F5 AI Assistant Expands with iRules Code Generation for BIG-IP Programmability

Over the last several months, F5 has rolled out purpose-built AI assistants for F5 Distributed Cloud Services and F5 NGINX One. In February at AppWorld 2025 in Las Vegas, we also offered a preview of F5-powered AI assistant functionality specifically designed for F5 BIG-IP customers, centered on iRules code generation. Today, we’re thrilled to share two exciting milestones: we’re bringing together our AI assistants across the F5 Application Delivery and Security Platform, and availability of iRules code generation.

Managing application delivery and security often feels like solving a puzzle with missing pieces. From writing configurations to searching for answers in scattered documentation, these tasks consume time and energy while leaving teams vulnerable to errors and delays. Repetitive processes like debugging and policy tuning sap creativity, and even the most skilled teams inevitably encounter gaps in expertise that slow progress. These challenges are common, but they don’t have to define your workflows. With purpose-built AI-powered intelligence, teams can simplify these complexities with insights and automation designed to supercharge application delivery and security deployments.

Unification across the platform

To deliver exceptional customer experiences across the F5 Application Delivery and Security Platform, we are bringing our AI assistants into a single F5 AI Assistant. With a consistent user experience, SecOps and NetOps teams can better understand their security posture and exploit the wealth of information at their disposal across the entire platform, reducing the operational complexities of their hybrid multicloud environments.

F5 AI Assistant leverages the F5 AI Data Fabric to deliver intelligence powered by proprietary, purpose-built AI models. Unlike general AI tools, the AI Assistant provides domain-specific expertise, offering precise guidance and actionable insights. From generating iRules to optimizing configurations and improving security postures, it drives enterprise-grade accuracy and contextual relevance while reducing complexity. As part of the F5 Application Delivery and Security Platform, the AI Assistant empowers faster decision-making and measurable outcomes for teams managing modern application and security challenges.

F5 AI Assistant provides a single natural language interface across all three product families of BIG-IP, NGINX One, and Distributed Cloud Services within the F5 Application Delivery and Security Platform.

iRules code generation is now available

F5 iRules are the backbone of customization within the BIG-IP ecosystem, empowering teams to tailor their application delivery and security environments to meet unique needs with unmatched precision and flexibility. Over 85% of BIG-IP customers rely on iRules, which power 70% of all BIG-IP instances globally. These dynamic scripts enable deep interaction with traffic, modifying behavior, optimizing routing, and solving challenges beyond standard configurations. However, iRules can be complex, time-intensive, and, in many cases, persist long after their authors have moved on from the company for which they were written. This level of control requires a tool that can match their importance, a tool designed to enhance their creation, use, and management for today’s scaling enterprises.

We’re excited to announce the availability of iRules code generation within the AI Assistant for our BIG-IP customers. This groundbreaking functionality leverages advanced automation with natural language processing, reshaping how teams build and manage iRules. With models trained using F5’s own expertise, including from our engineering and professional services teams, the AI Assistant simplifies the most complex aspects of iRules management by improving accuracy, reducing effort, and enabling faster security and application decisions. From streamlining workflows to eliminating manual processes, it empowers teams to achieve goals with efficiency, scalability, and innovation.

Explore F5 AI Assistant in action supporting the explanation, generation, and optimization of F5 iRules.

Functionality is categorized into three areas—explain, generate, and optimize:

  • Explain: Gain a deeper understanding of iRules with clear, natural language explanations that break down components, logic, and functionality. This capability bridges knowledge gaps, making iRules accessible to users of all expertise levels while providing actionable insights for better decision-making.
  • Generate: Instantly create secure, validated iRules by describing your needs in natural language. The AI Assistant translates your input into tailored scripts, saving valuable time, reducing errors, and accelerating deployments.
  • Optimize: Debug, troubleshoot, and fine-tune iRules with precision and efficiency. The AI Assistant streamlines complex processes, eliminates manual guesswork, and ensures enhanced performance, reliability, and scalability for your BIG-IP environments.
F5 AI Assistant explains, generates, and optimizes iRules, eliminating the manual guesswork.

The introduction of iRules code generation reinforces AI Assistant as your trusted partner for simplifying, innovating, and scaling BIG-IP environments. By eliminating guesswork, it ensures that teams can address vulnerabilities, maintain consistency, and manage traffic configurations swiftly and effectively.

Begin using F5 AI Assistant

To explore F5 AI Assistant for your organization, refer to our press release and the solution overview detailing iRules code generation and the strategic time-saving value the AI Assistant provides.

Also, be sure to catch all the latest F5 AI news on our Accelerate AI webpage.

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including F5 we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

This post originally appeared on F5.com, and is re-published with permission.

Breaking Down Barriers: How SAS and Carahsoft Are Making Trustworthy AI More Accessible to Government Agencies

Government agencies face a unique challenge when it comes to adopting new technologies: they need cutting-edge capabilities, but they also need absolute certainty that those tools meet the highest security and compliance standards. For AI and analytics, this balance has historically been difficult to achieve—until now.

A Major Milestone for Government AI Access

Data and AI leader SAS has achieved FedRAMP® and GovRAMP (formerly StateRAMP®) authorization for SAS® AI and Analytics for Government. Alongside its partner Carahsoft, SAS empowers Government agencies to improve efficiency, reduce risk and enhance data security with SAS® Viya®, its cloud-native data and AI platform.

Enhanced Access to Dependable AI in the Cloud

FedRAMP is a Government-wide program that establishes a standardized approach to security assessment, authorization and continuous monitoring for cloud products and services to ensure the protection of Federal information. GovRAMP, a nationally recognized risk authorization management program, provides a standardized approach to assessing cloud products. With these authorizations, even more Government agencies can use SAS Viya in the cloud operationalize predictive analytics and AI regardless of whether code is developed in SAS or open source. SAS has served as a trusted Government technology provider for nearly five decades and is used in all 15 executive departments of the US Federal Government and all 50 states.

Trust and Transparency at the Core

SAS Viya incorporates trustworthy AI capabilities such as bias detection, explainability, decision auditability and model monitoring, governance and accountability, boosting confidence in Government agencies’ responsible AI initiatives.

This accomplishment demonstrates SAS’ steadfast commitment to providing a secure and reliable solution that Government agencies can rely on to safeguard their data and operations.

“SAS understands that security is table stakes for being a government partner. Security and trust always come first, followed closely by value, innovation and the ability to solve the most pressing problems. That’s what SAS has helped governments with for nearly 50 years” said Ben Stuart, Vice President, US Public Sector at SAS. “These certifications are further evidence of this commitment, and we’re looking forward to bringing SAS Viya to even more Government customers to help them reach their goals and make an impact.”

