Exec Tech


Shutterstock image ID  448228297 credit Avo

Should robots kill?

Over 100 robotics and artificial intelligence experts worldwide warned the United Nations about a future of war that includes autonomous killing machines.

A climate measuring station in Oliktok Point, Alaska

Drones and weather balloons team up in Arctic tests

A national laboratory paired drones and weather balloons to try to improve Arctic weather data collection.

Shutterstock image: filing cabinets.

Managing the risks of data sprawl

A formalized risk framework can help agencies gain control of their entire information lifecycle.

Shutterstock image (by wk1003mike): cloud system fracture.

Does the IRS have a cloud strategy?

Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

Shutterstock image: illuminated connections between devices.

Who won what in EIS

The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

ODNI logo

Trump names top IC CIO

CIA open source leader John Sherman has been tapped to serve as CIO of the intelligence community.

Shutterstock image (by Laborant): clear magnifying glass, blurred binary code.

Watchdog dings DHS data efforts

The Department of Homeland Security needs to do a better job implementing its data strategy, says the agency's inspector general.

Shutterstock image: circuitry of a digital brain.

Gartner explains the hype

Blockchain, AI and IoT all have the potential to transform government IT, the research firm's latest analysis predicts.

Wikimedia Image: U.S. Cyber Command logo.

Trump elevates CyberCom to combatant command status

The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

Shutterstock image. Copyright: Lightspring

Accelerating IT modernization

It's not the money, it's the outcome that matters most when it comes to MGT.

broken lock

Dems want more data on FCC DDoS attacks

As the net neutrality debate heats up, a two lawmakers want more details on a reported attempt to disrupt the FCC's commenting system back in May.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

How data mining can help chase sex traffickers

To aid law enforcement, researchers developed automated data mining techniques that can identify human traffickers by linking bitcoin, online advertisements and writing style.