Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the astra-sites domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/research/public_html/wp-includes/functions.php on line 6131

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the popup-builder domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/research/public_html/wp-includes/functions.php on line 6131

Warning: Cannot modify header information - headers already sent by (output started at /home1/research/public_html/wp-includes/functions.php:6131) in /home1/research/public_html/wp-includes/feed-rss2.php on line 8
Government – Research Accounts https://researchaccounts.com Official Publication Thu, 12 Dec 2019 19:29:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 https://researchaccounts.com/wp-content/uploads/2019/07/cropped-Wikimedia-research-32x32.png Government – Research Accounts https://researchaccounts.com 32 32 Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse https://researchaccounts.com/2019/12/11/the-iot-imperative-in-public-services-government-and-healthcare-2/ https://researchaccounts.com/2019/12/11/the-iot-imperative-in-public-services-government-and-healthcare-2/#respond Wed, 11 Dec 2019 19:31:42 +0000 https://researchaccounts.com/?p=3486 Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse Read More »

]]>

All government programs are vulnerable to fraud, waste and abuse – now more than ever. Government fraud is at an all-time high and growing rapidly. Industry research shows that all together, fraud, waste and abuse represent about 10 percent of overall government program spending.
But what if governments could minimize deficits by eliminating fraud, waste and abuse? It’s an often overlooked way to close budget deficits – and one that forwardlooking government leaders are already acting on by implementing enterprise-level, state-of-the-art fraud detection programs designed to keep pace with increasingly sophisticated perpetrators.

]]>
https://researchaccounts.com/2019/12/11/the-iot-imperative-in-public-services-government-and-healthcare-2/feed/ 0
Government IT in an Era of Austerity https://researchaccounts.com/2019/12/11/government-it-in-an-era-of-austerity/ https://researchaccounts.com/2019/12/11/government-it-in-an-era-of-austerity/#respond Wed, 11 Dec 2019 19:29:51 +0000 https://researchaccounts.com/?p=3482 Government IT in an Era of Austerity Read More »

]]>

To achieve efficiencies in today’s turbulent economic climate, government entities need to integrate legacy applications with modern systems and web services. Orchestration between multiple systems across various departments and municipalities is needed to deliver quality public services. At the same time, public sector agencies face aggressive timelines and budget constraints, changing constituent needs, and open source policies. Learn how utilizing a lightweight, standalone Enterprise Service Bus (ESB) enables government entities to meet these key challenges and deliver vital public goods while cutting costs.

Evalute important decisions:

  • Achieving efficiencies in today’s turbulent budgetary environment
  • Time to Delivery and Budget Constraints
  • Constituent Needs and Public Value
  • Open Source Policies & Initiatives
  • The Software Architecture for Government
]]>
https://researchaccounts.com/2019/12/11/government-it-in-an-era-of-austerity/feed/ 0
WI-FI: SECURE ENOUGH FOR FEDERAL GOVERNMENT? https://researchaccounts.com/2019/12/11/wi-fi-secure-enough-for-federal-government/ https://researchaccounts.com/2019/12/11/wi-fi-secure-enough-for-federal-government/#respond Wed, 11 Dec 2019 19:28:17 +0000 https://researchaccounts.com/?p=3478 WI-FI: SECURE ENOUGH FOR FEDERAL GOVERNMENT? Read More »

]]>

One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions. 

]]>
https://researchaccounts.com/2019/12/11/wi-fi-secure-enough-for-federal-government/feed/ 0
Empowering eGovernment with Mobile Identity https://researchaccounts.com/2019/12/11/empowering-egovernment-with-mobile-identity/ https://researchaccounts.com/2019/12/11/empowering-egovernment-with-mobile-identity/#respond Wed, 11 Dec 2019 19:26:58 +0000 https://researchaccounts.com/?p=3474 Empowering eGovernment with Mobile Identity Read More »

]]>

Just as the proliferation of mobile devices, the Internet of Things and other elements of increasing connectivity have impacted our everyday lives, these trends are rapidly changing the landscape for government agencies. More agencies than ever before leverage advanced eGovernment applications to deliver citizen services. Government workers are at the forefront of the mobile workforce growth, with around 90 percent of government employees using at least one mobile device for their daily work. Collaboration among agencies and between states is increasing interoperability of eGovernment systems and networks.

All of these elements of growing connectivity have the potential to significantly increase productivity, streamline operations and enhance service levels to citizens and stakeholders. But these benefits are only one side of the story. The added complexity of the new eGovernment environment also creates many new challenges, as government agencies search for effective ways to secure and control access to the rapidly growing number and variety of gateways to their ecosystems.

]]>
https://researchaccounts.com/2019/12/11/empowering-egovernment-with-mobile-identity/feed/ 0
13 Federal Proposal Blunders and How to Solve Them – Stop Killing Your Win Rate https://researchaccounts.com/2019/12/11/13-federal-proposal-blunders-and-how-to-solve-them-stop-killing-your-win-rate/ https://researchaccounts.com/2019/12/11/13-federal-proposal-blunders-and-how-to-solve-them-stop-killing-your-win-rate/#respond Wed, 11 Dec 2019 19:18:29 +0000 https://researchaccounts.com/?p=3470 13 Federal Proposal Blunders and How to Solve Them – Stop Killing Your Win Rate Read More »

]]>

There are a wide range of mistakes Federal proposal responders regularly make. The biggest of which is forgetting that proposals need to persuade the Government that you possess some competitive advantage that your competition does not. Once you have the right content, you need to make sure that it is communicated well to the evaluator. On top of that, your proposal needs to meet all compliance requirements.  It is a huge job!! This whitepaper discusses thirteen common Federal proposal blunders suggesting ways in which you can solve the problems.

