Apple, IBM debut analytics apps for government, business users

Apple, IBM debut mobile analytics apps for iOS

Apple and IBM unveiled IBM MobileFirst for iOS, the first apps from a joint venture designed to offer business-specific, cloud-supported data and analytics capabilities on Apple devices.

App-level approach to mobile management

App-level approach to mobile management

Mobile app management can help government IT pros who want to take advantage of the savings mobile apps bring but still need to secure the enterprise.

GSA outlines leading edge tech

GSA's wish list for leading edge tech

The General Services Administration has created a list of developing technologies that could be incorporated into GSA's Alliant I and Alliant II government-wide acquisition contracts.

Azure RemoteApp supports mobile workers, scaled deployments

Azure RemoteApp supports mobile workers, scaled deployments

Starting next week, mobile and remote government IT managers will have a way to provide Internet access to their cloud apps via Microsoft’s Azure RemoteApp.

Hardware secured mobile devices toughen first line of defense

Hardware secured mobile devices toughen first line of defense

Combining a hardware-secured device with a PIN or biometrics can deliver more security and ease of use.

Wi-Fi-based pay phones in New York City

NYC transforms pay phones into Wi-Fi network

New York City will install multi-function, Wi-Fi-based phone kiosks across the city offering free gigabit Wi-Fi and free domestic calls across the United States.

Entrust offers agencies smart card management from the cloud

Entrust offers agencies smart-card management from the cloud

Entrust Datacard released a console that lets agencies produce a single unified identity credential for each person associated with an agency, delivered as a service.

5G wireless networking explained

5G will power the Internet of Things – and governments

Although 5G technology is still at a nascent stage of development, citizens and government will soon demand it to power a real-time connected world.

Apps not safe for work? NIST guide to vetting third-party apps

Apps not safe for work? NIST drafts guide for checking

The National Institute of Standards and Technology’s guide will help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.


First take: Apple’s Swift speeds programming

In offering leaner coding features, including the use of modules and concise syntax, the Swift programming language is challenging conventional coding with a combination of speed and ease of use.

Lt. Gen. Robert S. Ferrell, the Army

Lighter communications key to Army’s future

It's critical that the communication infrastructure be ready at all times – from installation to the point of need, said Lt. Gen. Robert S. Ferrell, the Army's CIO/G-6.

Mobile analytics tools track perimeter of Ebola

Mobile analytics tools track perimeter of Ebola

IBM is leading a group of software firms and developers to build tools to help track, diagnose and even predict the behavior of pandemic illnesses.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Ensuring Application Security in Mobile Device Environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.