China is cyberspying on US military computer networks, unleashing as many as 75,000 attacks last year. Beijing has breached Army computers and DOD may be unable to block all intrusions.
CBS Interactive's Distinguished Lecturer David Gewirtz hosts ZDNet Government -- ZDNet's politics and policy coffeehouse -- where civics lessons meet technology, nothing is sacred, and everything is fair game.
David Gewirtz, Distinguished Lecturer at CBS Interactive, is an author, U.S. policy advisor, and computer scientist. He is featured in the History Channel special The President's Book of Secrets and is a member of the National Press Club.
Cleveland is the model for municipal wireless, according to an upcoming report from the Haas Charitable Trust. Because government has purchased dark fiber and private industry has donated fiber, equipment and access, Cleveland has a powerful network poised to deliver 21st century solutions.
My kids started school today. Over the coming weeks, so will millions of others. As an IT professional, I've struggled with reconciling my core belief that IT, properly applied, can make most things work better and the evidence that it's had precious little effect on public education. One problem is that the application of IT to public education tends to be a hit-or-miss kind of thing.
Despite much work done since last year, the Dept. of Homeland Security still has not corrected numerous security holes, many of which were previously identified. For instance, sensitive devices were sometimes accessible with a well-known group or default password.
An Air Force database was breached allowing hackers access to personally identifying information to 33,000 employees, mostly active duty officers. Identity theft is also a huge concern at universities, both public and private, which may account for as many as half of the identity theft breaches.
Given all of the activity in consolidating and streamlining government datacenters, this post on IBM's Mainframe Blog provides excellent context for thinking about virtualization and datacenters. John Patrick writes: People have talked about the death of the mainframe for years but after seeing the Z9, you can be sure they are not going away for a very long time.
Government computer systems would be a prime target of terrorist organizations in a coordinated cyber/physical attack, computer crime expert Mark Rasch said in an interview with Investor's Business Daily. Rasch, the former head of the Justice Dept.
Computer viruses create more damage than just wasting time and resources. Every so often, we see the real-world impact of viruses, as on Thursday, when a virus shut down Customs Dept.
For a daily quick hit on computer security news, check out the "Two-Minute Warning," from Citadel. It's a streaming audio newscast of developments in viruses, vulnerabilities, and other news.
The federal effort to better manage health information technology took a step forward with the creation of the Office of the National Coordinator for Health Information Technology. FCW.