This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
SHOW NOTES This is the 9th magazine style episode and it’s a little different than the others. HOSTS CURT JACKSON CHRIS KALLAL The post SCP 193: Magazine Style Episode #9 (A.I. The post SCP 193: Magazine Style Episode #9 (A.I. Because the ideas the guys talk about are A.I. generated…and many of them are REALLY good.
According to CPO Magazine, Internet of Things has been “the primary force behind the biggest distributed denial of service (DDoS) botnet attacks for some time.” The era of bots has arrived. This risk is reflected in recent attack efforts.
The library had just recently created a Library of Things as well as completed a reorganization of our collection and the creation of a space called the Library Lounge with tables and cozy reading chairs as well as a newspaper and magazine collection.
When Hurricane Helene took out power and cellular communication across western North Carolina, first responders were able to stay connected using the state’s VIPER system, a radio infrastructure that leverages Motorola’s ASTRO P25 radio systems.
PA TIMES Magazine is a publication of the American Society for Public Administration (ASPA), a not-for-profit corporation. This edition focused on diversity, equity and inclusion in public administration, including guest columns, insights for the field and interviews with city government DEI officers about their work at the local level.
Cyberattacks targeting state and local power grids, communication systems, transportation networks, and other critical U.S. infrastructure have risen dramatically in recent months. These attacks, frequently attributed to foreign threat actors from countries such as China or Iran, pose risks for state and local governments.
In early October, the largest utility in the U.S. was hit by a devastating cyberattack. The provider had to postpone all billing operations in the wake of unauthorized system access, and more than 14 million people were unable to pay for water during the weeklong billing shutdown.
In a brief, West Virginia University notes, A 2022 mainframe failure disrupted West Virginians access to online government resources like health services and risked the states ability to perform basic functions like revenue collection. After the mainframe failure, West Virginia moved its workloads to a private cloud solution.
After Hurricane Helene struck North Carolina, 1.5 million people were without power. State CIO Jim Weaver told StateTech at NASCIO 2024 that as many as 17 public safety answering points were damaged or inaccessible. Normally, this would hinder access to emergency services for the communities served by those PSAPs.
Despite some fatigue, artificial intelligence continues to grow into almost every product and service used by all levels of government. The possibilities are exciting, and a growing majority of public employees admit to using AI tools for enhanced productivity and to help them become more creative in how they communicate.
As state and local government agencies modernize IT infrastructure to support hybrid work environments and cutting-edge citizen services, they also find themselves having to secure access to a mix of modern and legacy systems. Enter identity and access management.
When cybersecurity succeeds, there arent any negative outcomes. But when theres no fallout, it's harder to make the case for the resources needed to prevent bad outcomes in the future. No news is good news in cybersecurity, unfortunately, says Gary Coverdale, CISO for Santa Barbara County, Calif.
For as long as there have been video games, there have been attempts to use them for productivity. From teaching typing to boosting armed forces recruitment, gaming has been used in training, education and even business operations.
Where does data live? Where does it get put into action? As data-driven operations become both larger and increasingly more mission-critical, many organizations are exploring their options. While state and local agencies may have their own data centers, colocation offers an alternative.
Using the 6-gigahertz spectrum that the Federal Communications Commission has opened up for unlicensed use, Wi-Fi 7, the next generation of wireless technology, is primed to offer a nimble, consistent experience across networks and devices. While Wi-Fi 7 can operate on the previously accessible 2.4-
Cities and counties have started deploying servers and data centers at the network’s edge in support of everything from water infrastructure to real-time traffic controls, power grid management and more. By moving compute instances close to data sources, they’re able to deliver real-time analytics and other key capabilities.
Digital collaboration technology can make or break hybrid work in the public sector, where 88% of employees prefer to have the option to work at home or in the office as needed, according to Cisco.
As state and local governments adjust to the ramifications of the 2025 fiscal year, theyll need to balance budgetary concerns with the ability to deliver exceptional citizen services.
In its annual Federal Advocacy Priorities report, the National Association of State Chief Information Officers highlighted the importance of collaboration on artificial intelligence policy and implementation among states, federal agencies, Congress and the White House.
The adoption of mobile identification has proliferated nationwide over the past year, with numerous states implementing digital ID programs to improve citizen experience and streamline access to government services. Today, about 25 U.S.
As more state and local agencies adopt artificial intelligence technology, they face fundamental challenges about what use cases are most valuable and, crucially, what type of IT infrastructure best supports those use cases.
Elevating the citizen experience is a key goal for state and local agencies as they face pressure to modernize digital services for constituents and improve working conditions for employees. Often, the contact center acts as the front line, where citizens and government employees interact directly.
