StateTech Magazine - Technology Solutions That Drive Government en Iowa Chief Justice Seeks More Funding for Court Tech <span>Iowa Chief Justice Seeks More Funding for Court Tech</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/14/2019 - 09:05</span> <div><p>Iowa wants to firmly yank its court system into the 21st century. </p> <p>In his annual <a href="" target="_blank">Condition of the Judiciary address</a> last month, Iowa Supreme Court Chief Justice Mark Cady pushed for a series of technology investments. Cady told lawmakers that technology is “propelling courts into a new age of justice,” and he announced several new digital initiatives, including <strong>an online dispute resolution system and more </strong><strong>videoconferencing</strong> in the state’s court system, <a href="">as many other localities have done</a>. </p> <p>The Iowa Judicial Branch wants an additional <strong>$7.2 million</strong> to fund them, which would amount to <strong>a 4 percent increase over the $177 million</strong> the judiciary received for the budget year ending June 30, 2018, <a href="" target="_blank">according to local TV station Fox 28</a>. </p> <p>“We simply can no longer proceed into the future thinking it will be a modest linear extension from where we are today,” Cady said. “Imagine how my grandchildren will someday read a bedtime story to their grandchildren. New tools and a new understanding of our transforming world truly create an opportunity to do what we could not have previously imagined.”</p> <p>Iowa’s court system, he said, must <strong>“think big and take big steps.” </strong></p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>Find out how California wants to modernize its court system.</em></a></p> <h2 id="toc_0">Iowa Plans for New Digital Court Investments</h2> <p>In Cady’s address, he noted that “the power of technology has stirred our imagination and allowed us to <strong>identify more than 130 critical projects</strong> to serve better more Iowans, who are our customers.” </p> <p>The court’s digital plan contains projects such as electronic search warrants, text messages to defendants and other court users, remote court reporting and interpreting, and online dispute resolution. </p> <p>Cady noted that online dispute resolution has started in a few states with “promising early results.” For example, Utah in the fall of 2018 <a href="" target="_blank">set up an online dispute resolution pilot project</a> for small claims cases that “substantially reduced the steps needed to resolve a case. It has streamlined the process and made it more convenient for court users.” </p> <p>Iowa wants to do the same for the <strong>75,000</strong> Iowans who use the state’s small claims courts each year, according to Cady. </p> <p>“Imagine an online process that will allow Iowans to <strong>resolve some of their legal disputes without taking time from work</strong> to go to the courthouse,” he said. “Imagine a time when law enforcement officers will no longer need to drive from the scene of an investigation to a courthouse to request a warrant because judges will be able to transmit search warrants to officers in their vehicles.” </p> <p> </p> <p><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="" /></p> <p>Under the program, defendants would receive reminders of their court dates on their phones “so there are fewer delays and fewer adverse collateral consequences for defendants who miss appearance dates.”</p> <p>Iowa hopes to establish a pilot project on online dispute resolution in one or two counties this year, and Cady said he is <strong>hopeful the pilots can be launched this year</strong>, <a href="" target="_blank">according to local TV station </a><a href="" target="_blank">WHOTV</a>. </p> <p>Cady acknowledged that the programs will require investments. “Obviously, some of these projects and proposals are going to take some additional funding, but I think the vision is what can drive us there and I hope we've started that discussion today,” Cady said. </p> <p>The judicial branch estimates that in fiscal year 2019 it will deliver <strong>a $2 million</strong> dollar return on investment for the money they appropriated. Cady hopes implementing more tech initiatives will save more money for taxpayers and lead to greater ease of access for Iowans, WHOTV reports.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is the web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 14 Feb 2019 14:05:00 +0000 phil.goldstein_6191 42096 at Secure Networks Ensure the Flow of Data to First Responders During Disasters <span>Secure Networks Ensure the Flow of Data to First Responders During Disasters</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 02/12/2019 - 10:39</span> <div><p>Communities <a href="">depend on first responders</a> when natural disasters strike, and public safety agencies must also prepare for the possibility that severe weather could cripple their information systems.</p> <p>Enter the <a href="" target="_blank">National Law Enforcement Telecommunications System</a>, which provides police and fire departments with the capabilities to accurately <strong>respond in an emergency while also ensuring data recovery in a disaster</strong>.</p> <p>NLETS offers public safety agencies an <strong>automated secure alarm protocol</strong>, which automates transmissions from alarm monitoring central stations to emergency call operators. Use of the ASAP system <strong>ensures that first responders receive an exact address that has been verified,</strong> said Scott Edson, executive director of <a href="" target="_blank">the Los Angeles Regional Interoperable Communications System</a>, at <a href="" target="_blank">the National Sheriffs’ Association Winter Conference</a> in Washington, D.C., on Feb. 9. </p> <p>Edson, who retired from <a href="" target="_blank">the Los Angeles County Sheriff’s Department</a> in March 2017 after 39 years, stressed that his agency would often receive incorrect or incomplete address information from alarm monitoring companies.</p> <p>“In Los Angeles County, different stores tend to maintain alarm companies that answer the calls to their alarms,” Edson said. “Those alarm companies will then call the local police department. When you call the local police department and explain you have an emergency at 123 Main Street, and the operators take the information. We found that about<strong> 60 percent</strong> of the calls that come in from the alarm companies contained erroneous information.”