Big data, analytics, mobile computing and social media will blend together, with services doled out by cloud brokers.
Data volume is up, backup systems are nearing capacity and several factors have limited testing, leading feds to fear that systems aren't ready for recovery, a MeriTalk survey finds.
The Mobile Security Reference Architecture is one more guide for agencies wrestling with how so securely bring smart phones and tablets into their networks.
GammaTech's Durabook TA10 meets a variety of MIL-STD and IP standards and can include a FIPS 201 fingerprint scanner for two-factor authentication.
USDA is using technologies such as teleconferencing and social media for collaboration, but challenges include some employee resistance and incompatible software.
From the IBM PC to apps on demand, and cyber threats to FISMA, our experts weigh in on the biggest influences — good and bad — of the past three decades.
Epson's new PowerLight 4000 series produce enough lumens for just about any room and have an app that gives users full control from iOS and Android devices.
DISA specifies required capabilities for secure use of two more mobile operating systems on DOD networks.
While marking GCN's 30th year, we're taking a look at how far computing has progressed in three decades. It's no secret that PCs have advanced greatly in the intervening years, but how does an IBM PC stack up against an iPhone?
The agency approves security guidelines for Android and iOS operating systems, expanding the range of new devices in a market dominated by BlackBerry.
More than 9,000 people representing 44 countries took part in the agency's challenge, producing 770 entries and five overall winners.
The software supports CAC and PIV card authentication, and meets NSA and DISA requirements for secure Bluetooth communication.