Austin Texas skyline

Keep Austin wired: How the city powers its bandwidth blowout

As a showcase for Austin’s innovation-based economy, the South by Southwest festival and its public and private technology partners support a vision of the future unhampered by bandwidth limits of the past.

Smartphone on SPHERE at International Space Station

NASA to test Google 3D mapping smartphones

Project Tango, Google's prototype 3D mapping smartphone, will be used by NASA to help the international space station with satellite servicing, vehicle assembly and formation flying spacecraft configurations.

RFID tag in the street

RFID tags curb street repair time

Dayton, Ohio, embedded radio frequency identification tags in street cuts, reducing time spent on street inspection and repair.

Doctor with a smartphone

Mindfully mobile: Follow basic BYOD hygiene

Most agencies already have technology and policies in place to limit damage from an unprotected or misplaced device. Here are a few quick measures that can help make BYOD feasible for government agencies.

Sandia Combustion Research Facility

Sandia Labs unifies security, mobility, comm for next-gen researchers

Microsoft's Lync 2013 gives Sandia's IT managers presence awareness as well as instant messaging, conferencing and telephony tools that can integrate with enterprise collaboration and messaging software.

Professor helping students

Analytics tool tracks higher-ed classroom performance

Connect Insight, a mobile analytics tool, helps instructors visualize how individual students are performing relative to their peers.

puzzle

7 steps to unified comm – and control over mobility services

One approach to gaining control over mobile technology management is unified communications, which can centralize and integrate tools such as VoIP, chat, collaboration, video conferencing and social media.

tablets

Agencies mobilize for offline field employees

The Department of Agriculture developed a collection of mobile solutions for field employees who work in offline environments.

Q-warrior

DOD may get helmet-mounted display

BAE’s Q-Warrior increases the soldier's situational awareness by providing textual information on warnings and threats as well as enhanced visual tools.

firefighters

Free situational awareness app gaining traction among California firefighters

The Next-Generation Incident Command System is being used by emergency management agencies in California for planning, response and recovery for risky and hazardous events – many of them wildfires.

Iridium

Iridium GO! creates Wi-Fi hot spot for smartphones almost anywhere

Iridium GO! is a pocket-sized receiver/transmitter that can also serve as a hot spot, allowing up to five users within a 100-foot radius to make phone calls, send text messages and connect to the Internet.

BYOD

Mobile forecast: Tablets take off, smartphones flat

IDC Government Insights expects slower smartphone growth across government but increased use of tablets, especially among state and local governments.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.