What It Takes to Move AI From Pilot Phase to Full Deployment
In this video interview, Adam Clater, a Chief Architect at Red Hat, discusses how agencies can advance their AI maturity.
In this video interview, Adam Clater, a Chief Architect at Red Hat, discusses how agencies can advance their AI maturity.
Effective cybersecurity does not happen by chance. It’s supported by three foundational building blocks, says Idaho CIO Jerred Edgar. Learn from his real-world experience successfully developing Building Block #3: Collaborating on Collective Defense.
Cybersecurity that can withstand threats comes down to three foundational building blocks, said Idaho CIO Jerred Edgar. Read on for his advice, based on his Army experiences — for tackling Building Block #2: Fostering Trust Among Stakeholders.
Agentic AI has the potential to transform how government responds to constituent needs — but state and local officials aren’t getting caught in the hype. Hear how Tennessee’s CIO explains her state’s careful, responsible path to incorporating agentic AI into state systems.
Strong cybersecurity comes down to three foundational building blocks, explains Idaho CIO (and Army Veteran) Jerred Edgar. Read on to learn more — including how to develop Building Block #1: Executing with Competence.
In this video interview, John Chao, Director of Federal Products at Seekr, discusses how agencies can achieve defensible AI and adopt AI with greater confidence.
In this video interview, Jason Henley, Global Head of Product Strategy at TIBCO, discusses how a unified data platform can help agencies reduce the complexity of real-time data operations.
In this video interview, Laserfiche’s Andy MacIsaac discusses how AI can expand the impact and effectiveness of content management initiatives.
In this video, Iron Mountain’s Fred Pulzello and Ronald Sodano discuss how better information governance can strengthen AI strategies.
Agencies use an array of technologies to protect their facilities and campuses, including cameras, access control systems, and notification and dispatch systems. In theory, those systems enable security staff to conduct continuous surveillance and to detect and respond quickly to potential risks. The problem is one of scale: Agencies can have hundreds or even thousandsRead… Read more »