How spectrum sharing works

How spectrum sharing works

A database dynamically allocates frequencies and maintains protocols for user priority so that devices can share the same frequency bands.

how mobile apps affect the enterprise

Behind the app: Integrating mobile into the enterprise

Not all agencies have the back-end systems integration or maintenance resources to get the most out of customer-facing mobile apps.

Can Watson make government apps smarter?

Can Watson make government apps smarter?

A team of students at the University of Texas at Austin won $100,000 in startup funds for their work on a mobile app that helps users access Medicaid and other public services.

disa mobile users get classified access

DISA debuts new classified mobile access and devices

Now operational, the Defense Mobile Classified Capability – Secret provides better performance, a mobile device management system and a new secure mobile device.

impact of mobile on local government

How mobile impacts local government communications

America’s appetite for mobile information has moved the needle on digital local government from ‘because we can’ to ‘because we must.’

Testing options for app developers

Testing options for app developers

While emulators and simulators can help developers improve app performance, DigitalGov says, some features are best tested by people and their devices.

7 ways to avoid mobile app design failure

7 ways to avoid mobile app design failure

While IT shops tend to focus on technical design aspects, understanding user experience can ensure rapid user adaption.

Army seeks COTS support for mobile health system

Army seeks COTS support for mobile health system

The Army is researching commercial off-the-shelf software and mobile services for its bi-directional secure mobile health system.

The real killer app: Citizen service

The real killer app: Citizen service

To perform with the ease of Google and the personalization of Amazon, government apps need a thorough tune-up, from the user interface to the back end.

Military exploring improved mobile Internet access

Military exploring improved mobile Internet access

The Navy is testing Wi-Fi access for sailors’ mobile and personal devices, while the Army and Marine Corps are also improving connectivity.

MyID transfers derived credentials to mobile devices

MyID transfers derived credentials to mobile devices

MyID Trusted Authenticator gives Good Technology customers access to a wide range of secure credentials for signing, authentication and encryption.

The connected city: Don’t forget to tell the citizen

The connected city: Don’t forget to tell the citizen

Salesforce's study of 15 major cities finds widespread desire for digital services, but limited awareness of those that already exist.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

  • Ensuring Application Security in Mobile Device Environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.