Government IT - News, Features, and Slideshows
The Internal Revenue Service, which disclosed this week the breach of 100,000 taxpayer accounts, has been steadily reducing the size of its internal cybersecurity staff as it increases its security spending. This may seem paradoxical, but one observer suggested it could signal a shift to outsourcing.
By Patrick Thibodeau | 29 May, 2015 00:32
Former US Secretary of State Hillary Clinton said Tuesday that, in hindsight, her decision to use a private email server to conduct official business was not the best one. But she is defending it and said the system was secure.
By Patrick Thibodeau | 11 March, 2015 07:52
A week before former Secretary of State Hillary Clinton was sworn into office in January 2009, clintonemail.com was registered as domain. It became Clinton's principal email address as secretary of state, and its use was known by U.S. officials.
By Patrick Thibodeau | 09 March, 2015 22:57
There are many questions regarding former Secretary of State Hillary Clinton's use of her private email to conduct official business. A leading one is whether the department's IT managers did anything to question or stop it.
By Patrick Thibodeau | 06 March, 2015 08:19
Steven Spielberg's biopic, Lincoln, included a famous line President Lincoln may or not have said: "I am the President of the United States, clothed with immense power." That description might apply today to D.J. Patil.
By Patrick Thibodeau | 21 February, 2015 02:09
Ever since President Obama signed the Open Data Executive Order, government agencies have been making their vast data stores available to the public. These once-secret data sets are proving a valuable business resource, too.
By Cindy Waxer | 24 March, 2014 10:37
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
By Jaikumar Vijayan | 23 January, 2014 19:45
The NSA is spending some $80 million in basic research on quantum computing, money that may ultimately help commercialize quantum computing for the private sector.
By Patrick Thibodeau | 04 January, 2014 15:27
CGI Federal, the lead contractor at Healthcare.gov, is a veritable black belt in software development, with the highest possible certification from CMMI. So what does the website's flawed rollout say about how useful CMMI is?
By Patrick Thibodeau | 30 December, 2013 11:55
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- FT.NET DeveloperVIC
- CCHybris Developer - Global Digital AgencyNSW
- FT.NET Tech LeadVIC
- CCContract Analyst Programmer (SQL/Oracle/.Net) 160129/AP/vhs-bAsia
- CCAD and FIM EngineerNSW
- CCJunior .NET DeveloperQLD
- FTSystems Administrator/Engineer | $60-90K package | Northern BeachesNSW
- FTSenior Unified Communications Consultant - National IT ServicesNSW
- CCWintel Support EngineerNSW
- CCMultiple Middleware DevelopersACT
- CC.NET DeveloperACT
- FTSOE EngineerQLD
- CCSenior Systems Engineer - SCOM/SCCM/PowerShellVIC
- CCApplication Support AnalystNSW
- CCTest AnalystACT
- FTSolution ArchitectNSW
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsVIC
- FTIT Technical LeadVIC
- CCService Desk ManagerVIC
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- CCApplications DeveloperQLD
- CCMid to Senior Level User Experience SpecialistsNSW
- FTJava or Ruby Web DeveloperVIC
- FTMobile Designer / Developer - IOSNSW
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Modular cellphone kit can be used for IoT and wearables
- Dragula looks to take the bite out of drag-and-drop
- Mozilla sets kill date for Firefox OS on phones
- LTE-U’s cold war may be thawing, as field testing commences ahead of summit
- Now that AI has mastered 'Go,' are all our jobs next?
- Make a $40 Linux or Android PC with new Raspberry Pi 2 rival
- Researcher finds serious flaw in Chromium-based Avast SafeZone browser
- Fed up with bogus computer support calls, man turns tables on scammers
- Dridex banking malware mysteriously hijacked to distribute antivirus program
- SamsaraJS: Famo.us fork juices mobile Web UIs
- UN panel backs WikiLeaks' Julian Assange, but he may not go free
- The Neutrino exploit kit has a new way to detect security researchers
- 7 smartphone trends to watch this year
- What businesses need to know about Privacy Shield
- Box makes it easier for businesses to control encryption of cloud data