Year in Review 2022: GovTech's Words of the Year

Year in Review 2022: GovTech’s Words of the Year

In crafting our annual review of the year, a handful of phrases stood out that were new or gaining momentum in 2022. From “borderless hiring” to “zero trust,” these are some key terms from the last 12 months.

Hiring without borders: Hire staff outside the geographic boundaries of a jurisdiction. As governments increasingly embrace hybrid and remote working, some have begun to open job openings to candidates across city, county or state borders. Though the practice is far from common — and in some places it’s legally prohibited — a handful of states have embraced Hiring Without Borders, and agencies like Orange County, Florida, IT reports, l are seriously considering.

Ghost library: An on-site unstaffed library that offers things like keyless entry, computers, Wi-Fi, and automated payment, in addition to books and other resource materials. Shadow libraries have gotten their start overseas in recent years, but in 2022 the first shadow library opened in the United States, in Jefferson County, Colorado. Other US libraries open for limited hours without staff, but most of the time they are full-service facilities. .

Hyperconverged infrastructure: A computing architecture that brings together network, storage, and computing to allocate resources more efficiently by managing them all in one place rather than separately. HCI allows for flexibility, can be hosted on-premises or in multiple clouds, and can make an organization more resilient to cyberattacks or natural hazards.

Information disorder: Information disorder broadly refers to misinformation, misinformation, and misinformation and their adverse societal effects. Misinformation refers to lies that are deliberately spread, while misinformation refers to untruths inadvertently spread by someone who believed what they were sharing was true. CISA defines misinformation as factual information “used out of context to mislead, harm or manipulate”.

Low-Code/No-Code: A method of software development that does not require deep technical knowledge of coding. Users of low-code/no-code tools can build systems such as ERP platforms and analytics tools with point-and-click or drag-and-drop actions, often accompanied by robotic process automation. This allows organizations to purchase an off-the-shelf software solution and tailor it to their own needs without learning new coding skills.

Metavers: A virtual reality space where people interact with other users and with a computer-generated environment the same way they do in real life. The metaverse isn’t new, not quite, dating back nearly 20 years with the creation of online media platforms like Second Life. In 2022, however, the government has started planning and embracing the concept in different ways, primarily higher education.

Quishing and Smishing: New cybersecurity threats that target users via QR codes and mobile phones as attack platforms. Quishing is typically used in combination with email phishing, using QR codes to direct users to a fraudulent website that asks for an email address, ultimately sending a phishing attack. Smishing is basically a phishing attack that is sent via text messages (SMS) to mobile devices.

Calculation of the sky: As can be understood, sky computing sits above the cloud and aims to make cloud platforms that are independent and incompatible with each other interoperable. According to two professors at the University of California, Berkeley, sky computing would enable true multicloud application development with three layers (compatibility, intercloud, and peering) that together “realize the vision of utility computing” that the cloud was meant to achieve.

Technical/Innovation Debt: Costs that can result from not investing in new technologies, as well as not evaluating and improving platform capabilities. For example, cybersecurity threats continue to become more complex, but new technologies are easier to protect. Thus, innovation debt means the cost that the government might incur by choosing not to upgrade technology, thereby exposing itself to cyber vulnerabilities.

Zero Trust: A cybersecurity policy that restricts access to data and services, whether or not a device or account has been previously approved. Zero trust requires continuous authentication and strictly restricts access to only those resources that are absolutely necessary to get the job done. Zero-trust approaches are different from previous methods that allowed broad access once a user logged in, requiring stricter methods of identity verification and the widespread use of other tools like encryption.

#Year #Review #GovTechs #Words #Year

Leave a Comment

Your email address will not be published. Required fields are marked *