</p> <p>With no opening for human error, the ASAP system transfers the information to a public safety answering point. This <strong>electronically transmits data that has been validated to the appropriate jurisdiction</strong>, Edson said.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11391"><img src="/sites/" width="58" height="58" alt="Mickey McCarter" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11391"> <div>Mickey McCarter</div> </a> </div> <div class="author-bio"> <p> <div><p>Mickey McCarter is the senior editor of StateTech Magazine.</p> </div> </p> </div> </div> </div> </div> Tue, 12 Feb 2019 15:39:13 +0000 phil.goldstein_6191 42101 at The Tools New State CIOs Can Use to Get Up to Speed <span>The Tools New State CIOs Can Use to Get Up to Speed</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 02/11/2019 - 11:17</span> <div><p>On <a href="" target="_blank">Election Day 2018</a>, Democratic candidates won seven Republican governors’ seats — in Illinois, Kansas, Maine, Michigan, Nevada, New Mexico and Wisconsin — and a Republican won a Democratic seat in Alaska. Since November, and even a bit before, there has been a significant amount of turnover in the state CIO ranks. </p> <p>CIOs in <a href="" target="_blank">Alaska</a>, <a href="" target="_blank">Colorado</a>, <a href="" target="_blank">Florida</a>, <a href="" target="_blank">Hawaii</a>, <a href="" target="_blank">Illinois</a> and <a href="" target="_blank">Tennessee</a> are among those who left their posts since the start of fall 2018. According to <a href="" target="_blank">the National Association of State CIOs</a>, Colorado, Hawaii, New Mexico, Illinois, Iowa, Michigan, Minnesota and Washington, D.C., all have new permanent or interim CIOs in 2019. Meanwhile, Florida’s CIO office remains vacant and <strong>12 states got new CIOs in 2018</strong>. </p> <p>Add all of that up, and there are numerous new faces in positions of IT leadership across the country. Some have private sector backgrounds while others have long been involved in state government. Regardless of how much knowledge they may have had of a state’s technology operations before they got into the C-suite, new CIOs will start with some kind of<strong> deficit of knowledge about departmental priorities, the state of IT systems, best practices, personnel</strong> and more. </p> <p>New governors may need all the help they can get from existing IT teams, considering how quickly the topic can be drowned out by other priorities. To help governors execute innovation agendas, modernize state IT systems or enhance cybersecurity (a<a href="">s North Dakota hopes to do</a>), CIOs need to get up to speed quickly. </p> <p><strong>Knowledge management systems</strong> can help them do so by collecting knowledge and best practices, and giving IT leaders the resources and connections they need to get accustomed to a new environment.</p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>These are the top state and local government IT trends to watch in 2019. </em></a></p> <h2 id="toc_0">What Is a Knowledge Management System?</h2> <p><a href="" target="_blank">According to Gartner</a>, knowledge management is a discipline that “promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise's information assets. These assets may include databases, documents, policies, procedures, and previously un-captured expertise and experience in individual workers.”</p> <p>Knowledge management systems refer to any kind of IT system that <strong>retrieves knowledge to improve understanding, collaboration </strong><strong>and</strong><strong> process alignment</strong>, <a href="" target="_blank">as HubSpot notes</a>.</p> <p>Such systems can enhance collaboration and help IT leaders find where knowledge is located. They can also mine repositories for hidden knowledge, and capture and use knowledge.</p> <p>A KMS is “made up of different software modules served by a central user interface,” <a href="" target="_blank">Technopedia notes.</a> Such software can “allow for data mining on customer input and histories, along with the provision or sharing of electronic documents.” A KMS “can help with <strong>staff training and orientation, support better sales, or help business leaders to make critical decisions</strong>,” according to Technopedia. </p> <p>There are <a href="" target="_blank">numerous KMS options available</a> for state CIO offices to turn to, including <a href=";searchscope=all&amp;sr=1" target="_blank">from Hewlett Packard Enterprise and </a><a href=";searchscope=all&amp;sr=1" target="_blank">Ivanti</a>. </p> <p>And as <a href="" target="_blank">a KMWorld article explains</a>, the KMS model includes content management, information on how to locate experts, lessons-learned databases and<strong> communities of practice (COPs)</strong>. COPs are particularly useful to new CIOs, since they are groups of individuals with shared interests who “come together in person or virtually to tell stories, to share and discuss problems and opportunities, discuss best practices, and talk over lessons learned.”</p> <p><em><a href="" target="_blank"><strong>GET STARTED:</strong> Register for the StateTech Insider program today</a>.</em></p> <h2 id="toc_1">How Knowledge Management Systems Can Benefit State CIOs</h2> <p>For new CIOs who are getting their feet wet, using a knowledge management system can help them get up to speed on IT priorities and other recent hires on board as well. </p> <p><a href="" target="_blank">As Deloitte notes</a>, knowledge management helps <strong>improve decision-making by facilitating access to expertise and best practices</strong>. KMS also boosts efficiency, productivity and helps IT leaders work smarter by reducing cases of “reinventing the wheel” when they take over.</p> <p>KMS also makes it easier to collaborate, which can spur innovation. They also limit “brain drains” when former CIOs and other leaders leave government, in part by capturing both explicit and tacit knowledge. </p> <p>A KMS can boost productivity by <strong>speeding up on-boarding </strong><strong>trainings</strong><strong> for new hires</strong>. </p> <p>If your state has not adopted a KMS, it should definitely consider doing so. State CIOs come and go with time, but the knowledge they accumulate should not.</p> <p><em>This article is part of </em>StateTech<em>'s <a href="">CITizen blog series</a>. Please join the discussion on Twitter by using the <a href="">#StateLocalIT</a> hashtag.