SAS and Carahsoft’s Partnership Delivers Advanced Software to Government Agencies

The strategic agreement between the two technology leaders designates Carahsoft as a SAS Public Sector distributor, making SAS’ data and AI solutions accessible to US Government agencies through Carahsoft’s reseller partners and various contract vehicles and Government schedules. Through this partnership, Government customers can efficiently acquire SAS products and solutions, including cutting-edge, AI-optimized analytics tools for proactive response to evolving Public Sector challenges. 

With a legacy in Government dating back to the company’s founding in 1976, SAS software is used in more than 1,600 Public Sector departments, ministries and agencies in more than 130 countries worldwide. Recognized as a leading software distributor in the market, Carahsoft provides expanded scale and reach to SAS’s products and solutions, including SAS Viya, across the Public Sector.

Looking Ahead: Empowering Data-Driven Government

SAS, in partnership with Carahsoft, is dedicated to empowering Government agencies with data and AI solutions. SAS and Carahsoft help Government agencies to make informed decisions, optimize operations and enhance public services. SAS and Carahsoft are committed to driving positive change and delivering measurable results for the Public Sector.

Ready to explore how SAS can support your agency’s data and AI initiatives? Learn more about SAS public sector analytics, including FedRAMP and GovRAMP certifications.

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including SAS we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

Transforming Public Sector Fleet Safety: How AI-Powered Solutions Drive Results and Build Employee Trust

Despite advancements in vehicle safety technology, fatal vehicle crashes continue to rise. Notably, 87% of commercial vehicle crashes are caused by avoidable risky driving or driver error. For Public Sector fleet managers—whether overseeing school buses, emergency response vehicles or other municipal fleets—these trends jeopardize public safety, strain budgets and put essential services at risk.

Recent research shows the Public Sector is leading the way in addressing these challenges. While 32% of organizations globally have adopted artificial intelligence (AI), 58% of Public Sector organizations in the U.S. have done so, and 95% plan to increase their AI investments in the coming year.

The Critical Need for AI-Powered Fleet Safety Solutions

The Public Sector’s strong AI adoption reflects its commitment to smarter, more reliable service delivery. Solutions like Samsara’s Connected Operations Platform are transforming fleet management by integrating data from vehicles, assets and operations to enhance safety, efficiency and sustainability. Rather than solely relying on reactive measures, AI-powered tools enable drivers to self-correct in real time and give fleet managers predictive insights to prevent incidents before they occur.

AI is increasingly being applied across several key areas that directly impact public safety. Early implementations focus on driver behavior detection, predictive maintenance and fleet health monitoring to reduce downtime and ensure vehicle readiness. In parallel, AI-powered tools support route optimization and dispatch efforts, helping agencies respond faster and operate more efficiently. This shift from basic automation to proactive operations management marks a significant evolution in fleet safety.

Addressing Road Safety Challenges and Rising Costs

Public Sector fleets are facing growing road safety challenges that carry significant financial consequences. With crashes costing an estimated $340 billion annually, and insurance premiums rising 40% over the past decade, the impact on taxpayer-funded operations is substantial. The U.S. Chamber of Commerce Institute for Legal Reform reports that litigation costs have grown over 7% annually from 2016 to 2022, adding financial pressure on State and Local Government budgets. Every crash related cost diverts funding away from essential services like education, infrastructure and public health.

Samsara, Fleet Safety, blog, embedded image, 2025

Traditional safety measures alone are no longer sufficient. Distractions from mobile devices have surged—those who text and drive are 23 times more likely to crash. Speeding contributed to 29% of crash fatalities in 2022, and even a one- to two-hour sleep deficit can double crash risk. These preventable behaviors create challenges for Public Sector drivers who often work long shifts to meet community needs.

Technology like Samsara’s Connected Operations Platform offer a proactive solution to today’s fleet challenges. By providing real-time fleet visibility, driver coaching and predictive analytics, agencies can identify risky behaviors before they lead to incidents. Fleets that implement safety solutions often see a return on investment (ROI) within the first year through reduced collision costs, lower insurance premiums, decreased vehicle downtime and improved operational efficiency. For example:

Safety Technology Proves Effective and Resonates with Drivers

Driver buy-in is key for successful safety technology implementation. Research shows that 70% of drivers feel dash cams make driving safer, and 93% report becoming more aware of distracted driving after reviewing footage. Most notably, 90% of drivers prefer to stay with organizations that actively support safe driving habits.

When paired with real-time coaching, dash cams can reduce safety-related events by 52%. Samsara’s Connected Operations Platform enables drivers to self-correct through in-cab feedback. For example, Gwinnett County Public Schools reduced incident investigation times by 50% and harsh braking events by 60% in just three months, saving 400 administrative hours weekly and improving safety for 180,000 students with Samsara.

Strategies for Gaining Union Buy-In for Safety Technology

In unionized environments, successful technology implementation requires collaboration and transparency. The first step is establishing shared safety goals with input from fleet managers, drivers, union representatives, risk managers and administrators. Research shows that 100% of Public Sector leaders using or planning to use AI report positive employee perceptions when communication is clear and involvement is meaningful.

Unions often express concerns that dash cams could be used punitively. To address this, organizations should involve union representatives in shaping policies around data access, privacy safeguards and usage protocols. This collaboration builds trust and ensures policies reflect both operational needs and union priorities.

Transparency is critical: organizations must clearly document data access, usage guidelines and privacy protections, providing view-only administrative access to key union representatives and sharing audit logs of system changes maintains accountability and reassures unions that the technology is used fairly and appropriately.

Real-world exoneration stories highlight technology’s protective value. For instance, the City of Boynton Beach, used dashcam footage to exonerate a driver initially cited for rear-ending another vehicle; the evidence revealed the other driver was at fault, resulting in dismissal of the citation, legal claims being dropped and preventing unwarranted disciplinary action. Such cases show that safety technology protects drivers from false accusations and costly legal proceedings.

Public Sector organizations are uniquely positioned to leverage AI-powered fleet safety solutions that transform operations, build employee trust and deliver measurable ROI. With proven safety technology and collaborative implementation, agencies can achieve meaningful improvements in safety, cost control and operational efficiency—all while prioritizing transparency, employee engagement and shared safety goals.

Learn more about workforce technology trends transforming the Public Sector by exploring Samsara’s comprehensive research report.

