Rise of the Smart City SuperCluster
Many theories have come out of the study (and mistakes) of urban planning. The latest is the concept for a Smart City.
Many theories have come out of the study (and mistakes) of urban planning. The latest is the concept for a Smart City.
The purpose of software oversight is nothing more than to manage the risk of failure. The cost of oversight is more of the cost of risk avoidance.
After a year of hosting informal events to introduce their friends and colleagues directly to other friends who were running for office, Austinites Nathan Ryan and Liz Coufal looked at the growing crowds and realized they had tapped into something bigger than themselves.
I’ve been fortunate to have had the opportunity to serve on several boards and advisory committees over the last 15 years, including as a nonprofit board chair. Here are some of the things I learned along the way
Last year, only 24 percent government workers were between the ages of 20 and 35. Attract young talent by championing these four millennial-approved values.
Some time ago at the state of Nebraska, we recognized it was inefficient for our technology resources to work in IT silos. Prior to consolidation, an IT silo existed in every individual agency. As any productive business would do, we began working to break down each legacy silo across the enterprise through organizational and technological… Read more »
The turning of the seasons is a natural time to reflect, to think about where we are in our journey and where we’d like to go.
Becoming a thriving leader means stepping outside of your comfort zone and taking on new risks. Simply put, risk is exposure to harm. As a leader, the risks are plentiful.
The opportunity to use government data to take action on social problems is too big to pass up. The more accessible, discoverable, and usable data is, the bigger impact it can have on policymaking, scientific advancements, and business.
The number of cyberthreats out there is overwhelming. Sincere thought and effort towards designing your threat model could stand between you and a data disaster.