</em></p> <p><em><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="CITizen_blog_cropped_0.jpg" data-entity-type="" data-entity-uuid="" src="" /></a></em></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/matt-parnofiello"><img src="/sites/" width="58" height="58" alt="Matt Parnofiello" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/matt-parnofiello"> <div>Matt Parnofiello</div> </a> </div> <div class="author-bio"> <p> <div><p>In his role as Senior Business Development Strategist and Senior Public Safety Strategist at CDW•G, Matt Parnofiello manages technology integration projects with public safety agencies from concept to implementation. Working with the CDW•G team, customers, and industry partners he provides agencies with new capabilities and improved safety through digital transformation.</p> </div> </p> </div> </div> </div> </div> Mon, 11 Feb 2019 16:17:46 +0000 phil.goldstein_6191 42091 at The Arrival of IoT Heralds Networking Management from a Distance <span>The Arrival of IoT Heralds Networking Management from a Distance</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/07/2019 - 09:00</span> <div><p>One morning last summer, I was scheduled for one of the most unique network installs of my career. It was on the Brooklyn Bridge. </p> <p>It was a sunny morning with the wind blowing gently, and behind me was the Statue of Liberty. It was idyllic, but it was business; I had on a hard hat and safety glasses and as I stood on the historic bridge, which hangs from steel cables that are almost 16 inches thick. </p> <p>The Brooklyn Bridge, an iconic New York City landmark, spans 1,595 feet across the East River, connecting Manhattan and Brooklyn. It was originally built between 1869 and 1883, and today it sees traffic of more than 100,000 cars every day. The upgraded network equipment was to be installed at the top of the bridge, some 276 feet above the waterline. <a href="" target="_blank">The New York City Department of Transportation</a> assigned one lucky guy to <strong>go to the top of the bridge to access the enclosure that housed the networking equipment.</strong></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11861"><img src="/sites/" width="58" height="58" alt="Greg Bird" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11861"> <div>Greg Bird</div> </a> </div> <div class="author-bio"> <p> <div><p>Greg Bird is a regional sales manager for Transition Networks.</p> </div> </p> </div> </div> </div> </div> Thu, 07 Feb 2019 14:00:00 +0000 phil.goldstein_6191 42086 at Why State and Local Governments Should Adopt DMARC <span>Why State and Local Governments Should Adopt DMARC</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 02/06/2019 - 09:00</span> <div><p>Humble email systems remain an attack vector for malicious cyberattacks on state and local governments, as evidenced by a recent attack <a href="" target="_blank">on Missouri’s state government</a>.</p> <p>At a state and local level, there are thousands of domains that could benefit from <strong>the protection and benefits of email authentication </strong>— three times as many as the number of federal domains. However, almost no state and local governments are properly availing themselves of authentication standards that could improve email protections, especially from phishing attacks. </p> <p>As it stands now, <strong>less than 1 percent </strong>of state and local government domains (and none of the U.S. states’ primary .gov and .us domains) are correctly protected against impersonation by using the leading email authentication standard, Domain-based Message Authentication, Reporting, and Conformance, known as <strong>DMARC</strong>, <a href="" target="_blank">according to a report from Valimail</a>, which sells online authentication tools. </p> <p><strong>“We think you need to authenticate all forms of email,” </strong>says Alexander García-Tobar, the CEO and co-founder of Valimail. He notes that email was built to be open, which lends itself to abuse, since anyone can attack anyone else. DMARC helps government agencies stop both inbound and outbound email attacks, García-Tobar adds.</p> <p>According to García-Tobar, one-third of all state and local governments get hit with cyberattacks on an hourly basis, and half are targeted on a daily basis. </p> <p>“We believe that, as an owner of a domain for state and federal agency, you have an obligation to safeguard information you have about users,” he says. “It is impossible for the states, municipalities and local utilities to be able to comply with PII or GDPR guidelines if you haven’t even locked down your email.”</p> <p>Adopting DMARC not only <strong>enhances security but improves trust with residents and private sector companies</strong> that deal with the state or local government, according to García-Tobar. </p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH:</strong> See how North Dakota aims to improve its cybersecurity. </em></a></p> <h2 id="toc_0">What Is DMARC and How Can It Help State and Local Governments?</h2> <p><a href="" target="_blank">DMARC</a>, an industry standard, is an email authentication policy and reporting protocol that is designed to prevent email spoofing — when malicious actors impersonate legitimate email senders to bait internal employees or fool those outside an organization — which is the foundation of phishing. An initiative of the <a href="" target="_blank">Trusted Domain Project,</a> DMARC was finalized in 2015 by contributors, including <a href="" target="_blank">Google</a>, Yahoo, Mail.Ru, JPMorgan Chase and <a href="" target="_blank">Symantec</a>.</p> <p>DMARC “builds on the widely deployed SPF and DKIM protocols, adding linkage to the author (From:) domain name, published policies for recipient handling of authentication failures and reporting from receivers to senders, to improve and monitor protection of the domain from fraudulent email,” notes <a href="" target="_blank">According to the U.S. Department of Homeland Security</a>, setting a DMARC policy of “reject” gives agencies the “strongest protection against spoofed email, ensuring that unauthenticated messages are rejected at the mail server, even before delivery.”