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including Samsara, we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

Executive Order on Advancing AI in Education: What Government and Education Leaders Need to Know 

The recent Executive Order-14277 promotes the inclusion of artificial intelligence (AI) in education and is a significant step toward preparing America’s youth for an AI-driven future. Signed on April 23, 2025, this directive establishes a comprehensive framework for integrating AI literacy and proficiency across the educational landscape.  

As schools explore the benefits of AI, Carahsoft and our partners are here to guide and support their journey. Here are the takeaways that we found most important from the recent Executive Order. 

Task Force on Artificial Intelligence Education 

At the center of this Executive Order is the establishment of a White House Task Force on Artificial Intelligence Education. This cross-agency Task Force is chaired by the Director of the Office of Science and Technology Policy, and features executives from various offices and departments, such as the Director of the National Science Foundation (NSF), the Special Advisor for AI and Crypto and the Secretaries of Agriculture, Labor and Education. The Task Force will coordinate Federal efforts to promote AI in education and implement the policy initiatives outlined in the order. 

These include: 

  • Promoting AI literacy in the workforce and education 
  • Training educators in AI usage 
  • Integrating AI into early education 
  • Creating an AI-ready workforce 

This coordinated approach underscores the Federal Government’s commitment to ensuring students develop the skills necessary to thrive in an increasingly AI-driven economy and society.  

Initiatives for Enhancing K-12 AI Education 

With this Executive Order, schools are encouraged to establish partnerships with leading AI industry organizations, academic institutions and nonprofit entities to develop online resources that will teach K-12 students foundational AI literacy and critical thinking skills. Partnerships will be awarded on a rolling basis, with resources expected to be ready for classroom use within 180 days of the first announced partnerships. 

Additionally, within 90 days of the new Executive Order, the Task Force will establish plans for the Presidential Artificial Intelligence Challenge. This challenge celebrates student and educator achievements in AI, fostering collaboration between Government, academia and industry organizations, such as Varsity Tutors, which empowers students through its AI-powered adaptive learning platform, as well as its ability to recommend personalized tutors.  

Prioritizing Teacher Training and Professional Development 

Recognizing that effective AI education depends on well-prepared educators, the Executive Order directs the Secretary of Education to prioritize AI in discretionary grant programs for teacher training, authorized by the Elementary and secondary Act of 1965. This includes professional development focused on: 

  • Reducing time-intensive administrative tasks 
  • Improving teacher training and evaluation 
  • Integrating AI fundamentals across all subject areas 
  • Providing specialized training in computer science 

AI can reduce the burden on teachers by aiding with management. Platforms such as Degree Analytics and Education Analytics both utilize AI and machine learning to analyze student communications and engagement and provide reports to improve student performance and retention. Gaggle can help by alerting educators and parents of potential safety concerns with social media posts and other student communications, aiding educators in managing students. 
 

Additionally, the NSF is directed to prioritize research on AI in education and create teacher training opportunities that help educators effectively integrate AI-based tools in classrooms. There are a wide variety of AI-based tools for educators to choose from. Nuventive, for example, offers performance improvement platforms with AI-powered analytics for strategic planning in education. YuJa integrates AI for video captioning, analytics and engagement tools, and Turnitin helps educators detect plagiarism and writing patterns. PowerNotes, Docebo and Instructure (a Canvas platform) all feature organizational and learning enhancements for students. Docebo and Instructure (a Canvas platform) all feature organizational and learning enhancements for students. 

The Executive Order extends beyond K-12 education to address workforce development through AI-related Registered Apprenticeships. The Secretary of Labor is directed to increase participation in these programs by establishing specific growth goals with existing discretionary funds in order to support the creation of nationwide program standards. 

Building an AI-Ready Workforce Through Apprenticeships 

States and grantees are also encouraged to use Workforce Innovation and Opportunity Act (WIOA) funding to support AI-based learning opportunities. This component of the Executive Order creates significant potential for collaboration between education institutions, Government agencies and industry partners to develop comprehensive AI workforce development pathways. Some industry partners who have already begun integrating AI for workforce development initiatives are Education Technology, Services and Research (EAB), which uses AI to support student success, and YouScience, which maximizes student success by using AI to analyze a student’s interest and aptitudes and match them with academic pathways.   

The Path Forward 

Educational institutions and Government agencies seeking to capitalize on the opportunities laid out in Executive Order “Advancing Artificial Intelligence Education for American Youth” should begin planning now. Industry tie-ins can enhance education and learning, such as Udemy, which offers content recommendations and delivers AI course content, Invoke Learning, Inc., which leverages AI and data science to improve student outcomes and institution decision-making and Impero Software, which offers AI monitoring features for safeguarding and classroom management. Industry aid can go beyond K-12 education, too. Element451, for example, promotes student engagement and enrollment management in higher education.  

Carahsoft and our ecosystem of technology partners are ready to support this national effort to prepare America’s youth for an AI-driven future. Through our extensive contract vehicles and specialized AI solutions designed for educational environments, we provide the tools and expertise needed to implement the vision outlined in this landmark Executive Order. 

To learn how Carahsoft can help your organization implement the vision laid out in the Executive Order on Advancing AI Education, visit our comprehensive portfolio of AI solutions and discover how our trusted vendors can accelerate your institution’s AI-education initiatives today.

Becker’s Healthcare Online 2025: Top 5 Insights on Sustainability, Efficiency and Security in Patient Care 

At the 15th annual meeting of Becker’s Healthcare, providers and industry leaders gathered to discuss the latest in Health IT. Sessions explored intellectual capital, cybersecurity, logistics and technology, such as artificial intelligence (AI).  

Carahsoft and its partners, such as Oracle, Bamboo Health, Innovaccer, Laserfiche, Smart Communications, Wolters Kluwer and more, attended Becker’s to connect healthcare systems with the latest technology.  

Becker’s Healthcare conference featured five key themes for attendees to learn about. 

Expanding Patient Care Through Automation 

Speakers from Baptist Health discussed patient care amidst high demand in the session “Empowering Healthcare Teams: Baptist Health’s Journey to Efficiency.” As the Baptist Health Healthsystem began examining inpatient flows, they tracked all components of the patient’s experience. The influx of patients exposed existing weaknesses, such as fragmented operations, low visibility and discharging delays, resulting in lost revenue and overall inability to meet patient demand. In response, Baptist Health opened a command center to centralize its logistics, proactively taking steps to increase reliability and predictability. Viewing all components of a patient’s stay, from the moment patients entered to being fully discharged, as well as the time spent cleaning the room, enabled them to find and remove bottlenecks that prevented the efficient transfer of patients. Baptist Health also began automating workflows to expedite processes. Automated texts would be pushed to providers when patients were not moved, allowing providers to know where they were needed. These changes resulted in a 6% increase in overall admissions and a 50% increase in on time or early discharges by 11am, which helped free up beds, increasing overall capacity and revenue.  

