CitySmart Blog

Thursday, March 15, 2012
Dave Mims, President
Americans are using mobile devices to accomplish everyday tasks from making phone calls and taking pictures to visiting websites and paying bills. According to the *Pew Internet & American Life Project, 88 percent of American adults have a cell phone. As of February 2012, most of those cell phone owners are actually using smartphones. About six in 10 adults (63 percent) go online wirelessly and according to the 2011 Mobile Year in Review on, more smartphones were purchased in 2011 than PCs.

So, how do you communicate with your citizens? Business and government agencies alike rely on mobile technology. A recent report from Government Technology states nearly 60 percent of state and local IT professionals surveyed expect their respective agencies to spend more money on mobile devices and services in 2012.

DuPage County, Ill. has come up with a great mobile solution. The DuPage Green Grid is one example of how local government is using mobile technology to communicate with its citizens. The DuPage Green Grid identifies alternative fuel stations, car share location and buildings certified by the Leadership in Energy and Environmental Design (LEED) program throughout the area. Designed as an app, it is based on GIS technology and is available to residents for free.

Local governments nationwide have actually caught onto the trend. Last year, Sacramento County launched its first app, which spotlights the health scores of nearby eateries. Various counties also have produced snowplow apps so residents can track what roads have been cleared before venturing out into snowy conditions. 

According to, one billion apps were downloaded each month worldwide in 2011. Eight trillion texts were sent last year and there was a 166 percent increase in Facebook mobile users in the first half of the year alone. Your citizens are viewing the world from a much smaller mobile lens. Since they are, make sure they see you!

* Brenner, Joanna. Pew Internet: Mobile. Pew Internet & American Life Project, February 23, 2012,, accessed on March 13, 2012.
Friday, March 09, 2012
Clint Nelms, Network Infrastructure Practice Manager
We don’t need to look too far back to recall a recent natural disaster. When it comes to local governments, there are a lot of things to consider and for which to prepare when it comes to natural or man-made disasters – including what happens to your city’s critical data when something goes wrong.

Losing critical data can hinder not just the city but also the businesses in the community. Even with that as a backdrop, many local governments don’t have the contingency plans in place to protect their cities’ valuable data – whether the loss stems from a hurricane, earthquake, snowstorm or even something much less dramatic like a busted water pipe in the building.
  • What are you doing today for data backup? Are we still swapping tapes after a nightly backup?
  • Who is checking our backups?
  • Are all of our servers being backed up?
  • Who in our community will be impacted if 'this' city server crashed?
  • How fast can we be back operationally if 'this' city server failed?
  • Are we ready if a disaster occurred? What is our plan? 
  • When did we last check our backups? Could we recover if it were necessary?

The reality is that an ounce of prevention is worth a pound of cure as far as data backup goes. Rather than waiting for the worst and hoping for a good outcome, consider frequent backups and offsite storage that is actively monitored, managed, and tested.
Friday, March 09, 2012
John Miller, Network Infrastructure Manager
There’s an old quote or phrase that states, “we have met the enemy and it is us.” Although the quote didn’t address technology concerns, in the world of IT security issues, the quote is rather applicable. In fact, many local governments and organizations are vulnerable to IT threats because of employees.

Employees are not deliberately posing threats to their organizations. The issue is a security threat called social engineering defined as a type of fraud in which the bad guys obtain information or computer system access through trickery or deception of an individual. 

Nearly 50 percent of businesses have suffered social engineering attacks according to recent report by Dimensional Research. The same report shows that 34 percent of respondents also are not educating employees of such dangers. 

Ignorance is Not so Bliss
Poorly trained employees are a major concern in the world of IT security. In fact, educating them about possible threats is the first step in addressing the issue. According to Network World, every employee is a viable target. Eighty percent of those scammed aren’t the executives in the C-suite with access to all of a company’s data. It is the “regular” worker bees who provide easy access to the fraudsters.

Educating employees and thinking like the hackers will put your local government ahead of the game when it comes to social engineering. Moreover, if you can think like a fraudster, you can take the necessary steps to prevent breakdowns.
Once employees are “educated”, take steps to keep them aware and send out regular reminders about policies such as limited or no visitation of social media sites and restrict use of company email for personal reasons.  

