{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

States plug into Google's vax kit

State health agencies in North Carolina, Virginia, Arizona and Oregon have been using a suite of cloud-based tools from Google to manage their COVID-19 vaccine campaigns, the company said today. The “Intelligent Vaccine Impact" Google released last month was designed to give states interoperable solutions for the digital aspects of the vaccination process, like scheduling appointments or addressing some residents’ vaccine hesitancy. “We could plug and play with what’s working, and replace what wasn’t working," said Todd Schroeder, Google’s director of public sector digital strategy. Ryan Johnston reports.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

San Antonio recruits students for civic tech

The City of San Antonio last Thursday announced a new competition for college, university and trade school students interested in improving their communities through the use of digital technology. Students who enter the IgniteSA competition beginning April 1 will form teams, consult with mentors, develop their ideas and work toward developing prototype solutions for "real city challenges." Colin Wood has more on EdScoop.

The riskiest 'smart city' tech

Cybersecurity professionals surveyed by a think tank at the University of California, Berkeley said that emergency alert systems, video surveillance devices and traffic signals pose the greatest cyber risks to local governments pursuing “smart city” programs. The survey, conducted by researchers at Berkeley’s Center for Long-Term Cybersecurity, asked 76 experts to rate nine types of technologies frequently held up as core components of smart cities, based on how likely they were to be attacked by a malicious actor, how impactful a successful attack would be and how much interest they’d attract from nation-state adversaries. Benjamin Freed has details.


Four ingredients to a successful security strategy

A simple click on a malicious link can have devastating effects on an organization — stolen credentials, compromised security or, worse yet, a complete standstill of computer systems held hostage by hackers. A recent Okta white paper dives deeper into the varieties of new cyberattacks and discusses key security strategies that focus on protecting the end user. Read more here.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}