</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Cybersecurity-report_HowStrong%20(2)_0.jpg" data-entity-type="" data-entity-uuid="" src="" /></a></p> <p>Additionally, DHS notes that DMARC “reports provide a mechanism for an agency to be made aware of the source of an apparent forgery, information that they wouldn’t normally receive otherwise. Multiple recipients can be defined for the receipt of DMARC reports.” According to the Valimail report, of the<strong> 4,273 </strong><strong>domains</strong> it analyzed, only 220 <strong>(5.1 percent) </strong>had DMARC records. Of the groups it tracked in its quarterly reports, this is among the lowest adoption rates the firm has seen, the next closest being global media companies at 15 percent. </p> <p>Of those state and local domains who have deployed DMARC, <strong>63 </strong>were invalid due to syntax errors or other misconfiguration and <strong>132 </strong>had correctly configured DMARC records but lacked enforcement (anti-spoofing protection) because they were set to a monitoring-only policy. Meanwhile, <strong>25 </strong>were set to an enforcement policy (reject or quarantine), protecting these domains from impersonation. </p> <p>Ultimately, that means that<strong> just 0.6 percent</strong> of state and local government domains had correctly deployed DMARC. </p> <p><a href="" target="_blank"><em><strong>VIDEO: </strong>These are the cybersecurity threats that keep state CISOs up at night. </em></a></p> <h2 id="toc_1">How Public-Sector Officials Can Enhance Email Security</h2> <p>There are several reasons why state and local government adoption of DMARC may be low, especially compared to the federal government, <a href="" target="_blank">which Valimail says is now running</a> on <strong>80 percent </strong>of federal domains. </p> <p>For one, there has been <strong>no mandate</strong> that state and local government adopt DMARC, unlike in the federal government, <a href="" target="_blank">where agencies were required to do so in October 2017</a>. </p> <p>García-Tobar says there is also<strong> a lack of awareness</strong> among state and local government CIOs and CISOs regarding the threats from email and how easy it is to spoof emails. They assume that someone is securing their emails, but that is not possible unless domains are authenticated. </p> <p>“Once we do a complimentary domain analysis, we show that a third or half of emails that have their domain or are sent from their domain as them are criminal,” García-Tobar says. </p> <p>Agencies also face <strong>a lack of resources</strong>. “I don’t think people understand that there is an easy way to do this,” García-Tobar says, noting that 60 percent of agencies attempt to deploy DMARC on their own and find it impossible. </p> <p>Another reason adoption is low is because of the risk of blocking “good” emails in order to stop “bad” ones from getting through, according to García-Tobar. </p> <p>DMARC helps agencies stop email attacks and prevents malicious actors from impersonating official domains. The result is that <strong>“people now trust your emails,”</strong> García-Tobar says. That’s especially important for agencies like tax collection agencies that need residents and businesses to trust their communications so that they respond to notices and submit tax returns, for example. </p> <p>Agency IT leaders can work with a variety of vendors to test whether their domains are covered by DMARC as well as how much of their email traffic is fraudulent. That then helps IT leaders prioritize which domains need to be locked down and secured first. Those are usually the ones that deal with personally identifiable information, García-Tobar says. </p> <p>Once DMARC is deployed, it informs a gateway, anywhere in the world, that it should send a report back to the owner of the domain or anyone the owner authorizes. Those reports then show what is happening on the domain — that valid emails are getting through and malicious ones are being blocked, García-Tobar says. </p> <p>“Email is the No. 1 way you can expose PII,” he says. <strong>“We think it’s a responsibility to get this done.”</strong></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is the web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Wed, 06 Feb 2019 14:00:00 +0000 phil.goldstein_6191 42081 at Why Connected Intersections Are the Backbones of Smart Cities <span>Why Connected Intersections Are the Backbones of Smart Cities</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 02/04/2019 - 13:21</span> <div><p>Smart cities and connected transportation continue to <a href="">gain popularity with city officials and citizens alike</a>. From <a href="">streetlights</a> to bus stops to <a href="">parking meters</a>, smart cities are continuing to expand their <a href="">connected transportation systems</a>. With many entry points to starting a smart community, public officials first need to decide an important question: <strong>“Where do we start?” </strong></p> <p>One smart option is connected intersections, and the good news for public officials is that there is assistance to all states in the form of the <a href="" target="_blank">SPaT Challenge</a> (SPaT stands for <strong>Signal Phasing and Timing)</strong>. Created by the U.S. Department of Transportation along with the National Operations Center of Excellence, the SPaT Challenge is an initiative challenging state and local transportation officials to create approximately <strong>20 connected intersections in every state by 2020</strong>.</p> <p>Connected intersections are a foundational piece for a smart and connected city. When done correctly, they can support a city’s technological growth by bringing separate applications together. </p> <p>Using traffic signals that work directly with the platforms and network underlying a smart city, <strong>connected intersections can act as the ultimate conductors</strong>. They control traffic patterns, communicate with emergency service vehicles on the road and even “talk” with the ever-growing presence of smart cars. With connected intersection technology, city officials can be confident intersections in their cities are safe, which affects the safety of the roadways and cities overall.</p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>Find out how cities can overcome challenges to smart city deployments. </em></a></p> <h2 id="toc_0">Connected Intersections Build Safety and Security</h2> <p>As cities continue expanding the use of smart and sensor-driven technology, a major expectation of these investments is that they will help improve safety. With millions of traffic incidents occurring each year, lives are at stake. With connected intersections, the signal timing of stoplights can be prioritized to <strong>best meet the needs of real-time traffic situations</strong>. </p> <p>Relying on communications from ambulances, connected vehicles and sensors on the roadways, connected intersection technology can control traffic signals that correspond with activity on the roads. In fact, intersection-focused safety applications <strong>could help address up to 575,000 crashes and 5,100 fatalities per year</strong>, <a href="" target="_blank">according to Iowa State University research</a>. </p> <p>For instance, during rush hour when a large number of pedestrians are on the street, a traffic light downtown could be timed to delay for an extra few seconds before a light turns green to better ensure the crosswalk is clear. This can create not only safer roads, but also roads with less traffic congestion.