4 waves of cloud: Are agencies along for the ride?

The public sector has moved toward cloud computing, but has it been enough of a catalyst to ensure interoperability?

Smart App

Army app market to let customers have it their way

In the six-month pilot, users will be able to post requirements that developers can try to fill with existing or custom-made solutions.

US spectrum allocations

Why the new WiFi standard means fast times for wireless nets

It’s all about spectrum allocation, and devices with access to the 60 GHz band, 802.11ac devices would have enough to transmit uncompressed video, for example.

Sandia Labs’ virtual Android network is part of a larger project to emulate large-scale networks to help understand and defend complex online environments.

How to secure 300,000 smart phones? MegaDroid can help.

Sandia Labs’ virtual Android network is part of a larger project to emulate large-scale networks to help understand and defend complex online environments.

Windows 8

5 ways Windows 8 can be great for agencies

Innovative security, a friendly (for real) cross-platform interface, and handy support for telework and BYOD could do a lot for public-sector organizations

College campus

With eduroam, university users get secure WiFi access to the cloud

The wireless Internet service, widely used in Europe, is being expanded in the United States by Internet2, the University of Tennessee and the National Science Foundation.

Android malware builds 3D model of user's environment

A team from Indiana University frames PlaceRaider as a potential tool for burglars, but what if it got into government buildings?

802.11ac WiFi could help agencies cope with BYOD

The emerging WiFi standard could double the speed of your agency's wireless network ... once you have the equipment to take advantage of it.

From shipments to socks and ants, RFID is tagging everything

Modern RFID tags are only a few millimeters in size and comprise a chip, antenna and in some cases a battery (active). Some forms of RFID tags (passive) have no battery, but actually take power from the electromagnetic beams of a reader, and then send data back to the source. These tags can theoretically last forever, since they only send data or require power when actually being pinged by a reader device. Almost all RFID tags can be inserted into almost anything and do not require line of sight back to a reader. Some tags are so tiny that they have been glued to the backs of ants to track their behavior.

Army puts a 4G battlefield telemedicine system to the test

A real-time system that connects medics on the battlefield with surgeons at a hospital would save lives, if it can be made to work.

Can mobile devices work as ID cards, thin clients on a secure net?

DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.

Agencies yet to 'crack the code' on mobile management, security

Mobility is key for unlocking productivity, but government still struggles to securely manage mobile devices and their data, agency IT leaders say.

Topic Resources

  • How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

    Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.

  • Enabling Government to Citizen Engagement through Mobility and Identity Solutions

    In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, access tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile engagement. This webcast will provide agencies with insights into how to leverage the latest developments in mobile and identity technology.

  • Mobile Apps Make Gains in Identity and Security

    The government is transitioning its mobile app offerings from straightforward informational to more complex transactional setups. As more agencies embrace mobile apps, their possibilities become apparent and their security policies necessary. Read this informative Digital Dialogue to learn how agencies can take advantage of emerging mobile solutions while maintaining data security.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.