mobility

Mind your mobile: 2014's challenges (and solutions) for mobile government

Secure devices, virtualized mobile solutions and the Internet of Things will be at the top of mind for government IT managers.

mobile

How to put SharePoint in the palm of your hand

Mobile Entrée lets users access SharePoint features via Web browsers on their smartphones and tablet computers.

BES 10

BlackBerry BES 10.2 takes on enterprise BYOD

New features for enterprise mobile management include API and update support for iOS and Android.

Esri Geotrigger

Geotrigger puts geofencing in Esri mobile apps

Agencies can download a public beta version of Esri's cloud-based Geotrigger Service to create mobile geofencing applications.

PhoneSat

Latest PhoneSats will test cross-satellite data sharing, space weather monitoring

NASA's PhoneSats will demonstrate how off-the-shelf consumer devices can lead to a new, distributed means of problem-solving in space.

toughpad

Panasonic tablet marries rugged to high resolution

Panasonic unveils the Toughpad 4K UT MB5, a durable tablet with an ultra-high-definition display.

Lenovo Android Yoga tablet

Lenovo releases Android Yoga tablets

The 8- and 10-inch tablets can be used in three modes and boast 18-hour battery life.

keystroke

Keystroke encryption coming for Apple, Android phones

GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.

Nokia

Windows Phone upgrade adds on-the-job improvements

Update 3 is fairly minor in nature, but it adds several important features that serious users were craving.

clouds

Army gives some groups a choice of Microsoft Office 365 or Google Apps

Cloud-based email and collaboration services are for organizations that can't take part in DOD Enterprise Email.

waterways

EPA site taps a deep well of water data

The How's My Waterway website and mobile app delivers easy-to-find, plain-language information on the condition of the nation's waters, drawn from the depths of EPA's technical databases.

security

Security tool keeps data safe across collaboration systems

CipherPoint data security software prevents privileged IT administrators, attackers from accessing sensitive information across on-premise and cloud-based collaboration systems.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.