Data sharing lets states collaborate on toll collecting

Transportation agencies in Maine, Massachusetts and New Hampshire have developed technology and policies to enforce toll collections across state lines.

Mobile workers in Washington DC

USDA rolls out mobility management as a service

The Agriculture Department's Next Generation Mobility solution is a managed service to help its agencies integrate mobile devices into their missions.

Use of tablets saves printing

Fresno goes mobile to save time, money -- and trees

With Novell's ZENworks the city created a platform-neutral backend that would support any type of mobile device with security policies, asset tracking and emergency wiping –- keeping all data inhouse.

Cellebrite UFED Permission Management software

Software helps police manage lawful access to forensics info

Cellebrite mobile permission management helps admins manage data access privileges to groups of users on a right-to-know or need-to-know basis.

Charlotte NC skyline

Mecklenburg County extends employees' mobility, security

The North Carolina county combined Office 365, Microsoft Surface Pro tablets and Windows Azure to increase mobility and security – and save money.

trying to text about an emergency

Interoperability lab to test next-gen 911 services

Mobile technology provider TeleCommunications Systems Inc. will open an interoperability lab to help call handling services vendors test interfaces to next-generation 911 systems.

Citizens Connect 311 app

Boston posts guide for civic engagement tools

Boston's Office of New Urban Mechanics together with researchers with Emerson College's Engagement Game Lab recently released a "lessons learned" booklet for developing and deploying innovative tools for engaging citizens.

Microsoft CEO Satya Nadella

More mobile from Microsoft: Office for iPad, Enterprise Mobility Suite licensing

Microsoft announced several new products, including a new Enterprise Mobility Suite licensing option and the long-awaited Office for iPad.

Austin Texas skyline

Keep Austin wired: How the city powers its bandwidth blowout

As a showcase for Austin’s innovation-based economy, the South by Southwest festival and its public and private technology partners support a vision of the future unhampered by bandwidth limits of the past.

Smartphone on SPHERE at International Space Station

NASA to test Google 3D mapping smartphones

Project Tango, Google's prototype 3D mapping smartphone, will be used by NASA to help the international space station with satellite servicing, vehicle assembly and formation flying spacecraft configurations.

RFID tag in the street

RFID tags curb street repair time

Dayton, Ohio, embedded radio frequency identification tags in street cuts, reducing time spent on street inspection and repair.

Doctor with a smartphone

Mindfully mobile: Follow basic BYOD hygiene

Most agencies already have technology and policies in place to limit damage from an unprotected or misplaced device. Here are a few quick measures that can help make BYOD feasible for government agencies.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.