How the Cloud Powers Consolidation With Data Lakes, Data Hubs
For a growing number of agencies, cloud computing provides the elasticity and scale needed to correctly consolidate data.
For a growing number of agencies, cloud computing provides the elasticity and scale needed to correctly consolidate data.
State and local governments are trapped in the past by a mix of compliance, monetary and resource constraints when it comes to payment processing.
Employee-initiated spending involves any purchase an employee makes on an agency’s behalf without a traditional purchase order process.
Governments can catch up to the private sector by modernizing their online services, web presence and communications strategies.
Communities need to learn to think GIS first to drive long-term decision-making and planning by implementing data-driven decisions and collaboration with geodesign.
Cloud isn’t one-size-fits-all for governments. State and local agencies, for example, often have distinct budgets, needs and workforces.
When creating a procurement chatbot (or any chatbot, for that matter), you need to have specific end goals in mind. We had three main goals for our IT procurement chatbot, PAIGE, that was designed to streamline the procurement process for state and local governments.
Everywhere you look, government agencies are juggling a number of IT modernization initiatives. Introducing new technology is exciting and leads to better services for constituents, but it can also be extremely challenging to implement for many reasons.
Governments of all sizes have created data and analytics departments to assess what they have, coordinate communication between agencies and report stories that the numbers show.
This article is an excerpt from GovLoop’s recent report titled “Your Guide to Key Advancements in Government Cybersecurity.” Download the full report here. A cyberthreat against one is a cyberthreat against all, especially for state and local governments. They are increasingly uniting against their common enemies to boost their mutual cybersecurity postures. And the foes areRead… Read more »