Search form

twitter_icon facebook_icon youtube_icon


A heavily wooded park was the perfect setting for a state Senate committee to hear from folks with problems getting online in the digital age: the 650-acre Blue Spruce Park, which has 125,000 visitors annually, is a broadband dead zone, where neither internet nor cellphone connections are possible.

Nurses that are trained to provide expert care to sexual assault victims are a highly valuable resource—they have specialized training in forensic examination and understand best practices in evidence collection. There are too few of these nurses nationally and many communities have no access to such expertise.

After success expanding broadband access to rural areas of the state with a $10 million grant program, the Broadband Infrastructure Office wants to broaden its efforts but must wait for a budget to be approved first.

The internet of things (IoT) is transforming various industries and the education sector is no exception.

Pharmaceutical companies could reduce the cost of drug development thanks to a new partnership that aims to scale the next generation of digital clinical trials.

The key scholar on the Diffusion of Innovations, Everett Rogers, described how technological adoption is primarily a social, not economic, process. His research focused on how farmers adopted agricultural innovation and the role of trusted peers to introduce new tools and methods. 

As part of its continued efforts to help make the Do Not Call (DNC) data it collects more transparent and easier for consumers to use, the Federal Trade Commission today announced the debut of a new interactive public web pagecontaining a wealth of information about the National DNC Registry and unwanted telemarketing robocalls.

The Federal Bureau of Investigations aims to acquire access to a “social media early alerting tool” that will help insiders proactively and reactively monitor how terrorist groups, foreign intelligence services, criminal organizations and other domestic threats use networking platforms to further their illegal efforts, according to a request for proposal.

The three steps urged by CISA, MS-ISAC, NGA, and NASCIO are fairly basic security hygiene: run daily backups, train staff on "cybersecurity awareness," and "revisit and refine cyber incident response plans." School districts, government agencies, and small and mid-sized businesses may have IT budgets that place them below the information security poverty line.

Recent experiments by election officials allowing overseas voters to cast ballots through an encrypted mobile app are being credited with increasing participation in elections. This is despite continued skepticism from election-security advocates and computer scientists questioning the reliability and security of collecting ballots over the internet.


Printed from the website on July 09, 2020 at 10:47pm.