Who is at risk
Some local governments may think they are immune to security issues or that hackers only target the big guys. Not true. In a recent issue of Government Technology reported that an Arkansas’ sheriff’s office website had been hacked and that it was one of 70 law enforcement agencies in several states that had been victimized by hackers.

Take the time to roll out the necessary policies and training to minimize the risks to your local government and find out what other security solutions may help stem social engineering.
Thursday, January 05, 2012
Todd Snoddy, Senior Software Developer
I recently wrote a quick blog posting regarding things to consider when making the decision to develop a native or web-based mobile app.  Once a decision is made to develop a mobile web app, the developers given the task of implementing that app will likely need to consider which mobile devices their web app should target, and how the content should be displayed on devices with different resolutions.  Should the content scale automatically, or should the developer implement multiple views optimized for different resolutions?  One good reference that I came across which discusses this in more detail is located here:
Like many problems in software development, there is no “one size fits all” solution.  The article mentions a “hybrid approach” that provides good results, but it introduces some complexity and additional effort, so there are some tradeoffs to consider which will impact development time, cost, and user experience.  The bottom line is that making the decision to develop a mobile web app is just the first technical decision among many.  Unless the phrase “money is no object” applies to your project budget, you’ll want to consider your target audience and try to identify that “sweet spot” of which devices should receive a premium user experience, and then have a fallback plan for how other devices should be handled.  Lastly, don’t forget to test on multiple devices too.  HTML should be admired for trying, but there is no such thing as a “write once, run everywhere” technology.
Wednesday, December 07, 2011
Clint Nelms, Network Infrastructure Practice Manager
Do you know anyone who has had their email address compromised?  Have you started to receive spam emails from friends or family members?  Unfortunately this sort of compromise has become more and more prevalent.

Incidents like these indicate someone has used a password guesser to gain access to your mailbox.  Spammers do this to get your address list. They then blast out spam to everyone in your contacts.  Besides being a hassle, this sort of breach makes you feel like your privacy has been violated.  

How to Fight Spammers
Many online services such as Hotmail, Yahoo!®, and local services such as BellSouth are under attack constantly.  Once your account has been compromised, what do you do?  
  • Contact friends and family and tell them not to open any suspicious emails or links from your compromised account.  
  • Immediately change your password. Use a complex password with letters, numbers, a capital letter and a special character such as a dollar sign.  
  • Contact customer support and let them know your account has been compromised.  
What about prevention? 
Google has launched a service called, “2 factor authentication.”  In this configuration you need to authorize a computer before it can be used to check your email, this includes tablets, smart phones, and etc.  To verify your account, you can ask Google to text a verification code to your cell phone. Once you receive the text, log into your mail account on a new computer and you will be prompted for that code. 

The service also creates custom passwords to be entered into smart phones.  In this case, your smart phone uses this code instead of your actual password to check your mail. Although this method is a bit cumbersome, once set up, you will have the peace of mind to know that your mailbox is much more secure and that access to your mailbox can only be accomplished from a device you have authorized.  

For more info on how to set this up, click here.
Thursday, December 01, 2011
Clint Nelms, Network Infrastructure Practice Manager
Forced with budget cuts, local government agencies have turned to cloud computing to streamline their IT needs, lower hardware expenses and improve accessibility and mobility to necessary data. 

In a special report on cloud computing, The Center for Digital Government, in partnership with Public CIO, compiled a list of five government cloud success stories, two of which are at the local government level. 

