Apartment fire

Is the public safety community ready for new 911 location rules?

The FCC is proposing location requirements for the first time on cellular 911 calls made indoors, but even if carriers deliver, the data Public Safety Answering Points will need upgrades to use it.

mobile devices in cloud

Cloud-based performance testing launches for mobile apps, sites

Agency app developers can now load test their products using a new cloud-based load testing service designed for mobile apps, application programming interfaces and websites.

Idaho OntheGo mobile credit card payments

Idaho takes credit card payments on Android devices

Idaho OnTheGo allows state, county and city employees anywhere in the state to take credit and debit card payments on Android devices, even where there is no cell or Wi-Fi service.

Line of dominos

The IT domino effect: First big data, then mobility, cloud…

Anyone who manages IT systems knows technology change can have a domino effect across an entire organization. Be prepared for the influx of new data and new devices.

Smartphone weather app

Partnership yields new weather stations, irrigation scheduling app

A pilot crop water conservation project developed by Anheuser-Busch, the Bureau of Reclamation and two state universities will mean improved water efficiency for Idaho Falls area barley growers.

AppVet streamlines app-vetting workflow

NIST's AppVet makes sure apps are ready for government work

AppVet provides a framework for managing the app-vetting workflow, including uploading apps, receiving reports and generating an overall risk assessment.

Man checks smart phone

Web app tracks prison probationers

The New York City Department of Probation is pioneering a new goal-tracking Web app aimed at reducing recidivism and encouraging positive behavior among those on probation.

City in the palm of hand

Gartner: 10 trends for smart government

The market research firm identified 10 strategic technology trends and described how government IT managers can apply them to their innovation efforts.

Data sharing lets states collaborate on toll collecting

Transportation agencies in Maine, Massachusetts and New Hampshire have developed technology and policies to enforce toll collections across state lines.

Mobile workers in Washington DC

USDA rolls out mobility management as a service

The Agriculture Department's Next Generation Mobility solution is a managed service to help its agencies integrate mobile devices into their missions.

Use of tablets saves printing

Fresno goes mobile to save time, money -- and trees

With Novell's ZENworks the city created a platform-neutral backend that would support any type of mobile device with security policies, asset tracking and emergency wiping –- keeping all data inhouse.

Cellebrite UFED Permission Management software

Software helps police manage lawful access to forensics info

Cellebrite mobile permission management helps admins manage data access privileges to groups of users on a right-to-know or need-to-know basis.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

  • Ensuring Application Security in Mobile Device Environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.