car

Connected cars: Apps, networks and storage on wheels

Advances in traffic safety networks will be driven by the integration of transportation data across the crowd, the mobile phone network and the vehicles themselves, according to researchers.

phone in car

How to build a crowdsourced traffic safety network

Government transportation safety planners are experimenting with ways to crowdsource the collection of data on traffic and road conditions, including trading information with consumers and tapping cellular networks to map real-time traffic flows.

Connected vehicles

Can transportation agencies call on smartphones for traffic data?

The Transportation Department announced plans for a nationwide vehicle safety network, but it left open the role smartphone technology would play as a more efficient and inexpensive means of traffic data collection.

hardware secured smartphone

Hardware-based mobile security market heats up

The market for hardware-rooted security for mobile devices is on the rise as anti-virus and other traditional software methods fail to meet tougher requirements from government and security-sensitive businesses.

Jefferson County

IP video surveillance puts more 'eyes' on waterway traffic

A vast traffic-monitoring network has been deployed to make sure that all can safely navigate the waters with minimal interference.

Michigan

SaaS solution drives improvements at Michigan DMVs

The state of Michigan is piloting a service that uses mobile technology and software as a service to streamline the customer experience at the DMV and speed revenues to state coffers.

mobile security

Intrusion detection app 'trained' to spot malicious behavior

Mobile security company Zimperium releases an Intrusion Protection System app that uses artificial intelligence to recognize and block malicious behavior.

bridge

App helps Pennsylvania get its bridges back

Tablet app helps the state survey its complete road and bridge system.

apple devices

BYOD seeds Apple's public-sector growth

The iPhone's and iPad's usability, security and closed ecosystem have made Apple devices an increasingly popular choice for public-sector IT managers.

smart city

Cities turn the corner on 'smart city' investment

Market research firm IDC Government Insights says cities will start putting in place the IT building blocks for smart city systems and applications in 2014.

mobile medicare

'Build once, use often' guides Medicare.gov improvements

The Obama administration's open data framework set the stage for responsive design techniques used in the Medicare.gov upgrade and other planned improvements.

cloud

Industry group advocates linking cloud, cybersecurity planning

A report by SafeGov.org offers a plan to help agency CIOs get the benefits of cloud technology while meeting federal cybersecurity goals at the same time.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


More from 1105 Public Sector Media Group