  • Problem: One year ago, the state of Wyoming was operating 13 different e-mail platforms in its executive branch. Each system required dedicated staff to maintain it, and myriad platforms meant the state lacked a shared address book across all agencies. 
  • Solution: In less than nine months, the state has migrated to a single cloud-based solution, and moved 10,000 state employees to the new platform. The move will save the state more than $1 million annually, but cost reduction is not the only benefit. State employees are able to collaborate in ways that were not possible before. 
  • Problem: What builder isn’t troubled by permit requirement delays? 
  • Solution: By moving to a cloud-based solution for issuing permits, Oregon is dramatically accelerating the approval process for contractors, builders and developers. Oregon’s cloud solution will eliminate jurisdictional confusion and time-intensive paper chases. 
  • Problem: Four years ago, Nebraska was nearly ready to replace its creaky electronic applicant tracking system with a new application. 
  • Solution: Fourteen months into its cloud implementation, Nebraska has a new, more efficient and flexible paperless applicant tracking system, and an entire human capital suite that includes learning performance, succession and compensation management; a better benefits enrollment process; e-procurement; and a core human capital database. 
Hudson County, N.J. 
  • Problem: Ten years after September 11th, disaster recovery remains foremost in county officials’ minds. 
  • Solution: A private county cloud that took just eight months to build now provides back-up for all critical data and applications. Even if county offices are compromised, personnel can log in from any location and keep things going. The Hudson County IT Division’s plan is to offer servers on demand to all the towns in the county, turning its private cloud into a community one.
Nashua, N.H. 
  • Problem: For 30 years, Nashua, N.H., used an internal IT system that had, like a monster in a science-fiction movie, spread its tentacles into every agency in the city. 
  • Solution: When this system was replaced with a hosted ERP solution, city managers are able, to see integrated numbers that show what’s really happening in the city, find and eliminate waste, and change processes when needed. 
The report also takes a deep dive into the evolution of cloud computing technology, identifies the emerging trends, and discusses the exciting implications it has for the future of service delivery. Click the link below to read the results.

Tuesday, November 22, 2011
Scott Miller, Network Engineer
Pin Up the Folders You Use Most 

Windows 7 allows you to “pin up” the folders you use most on your taskbar. Simply hold your mouse over the favorite folder, right click, and drag the folder onto the taskbar. Windows 7 automatically pins itself to the Explorer Jump List. To open the folder, right click on the Explorer icon and select the folder you want.
Tuesday, November 15, 2011
Brian Ocfemia, Network Engineer
The Windows Logo Key
The mouse proved to be a lifesaver for users who want an easy way to navigate Windows' graphical user interface.  Unfortunately, it's not always the most efficient way to interact with your computer.  There are several keyboard shortcuts that can help you save time.  However, one of the most underused keys on the keyboard is the Windows logo key   (found between the CTRL and ALT key).  There are many things that you can accomplish by using this key.  To start with, you can open and close the Start menu just by pressing the Windows logo key .  You can display the desktop by pressing Windows logo key  + D or open Computer by pressing Windows logo key + E.  You can even open any program on your taskbar by pressing the Windows logo key and the number that corresponds to the position of the application on the taskbar (i.e. Windows logo key  + 1 launches the left-most application on the taskbar, Windows logo key + 2 launches the second left-most application, etc...).  For more information on keyboard shortcuts that can make your daily computing easier and more enjoyable go to:
Tuesday, November 08, 2011
Dave Mims, President
The results are in! On November 2, announced the winners of the eleventh annual Digital Cities Survey. The survey spotlights the municipalities that best show how information and communication technology are used to enhance public service. The survey is conducted by the Center for Digital Government and Government Technology.
The top 10 cities were selected by four different population categories and judged on the following criteria:
  • Enterprise applicability/Impact across multiple program areas
  • Measurable progress from the prior year
  • Hard dollar savings/soft dollar benefits as a result of technology use
  • Innovation
  • Demonstration of effective collaboration 
The cities chosen were selected from hundreds of municipalities nationwide. Winners include cities like Chicago, Corpus Christi, Texas, Eden Prairie, Minn., Honolulu and Virginia Beach, Va.
So, who else made the list? Did your city? See for yourself.
Thursday, November 03, 2011
Ohm Sadasivam, Senior Software Developer
Microsoft has added many useful features in SharePoint 2010. One of interest for developers is support for Language Integrated Query (LINQ). LINQ abstracts us from data source specific syntax such as SQL for SQL Server as well as Collaborative Application Markup Language (CAML) for SharePoint content data. Nice! I won’t steal all the thunder, but if you need to programmatically access SharePoint data and you aren’t already using CAML for SharePoint data access then checkout these two articles on LINQ to SharePoint from Microsoft at and
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 |
Contact a Sophicity Consultant Now To Find Out How We Can Help Reduce Your IT Costs Go