</p> <p>Of course, citizens want to know their vehicles and personal data remain secure — even when shared with the traffic camera and roadway sensors. Data coming into an intersection network from a connected vehicle or sensor is <strong>randomized and changes every 10 seconds</strong>, which means no personal identifiable information of a citizen is ever shared. </p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="" /></a></p> <p>In 2019, we will see more advancements to keep citizens safe with the use of blockchain to authenticate data transactions on the roads and at the intersections, ensuring all cars and drivers on the network are safe.</p> <p>Beyond physical citizen safety is the safety and security of the city’s network. Each city that deploys connected technology relies on a network to keep the technology up and running. </p> <p>Connected intersections bring information from various network sensors — on the roads, on the emergency management vehicles and even on the snowplows — into a central hub for the data. By bringing data into a centralized location, connected intersections can<strong> help find anomalies across the network and flag anything that does not seem right</strong>. </p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH:</strong> Discover why these smart cities are the ones to watch. </em></a></p> <h2 id="toc_1">Connected Intersections Serve as the Foundation for Smart Cities </h2> <p>Another key characteristic of connected intersections is that they can act as the first layer of smart city development for city officials to build on. They are the first step into the creation of a smart city. </p> <p>Because the data from roadway sensors and emergency vehicles can go to a centralized location, the information no longer sits in silos. The integration of this data not only improves security as noted above, but it also can be used to <strong>create a more efficient city</strong>. The connected intersection gives city officials a taste of how their cities can become more efficient.</p> <p>Connected intersections also help cities foray into a smart city with existing traffic controllers already in place to update processes without fully replacing the system. Also, pedestrian safety systems can be applied on top of the connected intersection technology to create safer streets for cars and pedestrians alike.</p> <h2 id="toc_2">What Comes Next with Connected Intersections?</h2> <p>Looking forward, cities will begin to deploy smart intersections at a rapid pace. As more cities rely on the technology to create safer roadways for their citizens and to build a fully smart city, city officials will begin to see not only a wide range of safety benefits, but also <strong>environmental benefits they didn’t see before, with less traffic congestion</strong>. </p> <p>This year marks a turning point for the technology and will be the year that connected intersections are not only part of the planning discussions, but are made a reality.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11856"><img src="/sites/" width="58" height="58" alt="Michelle Maggiore" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11856"> <div>Michelle Maggiore</div> </a> <a target="_blank" class="twitter" href=";screen_name=maggiore_m&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Michelle Maggiore leads transportation business development for Cisco’s Smart and Connected Communities. She is a professional transportation engineer with 20 years of experience in performance management and strategic planning for transportation agencies and local governments, most recently applying her background to the deployment of technology in the public sector. At Cisco, she advises public sector customers on implementing technologies to support connected and automated vehicles.</p> </div> </p> </div> </div> </div> </div> Mon, 04 Feb 2019 18:21:38 +0000 phil.goldstein_6191 42071 at Blockchain Technology Explained: The Biggest Use Cases for State and Local Government <span>Blockchain Technology Explained: The Biggest Use Cases for State and Local Government</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 01/31/2019 - 11:12</span> <div><p>Along with artificial intelligence and the Internet of Things,<strong> blockchain </strong>is one of a handful of technologies that might have more buzz around it than actual deployments across state and local governments.</p> <p><strong>Blockchain technology</strong>, in and of itself, cannot replace legacy systems for databases, record keeping or transaction management, but it can enhance such systems, experts say. <strong>Blockchain voting</strong> is also getting more attention, though cybersecurity experts are skeptical about it and it has not been tried in the United States on a large scale yet.</p> <p>Most state government officials are still in a wait-and-see mode about the technology, though blockchain use cases continue to proliferate. According to <a href=" Blockchains in State Government.pdf" target="_blank">a 2017 National Association of State CIOs report</a>, <strong>63 percent </strong>of those surveyed were still investigating blockchain in state government with informal discussions, <strong>26 percent </strong>said there were no discussions of blockchain at that time and <strong>5 percent </strong>had adopted blockchain technology in support of some state government services. </p> <p><a href="" target="_blank">Mark Fisk</a>, a partner at <a href="" target="_blank">IBM</a> Global Services Public Sector who specializes in blockchain, says state and local government leaders should begin to think about blockchain by <strong>considering their business networks and the challenges they experience</strong> in them as they work toward common goals.</p> <p>“Where blockchain comes in is, if those challenges involve <strong>trust, transparency, accountability </strong><strong>and</strong><strong> visibility</strong>, that is where we talk about how a blockchain capability can help address some of those challenges,” he says.</p> <p>As opposed to one member of a business network being the one that verifies transactions and serves as a source of truth, <strong>blockchain enables the entire business network to do so.</strong></p> <p>If government agencies have tried traditional mechanisms for standing up centralized capabilities, or for collaborating and sharing information, and they still have challenges, blockchain technology can help, Fisk notes.