Patient-Centered Sustainability 

In the session “The Future of Patient-Centered Care: Strategies for Sustainable Healthcare,” Fariha Siddiquie, the Director of Healthcare Services at The Kaleidoscope Group, emphasized that patients are the center of healthcare. When crafting a positive customer experience, healthcare systems should take a holistic approach to the patient’s journey. 

Healthcare systems can foster a positive experience by:  

  • Utilizing front desk staff to create positive experiences as soon as patients enter the facility 
  • Providing a comfortable experience in the waiting room 
  • Removing technical jargon to help patients and their support system understand billing, procedures and treatments 
  • Preventing and slowing the spread of diseases through community outreach 

Meeting patients and their support systems at their level contributes to patients feeling safe and welcome. While providers are not fully responsible for the experience a patient has at a healthcare center, they shoulder the most responsibility. Healthcare systems can help alleviate this responsibility by fostering a culture of empathy between employer and provider, which will ultimately extend to provider and patient. Focusing on the patient’s experience will ensure satisfaction in all aspects of patient care. 

To meet all of a patients’ needs, providers should consider how different backgrounds, such as geographical location and age, factor into care needs. With technology, certain features, such as specific fonts or options to connect to a help desk, boost accessibility. When these features are not included, the technology that already has been invested in will be ineffective. By committing to a strategic plan that impacts day-to-day workflow, healthcare systems can ensure a more welcoming, fostering environment for patients. 

Choosing the Right Technology for Your Healthcare Systems  

As IT expenses continuously grow, healthcare systems must consider which technology to prioritize. In the session “From Friction to Flow: Advocating for Smarter, Safer Healthcare Systems,” panelists discussed how healthcare systems must consider whether replacing existing technology with new ones is cost effective. Before purchasing, healthcare systems should consider how the technology will be incorporated into the workplace, and whether staff will need to be trained to use the new technology. Talking to front line caregivers and other staff can illuminate what solutions and tools are needed for daily operations. The technology with the best return on investment is that which alleviates monotonous administrative tasks and uplifts providers, who face potential burnout from the administrative tasks placed on top of their job. Once the technology is in place, healthcare systems should measure the outcomes of technology and gather and listen to feedback from end users. While technology helps processes, it cannot automatically solve problems. Rather, technology is best utilized when aiding providers and expediting work processes, allowing clinicians to focus on patient care. 

Preventing Data Breaches in Healthcare  

In the session “Doing the Inevitable: How Health Systems Are Stopping Data Breaches,” speakers from various institutions discussed the daily phishing breach attempts that healthcare systems face. Phishing attacks are insidious as they are impossible to fully prevent. Threat actors are getting more sophisticated with social engineering, using AI to impersonate leadership over the phone, or even on video calls. While security solutions, such as multi-factor authentication, are important to preventing breaches, there are use cases where they are not applicable- such as emergency situations in the operation room. 

Phishing breaches should be treated as a “when,” not an “if;” systems must proactively prepare for data breaches. Attacks can force an area or unit to go offline, so a response strategy can help operations continue smoothly. Trainings that simulate breaches can demonstrate to leaders the full complexity of these attacks and what is at risk. Even breaches for agencies that are indirectly exposed to your network can be a hazard. To prevent phishing breaches, everyone from providers to clinical leadership must be knowledgeable about mitigating attacks. 

Optimize Daily Operations with Artificial Intelligence  

In the session “AI in Healthcare: Big Ideas and Risks for the Next 5 Years,” speakers Dr. Chris Longhurst from UC San Diego Health, Dr. Mike Phepher from Stanford, the Chief Data Officer from CommonSpirit Health and Mohan, the Founder and CEO of LeanTaaS, discussed the variety of AI projects have been tested in healthcare systems to aid with operational processes. With the onboarding of secure AI portals, healthcare systems enable staff to experiment and learn how to use the new technology.  

They have found that AI can aid daily procedures in numerous areas, such as: 

Operational Tasks 

AI can help eliminate monotonous tasks that are not directly related to helping patients, such as with calls and removing duplicate insurance requests, empowering providers with more time with patients. 

Safety 

AI has helped predict which patients need palliation. This early identification has enabled symptom relief, disease prevention and reduced mortality rate. It has also democratized medical information, empowering patients and providers, as well as aided in eliminating misdiagnosis. 

Patient Empowerment 

AI has enabled patients to learn more about the care they receive. Tools such as language learning models (LLMs) have helped providers craft response letters to patients, and electronic health record (EHR) integration aids in provider-patient communication by making medical information more accessible to patients. 

When choosing the right AI platform for a healthcare system, the speakers recommend onboarding an AI model that is secure and sufficient for necessary procedures. A platform approach can help avoid siloing. Technology experts, such as VMWare, are constantly working to be at the forefront of AI initiatives and enablement, and Salesforce offers a variety of AI tools. Overall, AI can be used in many scenarios. Between aiding call centers and predicting illnesses, AI increases efficiency, optimizes processes and decreases costs. 

By maintaining security and investing in mission-supporting technologies, healthcare systems can support providers and offer the best care to patients. 

To learn more about technologies featured at Becker’s Healthcare Online, visit Carahsoft’s healthcare technology portfolio. 

Accelerating The Healthcare AI Revolution: Reasoning Models and Data

The healthcare industry stands at the precipice of transformation. While artificial intelligence (AI) has been utilized in healthcare for decades, analyzing OMICS and supporting drug discovery, recent advancements in generative AI (GenAI) and reasoning models are redefining what’s possible, especially when connected to private data. This evolution represents not just incremental improvement but a fundamental shift in how technology can augment healthcare delivery.

The Accelerating Pace of AI Evolution

The GenAI movement that emerged around 2017 added a new dimension, enabling AI to create content. However, it was the 2022 release of ChatGPT that democratized access to these capabilities, creating a “Wright Brothers moment,” springboarding the industry of AI. Suddenly, everyone from children to healthcare professionals began experimenting with these systems, often finding productivity gains despite the limitations of early versions of the technology.

Just as organizations were adapting to this new reality, reasoning models emerged in late 2024. These systems do not simply generate content, but think through problems step by step, mirroring human cognitive processes. Within months, more efficient, open-source reasoning models followed, making this technology accessible even for regulated industries like healthcare (e.g. Med-R1 8B).

