You are here

The Byte

Microsoft announced that as of Jan. 12 it will no longer be providing technical support and security updates for its Internet Explorer 8, 9 and 10 web browsers. The company is encouraging customers to upgrade to Internet Explorer 11 or to Microsoft Edge, its new web browser that comes with Windows 10.

If customers stick with older versions of the web browser they could be exposing themselves to security vulnerabilities and malware, Microsoft says.

Read the Original Story

Help your employees work together using collaboration technologies. CDW has created a guide to help enterprise planners understand the challenges, opportunities and benefits these technologies can bring to your enterprise. Download the CDW Digital App here.

Read More

Personal mobile devices continue to work their way into government, according to a survey of more than 1,000 federal employees:

49% Use a personal device to download work-related documents40% Ignore federal rules governing personal phone use at work24% Install applications from places other than official app stores20% Will sacrifice security for the convenience of using a personal device7% Have rooted or “jailbroken” a device they use for work

SOURCE: Lookout, “Feds: You have a BYOD program whether you like it or not,” June 2015

Read More

MaaS360, IBM’s cloud-based enterprise mobility management tool, became the first of its kind to become FedRAMP certified for wider government use. More than 50 government agencies have been using MaaS360 after it received FISMA Moderate Authority to Operate in 2011.

Read More

“It is our goal to modernize more of the FCC’s legacy IT to SaaS and other cloud-based platform options going forward. This modernization is more flexible, secure and resilient, as well as more cost-effective compared with the costs of maintaining on-premises IT solutions.”- David Bray

Bray is CIO of the Federal Communications Commission. Bray discusses the FCC’s IT infrastructure modernization on the official FCC blog, one of FedTech’s 50 Must-Read Federal IT Blogs

Read More

Citizens can now rate government agencies the same way they rate their favorite burrito spot.

The federal government has officially partnered with Yelp, best known for its online restaurant reviews, to provide a way for citizens to rate such things as agency field offices, TSA checkpoints and national parks.

Under the deal, agencies will take ownership of their Yelp pages to engage with users. The feedback will help agencies improve their operations and relationships with citizens.

Read More

Government websites see a tremendous amount of traffic at about 400 million hits per month. Some sites, such as the IRS, see hits surge depending on the time of year, while others are constantly at the top of the list. The most trafficked domains in August:

51.6 million hits: National Library of Medicine46.6 million hits: National Weather Service21.5 million hits: Internal Revenue Service19.4 million hits: Centers for Disease Control and Prevention17.8 million hits: USAJOBS

SOURCE: analytics.usa.gov, Sept. 3, 2015

Read More

Microsoft on Tuesday unveiled the Surface Book, what it's calling "the ultimate laptop."

Microsoft came to its latest press conference on Tuesday armed with more than a few announcements. But none shook the tech world quite like the news that Windows creator was entering the notebook market.

After concluding the announcement of the new, slimmer and more powerful Microsoft Surface Pro 4 tablet, Surface creator Panos Panay teased audiences with a new addition to the Surface family — a device performs like a tablet and a notebook computer.

"We made the ultimate laptop," Payan said. "This is the fastest 13-inch laptop ever made, anywhere, on any planet."

Read More

Research based on interviews with 302 public sector cybersecurity leaders suggests that better use of data analytics would improve cyberdefense. The findings:

86%: Mining Big Data can improve IT security.76%: IT teams tend to be reactive rather than proactive.61%: Better data could help detect breaches.51%: Agencies would monitor threats in real time if possible.49%: Data should be used to perform post-attack reviews.

SOURCE: MeriTalk, “Go Big Security,” May 2015

Read More

Pages