</p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>These are the top state and local government IT trends to watch in 2019. </em></a></p> <h2 id="toc_0">What Is Blockchain Technology?</h2> <p>Blockchain technology, the NASCIO report notes, “fits into the enterprise as a new and growing capability for creating, recording, and verifying transactions instantaneously using a decentralized autonomous logic.”</p> <p>No central authority is required to authorize, verify or approve a transaction. Instead, blockchain serves as “<strong>a shared, global, incorruptible and therefore trusted ledger of economic transactions</strong>. It is controlled equally by all who wish to participate and transparent, yet private.”</p> <p>A blockchain is a steadily growing count of “blocks” that create an immutable record where each block is “chained” or linked to the previous block using state of the art cryptography, NASCIO notes. <strong>Each entry in the blockchain is recorded and then validated and reconciled by all participants in the network</strong> to ensure its consistent integrity.</p> <p><iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="394" src="" width="700"></iframe></p> <p>“Blockchain technology can be programmed to record not just financial transactions, but <strong>nearly anything that holds value and can be expressed in code</strong>,” NASCIO notes. “Anything from birth, death and marriage licenses, to property deeds and titles of ownership, educational certificates, financial accounts, medical procedures, insurance claims, to votes, the possibilities are truly limitless.”</p> <p>The public sector is interested in using blockchain for selective data sharing, say between different government agencies or organizations, Fisk says, in a way that allows them to get visibility into not just the information but the rules that go with the information. State and local government agencies are also turning to blockchain for added data security — “protected from the outside, privacy from the inside,” Fisk says.</p> <p>State and local government agencies often have a need to regulate and audit, Fisk adds, so blockchain provides them with a way to do that, but in a way that the business network members agree on.</p> <p><a href="" target="_blank"><em><strong>GET STARTED: </strong>Register for the StateTech Insider program today.</em></a></p> <h2 id="toc_1">How to Set Up a Blockchain for Government</h2> <p>Once a government agency decides it wants to use a blockchain, it needs to define the rules and roles of the blockchain, <strong>what data is going to be added to the ledger</strong> and what the security policies are going to be, and what counts as a valid transaction on the blockchain networks, Fisk says</p> <p>Most blockchains are built on the <a href="" target="_blank">Hyperledger Fabric</a>, an open-source blockchain framework implementation, which enables those aspects through a permissioned blockchain. Users access their nodes on the blockchain through <a href="" target="_blank">a REST application programming interface</a>, and users may access a common application or use an API to access a legacy system or to feed an analytics warehouse. Coding the blockchain rules is relatively simple and can be done in JavaScript, and once the ledger is defined, interacting with the blockchain is as simple as interacting with a REST API, Fisk says. </p> <p>IBM has <a href="" target="_blank">a cloud-hosted solution</a> for the Hyperledger Fabric, <a href="" target="_blank">as do</a> other <a href="" target="_blank">firms</a>, such as <a href="" target="_blank">Oracle</a> and <a href="" target="_blank">Microsoft</a> with its <a href="" target="_blank">Azure platform</a>. </p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="" /></a></p> <p>Once an agency is partnering with a vendor that uses the fabric to build the blockchain, that is “half the battle,” according to Fisk. The other half of the battle is how the agency will use it.</p> <p>Agencies may use blockchain to feed existing processes and systems and make them more transparent. Often, though, agencies <strong>use blockchain for new capabilities, and new data sets </strong>they did not previously use, such as sensor data from IoT sensors. Or it can be used to create web portals or applications that give users greater visibility into data, without the user ever even knowing it is a blockchain supporting the app. </p> <p><strong>“It’s a journey of where you’re trying to go,” </strong>Fisk says. “But once you get a blockchain up and running, you have this better, more trusted information. You are probably doing some digital reinvention or business process change because you now have the ability to do so.”</p> <p>State and local governments that want to use blockchain to replace legacy systems are going down the wrong path, Fisk says. Instead, they should focus on what their business network challenges are, the capabilities they cannot implement and whether they can use blockchain technology to enhance or complement existing systems.</p> <p>That requires having an IT leader that sponsors the blockchain, as well as buy-in from agency leaders. Then, agencies should conduct pilot projects to demonstrate the value of the technology, Fisk says.</p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>Discover the drivers of technology innovation in government. </em></a></p> <h2 id="toc_2">Blockchain Technology Use Cases for State and Local Government</h2> <p>There are numerous blockchain technology use cases, and many state governments are pursuing blockchain initiatives. In 2018, a total of <strong>18</strong> states <a href="" target="_blank">introduced some form of legislation</a> related to blockchain technology and <strong>nine</strong> bills became law, according to a tally from the National Conference of State Legislatures.</p> <p>For example, <a href="" target="_blank">Colorado’s Department of State</a> is now required to consider research, development, and implementation for encryption and data integrity techniques, including distributed ledger technologies such as blockchain. <a href="" target="_blank">A law in Tennessee</a> now recognizes the legal authority to use blockchain technology and smart contracts in conducting electronic transactions.</p> <p>And <a href="" target="_blank">a Wyoming law</a> authorizes corporations to use electronic networks or databases for the creation or maintenance of corporate records.