smart city

Cities turn the corner on 'smart city' investment

Market research firm IDC Government Insights says cities will start putting in place the IT building blocks for smart city systems and applications in 2014.

mobile medicare

'Build once, use often' guides Medicare.gov improvements

The Obama administration's open data framework set the stage for responsive design techniques used in the Medicare.gov upgrade and other planned improvements.

cloud

Industry group advocates linking cloud, cybersecurity planning

A report by SafeGov.org offers a plan to help agency CIOs get the benefits of cloud technology while meeting federal cybersecurity goals at the same time.

Blackphone

Will government call on the Blackphone for secure comm?

The sleek, black smartphone will allow users to make secure phone calls, video chat and store files securely.

police officer

App gives police access to oft-used info, unclogging 911 dispatch centers

Badge Buddy cuts down on officers' reliance on dispatchers for relaying of noncritical information, saving time, improving efficiency.

beacons

Bluetooth beacons signal future public safety apps and advantages

Bluetooth beacon technology may show up first at the mall, but look for it in enterprise applications that rely on indoor location mapping and navigation.

FEMA

FEMA crowdsources disaster response

FEMA's mobile app now has a feature that allows citizens to photograph, geotag and explain conditions in their local area.

SI 3D

Smithsonian builds Internet of connected exhibits, specimens, research apps

The Smithsonian Institution is undergoing a digital makeover to support more interactive exhibits, displays and research applications for the public and research communities.

mobility

Dell Software addresses agency needs in BYOD, big data and security

Dell Software recently announced new tools for mobility management, security and business intelligence.

security

CSA pushes software-defined perimeter network protection

Standardized SDP security framework will protect application infrastructures from network-based attacks.

ID

Certificate-on-Chip offers identity as a service for mobile devices

New service brings increased security and access management for both employee-owned and corporate-issued devices.

Nett Warrior

DOD tech demo moves battlefield intell to the tip of the spear

Agile Bloodhound showed what combination of intelligence, surveillance and reconnaissance could be used to deliver tactical intelligence to front-line troops.

Topic Resources

  • How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

    Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.

  • Enabling Government to Citizen Engagement through Mobility and Identity Solutions

    In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, access tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile engagement. This webcast will provide agencies with insights into how to leverage the latest developments in mobile and identity technology.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.