Cybersecurity

Here Come the Drones—And Their Security Holes

With great convenience will come great security responsibilities, experts say.

Digital Government

Why Trump Needs to Rethink His Clean Energy Policies

The Department of Energy's budget might be targeted for near-total elimination.

Emerging Tech

A Doozy of a Lawsuit Over Self-Driving Cars

Waymo is suing Uber, and says a former employee stole nearly 10 gigabytes of secret files.

Digital Government

A Bot That Identifies 'Toxic' Comments Online

A Google-funded algorithm flags messages that are likely to drive others away from a conversation.

Modernization

Amazon Argues That Alexa Is Protected By the First Amendment in a Murder Trial

Police in Arkansas are seeking 48 hours worth of recordings and responses made by an Amazon Echo.

Artificial Intelligence

Podcast: How the Government is Putting Artificial Intelligence to Work

While the private sector puts AI to use in eye-catching projects, the government is taking a different path.

Digital Government

The 'Curious' Robots Searching for the Ocean's Secrets

A new class of machines knows how to recognize and investigate unexpected things that pop up underwater.

Emerging Tech

IARPA Wants Ways to Protect Nation from Genome Editing

Gene editing could create pest-resistant crops, but it could also create new organisms that threaten humans, according to IARPA.

Digital Government

Video: Analyzing Genetic Data From the Space Station

Analyzing astronaut DNA could be the key to fixing health problems that occur in the micro-gravity environment.

Digital Government

18F Wants to Change the Rules, Not Break Them, Leader Says

Part of hacking government includes finding policies and regulations that are barriers, Technology Transformation Service Commissioner Rob Cook said.

Emerging Tech

You Have More Time To Tell Government How To Use Internet of Things

NTIA is extending the deadline for comment on a report it published on connected technology.

Cybersecurity

Could Segmentation Restore the Federal Cybersecurity Perimeter?

Using segmentation requires thinking about cybersecurity in a way almost completely opposite of tradition.