OCC performs data analysis using bank statement, loan level, financial market, economic and legal data to provide macro and micro views of banking systems.
Tactics from the Pilot Training Next program are ready to go mainstream.
In today’s Federal Newscast, Veterans Affairs launched a new training program to help employees impacted by the agency’s ongoing electronic health record modernization.
The ink is dry on the Army’s new data strategy. Once it’s officially released, it will come with specific orders telling Army components to adhere to common data standards.
Jim Hansen, the vice president of products, security and application management for SolarWinds, detailed why agencies need to do more to protect their employees from cyber attacks.
Researchers have big plans for Argonne National Laboratory’s future exascale supercomputer, Aurora.
AI is already here, and its most common form is a lot closer to home than many people realize.
The President’s Management Agenda addressed the need for agencies to overhaul their approach to customer experience, but the Treasury Department has drafted a plan to put those ideas into practice.
The Defense Department is ready to use AI for some more serious uses, but there’s still a long way ahead.
Jamie Holcombe, the chief information officer of the Patent and Trademark Office, said among his first projects has been to fix the technology that runs the agency’s search tools to help patent examiners and trademark lawyers find ‘prior art.’
The Air Force wants to overhaul its IT infrastructure and focus more on data.
Air Force Space Command is trying to bring its data systems and sets together to benefit its operations.
Beau Houser will join Census Bureau to be its chief information security officer after spending the last two years as SBA in a similar role.
Also in today’s Federal Newscast, for the first time in 12 years, federal civilian agencies suffered no major cyber incidents in fiscal 2018.
The Department of Health and Human Services and the Defense Information Systems Agency are thinking beyond passwords when it comes to network security, and taking a step in identity management that has long been contemplated in government, but not actually implemented.