GenAI Reasoning Models in Healthcare

GenAI enables healthcare professionals to work more efficiently, freeing time to engage with patients. Unlike earlier models, recent GenAI reasoning models provide transparency into their decision-making process. These models can now power advanced AI agents using healthcare-specific models like Google AIM, Med-PaLM 2 or Med-R1. This auditability is crucial in healthcare, where understanding why a recommendation was made is often as important as the recommendation itself.

HIMSS25 AI in Healthcare blog graphics_Embedded in Blog 2025

Before implementing AI agents and reasoning, agencies should define clear outcomes and goals. Here are several factors to consider when integrating GenAI into your agency:

  • Data Strategy: The effectiveness of AI models depends significantly on the quality and privacy of your data. Organizations need clear protocols for creating evaluation datasets and managing sensitive patient information that can be kept sovereign.
  • Infrastructure Decisions: Healthcare organizations must decide whether to deploy models in the cloud or on-premises, considering regulatory requirements and data sensitivity. A hybrid approach often provides the flexibility needed to address various use cases.
  • Model Selection: Open-source models now trail proprietary options by only about six months in capabilities while offering cost advantages and greater control. Many organizations are adopting hybrid strategies, using proprietary models for cutting-edge applications and open-source alternatives for routine tasks.
  • Scale Considerations: Small, specialized language models can be more efficient for specific healthcare tasks, while larger models may be necessary for complex reasoning about treatment options or research questions.

Agencies should prepare robust data governance frameworks and flexible infrastructure that spans cloud and on-premise environments to enable healthcare personnel to use GenAI effectively. Overall, GenAI enables healthcare professionals to work more efficiently, enabling them to connect more with patients.

Your Journey to an AI Future Starts Now

The future of healthcare will be augmented by reasoning models, making healthcare more affordable and accessible for all.

Some new, AI-driven areas to watch for include:

  • Data Interaction: LLMs will navigate complex healthcare data ecosystems, from electronic health records to genomic data, answering nuanced clinical questions without requiring complex programming.
  • Planning and Research: By functioning as collaborative partners in research, the models look to help design clinical trials, analyze research literature and develop treatment protocols.
  • Actionable Workflows: Reasoning models will help automate clinical and administrative processes while incorporating human feedback in a continuous improvement cycle.

AI agents will begin to help address the acute staffing shortages plaguing healthcare systems worldwide. These digital assistants can handle routine documentation, answer common patient questions, and provide decision support, allowing clinicians to focus on direct patient care. As AI systems become more affordable and consumption increases, we’re likely to see a revolution in healthcare accessibility, particularly for underserved populations, with AI agents augmenting healthcare workers’ efforts.

The journey toward AI-augmented healthcare is accelerating faster than most experts predicted. For healthcare leaders, the question is no longer whether to embrace these technologies, but how to implement them to improve care while maintaining the human connection that defines healthcare.

The content of this blog was pulled from the Healthcare Information and Management Systems Society (HIMSS) panel, “Accelerating Enterprise GenAI.” To learn more about Nutanix GenAI, visit Nutanix’s AI Solution page.

Key Insights from Global Cyber Innovation Forum 2025 

The 2025 Global Cyber Innovation Forum served as a premier gathering where cybersecurity’s most pressing challenges meet collaborative solutions.  

Hosted by  Forgepoint Capital, Snowflake, Forescout, Google Cloud and Carahsoft at the Embassy of Canada in Washington, D.C., the Forum brought together a curated audience of influential cyber leaders from across the globe, including industry executives, Government officials, policy leaders, venture capitalists and thought leaders from academia and the non-profit sector.  

This annual event provided a platform for critical discussions on emerging threats, technological innovation and strategic partnerships essential for securing our digital infrastructure. Five key themes stood out throughout the sessions: 

  • National Security Threats with Supply Chain Vulnerabilities 
  • The Rise and Race to AI Dominance 
  • The Edge of Quantum Transformation 
  • Typhoon of Attacks on Critical Infrastructure 
  • Streamlining Cybersecurity Compliance 

National Security Threats with Supply Chain Vulnerabilities 

The digital supply chain, specifically software and applications civilians use, have increasingly become a source of critical national security vulnerabilities. Government officials and industry leaders warn that software and digital platforms sourced from foreign adversaries have reshaped the threat landscape by implanting foreign influence in the U.S. technology ecosystem.  

Technology serves as a funding mechanism for adversaries and comes with a hidden price of mass data collection, making it easier for threat actors to access sensitive information and transform traditional cyberattacks. The lack of transparency in certain nation-states raises concerns on regulatory consequences, potentially giving adversaries a strategic edge in information warfare and creating a blind spot in the global tech supply chain.  

U.S. leaders emphasize the necessity for regulated technology supply chains and accelerated Federal certifications, specifically FedRAMP, to ensure innovation does not come at the cost of national security. 

Rise and Race to AI Dominance 

With the rise of artificial intelligence (AI), data has become the modern form of power. Foreign adversaries are striving to build or gain access to data pipelines to fuel their AI models, bypassing privacy in a way that allows them to train AI models much faster than has been possible in America. The U.S. must counter this by accelerating our own AI model training and innovation, while safeguarding privacy and data integrity.  

Government and industry experts state that AI is being underutilized across U.S. operations. The current administration has streamlined AI usage through Executive Order 14179: Removing Barriers to American Leadership in Artificial Intelligence and Executive Order 14277: Advancing Artificial Intelligence Education for American Youth. Additionally, AI should be deployed when combating advanced cyberattacks and automating routine cybersecurity efforts such as threat detection, incident response and vulnerability identification. 

The Edge of Quantum Transformation 

Emerging technologies such as quantum computing are rapidly approaching mainstream adoption. The massive amount of encrypted data currently stored in secret could be vulnerable to decryption within the next 5 to 10 years. This hovering threat has made the development and deployment of post-quantum cryptography a top priority for the U.S. Government. The race to post-quantum cryptography and quantum computers has not just been an urgency for the U.S. and its allies, but also for adversarial nation-states. 

Typhoon of Attacks on Critical Infrastructure 

Advanced persistent threat (APT) groups such as Salt Typhoon, Volt Typhoon and Flax Typhoon have already infiltrated critical infrastructure systems, often using “living off the land” techniques. These public and well documented attacks are considered digital terrorism, disrupting U.S. critical infrastructure operations and stealing intellectual property.  

In response, the U.S. Government is prioritizing cyber hygiene, secure-by-design and the development of an integrated and robust defense system. Agencies, technology providers and critical infrastructure operators are heavily encouraged to collaborate through information sharing, adoption of emerging technologies and routine threat assessments. The severity of these cyberattacks have increased substantially, highlighting the urgency for a more proactive and coordinated national response from the U.S. Government. 

