Government Technology

    Digital Communities
    Industry Members

  • Click sponsor logos for whitepapers, case studies, and best practices.
  • McAfee

Adam Stone

Contributing Writer

Twitter: @dcommunities

Recent Articles

Cyberinsurance: Do You Need It?
February 27, 2014 - Not everyone's convinced of the value, but public CIOs must be involved in the decision.

Emergency Agencies Prepare for Cyberbreaches to 911 Systems
January 21, 2014 - Emergency managers are increasingly concerned about cyberattacks on 911 and other public safety systems.

Baltimore Builds a Data Dictionary
November 25, 2013 - By collecting and collating disparate data, government agencies are creating information repositories to assist decision-making.

Oregon Health Insurance Exchange Is Powered by Design Thinking
September 24, 2013 - With the launch of Cover Oregon, state officials expect their commitment to design thinking to pay off.

Video Helped Capture the Boston Bombing Suspects, But Is it Preventive?
July 11, 2013 - Video footage can help unravel an event and catch the perpetrators, but some say the presence of cameras could deter acts of violence.

Single-Vendor Purchasing for Data Centers
June 19, 2013 - Proponents say vertical stacking simplifies your data center - but will you be locked in?

Creating an Innovative Government Environment
May 02, 2013 - Failure to change will leave government shackled to the status quo. Here are some ideas for changing your cultural mindset.

What Happened to IPv6?
March 28, 2013 - After much hype and anticipation about the move to IPv6, it seems to have dropped off the radar - but that doesn't mean governments can afford to ignore the change.

Using Social Media to Enhance Situational Awareness
January 04, 2013 - Listening to relevant posts from the public on social media platforms helps governments drive action and respond to emergencies.

High-Tech Campaigns Face New Security Risks
June 29, 2012 - The Web makes it easy to collect campaign cash, but raises the risk of phishing, hacking and data theft.

PREV 1 | 2 | 3 | 4 | 5 NEXT