VA apps

Mobile apps are key to VA's New Models of Care program

The department is piloting programs to help developers get their apps up to VA's standards. Note to developers: Know your Scrum.

BOINC

Now, Android phones can help solve the mysteries of the universe

Berkeley makes room for the OS on its BOINC grid so owners can lend their idle computing time to research projects.

cracked phone

Phun with Phones: 3 ways to phreak Android, iOS

The convergence of computing and mobile telephony has made smartphones the new frontier of cybersecurity, with a host of new vulnerability research presented at this year’s Black Hat Briefings.

Pittsburgh

Pittsburgh launches first-of-its-kind Wi-Fi network for inland waterways

The Wireless Waterways Project reportedly is the first to bring wireless IP communications to inland ports and could spread across the country.

Lenovo Helix

Lenovo's rip-and-flip Helix could find a place in the mobile office

The company's new ThinkPad covers the bases as both a tablet and laptop.

e-authentication

E-authentication: What IT managers will be focusing on over the next 18 months

The moves to cloud computing and shared databases are among the factors driving e-authentication.

Lenovo Helix functions as an ultrabook but with a detachable tablet screen

Lenovo shows off high-performance, rip-and-flip laptop/tablet

The Helix, with an Intel Core processor and running Windows 8, functions as an ultrabook, but with a detachable tablet screen.

BlackBerry Q10

With Q10, BlackBerry makes a last stand for agency users

With an old-school keyboard, BlackBerry security and new management features, the Q10 meets government's twin demands for productivity and personalization.

HP Slate 21 Android desktop computer

Will an Android on the desktop take off for government users?

HP is set to debut the Slate21, an Android-based desktop with a low-cost upgrade path and options for user sharing that could put it in the government buy basket.

Agency officials in meeting with tablets

5 tablets to tackle government work

No matter their intended purpose, there are some features of the tablet form factor that every agency needs to consider. We take a look at five models — the Apple iPad, Dell Latitude 10 Enhanced Security, Lenovo ThinkPad Tablet2, Microsoft Surface Pro and Panasonic ToughPad — and see how their features match up with agency needs.

Spatial data analysis on Esri map

SAP, Esri offering a unified view for data, geospatial analysis

SAP business intelligence and mobile platforms will integrate with Esri ArcGIS.

Panasonic ToughPad FZ-G1

Tablets for government: Panasonic ToughPad FZ-G1

Panasonic's ToughPad FZ-G1 is a Windows 8 Pro tablet rugged enough to be used in practically any environment. But when multiple options are in use, its power consumption might be an issue.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.