Subscribe

Digital Design
It’s no surprise that the practice of designing, building, and operating public sector buildings and infrastructure must change. As our built environments become increasingly complex, it’s vital that project team productivity and asset performance levels are addressed. According to KPMG, just a quarter of construction projects in the last three years came within 10% of their original deadlines.
Digital Design
Despite mandates, BIM adoption in government has lagged its private sector counterparts. However, new data shows that BIM is poised for greater adoption across agency design and construction projects, as well as into building operations.
Digital Design
Looking to improve the look of your Revit presentations? Revit includes some powerful out-of-the box graphic features such to render and make your drawings looks great. Many of these use non-Revit-like presentation techniques to help you develop your own artistic style. Not using them yet? Check out this online session from Autodesk University in which Steven Shell, co-founder and chair of the Southern Arizona Revit Users Group offers tips, tricks and techniques for making your drawings look great.
Cybersecurity
As incidents of government data breaches increase and threat landscapes grow, savvy federal, state and local government agencies should take a look at how data loss prevention technologies can help them discover, monitor, and protect sensitive data across clouds, mobile devices, and on-premise. What is Data Loss Prevention?
Cybersecurity
Fighting hackers is hard enough, but a huge shortage of cyber workers could leave the government exposed. According to numbers from the Bureau of Labor Statistics, there were more than 209,000 unfilled cybersecurity jobs in the U.S. in 2016, although the number could be as high as 350,000.
Cybersecurity
Cyberattacks on the application layer are becoming more commonplace than attacks on servers, according to a survey of IT professionals by DLT partner, Veracode. The problem is that traditional security methods are largely ineffective against these application layer attacks. But despite this increase, it’s important to maintain perspective.