Despite once achieving high visibility and big successes, government-sponsored gamification projects have fallen on hard times, and nobody in government seems willing to drop a few more quarters into the machine to continue playing.
Despite the seeming hegemony of the Internet of Things, there are a couple places where the tiny sensors have yet to travel. One of them is deep in the world’s oceans, and the other is on the frontlines of today’s modern battlefield.…
The next thing in biometric authentication could be a new version of something already familiar to web users — Captcha, the tried, true and too often maddening method of convincing a site you’re not a bot by typing in distorted letters and…
This week’s NextGov column focuses on two government technologies following vastly different paths. In the fist, we find Threat Hunting making serious inroads. But a new GAO report says another technology, GPS, is in danger of total collapse.
In a NextGov column last year, I predicted that drones would step up to a new public safety role, with both officers and public volunteers piloting the craft. With amazing drone rescues saving lives, that future is close at hand.
The Pentagon plans to take artificial intelligence to the next level, particularly with regard to analyzing the millions of hours of video collected by unmanned aerial aircraft and other sensors in Iraq and Syria.
Unfortunately, we don’t yet have technology that can prevent a storm of the magnitude of Hurricane Harvey from devastating our cities and towns. But it can help in the response, and even provide valuable information for citizens trying to survive a catastrophic…
A new breed of threat is taking a different approach, setting up fake websites and apps that appear to be legitimate, but can be extremely dangerous to anyone fooled into trusting them. NextGov investigates those threats aimed at the United States Postal…
Two years after a data breach at OPM compromised personal information of tens of millions of current and former federal employees, agencies need to move from making short-term fixes to implementing long-term strategies. Learn how at Tenable Network Security.