GEM

Government Management Information Sciences

Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Legislative Issues
The Cybersecurity Information Sharing Act was included in the 2,242-page appropriations act passed in late December. (Government Technology)

Visit http://www.govtech.com/security/Controversial-Cybersecurity-Bill-Slipped-into-Federal-1-Trillion-Spending-Bill.html to view the full article online.

 
Starting in the early 2000s, technology was slowly introduced into the engagement process – now local governments are embracing social media, mobile and desktop applications, and transparency portals. (Government Technology)

Visit http://www.govtech.com/opinion/3-Tips-for-Boosting-Citizen-Engagement.html to view the full article online.

 
Local and state governments running SQL 2005 must comply with appropriate laws and regulations. (State Tech)

Visit http://www.statetechmagazine.com/article/2015/12/state-governments-must-comply-data-security-rules-ahead-impending-sql-server-2005 to view the full article online.

 
Professional Development and Leadership
If there is one attribute that sets apart really excellent managers from more ordinary ones, it’s this: the willingness and insight to take the time to bring out latent abilities in employees and help them develop talents they sometimes didn’t even know they had. (Forbes)

Visit http://www.forbes.com/sites/victorlipman/2016/01/11/the-best-managers-always-develop-their-employees/ to view the full article online.

 
IT and cybersecurity specialists ranked the lowest among mission-critical occupations in this year's "Best Places to Work in the Federal Government" rankings. Experts blame failures in leadership. (Fed Scoop)

Visit http://fedscoop.com/whats-wrong-with-federal-it-personnel to view the full article online.

 
A round-up of some of the best news, analysis and opinion sources of 2015, for state and local tech leaders to follow into the new year. (State Tech)

Visit http://www.statetechmagazine.com/article/2015/11/50-must-read-state-and-local-it-blogs-2015 to view the full article online.

 
Geek's Corner
Here's your annual one-stop roundup of what security experts are telling us will happen next. (Government Technology)

Visit http://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-16-security-predictions-for-2016.html to view the full article online.

 
Every year, the entire personal technology industry assembles at the Consumer Electronics Show in Las Vegas to show off the results of their collective efforts. Wired staffers cruised the show floor all week to compile the most impressive products and best-designed gadgets. (Wired)

Visit http://www.wired.com/2016/01/best-of-ces-2016/ to view the full article online.

 
After a tumultuous 2015 in tech, 2016 promises to be much the same. (Info World)

Visit http://www.infoworld.com/article/3015534/internet/tech-tremors-5-bumps-to-brace-for-in-the-year-ahead.html to view the full article online.

 
The amount of personal data created is going to skyrocket as the Internet of Things becomes more pervasive. Experts at CES shared ideas for how companies should protect that data from being abused. (Fed Scoop)

Visit http://fedscoop.com/experts-call-for-privacy-and-security-to-be-design-staples-as-iot-grows to view the full article online.

 
GMIS International Headquarters
PO Box 27923 Austin, TX 78755 | 877-963-4647
www.gmis.org