</p> <p>The NASCIO report notes that early applications of blockchain technology are “circumstances involving <strong>audit; audit trail; necessary record of information lineage;</strong> multiple systems or databases that must be reconciled due to recording errors; managing physical or digital assets; managing ownership; managing contracts or agreements involving many secondary parties.”</p> <p>Blockchain can help state and local government agencies <strong>encode and confirm or transfer property</strong>; in the transfer of currency, stock, private equity, bonds, derivatives; facilitate crowdfunding; <strong>manage the lineage of land titles, vehicle registries, business licenses, passports, voter IDs, death certificates, and proof of insurance</strong>; manage and execute contracts, signatures, wills, trusts, and escrows; and serve as a secure way to provide physical asset keys that manage access to homes, hotel rooms, rental cars or private cars.</p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH:</strong> Find out how state and local government can rethink IT acquisition. </em></a></p> <h2 id="toc_3">Blockchain Technology for Voting: Can It Be Secured?</h2> <p>Another use case for blockchain is in elections and voting. <a href="" target="_blank">Advocates argue</a> that blockchain can also enable secure, real-time representation with decentralized voting.</p> <p>This past election season, the state of West Virginia <a href="" target="_blank">implemented a blockchain-based voting app</a> for the first time. Secretary of State Mac Warner reported that in the 2018 midterm elections, <strong>144</strong> military personnel stationed overseas from 24 counties were able to cast their ballots on a mobile, blockchain-based platform called Voatz.</p> <p>Here is how it works, <a href="" target="_blank">per the <em>Washington Post</em></a>:</p> <blockquote><p>To cast a ballot, voters must first register through the app by uploading an image of their driver’s license or other photo identification. Then the app instructs them to submit a short video of their own face. Facial recognition technology supplied by a voter’s iPhone or Android device matches the video against the photo ID, and the personal information on the ID is matched to West Virginia’s voter registration database. Once the verification is complete, voters can make their selections and confirm their ballot by fingerprint or facial recognition.</p> </blockquote> <p>However, Michael Queen, deputy chief of staff to Warner, said West Virginia has <strong>no plans to extend the use of the ap</strong>p. “Secretary Warner has never and will never advocate that this is a solution for mainstream voting,” Queen told the <em>Post</em>.</p> <p><a href="" target="_blank">Maurice Turner</a>, an election security expert at the Center for Democracy and Technology, tells the <em>Post </em>the blockchain system is likely more secure than sending in an absentee ballot via email, and uses facial recognition technology. However, he says it is still far less secure than submitting a paper ballot in person.</p> <p><img alt="Tweet on blockchain " data-entity-type="" data-entity-uuid="" src="/sites/" /></p> <p><a href="" target="_blank">Johns Hopkins University cryptography professor Matthew Green</a> has numerous <a href="" target="_blank">concerns about blockchain voting technology</a>, and a key one is that the technology relies on computer hardware and software that could potentially be compromised.</p> <p>“Protecting connected devices against hacking is hard enough, and, even if that could be achieved, developing an online system that preserves all the attributes we expect from democratic elections would be incredibly difficult to pull off,” <a href="" target="_blank"><em>MIT Technology Review</em> reports</a>.</p> <p>“No matter how much it might seem at first like it's ‘perfect’ for it, <a href="" target="_blank">civil voting just isn't a good application for blockchain</a>," tweeted <a href="" target="_blank">Matt Blaze</a>, a University of Pennsylvania computer science and cryptography professor and expert on electronic voting security.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is the web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 31 Jan 2019 16:12:45 +0000 phil.goldstein_6191 42066 at San Francisco Considers Banning Facial Recognition Tech <span>San Francisco Considers Banning Facial Recognition Tech </span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 01/31/2019 - 09:42</span> <div><p>A local lawmaker in San Francisco has <a href="" target="_blank">introduced legislation</a> that would make the city the first in the country to <strong>ban the use of facial recognition technology</strong>. <a href="" target="_blank">As StateScoop reports</a>, the bill “would prohibit all city agencies, including law enforcement, from using the technology and any information gleaned from it.”</p> <p>“We know that facial recognition technology, which has the biases of the people who developed it, disproportionately misidentifies people of color and women,” city supervisor Aaron Peskin, who introduced the bill, told the <em><a href="" target="_blank">San Francisco Examiner</a></em> on Tuesday. “This is a fact.” </p> <p><a href="" target="_blank">Research from the FBI</a> has found that some demographic groups “are more susceptible to errors in the face matching process,” StateScoop notes. <a href="" target="_blank">Microsoft</a> has <a href="" target="_blank">called for new laws</a> to regulate the use of facial recognition technology. </p> <p><a href="">As <em>StateTech</em> has reported</a>, surveillance cameras have become pervasive in many cities in recent years. Although there are clearly privacy concerns in some cities, IP-based video cameras <strong>can improve security, discourage people from committing crimes, provide first responders with situational awareness</strong>, help police solve crimes and serve as evidence to secure convictions.</p> <p>The proposed ban is part of <strong>a wider package of rules aimed at enhancing oversight of surveillance tech</strong> in San Francisco.</p> <p><a href="" target="_blank"><em>Wired </em> reports</a>:</p> <blockquote><p>In addition to the ban on facial recognition technology, the ordinance would require city agencies to gain the board’s approval before buying new surveillance technology, putting the burden on city agencies to publicly explain why they want the tools as well as the potential harms. It would also require an audit of any existing surveillance tech — things like gunshot-detection systems, surveillance cameras, or automatic license plate readers — in use by the city; officials would have to report annually on how the technology was used, community complaints, and with whom they share the data.