Job recruitment via smartphones and social media

Tools help agencies boost recruiting via social media

NGA.NET's SocialSmashed and Social Apply helps agencies recruit young workers via platforms they're familiar with.

Northwoods Compass CoPilot tablet suite for social workers

Tablet suite saves case workers their most valuable commodity

Social workers in Fairfield County, Ohio, no longer have to schedule "paperwork days" after adopting Compass CoPilot for tablets.

Rescue squad interoperable communications

Ultimate public safety network is far off, but there are comm options

While first responders wait for the creation of a single nationwide public safety network, a variety of technologies are already providing interoperability.

Kensington SecureBack M Series of enclosures for iPad

A way to lock down public-facing iPads

Kensington's SecureBack enclosures offer a way to secure iPads used as kiosks or control panels in public settings.

Text-to-911 service gets a big step closer to reality

Industry groups, including the major wireless carriers, release the specs for a nationwide system they say will be in place next year.

Fire in a high rise apartment building illustrates the need for indoor 911

Why 'indoor GPS' for 911 calls is still years away

FCC performs extensive tests on three technologies to find out what works, what doesn't and what's in the way of better indoor location.

Soldier using smartphone to access Army mobile sites

Mobile devices run amok in the Army, report says

DOD's inspector general says the Army is "unaware" of some 14,000 smart phones and tablets, many of them unmanaged and unsecure.

Fixmo Secure Gesture password technology

Better than a password? Write with your finger.

For iOS and Android devices, Secure Gesture from Fixmo and Lockheed Martin lets users log in with a touch-screen gesture that can be almost impossible to duplicate.

FIPS 140 2 validated TrustChip for Trustcall on iPhone

TrustCall brings fully encrypted voice to the iPhone

With the FIPS 140-2 validated TrustChip, KoolSpan's solution is the first hardware-encrypted security for the iPhone 4 series.

North Miami Beach uses the online 311 reporting application Fix It NMB

City sees a lot more than potholes in mobile reporting apps

Cloud-based services let residents and city employees report problems; North Miami Beach wants to use that data to anticipate problems and allocate resources.

Businessman with smartphone in front of Old Executive Office Building Eisenhower

BYOD: The elements of getting it right the first time

Allowing personal mobile devices onto your network requires a lot more than platform support.

Mobile device management

MDM is only part of the story

XenMobile MDM from Citrix provides gives admins a wealth of management capabilities, which can be leveraged further when used with the other applications in the Mobile Solutions Bundle.

Topic Resources

  • How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

    Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.

  • Mobile Apps Make Gains in Identity and Security

    The government is transitioning its mobile app offerings from straightforward informational to more complex transactional setups. As more agencies embrace mobile apps, their possibilities become apparent and their security policies necessary. Read this informative Digital Dialogue to learn how agencies can take advantage of emerging mobile solutions while maintaining data security.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.