iRobot unveils multi-bot tablet controller, improved networking

iRobot unveils multi-bot tablet controller, improved networking

iRobot announced a multi-robot tablet controller and the uPoint Robot Radio networking solution for first responders and defense forces.

Microsoft Surface Pro 3

Surface Pro 3 stretches for the enterprise

For enterprises looking to equip staff with both tablets and laptops, Microsoft is positioning its Surface Pro 3 as a full-powered business PC and a tablet while sweetening the deal with a discount and new support program.

Mobile patient data for emergency response

FEMA adds patient tracker apps to ER toolkit

New mobile patient tracking software will improve healthcare situational awareness at disaster sites.

Forensic software extracts iPhone data even with iOS 8 encryption

Forensic software extracts iPhone data – even with iOS 8 encryption

Apple's latest security improvements in iOS 8 make iCloud backup acquisition the only way for criminal investigators to access the suspect's smartphone data.

AppVet speeds mobile devices, apps  to the battlefield

AppVet speeds mobile devices, apps to the battlefield

The NIST AppVet project developed a framework to evaluate hardware and software for off-the-shelf smartphones in military field operations.

Driverless-vehicle tech on the move

Practice lanes for driverless-vehicle tech

Autonomous vehicles will learn to navigate the complexities of urban and suburban driving in two recently established off-road cities.

Microsoft previews Windows 10 as enterprise OS

Microsoft previews Windows 10 as enterprise OS

Featuring a one universal app platform and integrated data protection, Windows 10 will be the next version of Microsoft's operating system for smartphones, desktops, tablets and laptops.

enterprise video management

AirWatch platform to help manage enterprise video

AirWatch Video simplifies video distribution, security and management, helping organizations to scale and secure video initiatives.

A KC-10 Extender refuels an F-22 Raptor

AF self-starters build load balancing app for refueling

A team from the Air Force’s Software Engineering Office taught themselves the basics of app development well enough to build an app that now saves AF tankers over 30 minutes on in-flight refueling operations.

New York Department of Transportation iRideNYC transit app

Bootstrapped web app delivers NYC transit options

Using open source technology, in-house development expertise and a scalable cloud architecture, the New York City Transportation Department created iRideNYC, a much-needed mobile transit solution at a fraction of the estimated cost.

10 mobile features workers want – and agencies need

10 mobile features workers want... and agencies need

As agencies seek to increase productivity in the field they are increasingly looking to get mobile devices like smartphones, tablets and 2-in-1 devices into the hands of their employees.

citizen developers

Citizen developers as a force multiplier in the enterprise

Crowdsourcing helps organizations bridge skills gaps in their workforce and bring greater collaboration and innovation to cloud, analytics, mobile and social technologies.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.