</p> </blockquote> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is the web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 31 Jan 2019 14:42:42 +0000 phil.goldstein_6191 42061 at North Dakota Considers Major IT and Cybersecurity Unification Effort <span>North Dakota Considers Major IT and Cybersecurity Unification Effort </span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 01/30/2019 - 10:42</span> <div><p>While <a href="" target="_blank">Oklahoma’s legislature is considering a bill</a> that would splinter the state’s IT operations, about 1,000 miles to the north along Tornado Alley, North Dakota is contemplating the opposite: more centralization and unification. </p> <p>North Dakota’s legislature will decide this year on <a href="" target="_blank">a budget proposal</a> from Gov. Doug Burgum for the 2019-21 fiscal cycle that would boost the state’s IT budget, <strong>unify the state’s IT service and centralize its approach to cybersecurity</strong>. Under the proposal, the state would unify its cybersecurity efforts for nearly all of North Dakota’s public institutions. </p> <p>The budget proposal includes <strong>$174 million </strong>for technology investments, spread among <strong>24 IT projects supporting 19 agencies</strong>, which the proposal says, “will improve public safety, citizen-government interactions and voting integrity.”</p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>See why California CIO Amy Tong wants to focus on cybersecurity. </em></a></p> <h2 id="toc_0">North Dakota Would Unify IT Functions</h2> <p>North Dakota CIO Shawn Riley <a href="" target="_blank">tells the <em>Bismark Tribune</em></a> that the IT proposals have three goals:<strong> lowering costs, improving cybersecurity and streamlining online services to deliver an “Amazon experience” for residents</strong>. </p> <p>Riley’s department has led a unification project to group state websites on one platform that so far serves 26 state agencies and has <strong>saved than $500,000</strong>, according to the <em>Tribune</em>. “Unification helps us bring systems together, helps us inventory systems, helps us do work processes together — tons and tons of things that really are necessary from a strategy standpoint,” Riley said.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="CDW Cybersecurity Insight Report " data-entity-type="" data-entity-uuid="" src="" /></a></p> <p>The proposal says the state must incorporate innovative technologies to better serve residents, and enhance citizen experience and government performance. Under the IT unification plan, Burgum’s budget blueprint recommends <strong>aligning 145 full-time employees from 17 cabinet agencies</strong> into one shared IT service, “while maintaining their physical presence within the agencies.” This will reduce redundancy and streamline operations through standardization, the proposal argues. </p> <p>"If we measure all FTEs and requested changes together — and adopt at least some unification practices — I believe fully funding our cyber security needs is completely possible this legislative session," Rep. Corey Mock, who chaired the state's interim IT Committee, told the <em>Tribune</em>. </p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>These are the top state and local government IT trends to watch in 2019. </em></a></p> <h2 id="toc_1">North Dakota Aims to Bolster Cybersecurity</h2> <p>Over a six-month period last year, North Dakota’s IT systems and networks experienced <strong>34 million</strong> vulnerability attacks directed at software, <strong>3.3 million</strong> denial of service attacks and <strong>88 million</strong> spam or phishing emails.</p> <p>Last September, <a href="">Riley told a bipartisan group of state lawmakers</a> that his agency would ask for more than <strong>$11 million</strong> in software upgrades and 37 additional cybersecurity experts in the next two-year budget. </p> <p>The budget proposal actually <strong>requests $16.4 million for cybersecurity and funding to hire 17 new full-time cybersecurity employees</strong>, most of whom would focus on the state’s educational institutions, <a href="" target="_blank">according to StateScoop</a>. </p> <p>The budget request notes that cyberthreats to the state’s financial assets and residents’ data are growing daily, and that “attempted disruptions from hacktivists, organized criminal activity like ransomware and persistent attacks from foreign nation-states are the new status quo for states, university systems and large municipalities.”</p> <p>The budget blueprint says it is “nearly impossible and full of risk for the over 400 organizations that touch our statewide network to each separately be responsible for their own cybersecurity.” </p> <p>“A lot of different entities from K–12 to higher ed, state, political subdivisions are all landing on the same network, so it's a pretty large attack surface,” North Dakota CISO Sean Wiese <a href="" target="_blank">tells local TV station KFYRTV</a>.</p> <p>The budget proposal vows to “centralize our approach to cybersecurity to be more coordinated, intelligent and effective in managing identities and protecting data.” Only 22 percent of the states’ executive branch is managed under a central cybersecurity defense, but the changes would <strong>boost that figure to 78 percent</strong>. </p> <p>An internal review in September showed the state's security ranks average at 1.2 out of 5, but if the budget request goes through, the IT department estimates that figure could jump to a 3.1, according to KFYRTV. “So, it is a pretty big leap. It does move us much further in the scale and gives us a much better protection across the state,” Riley tells KFYRTV.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is the web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Wed, 30 Jan 2019 15:42:51 +0000 phil.goldstein_6191 42056 at Winter 2019 <span>Winter 2019 </span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 01/30/2019 - 07:58</span> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="" data-title="Winter 2019" data-via="StateTech" data-button-background="none"> <span> <span>Jan</span> <span>30</span> <span>2019</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="" data-title="Winter 2019" data-via="StateTech" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href=";" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="" data-title="Winter 2019" data-via="StateTech" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Wed, 30 Jan 2019 12:58:32 +0000 phil.goldstein_6191 42051 at