Testing (and re-testing) your designs with users will help you build the best possible product. Our Validate Methods cover varied testing scenarios and potential user groups.
Companies have been developing and using artificial intelligence (AI) for decades. But we've seen exponential growth since OpenAI released their version of a large language model (LLM), ChatGPT, in 2022. Open-source versions of these tools can help agencies optimize their processes and surpass current levels of data analysis, all in a secure environment that won’t risk exposing sensitive information.
18F describes modular contracting, the process of breaking up large, custom software procurements into a small constellation of smaller contracts. Modular procurement requires agile, product thinking, user-centered design, DevSecOps, and loosely-coupled architecture.
This guidebook offers an introduction to the risks of discrimination when using automated decision-making systems. This report also includes helpful definitions related to automation.
This report outlines a dozen fintech and civic tech organizations working across fourteen safety net programs to show what’s possible when modern technology is married to a consumer insights perspective.
In this keynote presentation, Carole House, the Director for Cybersecurity and Secure Digital Innovation at the National Security Council discusses cybersecurity and identity management priorities at the federal level.
Applicants to federal aid programs face numerous barriers in accessing benefits they are eligible for. The Centers for Medicaid and Medicare conducted an extensive qualitative user research study to better understand applicant experience in enrolling in public assistance programs. Based on the results, the study emphasizes the need for simplified, streamlined and less burdensome application processes.