Exec Tech


Shutterstock image: data lines forming a sphere.

What do 800,000 people have to say on net neutrality?

The Sunlight Foundation has teased patterns and sentiments from the FCC's massive data set of net neutrality public comments.

Shutterstock image: social media conversation.

Can social media analytics and open data pair up?

Broader access to Twitter analytics could aid government in reaching out to and serving citizens on social media.

 Shutterstock image: global health.

Task force taps the brakes on interoperability

The seamless transfer of health data could mean large incumbent providers lose market advantage and the ability to act as information gatekeepers.

Rana Lahiri and Mark DeRosa.

How data analytics can improve real property management

Real estate is a massive (and complicated) part of agency operations. Leading-edge analytics help make the most of existing footprints.

Heartbleed Logo

Huge Heartbleed data theft logged

An FBI warning says an attacker is targeting personal data and valuable intellectual property, such as information related to the development of medical devices and equipment.

McClureillo

McClure to Veris, Microsoft in court, tech transfer at Los Alamos and more

News and notes from around the federal IT community.

Shutterstock image: executive connecting individuals to one another.

USDS additions, Google dorking and more

News and notes from around the federal IT community.

IEEE Center for Secure Design report.

Defective by design?

IEEE's Computer Society Center for Secure Design has identified a number of security concerns for software architects to recognize and avoid.

ships at sea

Tactical clouds, techie politicians and better bandwidth for the troops

News and notes from around the federal IT community.

Wikimedia image: Energy Star logo.

600 million reasons to embrace Energy Star

Congress may mandate more data center efficiency, but CIOs shouldn't wait.

TSA airport screener

PreCheck, Global Entry programs pass milestones

TSA continues to expand traveler programs and work through data hiccups.

Shutterstock image: traffic light.

Traffic cybersecurity gets a red light

Researchers have demonstrated relatively easy access to networked traffic systems.