IPv6 use up at Virginia Tech

The switch to IPv6 is on: Who’s out in front?

A year after the global launch, traffic using IPv6 has doubled, with some mobile networks, university campuses and government agencies driving the switch.

Mobile data floating through hands

From an $8,150 laptop to disposable smart-phone satellites: A mobile timeline

Fueled by government research, advances in portable computers, untethered phones and wireless communication standards ushered in today's anytime, anyplace way of doing business.

DARPA looking for ideas for mobile ad hoc networks or MANETs

Call ahead: The next 5 years of mobile computing

Mobile technology has changed a lot in the past 30 years. It may change even more in the next five.

BlackBerry Q10

BlackBerry Q10 features a real keyboard, smart ID card support

The company's new phone harkens to the days of old with a physical keyboard, while adding new functionality and security features with Version 10.1 of the OS.

Steps going into the clouds

The next 5 years: Everything converges and rides in the cloud

Big data, analytics, mobile computing and social media will blend together, with services doled out by cloud brokers.

Servers in the path of an approaching tornado

When disaster strikes, will federal data be safe?

Data volume is up, backup systems are nearing capacity and several factors have limited testing, leading feds to fear that systems aren't ready for recovery, a MeriTalk survey finds.

Tablet, smartphone, ebook reader and laptop sitting on a blueprint

OMB delivers advice to help agencies get going on mobile

The Mobile Security Reference Architecture is one more guide for agencies wrestling with how so securely bring smart phones and tablets into their networks.

GammaTech Durabook TA10

Rugged tablet has the toughness, security features for field duty

GammaTech's Durabook TA10 meets a variety of MIL-STD and IP standards and can include a FIPS 201 fingerprint scanner for two-factor authentication.

social network illustration

Telework challenge: Employees who resist telework tools

USDA is using technologies such as teleconferencing and social media for collaboration, but challenges include some employee resistance and incompatible software.

Look back at 30 years of government IT

The best (and worst) influences on 30 years of government IT

From the IBM PC to apps on demand, and cyber threats to FISMA, our experts weigh in on the biggest influences — good and bad — of the past three decades.

Epson PowerLite 4000 series installation projectors with iProjection app

Projectors light up large venues, with iOS, Android control

Epson's new PowerLight 4000 series produce enough lumens for just about any room and have an app that gives users full control from iOS and Android devices.

Samsung Galaxy and Apple iPhone

A breakdown of DOD security controls for iOS and Android

DISA specifies required capabilities for secure use of two more mobile operating systems on DOD networks.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

  • Ensuring Application Security in Mobile Device Environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.