10 mobile features workers want – and agencies need

10 mobile features workers want... and agencies need

As agencies seek to increase productivity in the field they are increasingly looking to get mobile devices like smartphones, tablets and 2-in-1 devices into the hands of their employees.

citizen developers

Citizen developers as a force multiplier in the enterprise

Crowdsourcing helps organizations bridge skills gaps in their workforce and bring greater collaboration and innovation to cloud, analytics, mobile and social technologies.

Mobile app gives Texans access to public safety services

Mobile app gives Texans access to public safety services

The Texas Department of Public Safety's mobile app gives Texans access to the state's Sex Offender Registry, Texas 10 Most Wanted program and other valuable resources.

Smartphone with Utah statehouse

How Utah stays on top of the mobile adoption curve

The state of Utah has learned that in mobile technology, it pays to track where the adoption curve is trending rather than to wait for users to arrive first, says state chief technology officer David Fletcher.

crowd of people with mobile phones

Good offers calculator for agency mobile performance

Mobile security provider Good Technology introduced a free tool to help agencies assess total cost of ownership of their mobile technology investments against industry standards.

Lenovo’s TAB S8

Lenovo's TAB S8: $200 tablet with Intel processor

Lenovo announced the $199 TAB S8, the company’s first Intel-powered Android tablet.

Baltimore dives into smart water metering

Baltimore dives into smart water metering

Baltimore is one of the latest cities to install automated meters to collect precise data on utility usage in an effort to provide more accurate billing, increase efficiency and reduce waste.

2014 GCN Award Winners

10 public sector projects win GCN Awards for IT excellence

The 2014 GCN Award winning projects range from a system that streamlined a process for victims of physical abuse to obtain protective orders to a cost-saving mobile app by a self-taught Air Force dev team.

Mobile assimilation picks up speed

Mobile assimilation picks up speed

As security challenges are addressed, the mobile conversation is moving from technology acquisition and introduction to assimilation into agencies' missions.

Customs

App speeds Customs inspection for travelers

The Mobile Passport Control app lets eligible travelers submit their passport information and customs declaration form prior to CBP inspection via a iOS smartphone or tablet.

IBM alliance could expand Apple

What's next for government enterprise mobility

The partnership between Apple and IBM may help overcome traditional barriers to deploying mobile enterprise solutions in the government space: security and long development cycles.

Ebola treatment clinic

Tracking Ebola with CDC's app

Developed by the Centers for Disease Control, the Epi Info viral hemorrhagic fever application is getting its first chance to speed contact tracing of everyone exposed to a person with Ebola and to help with the collection and management of data.

Topic Resources

  • Mobile Apps Make Gains in Identity and Security

    The government is transitioning its mobile app offerings from straightforward informational to more complex transactional setups. As more agencies embrace mobile apps, their possibilities become apparent and their security policies necessary. Read this informative Digital Dialogue to learn how agencies can take advantage of emerging mobile solutions while maintaining data security.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.