Modernization For — and With — AI
You can’t have an AI strategy without a data strategy, says Matthew Rose of Snowflake. To be ready for AI, you need an ecosystem for data.
You can’t have an AI strategy without a data strategy, says Matthew Rose of Snowflake. To be ready for AI, you need an ecosystem for data.
Discover how enterprise technology can evolve from tactical AI use to strategic success, using the AI factory model. Learn how to overcome data-quality and other obstacles, and explore tips for better collaboration and outcomes.
While the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence focused attention on AI, it also brought the biotech conversation to the forefront for all government entities.
Curious about how your agency can stay ahead in a rapidly changing world? Check out these fresh ideas on how to future-proof your organization.
Qualitative and quantitative data serve distinct purposes and work best when considered together.
Initiating an equity strategy in Tucson would require cross-departmental collaboration and deep public engagement. The new chief equity officer had to make a nuanced and complicated topic — equity — approachable and easy to understand. By establishing an authoritative source of data, the Office of Equity created a strategic way to understand vulnerable communities.
AI-powered knowledge graphs can enhance interagency collaboration by mapping and visualizing relationships between diverse data sources.
Artificial intelligence is revolutionizing the way governments interact with citizens. From streamlining operations to enhancing citizen experiences, AI offers unprecedented opportunities to improve service delivery.
As agencies embark on data-driven journeys and begin embracing AI, it’s critical to understand their data networks and the gravity that agencies can create by identifying, mobilizing and harnessing more data into how they operate.
This will be the first in a short series on ways to protect end-user identities when collecting feedback or testing products. As many of us become more proficient in cybersecurity best practices, it’s crucial that we don’t forget some of the low-tech ways that we can keep identities secure and maintain trust.
Notifications