30-year showdown: IBM PC vs. Apple iPhone

While marking GCN's 30th year, we're taking a look at how far computing has progressed in three decades. It's no secret that PCs have advanced greatly in the intervening years, but how does an IBM PC stack up against an iPhone?

iPhone in hands of Army user

DISA opens a path for iOS, Android devices in military

The agency approves security guidelines for Android and iOS operating systems, expanding the range of new devices in a market dominated by BlackBerry.

T 10 mobile application

'Largest hackathon ever' gives NASA a new payload of space apps

More than 9,000 people representing 44 countries took part in the agency's challenge, producing 770 entries and five overall winners.

Citrix Receiver with BAI CAC reader

Citrix Receiver now supports Android smart-card authentication

The software supports CAC and PIV card authentication, and meets NSA and DISA requirements for secure Bluetooth communication.

Citizen reports landslide to city via 311 app

Salesforce.com optimizes mobile apps for government

Four new cloud-based mobile solutions let agencies collaborate, connect with citizens from any device and speed up mobile app development.

Biometric Associates smart card reader

Mobile authentication for CAC, PIV cards could get easier

A new app works with the cards on iOS and Android platforms, as will future versions of BlackBerry 10.

iX104C5 M2 tablet from Xplore Technologies

Ultra-rugged tablet, with CAC reader, ready for the field

Xplore's newest model stands up to just about any military test for ruggedness, and it exceeds the specifications in some areas.

NetApp Connect on smartphone

Net App Connect provides a secure platform for BYOD

Connect lets users view, work with and share information while it stays safely behind the network firewall.

harmonie Collaboration app for Blackberry 10

App company brings collaboration to BlackBerry 10

The company's app for BlackBerry gives users full Office 365 and on-premise SharePoint functionality.

Woman retrieving documents from office printer

Print2Cloud247 offers secure mobile printing on any printer

The company's Universal Cloud Release Station, on display at FOSE, can be tied to a PIV of CAC card.

UEFI firmware moves beyond PCs and into mobile devices

UEFI expanding from PCs into mobile devices, even heavy equipment

The Unified Extensible Firmware Interface, which replaced BIOS for booting Windows 8, is moving into mobile and non-PC devices.

Exhibit floor at FOSE

Tomorrow's tech on display at FOSE

Exhibitors on the show floor at FOSE 2013 offer technologies that can help agencies meet 21st century challenges.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

  • Ensuring Application Security in Mobile Device Environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.