DOT greenlights first phase of smart transportation pilot

DOT greenlights first phase of smart transportation pilot

The Transportation Department issued a pre-solicitation notice for a working model of a connected vehicle transportation system.

Cellular on wheels

Colorado to demo LTE safety network

The LTE Demonstration Network will give first responders the chance to use some of the next generation LTE devices that will bring the power of broadband data to local, tribal, state and federal responders.

Boston street during a snowstorm

Too much snow? Phone it in.

Several municipal governments have created mobile apps that allow residents to better track and participate in snowstorm response.

Analytics powers app for social workers

Analytics powers app for social workers

The Case Advice app pulls data from a variety of back-office systems and makes it available to case workers while they’re in the field.

FirstNet opens to feds; DHS on board

FirstNet opens to feds, DHS on board

FirstNet began discussions with agencies to see how they can best leverage the nationwide public safety network.

Firms combine mobile dev, code analysis for agency apps

Mobile dev, code analysis tool debuts for DOD, intell agencies

CACI, Appcelerator join forces in developing a tool to help agencies develop and release secure apps on schedule and within budget.

Michigan intros first of its kind Medicaid mobile app

Michigan intros first of its kind Medicaid mobile app

Partnering with the private sector, Michigan has created a mobile application for Medicaid recipients to view their medical records and coverage remotely.

Emergency communications

Emergency communications take multi-path approach

The Department of Homeland Security’s National Emergency Communications Plan aims to allow first responders and public safety officials to better share information and enhance situational awareness.

Census 2020 technology

Census tests tech for 2020

The Census Bureau will leverage the Internet, mobile technology and geographic information systems as it counts up the country’s population and tries to hold the line on costs.

VA seeks cemetery tracking system

VA seeks cemetery tracking system

The Department of Veterans Affairs is seeking a system to help it with digital mapping, internment notices and remains tracking in its 131 cemeteries.

2015 mobility mantra: manage data, not devices

2015 mobility mantra: manage data, not devices

Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.

Should APIs be free from copyright?

Should APIs be free from copyright?

The Supreme Court is considering a decision involving Google and Oracle that would allow a form of copyright on application programming interfaces.

Topic Resources

  • Mobile Apps Make Gains in Identity and Security

    The government is transitioning its mobile app offerings from straightforward informational to more complex transactional setups. As more agencies embrace mobile apps, their possibilities become apparent and their security policies necessary. Read this informative Digital Dialogue to learn how agencies can take advantage of emerging mobile solutions while maintaining data security.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.