Subscribe

Cybersecurity, Technology
There’s a lot of buzz about blockchain these days, even in government. In fact, we predict that 2018 will be the year of blockchain in government. Blockchain’s inherent security makes it resistant to data manipulation, making it a great tool for securely recording transactions between two parties, everything from medical records, contracts, transactions, even online voting.
CAD General
Perhaps you’re considering BIM for your next agency or department’s next building, facilities management, or civil infrastructure project. But what’s the best way to make sure you get full value from your investment in BIM?
Buildings, Digital Design, Infrastructure, Transportation
Urban development is a big challenge for governments and project owners. Urbanization, combined with overall population growth, could add another 2.5 billion to the world’s urban centers by 2050. For the infrastructure sector, this means providing the essential utilities and transportation systems to support these dense over-crowded areas – while doing more with less.
Analytics & Data Science, Technology, Training
On October 18th, DLT competed at a fun and spirited “Demo Jam” contest during the Red Hat’s public sector annual meeting at Kingsmill.  The demo had to be live, no longer than eight minutes and had to showcase at least one Red Hat product.  We included nine Red Hat products, plus quite a few other technologies, taking a lighthearted look at the internet of things.  Against stiff competition and by audience selection, we won first place!  Unfortunately, the audio on any recording of the event itself was drowned out by cheers, tambourines and cow bells,
Infrastructure
With BIM mandates and pressure to improve collaboration and efficiencies on construction projects, how are teams taking advantage of digital workflows to improve the potential of BIM?
Cloud Computing, Cybersecurity, Data & Storage, Technology
No sooner do you have your arms around one cybersecurity vulnerability then another surfaces. This time it’s Meltdown and Spectre, both of which can cause data leak from kernel memory. These vulnerabilities are particularly worrying since they impact practically all computers and involve multiple IT vendors including processor players Intel, AMD, Qualcomm, and ARM.