Most federal agencies are somewhere in the process of their transition to the Windows 10 operating system, and you’ve probably heard about the benefits from on high, not least of which is better security. But what does that mean for the end user?
Posts Tagged: Computer
Like all technology, web browsers constantly evolve. Using an outdated web browser not only makes you vulnerable to viruses and other security risks—it also gives you a subpar internet experience, not unlike watching TV in black and white.
Recently EEOC share BYOD successes with Federal Technology Insider and we’ve tapped into other sources that best practices. Yet, private sector seems to be keeping projects under wraps. Want to know a Bring Your Own Device (BYOD) secret? Good luck gaining any insight from corporations. While these organizations are generally considered to be further along… Read more »
By: Grant Asplund Originally posted on Federal Blue Print In an age where technology is changing in the blink of an eye, there is one thing we know for certain: social media applications and networks are here to stay. While old technologies such as voice and instant messenger persist, more and more agencies are integrating… Read more »
There’s bound to be plenty of talk about what we are thankful for this week as we approach Thanksgiving and the holiday season, so I wanted to share a project that we’ve been working on at HP that I’m extremely thankful for. We’ve been lucky enough to connect with NBC’s new show “School Pride” to… Read more »
I recently spent a week in beautiful Tampa, Florida for the U.S. Army’s premier information technology conference and showcase – the Armed Forces Communications and Electronics Association’s (AFCEA) LandWarNet. The show floor was buzzing this year, with more than 9,000 government and industry attendees and more than 300 exhibits. I caught up with Becky Nolan,… Read more »
Earlier this month, NextGov’s Bob Brewin wrote about the Department of Veterans Affairs’ plans for an extensive PC refresh cycle that translates to millions in spending to improve the agency’s technological infrastructure. In Brewin’s article, he notes that “the department owns about 240,000 PCs. The new contract will provide an additional 360,000 computers to supply… Read more »
Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwords… Read more »
Author’s Note: I wrote this originally a year ago fresh into my Mac era. It was rough! I’ve evolved a bit since then and, perhaps it is the cult of Mac, but things are fairing much better now. #gofigure – to borrow from Twitter: GIVE ME THE WORKS So I foolishly bought a Mac computer… Read more »
Technology in Law Enforcement? I was having a conversation the other day with a newly appointed Chief of Police, Ray Douglas, from a small town close to Memphis. This newly sworn-in Chief was going through the process of determining what capabilities his staff had and what they lacked. During my conversation with Ray, I asked… Read more »