Subscribe

Cybersecurity
“Cyber Hygiene”:  you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security.  Still, others think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity.
Digital Design
What do a Facebook data center, a railway, an expressway, an office building extension, and a cancer center have in common? These and other global projects are recipients of this year’s AEC Excellence Awards in recognition of how they’ve embraced technology to reimagine the processes of design and construction.
Cybersecurity
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and so on.
Cybersecurity
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security
IT Perspective
Last month, we sat down with DLT Chief Technology Officer David Blankenhorn to get his insight on DLT's evolution to a government solutions aggregator. Tell me a little bit about DLT’s movement to an aggregator model. Why is that important?
Cloud Computing
Choice and self-determination are cornerstones of our nation’s democratic process. Come election night, we might not all root for the same candidates, but there’s one point we can all rally around – the need for modernization and the role of the cloud in powering U.S. elections.