- Welcome Guest
- Sign In
U.S. government agencies can significantly improve their ability to deal with cybersecurity problems by utilizing big data analytics. However, agencies are finding it difficult to fully benefit from these advanced analytical tools for a variety of reasons -- including dealing with the sheer volume of data, which will only keep growing ...
The U.S. Supreme Court last month granted a request from Spokeo, a data aggregator, to consider whether the legal basis litigants must meet to file a claim in federal court should be broadly or narrowly defined. ...
The old clich about the difficulty of turning an aircraft carrier around applies to changing the way government deals with investing in information technology, according to two recent reports ...
The dynamic world of information technology calls for a future-oriented approach to IT management. However, government agencies too often may be looking backward rather than forward with respect to how they operate IT systems, especially when it comes to investing huge sums of taxpayer money into those resources ...
The U.S. Federal Trade Commission, which is at the forefront of regulating the impact of information technology on consumers, is bolstering its technical resource capabilities through a new Office of Technology Research and Investigation, or OTRI ...
All major U.S. government agencies employ a chief technology officer who generally deals with the management of information technology resources including hardware, software, cybersecurity and the mechanics of the digital world ...
The U.S. government spends tens of billions of dollars each year just to make sure that computer and data processing systems keep functioning on a day-to-day basis. With so much investment allocated for operations and maintenance of legacy systems, it makes sense that far fewer dollars are available for cutting-edge information technology investment -- also known as "development, modernization and enhancement" spending...
The U.S. government will increase spending on information technology for the third year in a row, if the Obama administration's proposed 2016 fiscal year budget is passed. The fiscal year begins on Oct. 1 ...
The observation that "80 percent of life is just showing up," generally attributed to comedian Woody Allen, has morphed into the admonition that "80 percent of success is just showing up." ...
The major headline hacking event of 2014 involved data theft at a highly visible enterprise: Sony Pictures ...
A major information technology trend within the U.S. government is the gradual -- and apparently inexorable -- migration of federal IT resources to cloud platforms. As the potential for federal cloud adoption has grown, vendors have intensified their marketing and improved their offerings to meet the emerging IT requirements of government agencies ...
Just how close is 'too close for comfort' in the unprecedented connectivity of people, products and electronic communication that lies ahead with the Internet of Things? Should the providers of electronic devices be allowed to know when you set your house thermometer, or how often and how long you go for a jog using a 'wearable' electronic exercise sensor?...
The future explosion in e-commerce connectivity of all manner of electronic devices, sensors, and consumer products -- known as the Internet of Things (IoT) -- will pose a major challenge to ensure that IoT data is secure and that personal privacy is protected. The global "installed and connected base" of IoT units will reach approximately 30 billion in 2020, noted IDC in a November 2014 report...
"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week ...
As members of the U.S. Congress started to prepare for the upcoming legislative session, President Obama lost little time in putting cybersecurity near the top of a to-do list for lawmakers. During a visit to the federal National Cybersecurity Communications Integration Center, Obama called for additional legislation to improve information technology protection...
The explosion in the use of mobile devices in the United States is posing a major challenge for the federal government to provide public access to agencies via wireless channels. In an effort to keep pace with technology, the U.S. government launched the Digital Government Strategy in May 2012 with the goal of providing citizen access to federal services and information anywhere, anytime, on any device.
Information technology providers who market to the federal government got some holiday cheer as the U.S. Congress and the White House approved legislation to improve the way the government acquires IT equipment and services. The reforms are significant and welcome, and no doubt will facilitate the marketing of IT to federal agencies. ...
The political spotlight in Washington was on congressional approval of the 2015 budget before legislators broke for the holidays, but a less volatile proposal also was passed in the closing days of the session -- one of considerable importance to the information technology sector ...
The U.S. government will remain a steady and significant customer for information technology providers over the next several years. That's the good news for vendors. For the foreseeable future, though, the days of ever-growing federal spending for IT are over ...
Federal agencies will be keeping a sharp eye on how much they spend on information technology over the next several years, as budgets will remain tight. In order to deal effectively with tighter budgets, IT providers to the government will have to understand the complex contracting procedures federal agencies will use to maintain discipline in spending.
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide