An effective data analytics strategy requires a deep understand of the tools, processes and people involved.
Massive volumes of fragmented information are now available for the kind of deep-pattern analysis originally reserved for numerical databases.
The Defense Department must ensure that cloud-based data can be transferred across classification levels and accessed by only the right people, with the right authorization at the right times.
While legitimate fears about data vulnerability have limited agencies' attempts to share information, some are turning to new cryptographic techniques to protect privacy while data is processed.
Furloughed IT staff and overburdened security teams create opportunities for malicious and negligent insider attacks.
Transforming the delivery of citizen services, increasing cybersecurity and supporting automation are essential to meeting the administration’s goals for modernization.
By moving toward a cloud-based unified communications system, agencies can make an instant impact that will provide immediate results and serve as a jumping off point for larger modernization efforts.
As easy targets with high value, cities often fall victim to phishing attacks launched from common applications, such as Acrobat Reader, Microsoft Word and Chrome.
A high-stakes policy debate among automakers, governments and telecommunications firms over the spectrum for vehicle-to-everything communications may eventually be solved by market forces.
To avoid losing 3D leadership and bring manufacturing back home, the federal government must commit to building a 3D ecosystem, creating incentives and nurturing future talent.