Eagle County ready for text-to-911

Eagle County ready for text-to-911

Eagle County, Colo. set up its text-to-911 service to meet public expectations for the service, especially among the hard-of-hearing communities.

First responders test links to future public safety net

First responders test future public safety net

At a February ski event, Colorado first responders put LTE mobile broadband to the test in a demo of technologies for a future nationwide public safety network.

Next BlackBerry tablet is aimed at government

Next BlackBerry tablet is aimed at government

BlackBerry announced the SecuTablet, a new secure tablet outfitted with technology components from Samsung, IBM and Secusmart, a German encryption company acquired by BlackBerry last year.

Samsung may bundle Office apps into Knox

Samsung may bundle Office apps into Knox

Reports from the recent Mobile World Congress in Barcelona indicate that Samsung plans to bundle Microsoft’s Office apps – OneDrive, OneNote and Office 365 – into its Knox Workspace enterprise security platform.

Voting technology: Is it secure yet?

Voting technology: Is it secure yet?

With the presidential election coming up in 2016, many constituencies are considering how they can use technology to secure and streamline the voting process.

Agencies tap into recreational data

Agencies tap into recreational data

The departments of Interior and Agriculture will showcase data and platforms that will make it easier to access recreational information across the United States.

NHTSA upgrades crash data collection tech

NHTSA crash data upgrade slowed by tight budgets

Armed with mobile technology and new data sampling methods, the National Highway Traffic Safety Administration aims to improve the accuracy of its crash data, but funding restrictions are slowing the transition, GAO says.

government in a mobile payment world

The future of mobile payments in government

Now that most mobile platforms support near-field communications, government must be ready to interact with a world where financial transactions will be increasingly handled on smartphones.

Google’s MDM program for putting Android to work

Google’s MDM program for putting Android to work

Google’s Android for Work program is designed to give IT departments a consistent approach for mobile device management of Android devices through standardized management APIs.

FDA opens the doors for mHealth apps

FDA opens the doors for mHealth apps

In an effort to spur development of new technologies, the Food and Drug Administration said it would not regulate health apps that pose no threat to patients.

Mobile momentum picks up in state and local gov

Mobile momentum picks up in state and local gov

While extracting value from mobile applications can be challenging for local governments, most are on the path to delivering information and services anywhere, anytime on any device.

Coast Guard searches for next-gen 911 data links

The Coast Guard said it wants to build an interface to take advantage of geo-positioning and other metadata produced by 911 call centers.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.