Subscribe

Digital Design
Making the move to AutoCAD Civil 3D or just getting to grips with all the new features that Autodesk regularly rolls out, can be challenging. DLT partner, IMAGINiT Technologies, sees them every day as they work on countless projects across the country. Getting the most out of Civil 3D and realizing its productivity and efficiency benefits requires a new approach to software. Keep yourself out of trouble by avoiding these top three user fails for AutoCAD Civil 3D.
Open Source
With pressure to better respond to evolving agency needs, do more with less, and all that jazz, government agencies are turning to modern tools and DevOps practices to help developers become more efficient in delivering innovative solutions.
Digital Design
AutoCAD Civil 3D is about to get another round of enhancements. If you’re using Civil 3D 2018, be the first to learn what’s new in this upcoming webinar on September 20th, 2017 at 12.00 PM ET. Join the Civil 3D product team as they share a preview of what’s coming in the AutoCAD Civil 3D 2018.1 Update. You’ll learn about some of the major efficiency improvements to common workflows including:
Cybersecurity
As government officials begin investigation of the Equifax breach that exposed the sensitive information of 143 million people, what does the breach mean for agencies themselves? After all, the U.S. government stores far more sensitive data than the private sector, and often stores it on older, more vulnerable systems.
Cybersecurity, IT Perspective
When it comes to enhancing their cybersecurity postures, federal agencies have to wade through an entire alphabet soup of regulatory compliance guidelines. From the RMF (Risk Management Framework) to FISMA (Federal Information Security Management Act) and DISA STIGs (Defense Information Systems Agency Security Technical Implantation Guides), there are a number of requirements that agencies must implement to satisfy the government’s definition of a secure environment.
Cybersecurity
Hackers are ruthless in their persistence and fortitude. It can take weeks or months for them to gather intelligence on your IT vulnerabilities, penetrate your network, and exfiltrate your precious data. But they know, and statistics prove this, that, for the most part, their victims have no idea that their network infrastructure is under attack – until it’s too late.