Agency officials in meeting with tablets

5 tablets to tackle government work

No matter their intended purpose, there are some features of the tablet form factor that every agency needs to consider. We take a look at five models — the Apple iPad, Dell Latitude 10 Enhanced Security, Lenovo ThinkPad Tablet2, Microsoft Surface Pro and Panasonic ToughPad — and see how their features match up with agency needs.

Spatial data analysis on Esri map

SAP, Esri offering a unified view for data, geospatial analysis

SAP business intelligence and mobile platforms will integrate with Esri ArcGIS.

Panasonic ToughPad FZ-G1

Tablets for government: Panasonic ToughPad FZ-G1

Panasonic's ToughPad FZ-G1 is a Windows 8 Pro tablet rugged enough to be used in practically any environment. But when multiple options are in use, its power consumption might be an issue.

Apple iPad

Tablets for government: Apple iPad

The iPad's bright display and long battery life may not compensate for its limited processing power and number of ports.

Dell Latitude 10 Enhanced Security

Tablets for government: Dell Latitude 10 Enhanced Security

The Latitude's user authentication features will please admins, but users won't love the limited battery power.

Microsoft Surface Pro

Tablets for government: Surface Pro from Microsoft

The Surface Pro from Microsoft could be a popular choice among government IT administrators, given its large, clear display and processing power. But its larger size and weight might make it less popular among some end users.

Lenovo ThinkPad Tablet 2

Tablets for government: Lenovo ThinkPad Tablet 2

Lenovo's ThinkPad Tablet 2 is a Windows 8 Pro tablet with good battery performance well-suited to the agency user who needs a near-desktop experience while operating remotely. But its prior-version USB port might be a hindrance to those using many newer peripherals.

Crittercism Fathom Mobile Command Center

How's your app performing? Fathom does a deep dive

Crittercism's Fathom Mobile Command Center offers a way for agencies to track the performance of increasingly complex mobile applications.

Monroe Mobile app for disaster assessment

App provides disaster assessment on the fly with ArcGIS Online

A Michigan county is using WebMapSolutions to build a mobile app that provides faster, more complete damage assessments.

The technology that goes into smartphones

Smart phone: 30 years in the making

The technology behind smart phones can be traced back to GCN's beginnings, and further, into government research projects. Here's a brief look at what's behind a smart phone's key components.

Service member with an iPad

DOD building its own secure 4G wireless network

The Pentagon expects to have its own network up and running by next year, as part of its new push for better cybersecurity.

Man texting for help in front of a brush fire

Next steps in making text-to-911 a reality

Major wireless carriers already have committed to delivering text messages to 911 by May 2014, and the FCC is considering rules to expand the requirement to all carriers and third-party providers.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.