Teams from the Naval Research Laboratory and the Defense Threat Reduction Agency use Android-based handhelds to test and transmit field information on tropical diseases.
Most agencies already have technology and policies in place to limit damage from an unprotected or misplaced device. Here are a few quick measures that can help make BYOD feasible for government agencies.
Beacon technology has inspired ideas for the public sector applications including ones to help people find their way around a courthouse or to locate the nearest bailiff.
Researchers at the University of Liverpool made a splash in the media recently when they announced that they had demonstrated the first virus to infect a wireless network.
Microsoft's Lync 2013 gives Sandia's IT managers presence awareness as well as instant messaging, conferencing and telephony tools that can integrate with enterprise collaboration and messaging software.
Connect Insight, a mobile analytics tool, helps instructors visualize how individual students are performing relative to their peers.
The Department of Agriculture developed a collection of mobile solutions for field employees who work in offline environments.
One approach to gaining control over mobile technology management is unified communications, which can centralize and integrate tools such as VoIP, chat, collaboration, video conferencing and social media.
The new generation of digital pens can do much more than draw lines on tablets, thanks to advances not only in pen technologies but also in biometrics and handwriting recognition.
A strong API layer is one of the most important components in the U.S. Navy’s official app, which connects sailors and their families with relevant and updated content.
BAE’s Q-Warrior increases the soldier's situational awareness by providing textual information on warnings and threats as well as enhanced visual tools.
The Next-Generation Incident Command System is being used by emergency management agencies in California for planning, response and recovery for risky and hazardous events – many of them wildfires.
The two cybersecurity implementations will help develop capabilities for attribute-based access control and address security issues surrounding mobile access to network resources.
“Beamsteering,” which uses antenna arrays to point radio signals at a specific target, is drawing interest from industry and the Defense Department.