Posts Tagged: Computer

BYOD Successes? Private Sector Keeps It Under Wraps; Agencies Share

Recently EEOC share BYOD successes with Federal Technology Insider and we’ve tapped into other sources that best practices. Yet, private sector seems to be keeping projects under wraps. Want to know a Bring Your Own Device (BYOD) secret? Good luck gaining any insight from corporations. While these organizations are generally considered to be further alongRead… Read more »

Social Networks: If You Build It, Will they Come?

By: Grant Asplund Originally posted on Federal Blue Print In an age where technology is changing in the blink of an eye, there is one thing we know for certain: social media applications and networks are here to stay. While old technologies such as voice and instant messenger persist, more and more agencies are integratingRead… Read more »

Giving Thanks for School Pride

There’s bound to be plenty of talk about what we are thankful for this week as we approach Thanksgiving and the holiday season, so I wanted to share a project that we’ve been working on at HP that I’m extremely thankful for. We’ve been lucky enough to connect with NBC’s new show “School Pride” toRead… Read more »

LandWarNet – Military and Government Technology

I recently spent a week in beautiful Tampa, Florida for the U.S. Army’s premier information technology conference and showcase – the Armed Forces Communications and Electronics Association’s (AFCEA) LandWarNet. The show floor was buzzing this year, with more than 9,000 government and industry attendees and more than 300 exhibits. I caught up with Becky Nolan,Read… Read more »

PC Refresh Cycle ready to touch down in government?

Earlier this month, NextGov’s Bob Brewin wrote about the Department of Veterans Affairs’ plans for an extensive PC refresh cycle that translates to millions in spending to improve the agency’s technological infrastructure. In Brewin’s article, he notes that “the department owns about 240,000 PCs. The new contract will provide an additional 360,000 computers to supplyRead… Read more »

HOW to unlock programs, financials, databases, etc without passcodes/ passwords/user names???

Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwordsRead… Read more »

Technology in Law Enforcement. What about Web 2.0?

Technology in Law Enforcement? I was having a conversation the other day with a newly appointed Chief of Police, Ray Douglas, from a small town close to Memphis. This newly sworn-in Chief was going through the process of determining what capabilities his staff had and what they lacked. During my conversation with Ray, I askedRead… Read more »