mlearning man with smartphone in classroom

12 things you should know about mobile learning

mLearning is a growing field in the public sector, but there's more to it than just putting online learning courses on a smart phone.

Neutering iPads to make them safe in secure environments

How to make iPads safe for government? 'Neuter' them.

Mobile devices can be a risk to secure environments. A CACI exec says one approach to security has been to alter the hardware of Apple iPads.

DCO on tablet

Defense personnel can now take meetings on their Apple devices

Carasoft and Defense Connect Online have released a mobile app for iOS devices that allows for secure collaboration.

Mobile Gov Wikithon

Mobile Gov Wikithon: Where the rubber meets the code

Monthly sessions of volunteers help expand the Mobile Gov Wiki, a go-to resource for best practices on mobile government.

Smartphone with SCOE mobile logo

Army team sets a standard for developing mobile learning apps

Having developed 77 apps since 2009, the Sustainment Center of Excellence team offers some lessons learned.

Student faces a steep climb

Agencies face a learning curve to get to mLearning

Mobile learning has great potential as an educational tool, and it will be around for the long haul, but building platforms and apps isn't as easy as you might think.

Smartphone with lock and key in it

5 tips for secure mobile apps

Security is a natural concern for agencies building mobile applications. Here are a few important points to keep in mind.

Raytheon One Force mobile collaboration app

One Force app lets first responders collaborate

Raytheon releases a suite of tools for smart phones and other devices that combines voice communications, maps, GPS tracking and image and video sharing.

Harris BeOn managed group communications tool

Using IP to give radio systems a national footprint

A radio-to-IP system brings smart phones into public safety networks but it's no replacement for traditional land mobile radios, users in Mobile County, Ala., say.

Mobile phones with web code in background

Hybrid apps: The future of mobile development?

Agencies deciding on whether to provide mobile services via an on-device app or a Web app might want to consider the advantages of combining the two.

People walking in city during snowstorm

During snowstorm Nemo, cell-phone alert systems worked, sort of

The Commercial Mobile Alert System, designed to alert people in targeted areas of serious emergencies and pending disasters, got the message out, but only to users with the right phones.

Investigators looking at cellphone

Forensics tool helps police crack suspects' cell phones

Paraben's Device Seizure 6 can break passwords, track where a phone has been and map the complete file system, including deleted data.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.