Young girls fishing in a small creek

EPA's How's My Waterway app delivers transparency, environmental awareness

EPA's How's My Waterway web application was designed to conserve technology, operate across multiple devices and maintain a bond of information transparency to the public.

VALET

Visual analytics app gives police a nearly omniscient view

Purdue University researchers' VALET combines crime, traffic, geospatial, weather and other data on one screen for real-time situational awareness and predictive capabilities.

USS San Antonio

Navy's 4G LTE network signals new era in ship-to-ship communications

The Long-Term Evolution network lets personnel on the two ships receive real-time video streaming from air nodes mounted on helicopters, which in turn allows officers to make quicker and more accurate decisions based on what advance units are doing.

Go pass

Public transit gets on the bus with smartphone ticketing

Dallas-Fort Worth and Portland are among the latest to let customers buy bus and rail tickets with their smartphones, and riders are responding.

storm damage

After Sandy hit, Coast Guard comm got ... better

The TRIDENT mobile ad-hoc network, pressed into service after Superstorm Sandy, improved communications for a fraction of the price, and is now being deployed elsewhere.

GPS

Juniper app works to correct GPS errors

The app, which works with the company's Mesa Geo rugged notepad, takes into account a user's mode of transportation in considering the accuracy of signals.

Colorado

DISA's satellite-comm device helps with Colorado flood efforts

The SHOUT Nano, a pocket-sized Iridium communicator and tracking device, is being used by the Army Air National Guard for to keep troops in touch.

Agliz

Tough tablet has strength, endurance and (probably) enough speed for the field

The Algiz 10X from Handheld Group easily passes every ruggedness test and can run all day, though its Atom processor has performance limits.

remote authentication

Remote authentication guidelines updated for a mobile world

NIST's update provides minimum technical requirements for remotely authenticating users over open networks.

PIV

PIV credentials can now be used with mobile devices

The latest revision of FIPS 201, which sets the requirements for PIV cards, includes credentials for mobile devices and new interfaces to enable access with contactless connections.

iPhone scan

Is the new iPhone's fingerprint scanner a sign of things to come?

If opened to app developers, Apple's Touch ID could give another authentication option to agencies looking to manage mobile devices, especially if other smartphone manufacturers follow suit.

View of cell tower from behind barbed wire fence

Managing cellular access means really managing it, sometimes daily

A system to block contraband cell phones in prisons must be continually tuned to ensure that it covers the required footprint but does not step out of bounds.

Topic Resources

  • How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

    Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.

  • Enabling Government to Citizen Engagement through Mobility and Identity Solutions

    In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, access tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile engagement. This webcast will provide agencies with insights into how to leverage the latest developments in mobile and identity technology.

  • Mobile Apps Make Gains in Identity and Security

    The government is transitioning its mobile app offerings from straightforward informational to more complex transactional setups. As more agencies embrace mobile apps, their possibilities become apparent and their security policies necessary. Read this informative Digital Dialogue to learn how agencies can take advantage of emerging mobile solutions while maintaining data security.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.