Streamlining Cybersecurity Compliance 

The current cybersecurity regulatory landscape presents a fragmented maze of overlapping requirements that hinder both innovation and effective security implementation. Government and industry security teams are overwhelmed by conflicting standards across Federal, State and agency-specific frameworks. Organizations must navigate multiple compliance frameworks—FedRAMP, National Institute of Standards and technology (NIST) requirements, Cybersecurity Maturity Model Certification (CMMC) and various state requirements—creating redundant processes that drain resources without enhancing security. 

To address this, industry leaders are advocating for regulatory harmonization initiatives. Federal agencies are working to align various compliance frameworks while updating modernization strategies to build interoperability. By aligning around core standards like NIST 800-53 and implementing automated compliance tools, agencies can reduce complexity while maintaining robust cybersecurity postures. Forum participants agreed: harmonized regulations are essential to enabling secure innovation without compromising oversight. 

The Global Cyber Innovation Forum demonstrated that securing America’s digital future requires unprecedented coordination between Government agencies, private industry and international allies. As adversaries continue exploit emerging technologies, the U.S. must respond with unified strategies that streamline regulations, accelerate innovation and sustain global cyber leadership. The insights shared offer a critical roadmap for defending against tomorrow’s threats in a rapidly evolving digital landscape. 

Visit Carahsoft’s Resource Hub to dive deeper into the key takeaways, expert perspectives and resources from the 2025 Global Cyber Innovation Forum. 

SOF Week 2025: Top 5 Insights on Interoperability, Artificial Intelligence and More

Effective defense often relies on operations that are agile, adaptable and focused. Special Operations Forces (SOF) Week 2025 is an international conference for thought leaders, Government representatives and key military decision-makers involved in the Department of Defense (DoD). Jointly hosted by the United States Special Operations Command (SOCOM) and Global SOF, the conference platformed discussions surrounding the improvement of cybersecurity and technology within SOF.

This year, Carahsoft and over fifty of our technology partners attended to showcase solutions in artificial intelligence (AI), cybersecurity and much more, supporting SOCOM and DoD mission objectives.

The SOF Week conference featured five key themes for attendees to learn about.

Leveraging Artificial Intelligence to Achieve SOF Objectives

One of SOCOM’s innovation priorities is to onboard products that have AI integrations, uncrewed and autonomous systems, power computing and quantum capabilities. In the session “Keynote Address: U.S. Special Operations Command Team,” speakers General Bryan P. Fenton, Commander of USSOCOM and the Command Sergeant Major Shane Shorter, Senior Enlisted Leader of the USSOCOM, discussed optimizing the computing power of adapted technology to maintain pace with adversaries. By providing the needed tools, SOCOM can help reduce the cognitive load placed on personnel.

In the session “PEO Overview: Tactical Information Systems,” speaker Chad Skiendsiel, the PM for Transport Systems, PEO TiS, requested multiple AI capabilities that would be useful to SOCOM operations. These are:

  • Automation of data and containerization
  • Software infrastructure that enables more containerization of data and configuration.
  • Commercial solutions that can enable classified data computing as well as compute power out to the edge
  • Embedded computing that can be attached to the warfighter to achieve better situational awareness

In the session “Fireside Chat: AI Innovation and Integration in National Security,” speaker Akash Jain, CTO of Palantir discussed SOF’s efforts to implement AI into SOCOM operations. One key area that requires special attention is AI integration into legacy systems, many of which have existed for years and cannot easily have AI added to enhance the work SOF does. This is why vendors with solutions, such as Hewlett Packard Enterprise, can be utilized to integrate AI into existing infrastructure.

Bolstering Cybersecurity in SOCOM Operations

One of the key themes present in SOCOM’s evolving cybersecurity efforts is the adoption of a Zero Trust architecture, particularly within the Enterprise Information Systems directorate. It is referenced across multiple capability areas as essential to aligning with broader DoD cybersecurity mandates. To advance this strategy, SOCOM is actively engaging with industry and conducting assessments to define mission-driven requirements. Technology experts such as Dell Technologies, Red Hat and VMware are constantly working to be at the forefront of Zero Trust efforts.

Following this focus, the Professional Employer Organizations (PEO) is implementing cybersecurity initiatives in its contracting services. All solicitations will include cyber discipline and hygiene requirements, supply chain risk management and cybersecurity risk management requirements. Across the portfolio within SOCOM, post-quantum encryption is being looked at as the future strategy for cyber and will continue to develop as time goes on. The PEO SOF Digital Applications (SDA) also notes that CISA’s Software Bill of Materials (SBOMs) will continue to be added to its cybersecurity pipeline to ensure software is open and honest. These initiatives work to fortify existing and future cyber structures to protect the effectiveness of missions and the safety of personnel.

As supply chains, SOF and the Defense Industrial Base (DIB) continue to be under threat from adversarial cyber-attacks, PEO Services continue working to fully implement CMMC guidelines in their procedures. For unclassified solicitations, SOCOM will implement CMMC Level One, while any classified solicitations will be level two or higher.

Industry Partnerships to Meet Demand

In the session “Keynote Address: U.S. Special Operations Command Team,” Major General Bryan P. Fenton heavily emphasized that partnerships are key to meeting industry needs. While SOF is maintaining pace with current requirements, to stay ahead in the future, SOCOM must look to industry partners for their specialty and assistance.

One such category of offerings is autonomous, unmanned systems promote efficiency by saving time on menial, repetitive tasks. SOCOM is looking to implement dual-usage, capable autonomous products, such as self-driving cars, drones and robots. Modeled after the Private Sector’s success with unmanned systems, SOCOM agencies aim to evolve at the same speed. To enact this, all onboarded unmanned systems must be interchangeable, adaptable and successful within any region of the world to meet mission requirements.

The Importance of a Modular Open Systems Approach (MOSA)

For the military, multi-domain connectivity is the way forward. Military agencies are focusing on modular open-mission systems that can be interoperable, as they are the key to staying ahead of future conflicts. Depending on industry trends and the latest in cybersecurity, equipment may need to be changed on the fly. Some technologies will need to be found preemptively; in these scenarios, industry experts can provide assistance.

In the session “PEO Overview: SOF Digital Applications session,” Modular Open Systems Approach (MOSA) was noted by every program manager as a solution. This approach is desired as it allows systems and products to remain agile when new software is added.

