Rugged computer in use outdoors at Air Force base

The meaning of 'rugged': 8 tests behind MIL-STD ratings

The U.S. Military Standard (MIL-STD) 810 tests are designed to let users know how equipment will perform in harsh environments. Here are the eight tests most commonly applied to computing devices.

Appian BPM apps on mobile devices

Appian BPM gets more social and mobile

Appian Records lets users browse, update and take action on data from any enterprise system through a single social interface. Appian SAIL lets designers push BPM apps to mobile devices.

House in Mantaloking NJ after hurricane Sandy

In Sandy's wake, NJ town goes to all-wireless phone service

Reflecting a trend toward mobile computing, Mantaloking will be one of the few areas in the country to operate without copper land lines.

BlackBerry Samsung Knox

DOD OKs BlackBerry, Android devices, expanding its mobile options

The department approves Security Technical Implementation Guides for BlackBerry smart phones and tablets with BES 10, along with Samsung's Android Knox.

Business users share files over mobile network

Novell, NTP introduce secure mobile file sharing solutions

Services can help enable BYOD by allowing mobile users to securely share documents.

PhoneSat 1 during high altitude balloon test

NASA's smart-phone satellites launch new era in space communications

The small satellites built around Android phones, launched Sunday, mark a trend toward small, inexpensive satellites for a variety of uses.

BlackBerry Z10

Does BlackBerry Z10 have the goods for government?

The new smart phone's security features could be what keeps BlackBerrys in the hands of government employees.

AOptix iphone biometric tool

App, case turns iPhone into on-the-spot biometric scanner

The hardware and software package from AOptix would allow police and the military to take fingerprint, iris, face and voice readings in the field.

Fingerprint authentication for mobile cloud device

6 steps to secure mobile access

The IdentityX platform leverages the federal cloud and up to six ID factors to authenticate users, even those using devices not managed by the enterprise.

Smartphone with lock and key in it

A checklist for keeping mobile apps secure

Mobile devices' broad range of access opens up vulnerabilities for apps, but there are ways to close them.

iPhone has most vulnerabilities but Android is the most attacked

iPhone has most vulnerabilities, so why is Android the most attacked?

Android, with only a handful of vulnerabilities reported in 2012, was the OS of choice for malware writers, Symantec says.

OptiView XG Network Analysis Tablet

Real-time network stress tests help admins prepare for the worst

Version 10 of the OptiView XG Network Analysis Tablet helps identify problems before they crop up.

Topic Resources

  • Mobile Apps Make Gains in Identity and Security

    The government is transitioning its mobile app offerings from straightforward informational to more complex transactional setups. As more agencies embrace mobile apps, their possibilities become apparent and their security policies necessary. Read this informative Digital Dialogue to learn how agencies can take advantage of emerging mobile solutions while maintaining data security.