As CEO and executive director of the National League of Cities, I have the privilege of working closely with thousands of local leaders from cities, towns and villages across the country, hearing their hopes and concerns about the biggest issues impacting their municipalities.
Machine learning and deep learning, which are subsets of artificial intelligence, have been used for intrusion detection as far back as the early 2000s. Even then, it was clear that AI could improve mean time to detection. Anything that can operate at machine speed can spot something of interest in torrents of data faster than a person can.
In state and local government, system backups are essential to resilience and compliance, especially for emergency and nonemergency citizen services. But traditional full backups are time-consuming and can strain IT infrastructure, potentially slowing access to essential digital services.
While artificial intelligence will dominate this years state and local government technology landscape, theres one iteration of AI that agencies will want to pay close attention to.
In 2022, the ALPHV Ransomware as a Service group attacked the city of Alexandria, La., with its malware. Two years later, LockBit ransomware bandits attacked Wichita, Kans. Once novel RaaS gangs are increasing attacks against local governments, according to a raft of new cybersecurity threat reports.
State and local agencies are using generative artificial intelligence for a wide range of tasks, from modernizing old code to intelligently processing documents and improving the citizen experience by augmenting the capabilities of contact center agents.
During a 2025 IT forecast in January, Doug Robinson, executive director of the National Association of State Chief Information Officers, confirmed that generative artificial intelligence will be the most impactful emerging technology for state CIOs over the next several years.
Neglecting regular patch management can create gaping security holes, leaving agencies susceptible to malware, ransomware and other attacks. In fact, according to Sophos, almost a quarter of state and local government IT leaders report exploitation of unpatched vulnerabilities as the root cause of ransomware.
State and local government networks have always been complex, with different departments and agencies often adding resources, apps and hardware as needed to meet their mission goals. The move to cloud has only expanded network footprints, as has the trend toward more remote and hybrid offices.
Data center backup and recovery have been top of mind in recent years for state and local governments, and not just because of ransomware. In April 2023, Fort Lauderdale City Hall’s basement flooded after 26 inches of rain fell in 24 hours, knocking the government’s headquarters out of commission and causing IT outages.
When state or local governments must scale or deploy a data center quickly and flexibly, many look to modular data center solutions. Modular data centers are prefabricated or containerized data centers. They take up minimal space and can be installed quickly.
The prank sounds harmless enough: High school students wait until dark, pour soap into a public fountain and laugh as it fills up with bubbles. But when it happened 17 times in one year ruining several $30,000 pumps and requiring a two-day cleanup process each time city officials in Opelika, Ala.,
A pivot to cashless tolling last summer on the 236-mile Kansas Turnpike is already paying dividends for drivers and roadway managers alike. For drivers, the new system means no longer having to slow down or stop to pay their tolls. Traffic is moving more smoothly now, and thats made the turnpike safer for travel.
While organizations across sectors have made strides in recent years to address cybersecurity workforce shortages, there are still hundreds of thousands of jobs left unfilled. The latest available data shows that nearly 700,000 cybersecurity jobs remain open in the United States, according to the National Institute of Standards and Technology.
In a modern work environment, state and local government agencies regularly find their employees collaborating remotely. Many agencies have adapted to this reality by orchestrating security solutions suitable for a distributed workforce.
Critical infrastructure, crucial to our everyday lives, could fall victim to malicious activity from hackers. In February, the U.S. Cybersecurity and Infrastructure Security Agency reported that international adversaries were discovered on U.S. critical infrastructure networks, where they had remained undetected for up to five years.
Even as government agencies adopt zero-trust architectures and become more adept at detecting and preventing cybersecurity threats, attackers are still finding ways to get through defenses.According to the 2024 IBM X-Force Threat Intelligence Index, the use of valid credentials became the top initial access vector last year, accounting for 30% of the (..)
Cybercriminals are increasingly targeting data recovery systems in ransomware attacks. State and local governments must be prepared, and an immutable backup is a vital component. Immutable backups are air-gapped, unalterable copies of files and data.
State and local government agencies possess hoards of valuable data about citizens, businesses, healthcare organizations and other entities. Naturally, this makes them targets for cyberattacks that seek to pilfer data, extort government agencies and commit cyber fraud.
From ambient listening to advanced diagnostics, care providers are already using artificial intelligence to improve healthcare outcomes. But its not just clinical settings that stand to gain from the deluge of new AI technology. Public health and policy experts have opportunities to leverage AI for a variety of valuable use cases.
When a natural disaster hits, the affected community’s first instinct is to seek answers — fast. People want to know how to evacuate, where to find shelter or when it will be clear to return home. The contact center becomes the heartbeat of the emergency response.
We organize all of the trending information in your field so you don't have to. Join 40,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content