MOSA consists of three main components:

  • Infrastructure and Deployment: Hybrid deployment of cloud, multi-vendor capabilities, Open-source technologies and COTS integration
  • Data Centricity & Interoperability: Messaging & EDA, Black Box interfaces, Ontology Support, preferences on containerization and VMs
  • AI Implementation & Sustainment: Low-cost and remotely maintainable solutions, lifecycle management and updates, AI support for LLMs and at the edge and adaptability on mission needs

By enabling agencies within SOCOM to implement software updates, MOSA promotes interoperability and the speedy onboarding of key technologies.

Humans Over Hardware

While technology is vital to SOCOM Operations, humans are the backbone of the agency. In the session “Keynote Address: US Secretary of Defense,” Secretary of Defense Pete Hegseth spoke on the three pillars for success within the DoD and how SOCOM can reiterate and emphasize them. Among these three, the warrior ethos is targeted with the slogan, “humans are more important than hardware.” Secretary of Defense Pete Hegseth, USSOCOM Commander General Fenton, and the Chairman of the JCOS Dan Caine all echoed this point that warfighters are the most important aspect within SOF. Any person that meets warfighter standards can serve, and all purchases and developments should center the safety and wellbeing of the warfighter in mind.

Through the collaboration between people and technology, SOF is able to work securely, quickly and smoothly. With top cybersecurity, automation integrations and industry partnerships, SOCOM continues to fulfill DoD mission objectives and keep personnel safe.

To learn more about technologies featured at SOF Week, visit Carahsoft’s defense portfolio.

SOC of the Future: Advanced Strategies for Modern Cybersecurity Challenges

Carahsoft-Innovative Care for Shadow Warriors-blog-embedded image-2025

In today’s fast-paced digital world, security teams are under immense pressure to defend against a surge in sophisticated cyber threats. Expanding attack surfaces, driven by new technologies, cloud adoption, remote work and interconnected devices, create countless entry points for attackers. Security Operations Centers (SOCs) must evolve by leveraging automation, AI and machine learning (ML) to stay ahead—cutting through the noise, accelerating threat detection and streamlining responses to provide scalable, real-time defense against ever-evolving risks.

Modern SOC Challenges

As cyber threats continue to rise in both frequency and sophistication, SOCs are coping with an overwhelming volume of security incidents. Check Point Software’s 2025 Security Report reveals a staggering 44% year-over-year increase in cyberattacks, highlighting the urgent need for stronger, more scalable defenses.

Organizations are no longer operating within clearly defined perimeters. Today’s digital environments are sprawling and dynamic, spanning on-premises infrastructure, multi-cloud deployments, software as a service (SaaS) platforms, Internet of Things (IoT) devices and a remote workforce. Each layer adds complexity—and with it, new vulnerabilities. The expanding attack surface increases not only the number of potential entry points but also the volume of activity that must be monitored.

This leads to another major challenge: organizations are now generating unprecedented volumes of security data. SOCs are tasked with analyzing vast, continuous streams of telemetry to detect threats in real time but extracting meaningful insights from this flood of data has become increasingly difficult.

While traditional Security Information and Event Management (SIEM) systems remain a core component of enterprise security, they are struggling to keep up. Many SIEM platforms are constrained by schema designs, database capacity and a limit on the number of detection rules that can be ingested.

As a result, SOCs are often forced to make difficult trade-offs, choosing which data to collect and analyze based on storage and processing limitations. This selective approach creates blind spots, potentially allowing critical threats to go undetected. In fact, 56% of organizations report coverage gaps directly linked to the limitations of legacy SIEM systems, underscoring the need for modernization.

Alert fatigue is compounding the issue. Even well-configured SOCs can generate thousands of alerts daily, overwhelming analysts and increasing the risk of real threats being missed. According to a 2023 RSA survey by Gurucul, 61.37% of security teams report receiving more than 1,000 alerts per day, while 4.29% deal with over 100,000. Alarmingly, 19.74% say the volume is so high they cannot even quantify it.

SOC Prime-SOC of the Future-blog-embedded image-2025

Beyond the operational strain, cost is another major barrier. A medium-sized organization can produce terabytes of log data every day, and storing and processing this information—especially at the scale required for comprehensive threat detection—can cost hundreds of thousands annually. SOC leaders are under constant pressure to strike a balance between broad visibility and tight budget constraints.

In this high-volume, high-velocity environment, traditional manual analysis simply cannot keep up. To close visibility gaps, reduce alert overload and operate efficiently at scale, organizations must adopt intelligent automation. Advanced analytics, ML and AI-driven detection can dramatically reduce noise, prioritize critical alerts and help SOC teams focus on what matters most—responding to real threats in real time.

The Role of Automation in SOC

Automation is a key force multiplier for SOC teams, enhancing threat response speed and accuracy. Over the past decade, security orchestration, automation and response (SOAR) solutions have had mixed success. While these solutions streamline workflows and incident response, they require significant maintenance, including scripting, playbook development and continuous security stack integration. The high total cost of ownership often outweighs initial investments, making long-term sustainability a challenge.

To address these limitations, SOCs are adopting telemetry pipelines, which intercept and filter traffic before SIEM processing, ensuring only relevant security data is analyzed. Advanced enrichment reduces redundant data, improving efficiency while lowering cloud storage costs.

Extended detection and response (XDR) solutions are also gaining traction. XDR integrates multiple security layers, correlates alerts locally and reduces reliance on centralized SIEMs. Vendor-specific XDR stacks work best within their own ecosystems but streamline threat detection and response.

Data lakes are becoming essential for long-term threat hunting, enabling analysts to detect subtle, prolonged attacks by retaining historical data for extended periods. This allows analysts to uncover patterns that might otherwise go unnoticed.

As SOC automation evolves toward autonomous SOC models and “SOCless” SIEM architectures, ML-driven algorithms will handle much of the processing and correlation, facilitating faster threat detection and response. By automating repetitive tasks like log analysis and low-level alert triage, SOC analysts can focus on complex investigations, enhancing security while addressing the skills gap.

Still, Gartner predicts that by 2030, 75% of SOC teams will see a decline in core security analysis skills as they grow too reliant on automation and AI. Therefore, deployments aimed at both augmenting human tasks and adding precision and speed to human investigations will be more effective than single-technique AI analytics. Striking the right balance between machine-driven speed and human insight seems like a feasible solution that keeps security teams agile, informed and in control of threats.

Evolving Technologies and Solutions

AI and ML capabilities enhance predictive analytics and threat-hunting capabilities, keeping SOC teams ahead of attackers. According to Gartner, by 2026, advancements like “action transformers” and the continued evolution of Generative AI (GenAI) will power semi-autonomous platforms that can greatly enhance and support the day-to-day operations of cybersecurity teams.

