Frederic Lardinois, Tech Crunch, Tuesday, May 19, 2015
Google today announced yet another round of price cuts for its cloud computing platform, as well as a new instance type that will allow businesses to save even more on some of their cloud computing tasks. Today’s cuts focus on the Compute Engine side of the service and include cuts of up to 30 percent for the smallest instances. A Micro instance on Google Cloud platform will now cost as little as $0.006 per hour under regular usage. For other instance types, the price cuts are somewhat less dramatic and range between 5 percent for High CPU instances and 20 percent for the Standard instances.
Jennifer Valentino-DeVries, Wall Street Journal, Tuesday, May 19, 2015
A dilemma this spring for engineers at big tech companies, including Google Inc., Apple Inc. and Microsoft Corp. shows the difficulty of protecting Internet users from hackers. Internet-security experts crafted a fix for a previously undisclosed bug in security tools used by all modern Web browsers. But deploying the fix could break the Internet for thousands of websites.
Megan Smith and Roy L. Austin, Jr., OSTP, The White House, Monday, May 18, 2015
The President’s Police Data Initiative has assembled a volunteer team of technology experts who are also in Camden today. The team will spend two days in Camden on a design sprint, engaging directly with front line officers, detectives, crime analysts and department leadership to help envision what a truly effective technology system could look like. The two-day deployment will help the team consider best practices and address specific technology questions as they arise, enabling departments like Camden to find the solutions that most fit their needs.
Molly Bernhart Walker, Fierce Government IT, Monday, May 18, 2015
The Federal Risk and Authorization Management Program, or FedRAMP, has played a critical role in accelerating the authorization of cloud computing services across the federal government. Some have suggested a similar program – a FedRAMP for cloud brokers – would be helpful for agencies seeking to strike up a relationship with a cloud middleman, but an official with GSA's Federal Acquisition Service says it's probably not feasible.
Robinson Meyer, The Atlantic, Saturday, May 16, 2015
On Friday, 34 civil rights groups—including the ACLU, NAACP, and Leadership Conference on Civil and Human Rights—announced principles that they hope will guide national and local policy on body cameras. Broadly, they say that city and state rules about body cams must be public: developed with the public and then available to the public. They ask for “limitations” on what kinds of technology can be used to sift through the footage, like facial-recognition algorithms. And—in the most specific policy described—they dictate that police officers should submit their own incident reports before getting to view body-camera footage, thus preserving the “independent evidentiary value” of both.
Civil Rights, Privacy, and Media Rights Groups Release Principles for Law Enforcement Body Worn Cameras
The Leadership Conference on Civil and Human Rights, Friday, May 15, 2015
Today, a broad coalition of civil rights, privacy, and media rights organizations released shared civil rights principles for the use of body worn cameras by law enforcement. As body worn cameras come into greater use by law enforcement across the country, the signers are urging police departments to follow certain principles to ensure that the cameras are a tool of public accountability and transparency. Video footage that documents law enforcement interactions with the public — whether gathered through body worn cameras or citizen video of police activities — can have a valuable role to play in the present and future of policing. At the same time, the arrival of new video equipment does not guarantee that a police agency will better protect the civil rights of the community it serves.
Sens. Edward J. Markey and Orrin Hatch, The Hill, Friday, May 15, 2015
Schools may be winding down to the end of the school year, but as they do so, they are also ratcheting up the use of technology to bolster student engagement. Whether on a computer or in the cloud, digital tools are being used to help improve students’ reading, writing and arithmetic skills. But as student information moves from folders in a cabinet to the folders in the cloud, we need to ensure that the enormous power of technology is harnessed to the benefit of students and not for any unknown means.
Kenneth Corbin, CIO, Friday, May 15, 2015
Among federal CIOs, there is no shortage of interest in the cloud, but many agency IT leaders say they worry about security, what kind of support they'll get from their vendor, and the restrictions that come with long-term contracts, among other issues, government IT insiders say.
Tracy Mitrano, Inside Higher Ed, Thursday, May 14, 2015
We are all on the same page! After years of bridging the gap between “privacy” and “security” my sense in the aftermath of these two conferences is that higher education community is becoming increasingly aware and interested in closing the gap between these two areas of law, technology and business practice on our campuses. A more sophisticated approach, one that transcends each of those respective areas in favor of comprehensive information management programs that seek institutional governance, compliance and risk management.
Cory Bennett, The Hill, Thursday, May 14, 2015
Sens. Orrin Hatch (R-Utah) and Ed Markey (D-Mass.) reintroduced a bill on Wednesday to restrict education companies from selling or using student data to target ads. The measure would also require private companies to meet certain data security requirements when handling student information.