harmonie Collaboration app for Blackberry 10

App company brings collaboration to BlackBerry 10

The company's app for BlackBerry gives users full Office 365 and on-premise SharePoint functionality.

Woman retrieving documents from office printer

Print2Cloud247 offers secure mobile printing on any printer

The company's Universal Cloud Release Station, on display at FOSE, can be tied to a PIV of CAC card.

UEFI firmware moves beyond PCs and into mobile devices

UEFI expanding from PCs into mobile devices, even heavy equipment

The Unified Extensible Firmware Interface, which replaced BIOS for booting Windows 8, is moving into mobile and non-PC devices.

Exhibit floor at FOSE

Tomorrow's tech on display at FOSE

Exhibitors on the show floor at FOSE 2013 offer technologies that can help agencies meet 21st century challenges.

Attendees at the FOSE keynote

What's hot at FOSE 2013

The annual conference and expo kicks off Tuesday, tackling the key challenges facing the public-sector IT community.

Appian BPM apps on mobile devices

Appian BPM gets more social and mobile

Appian Records lets users browse, update and take action on data from any enterprise system through a single social interface. Appian SAIL lets designers push BPM apps to mobile devices.

Rugged computer in use outdoors at Air Force base

The meaning of 'rugged': 8 tests behind MIL-STD ratings

The U.S. Military Standard (MIL-STD) 810 tests are designed to let users know how equipment will perform in harsh environments. Here are the eight tests most commonly applied to computing devices.

House in Mantaloking NJ after hurricane Sandy

In Sandy's wake, NJ town goes to all-wireless phone service

Reflecting a trend toward mobile computing, Mantaloking will be one of the few areas in the country to operate without copper land lines.

BlackBerry Samsung Knox

DOD OKs BlackBerry, Android devices, expanding its mobile options

The department approves Security Technical Implementation Guides for BlackBerry smart phones and tablets with BES 10, along with Samsung's Android Knox.

Business users share files over mobile network

Novell, NTP introduce secure mobile file sharing solutions

Services can help enable BYOD by allowing mobile users to securely share documents.

PhoneSat 1 during high altitude balloon test

NASA's smart-phone satellites launch new era in space communications

The small satellites built around Android phones, launched Sunday, mark a trend toward small, inexpensive satellites for a variety of uses.

BlackBerry Z10

Does BlackBerry Z10 have the goods for government?

The new smart phone's security features could be what keeps BlackBerrys in the hands of government employees.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.