As cybersecurity AI assistants evolve, they will be used as more sophisticated tools for interactive support and investigation, covering tasks like incident response, risk assessment and code reviews. These tools are expected to boost efficiency and reduce response times, whether in organizations just building their security programs or in mature teams with established processes. These innovations improve threat detection and SOC readiness to withstand modern cyber risks.

Future SOC Operations

Progressive organizations understand the real value of AI/ML-powered SOC technologies that can be reasonably used and shift their focus from single-technique tools to building integrated systems that fuse software, AI and human expertise. Achieving scalable impact means having a clear strategy that targets the most meaningful opportunities.

Additionally, investment in workforce development and upskilling will be essential to bridging the cybersecurity talent gap. Organizations that invest in these areas will elevate their SOC effectiveness, better safeguard critical assets and build a resilient, future-ready cybersecurity posture.

To gain deeper insights into these strategies and hear directly from industry experts, watch SOC Prime’s webinar, “The SOC of the Future: Advanced Strategies to Evolve SOC for Modern-Day Enterprise Cybersecurity.”

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including SOC Prime we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

The Importance of Data, AI and More Within Law Enforcement at IACP Technology Conference 2025 

The International Association of Chiefs of Police (IACP) Technology Conference 2025 is an annual law enforcement conference that hosts public safety professionals and technology thought leaders to discuss new solutions, techniques and trainings to equip the industry for success. With a strong law enforcement portfolio and deep industry ties, Carahsoft offers unmatched insight into the challenges agencies face today. 

By bridging the gap between top software providers and law enforcement agencies, Carahsoft’s Law Enforcement Technology Team helps both sworn and civilian personnel streamline operations, enhance decision-making and drive greater efficiency across all aspects of public safety.  

Carahsoft and over 20 of our vendors, including Cellebrite, Zebra, Saferwatch, Blackberry and Magnet Forensics, attended and ran demos of their solutions across data management and analytics, artificial intelligence (AI), emerging technology, forensics, and device security. 

Here are the 5 most relevant themes featured at the IACP Technology Conference 2025. 


Integrating Artificial Intelligence into Law Enforcement 

At IACP Tech, discussions centered around integrating AI into law enforcement to increase efficiency while balancing transparency and accountability to real-time threats. In the panel “Transforming Policing with AI: Efficiency, Accuracy and Ethical Considerations for Report Writing,” panelists underscored how AI can streamline administrative tasks, reduce the time officers spend on documentation and improve the overall accuracy and quality of police reports. Speakers also highlighted that the integration of AI must be accompanied by transparency and accountability. They stressed the importance of clearly disclosing when reports are generated or supported by AI to maintain public trust and uphold ethical standards. In the panel “Curb Your AI Through Privacy Impact Assessments,” speaker Nora Kurzova, the State Auditor of the State of Utah Office, explored the ethical implications that come with predictive AI in law enforcement. Kurzova drew attention to bias present in predictive tools, stressing the importance of human oversight to correct potential biases. With rigorous evaluations of the decisions that automated systems enact, law enforcement can ensure fairness and a positive impact on communities. 


Carahsoft, IACP 2025, blog, embedded image, 2025

Emerging Technologies in Law Enforcement 

For modern criminal investigations, law enforcement faces growing complexity in managing and analyzing mass volumes of digital data. As the volume of data generated by connected devices continues to surge, investigators must adapt software that enables timely and efficient data recovery. Critical evidence can come from a variety of sources, such as Nest cameras, smart rings, thermostats and even gaming consoles. Human augmentation technologies, including smart glasses, brain-computer interfaces and mixed reality devices, were all identified as new frontiers that officers could utilize during investigations. By utilizing unconventional data points as corroborative tools and avenues for new leads, law enforcement can increase its investigative awareness.  


Breakthroughs in Digital Forensics 

At the panel “Advancements in Criminal Investigations: Increasing Solve Rates with Technology,” speaker Ed O’Carroll, a retired Major of the Crimes Bureau from the Fairfax County Police Department, emphasized the transformative impact of advanced investigative technologies in resolving challenging criminal cases. Advancements in digital forensics, genetic genealogy and rapid DNA testing have all transcended the abilities of law enforcement, enabling the solving of difficult cases. As IT continues to evolve, law enforcement can utilize strategic partnerships with technology organizations to improve its digital forensics capabilities and reduce backlogs. With recent technological breakthroughs, skilled crime analysts and forensic professionals can maximize their potential through these revolutionary tools. 


The Importance of Interoperable Data in Public Safety 

Law enforcement depends on thorough and accurate analytics to improve and maintain capabilities. In the panel “Breaking the Data Chains: Advocating Open and Interoperable Solutions in Public Safety,” speakers explored the evolving role of data in public safety, with a strong emphasis on the importance of interoperability and open standards. Adopting open data standards enables seamless data exchange across systems and jurisdictions. Panelists called for greater vendor transparency and urged public safety agencies to include open data access provisions in their contracts to avoid vendor lock-in. Ultimately, by strengthening data sharing practices, public safety agencies can enhance operational effectiveness and fulfill mission objectives.  


Tailored, Interactive Training with Artificial Intelligence 

Law enforcement agencies are increasingly utilizing AI and virtual reality technologies to address resource constraints during training. In the panel “How Your Records Management Process Can Work for You—Leveraging RMS Functional Standards,” speaker Jeff Smythe discussed a statewide effort to revise curriculum by embedding AI tools into courses. By synthesizing practical data and automation, law enforcement can improve training and service quality.

Examples of this include: 

  • Utilizing real-world body camera footage to create simulated scenarios for training 
  • Collecting best practices to develop AI-powered virtual reality scenarios that feature immediate feedback and debriefing capabilities 
  • Implementing automated virtual reality scenarios to train soft skills, such as employee counseling and community engagement 

By simulating realistic, frequent tech-enhanced training, employers can significantly improve officer readiness and skill retention. AI and virtual tools offer scalable solutions to deliver consistent, high-quality training in an evolving public safety environment. 


As law enforcement professionals handle sensitive and vital information, the protection of that information and data is essential to carrying out fair and accurate investigations and procedures. Through tailored training, data analytics and AI, law enforcement can improve capabilities and focus resources on protecting civilians.  

To learn more about public safety related technology, visit Carahsoft’s law enforcement portfolio to explore solutions showcased at IACP Technology Conference. For additional research into the key takeaways that industry and Government leaders presented at IACP Technology Conference, view Carahsoft’s full synopsis of key sessions from the tradeshow.