Forest Service wants app to map firefighter safety zones

Forest Service wants app to map firefighter safety zones

The U.S. Forest Service plans to develop a mobile app that would allow firefighters to determine safety zones during a firefight.

ActivPoint, NC4’s Risk Center risk management application, uses smartphones

Mobile app leverages GPS to provide safety on the go

ActivPoint, NC4's Risk Center risk management application, uses smartphones' GPS and related technologies to capture precise position data to deliver vital information to both the user and security personnel.

Mobile employee uses enterprise apps to work at a conference

Mobile Workflow Builder assembles apps into business processes

The Good Technology Mobile Workflow Builder lets IT managers select mobile enterprise apps and combine them into business processes to better manage their users' mobile work experience.

screenshot of the Hurricane Evacuation Encouragement Demonstrator (HEED)

Hurricane simulation tool encourages citizen evacuation

Researchers at Old Dominion University's Virginia Modeling, Analysis and Simulation Center have developed a tool that graphically demonstrates the threat posed by high winds and rising water during a storm.

Firefighter using Michigan public safety network

How Michigan set the pace for state public safety networking

After Detroit established the first city police radio system, the state maintained an upgrade path that kept it at the forefront of local public safety communications.

Azure RemoteApp client for Windows RT

Windows RT gets access to 'desktop' apps via Azure RemoteApp

Microsoft's Azure RemoteApp client for Windows RT devices gives users a way to access apps that they can't install on their machines.

Students on campus using wireless devices

Survey finds continuing campus bandwidth squeeze

SIIA’s annual survey finds that bandwidth is not keeping up with demand at higher-ed institutions.

API tier

API first: Shifting how government delivers services

An API tier provides a simple interface to complex internal systems, making it easy to deliver services on any device or interface.

Total Communicator Solutions project boundary wellness app

Gamifying healthy behavior in the workplace

HHS's Project Boundary uses an indoor ecosystem of proximity beacons that send context-appropriate triggers to users via their cellphones to encourage healthy behaviors within the workplace.

Nautical chart

NOAA charts course toward open nautical data

This summer, NOAA's Coast Survey office plans to offer a new service that will make it easier for application developers to use NOAA charts in their products.

Man texting on smartphone against backdrop of legacy computer equipment

FCC tackles data mobility across 200 legacy systems

The Federal Communications Commission wants to ensure efforts now underway to redesign hundreds of legacy systems will support data mobility.

Toughpad FZ-E1 and Toughpad FZ-X1 are fully rugged, 5-inch enterprise-class handheld tablets

Smaller Toughpads get voice connectivity

Panasonic announced two fully rugged, 5-inch enterprise-class handheld tablets for mobile professionals.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.