Thursday, January 31, 2013

Gun Control Requires IT Overhaul | DARPA Wants Self-Destructing Devices

If you have trouble viewing this email, read the online version.

InformationWeek Government
Join the community
Facebook Twitter LinkedIn
  Thursday, January 31, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist Federal Gun Control Requires IT Overhaul
By John Foley
White House plan will work only if the IT systems and databases used for background checks and gun tracing get the improvements needed to support stepped-up oversight.

DARPA: Your Tech Will Self-Destruct
Defense Advanced Research Projects Agency seeks a new class of electronic devices that can dissolve on command as a way of staying out of enemy hands.

China's GitHub Censorship Dilemma
Censorship becomes more difficult when communication gets combined with code.

U.K. Government CIOs Unhappy With ERP
More than 60% IT decision makers in British local government feel their electronic resource planning (ERP) investments haven't delivered, says poll.

Judge Won't Triple $1.05B Verdict Against Samsung
In patent battle, Apple had sought "willful infringement" decision in motion following August jury trial; more wrangling ahead.

Healthcare Experts Confront EHR-Related Medical Errors
AMIA task force calls on vendors, clinicians, academics and policy-makers to rethink poorly designed health IT systems.

Google Maps North Korea With Help From Users
Individuals around the world are contributing geo-information about secretive North Korea.

ALSO SEE
Healthcare Experts Confront EHR-Related Medical Errors
Google Maps North Korea With Help From Users
Strategy: One-Click Disaster Recovery
Bloomberg BusinessWeek Agility for Differentiation
10 Best Android Apps Of 2012
Mobile Security -- A Holistic Approach
2013 InformationWeek Government IT Innovators

Download our iPad App

JOIN THE CONVERSATION
Posted By John:
"'Lean and mean' for it's own sake is bound to fail if none of the usual gang actually has time to do his job properly and is therefore running from emergency to emergency."
In reply to: Startup Culture And Innovation, Defended
View Entire Response | Post Your Own Reply



  Digital Issue  
DOWNLOAD INFORMATIONWEEK HEALTHCARE'S LATEST DIGITAL ISSUE
Federal Meaningful Use Stage 2 requirements will make your medical organization more competitive -- if they don't drive you off the deep end.

Also: As a nation, we're falling short of the goal of boosting efficiency and saving money with health IT.


DOWNLOAD NOW FREE (Registration Required)
 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)

Featured Report
How to Conduct an Effective IT Security Risk Assessment
Assessing an organization's security risk is an important element of an effective enterprise security strategy. It's also a key way to justify future security spending to upper management. In this Dark Reading report, we recommend how to conduct an IT security risk assessment -- and how to translate the results into terms that make sense in dollars.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Bloomberg BusinessWeek Agility for Differentiation
Organizations are finding that a cloud-based platform for agile software development provides the speed and flexibility they need to respond to opportunities and market changes. This research report highlights how organizations are implementing and benefiting from cloud-based agile software development.
Download Now (Registration Required)


The Foundations of Efficiency
A difficult economy demands that government agencies use all of the data at their disposal to optimize resources and inform decisions. Download this report to understand why this is true.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Chromebooks Actually Selling, Acer Says
Laptops running Google's browser-based operating system are resonating with buyers.

BlackBerry 10: Not All The Right Moves
BlackBerry got many elements of its pivotal new smartphone platform right, but not all of them. Let's break down the good and bad.

8 Key Changes In Microsoft SharePoint 2013
Microsoft's popular collaboration platform gets a significant revamp with SharePoint 2013. Here's what you gain.

10 Great Windows 8 Apps
Transitioning to Windows 8 isn't easy, but these apps can help.

MORE NEWS  
 
WEBCASTS
Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek Government IT Innovators
InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes?
Nominate By April 12



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Government
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of the InformationWeek Government Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment