- Welcome Guest
- Sign In
The Obama administration and the private sector -- often at odds over the regulation of everything from telecom issues to software protection to the environment -- apparently agree that a major issue dealing with cybersecurity should be addressed on a cooperative basis, largely free of federal regulation ...
The U.S. Defense Department last month adopted a set of final rules covering the detection and avoidance of counterfeit electronic parts in the federal supply chain. The rules affect a wide swath of information technology firms that supply electronic components to the department, including software in some cases ...
Information technology groups and a wide range of other businesses are so divided on proposed changes to U.S. patent law that a key U.S. lawmaker abruptly terminated work on patent reform legislation last week. The legislation addresses intellectual property protection practices, informally known as "patent trolling," that overwhelmingly affect computer software and IT components...
The U.S. government could save billions of dollars in the management of information technology resources by significantly improving outdated and overworked networks. ...
Protecting supply lines is essential to military success. But the U.S. government has now launched an initiative designed to protect the supply chain of both civilian and military agencies from potential cyberattacks. ...
A major federal agency has launched a program designed to acquire information technology and other essential goods and services for the government the same way that major corporations handle procurement ...
The use and scope of information technology has grown dramatically since 2000 -- and along with that growth have come ever greater cybersecurity threats to businesses, government agencies and consumers ...
The allure of Big Data stems from the ability to use advanced technology to manage and manipulate huge amounts of information. Not only that, Big Data offers the opportunity for unlocking information not previously available, and even not previously knowable ...
With the emergence of the Big Data era, technology developers see major benefits in the ability to manage huge volumes of information. However, with an onslaught of data breaches such as the recent hacking of the Target retail chain, consumers and their representatives in government are increasingly nervous about bigger threats to privacy ...
Federal information technology managers are as intrigued as any other IT community by the potential benefits from IT innovations. However, many federal managers continue to face challenges in adopting innovative technologies. ...
There you are, strolling down the coffee and tea aisle at the supermarket when you get an alert on your smartphone that you can get extra points in the store's reward program if you purchase a certain brand of coffee. Are you annoyed -- or perhaps really vexed -- that you have been tracked with such precision that the merchant knows not only that you are in the store -- but also which food aisle you are in? Or are you pleased to take advantage of the extra reward points? ...
Cloud computing has ushered in an emphasis on service-oriented, on-demand information technology in the federal market. The shift from acquiring hard assets, such as computers, servers and even mobile devices, as well as software packages installed on those assets, has been gradual. However, the process has reached a point that it requires more attention from the vendor community...
The U.S. government will be a prime target for mobile information technology vendors offering a variety of devices, associated telecom services, and mobile management assistance over the next several years. By 2017, annual federal spending on a wide range of mobile IT capabilities could approach US$10 billion ...
Federal agencies have been diligently pursuing the use of cloud-based information technology for the past three years in compliance with a White House directive. As a result, federal spending on cloud-based technologies reached US$2.3 billion in fiscal 2013, according to a market assessment by Deltek. ...
U.S. government agencies are moving briskly into the mobile era, spurred by the fast pace of technological change. The scope of the federal mobile market is broad-based, and to some degree depends upon what is meant by such terms as "wireless," "mobility" and "digital." ...
The explosion of the Internet of Things promises great opportunities for improving quality of life -- but also for creating both seen and unforeseen dangers ...
U.S. government agencies have faced significant obstacles in meeting a federal mandate designed to foster the use of cloud technologies, but those challenges are unlikely to derail federal adoption of the technology, and there are indications that cloud deployments will accelerate at a much faster rate over the next few years ...
Federal agencies spend considerable portions of their budgets on their legal offices. For example, the U.S. Department of Justice awarded a US$1.1 billion multiyear contract in 2013 for a wide range of information technologies and legal support services ...
Federal employees quickly have become strong adherents of mobile devices. In a recent survey, 90 percent of government employees said they used at least one mobile device -- laptop, smartphone or tablet -- for work purposes. ...
The widespread problems in implementing the Affordable Care Act have provided some momentum to the efforts by the Obama administration and Congress to ratchet up reforms in the management and procurement of information technology at the federal level ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide