IT Modernization

Embracing Human-Centered Design in Government Software Development

Human-centered design (HCD) is an IT modernization practice that incorporates tangible user feedback to ensure that technologies meet the needs of users. It prioritizes the needs, behaviors, and experiences of users throughout the software development lifecycle.

Harnessing Lean Enterprise and Continuous Innovation: How to Avoid Being the Next Organizational Dinosaur

In today’s fast-paced world, clinging to outdated processes is a fast track to organizational irrelevance. For government executives, embracing lean enterprise principles and continuous innovation isn’t just a nice-to-have—it’s essential for driving impact, efficiency, and public trust.

Chatbot

What You Need to Know About Bots and CX

Chatbots have grown in popularity for good reason: They’re friendly, helpful, and make information readily available. The benefits are arguably even more significant in government applications. They’ve become a reliable tool for delivering constituent services while saving agencies time and resources. In a recent CX Community of Practice, What You Need to Know About BotsRead… Read more »

How to Use Data, Training to Maximize AI

Data Is the Heart of AI

In the public sector, challenges persist with data sourcing, sharing, training and determining the best ways to use AI. As a result, government agencies continue to tread cautiously while still establishing use cases. The Office of Naval Research is no exception, and Director and Chief Analytics Officer James Valverde Jr. acknowledged it’s impossible to talkRead… Read more »

Animated newspaper with headline that states, "More High-Profile Cyber Attacks".

The App Security Imperative: Closing the Cyber Gap

Application security is imperative in all phases of your agency’s software lifecycle, from design to deployment. That means you must continue to find new and better ways to embed security testing to reduce the risk of cyberattacks and protect your organization’s data. Recently, a rash of high-profile cyberattacks has exploited weaknesses in the elements usedRead… Read more »