article thumbnail

Mass Attacks in Public Spaces, 2016-2020

Disaster Zone blog

Compiled by the Department of Homeland Security

Security 100
article thumbnail

National Research Center Exclusive Interview with CPBB Co-Founder Chris Fabian for the 2016 (Un)Conference

PBB Center for Priority Based Budgeting

Click here for more information on the 2016 CPBB (Un)Conference. Just one week away from the highly anticipated 2016 CPBB Conference, NRC’s Angelica Wedell gets the scoop on the conference and the power of priority in this exclusive interview with the Center for Priority Based Budgeting (CPBB) Co-founder Chris Fabian.

article thumbnail

4 Things You'll Learn About Data, Leadership + Budgeting at the CPBB 2016 (Un)Conference!

PBB Center for Priority Based Budgeting

The Center for Priority Based Budgeting 2016 "Prioritized World" (Un)Conference is just over a month away. The 2016 CPBB Unconference is going to be our biggest and most dynamic event to date! Last year NRC engaged at our 2015 conference (and is a sponsor of the 2016 conference). But don't just take our word for it.

article thumbnail

Five Ways to Run an Effective Solid Waste Collection Operation

NLC (National League of Cities)

In 2016, RUBICONSmartCity™ was launched with the goal of empowering local governments to maximize the potential and efficiency of city fleets while cutting […] Source

article thumbnail

Quantum Cryptography Challenges and Opportunities for Federal Agencies

FedTech Magazine

In 2016, the National Institute of Standards and Technology asked experts to develop quantum-resistant public-key cryptographic algorithms algorithms that could be standardized for use in protecting sensitive government information. Five years later, in July 2022, the top four candidates were announced.

article thumbnail

Q&A: Innovation Official Marquis Willis on Why Little Rock Is a Smart City to Watch

State Tech Magazine

Through an open-data hub the city launched in 2016, residents can access charts and other resources highlighting information ranging from the number of licenses that have been issued for various types of businesses to recent attendance at the Little Rock Zoo. Web-based data analysis and visualization tools are helping Little Rock, Ark.,

98
article thumbnail

Pick Out Threats in Federal Networks With IP Packet Capture

FedTech Magazine

Federal government cybersecurity breaches rose by 453 percent between fiscal years 2016 and 2021, according to the Government Accountability Office. To combat and overcome these threats, federal IT administrators can use IP packet capture to examine network traffic for security threats using Microsoft Network Monitor (Netmon).