Fire in apartment building

FCC tests if 911 cell-phone calls can be traced indoors

With a growing number of 911 calls coming from cell phones, an FCC committee wants to set benchmarks on the accuracy of calls made from inside buildings.

Government citizen services

Data-driven government's goal: Personalized service

Agencies need to create a tech strategy that supports convergence of cloud, big data, mobility and Web services, a Justice CTO says.

Futuristic office computer display

8 reasons agency IT will change course in 2013

Next year is likely to be a tipping point when agencies will have to make landmark decisions about the types of client machines they use.

BlackBerry 10

Test drive: BlackBerry 10 has the features for work/life balance

Centralized messaging, integrated calendar, predictive text and segregated work and personal functions are aimed at helping RIM maintain a hold in the enterprise.

Minneapolis city services

City calls in open standards to clear away 311 pile-up

By leveraging open standards for 311 non-emergency reporting, Minneapolis plans to automate tasks now handled at labor-intensive call centers.

Call center

Open311 reduces dependence on call centers

The Open311 initiative provides a standard protocol for linking location-based information to existing municipal 311 services.

Texting on phones

NIST spells out baseline security requirements for next-gen mobile devices

Mobile devices lack the hardware-based security needed to make them trusted tools in the workplace; a draft NIST publication identifies the requirements for making them secure enterprise devices.

Presidents desk

5 tech priorities for the new administration

Here are five technologies the new administration should keep on the presidential blotter.

GPO digital strategy

GPO strategy: Publishing from any source, in any format

As demand for ink on paper slows and digital documents increases, the Government Printing Office is transforming its business model to become content-centric, focusing on authentication and document delivery across a spectrum of devices and formats.

Samsung ATIV Smart PC Pro

Samsung PC line built for Win 8's cross-format approach

The company's new laptops and all-in-one PCs use AllShare Play technology to converge PCs and mobile devices.

Fire and rescue unit

Jacksonville upgrades emergency services

Jacksonville’' Fire and Rescue Department worked with the Information Technologies Division to update the Emergency Preparedness Division's website and develop the JaxReady mobile application for iOS and Android smart phones.

Motorola HC1

Are wearable PCs for the field in sight?

The Motorola HC1 is light and rugged, features that could prove useful to military and civilian agencies.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.