang software

    Atlanta's collaborative intelligence-sharing system tracks cases, alerts investigators to potential links between incidents and has nearly doubled the rate of indictments.

  • library

    Large-scale pilot to get a read on Super Wi-Fi

    The far-reaching technology, which uses white spaces in the TV broadcast spectrum, could be key in bringing wireless service to underserved areas.

  • Tableau

    Visual analytics help Florida tell the story of juvenile justice reform

    The state's Department of Juvenile Justice uses Tableau Software for an interactive view of juvenile programs that can be filtered from the statewide to county level.

  • scam

    Officials warn of spoofed health exchange websites

    The look-alike Web pages may be created by interest groups, private insurance companies and, sometimes, scammers looking to gather personal information.

  • Newport Beach

    Newport Beach's documents now go with the flow

    The California city uses Laserfiche 8 to automate the flow of 3 million pages of documents.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • GameChanger: NoSQL

    Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.

  • The Power of Analytics for the Public Sector

    Agencies face the difficulty of managing the increasing complexity of the “information explosion”. Adopting analytics can help solve these issues and achieve desirable outcomes. Read this white paper and see how analytics solutions can help the Government evaluate excess data and unlock insights to create better informed decisions.

  • i2 Intelligence Analysis Platform

    IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.