]]>
https://researchaccounts.com/2019/12/11/13-federal-proposal-blunders-and-how-to-solve-them-stop-killing-your-win-rate/feed/ 0
A Call to Action to Protect Citizens, The Private Sector, and Governments https://researchaccounts.com/2019/12/11/a-call-to-action-to-protect-citizens-the-private-sector-and-governments/ https://researchaccounts.com/2019/12/11/a-call-to-action-to-protect-citizens-the-private-sector-and-governments/#respond Wed, 11 Dec 2019 19:16:02 +0000 https://researchaccounts.com/?p=3466 A Call to Action to Protect Citizens, The Private Sector, and Governments Read More »

]]>

Information and Communications technologies have revolutionized our way of life and have driven economic and industrial development to the point where we have become highly dependent on cyberspace. Our way of communicating, interacting, pursuing education and even how we purchase items has been transformed with the growing penetration of digitalization which has changed our habits and behaviors. These digital transformation processes have also impacted the public and private sector, to such an extent that any productive process or public service for citizens cannot be conceived without an intensive use of technologies.

While this scenario creates great opportunities for the economy, industry and society, it is not without new risks and threats. Cyberspace has become a great interest area for criminals and terrorists who can take advantage of the anonymity provided by the Internet and the lack of homogeneity in national and international laws, to act with impunity.

]]>
https://researchaccounts.com/2019/12/11/a-call-to-action-to-protect-citizens-the-private-sector-and-governments/feed/ 0
Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices https://researchaccounts.com/2019/12/11/authentication-at-the-networks-edge-the-federal-governments-journey-to-secure-mobile-devices/ https://researchaccounts.com/2019/12/11/authentication-at-the-networks-edge-the-federal-governments-journey-to-secure-mobile-devices/#respond Wed, 11 Dec 2019 19:12:08 +0000 https://researchaccounts.com/?p=3462 Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices Read More »

]]>

Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Multifactor authentication is one of the most effective ways that federal agencies can protect mobile data and devices. Check out this issue brief discussing how the security approach needs to differ for mobile, what agencies can do and the risk of inaction.

]]>
https://researchaccounts.com/2019/12/11/authentication-at-the-networks-edge-the-federal-governments-journey-to-secure-mobile-devices/feed/ 0
Managing the Complexities of Information Security in a Post NDB Environment https://researchaccounts.com/2019/12/11/managing-the-complexities-of-information-security-in-a-post-ndb-environment/ https://researchaccounts.com/2019/12/11/managing-the-complexities-of-information-security-in-a-post-ndb-environment/#respond Wed, 11 Dec 2019 19:05:33 +0000 https://researchaccounts.com/?p=3458 Managing the Complexities of Information Security in a Post NDB Environment Read More »

]]>

THE NOTIFIABLE DATA BREACHES (NDB) SCHEME came into effect on Feb 22nd 2018, making it obligatory for every organisation covered by the Australian Privacy Act to notify the Australian government of certain security breaches.

The 2019 Canon Security Report is a guide to understanding which organisations are affected by this policy, the types of security breaches that require notification and what your organisation can do to help mitigate the risk of such breaches happening in the first place.

]]>
https://researchaccounts.com/2019/12/11/managing-the-complexities-of-information-security-in-a-post-ndb-environment/feed/ 0
15 Ways to Weed the Regulatory Violations Out of Your Spend https://researchaccounts.com/2019/12/11/15-ways-to-weed-the-regulatory-violations-out-of-your-spend/ https://researchaccounts.com/2019/12/11/15-ways-to-weed-the-regulatory-violations-out-of-your-spend/#respond Wed, 11 Dec 2019 19:02:31 +0000 https://researchaccounts.com/?p=3453 15 Ways to Weed the Regulatory Violations Out of Your Spend Read More »

]]>

Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. 

How do you know if you have these violations hiding in your organization’s expenses, contracts, or invoices? 

It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming. 

]]>
https://researchaccounts.com/2019/12/11/15-ways-to-weed-the-regulatory-violations-out-of-your-spend/feed/ 0
Gorilla Technology Optimizes the Efficiency of its IVAR Intelligent Video Analytics Recorder https://researchaccounts.com/2019/12/11/gorilla-technology-optimizes-the-efficiency-of-its-ivar-intelligent-video-analytics-recorder/ https://researchaccounts.com/2019/12/11/gorilla-technology-optimizes-the-efficiency-of-its-ivar-intelligent-video-analytics-recorder/#respond Wed, 11 Dec 2019 18:48:57 +0000 https://researchaccounts.com/?p=3448 Gorilla Technology Optimizes the Efficiency of its IVAR Intelligent Video Analytics Recorder Read More »

]]>

Deep learning is enabling a new generation of real-time video analytics technology that can identify and track people, vehicles, and more objects frame by frame in real time, providing state-of-the-art security for a wide range of businesses and government agencies. But along with the advances come challenges. Systems can be complex, and environmental inconsistencies make video analysis complicated. For Gorilla Technology’s IVAR™ intelligent video analytics recorder platform, the key challenge was to maximize performance for its customers. Find out how Gorilla Technology worked with Intel to achieve a 50% increase in CPU performance.

]]>
https://researchaccounts.com/2019/12/11/gorilla-technology-optimizes-the-efficiency-of-its-ivar-intelligent-video-analytics-recorder/feed/ 0