A federal initiative to help departments purchase 50,000 body cameras for police in the wake of recent high-profile incidents of police violence is only the first step in creating a full video system. Departments will have to store and manage terabytes of data for years, sometimes decades.
Government IT departments will increasingly turn to data warehouse augmentation tools and tactics in 2015 to address their big data management challenges.
Researchers are developing set of data management tools that could be used across the scientific community.
Veterans Affairs launches a pilot project to test uses of IBM Watson analytics to help doctors sift electronic medical records to support clinical decision-making in treating PTSD.
National Coordinator for Health IT's draft five-year plan outlines expanded health information sharing through mobile, sensor and analytics technologies.
Apple and IBM unveiled IBM MobileFirst for iOS, the first apps from a joint venture designed to offer business-specific, cloud-supported data and analytics capabilities on Apple devices.
The General Services Administration has created a list of developing technologies that could be incorporated into GSA's Alliant I and Alliant II government-wide acquisition contracts.
The National Geospatial-Intelligence Agency launched its Map of the World within Amazon Web Services’ Commercial Cloud Services (C2S) environment.
The use of social media as a public outreach and data collection tool is now actively promoted by government agencies. But do the data samples paint an accurate representation of public sentiment?
Plenario lets users assemble information from open data portals and analyze it via a single spatial and temporal index, making it possible to do complex analysis with one query.
Tableau’s business intelligence tools enable near-real-time “what if” data visualizations and allow users to share analytics in a collaborative environment.
The National Security Agency released an open source software product that automates data flows among multiple computer networks, even when data formats and protocols differ.
A recent survey claims that most, if not all, of the rise in sophisticated, targeted attacks from the outside is due to exploitation of privileged accounts.
Developed for the 1990 population count, the Census Bureau’s TIGER data sets are still in demand as geospatial base data for new government and commercial mapping programs and applications.