Source code for iOS and Android developers is available on GitHub.
The National Justice Information Sharing Initiative grant will advance enterprise architecture and information sharing among states, NASCIO offciials said.
Acknowledging Congress' failure to pass cybersecurity legislation, Democrats assert the president’s willingness to act on his own through executive order.
With millions wondering if their device identifiers are included in the reported breach of FBI files, the FBI and Apple clam up, leaving users vulnerable to scammers offering to fill the information void.
The phrase "garbage in, garbage out" is appearing with increasing frequency in discussion of big data – and with good reason.
Recent attacks illustrate the growing professionalism of malware developers, analyst says.
Many rejected Vista and resisted Windows 7; what will they make of Windows 8?
Researchers at Rutgers have developed a prototype device that lets you authenticate with the swipe of a finger.
Although HelpSTAR2012 is not cheap, cutting downtime and streamlining help desk calls can be worth the money over time.
As more agencies adopt Apple's mobile devices, the new OS' security, messaging and synch-ability could make the workplace more efficient and enjoyable.
Mobile computing and the cloud, which each have their own security concerns, have become inseparable.
The AISight cameras used during the Republican convention adapt to their environment to determine if anything is amiss.
The zero-day window for the latest Java vulnerability has officially closed, but agencies still have to decide whether the benefits of running Java on their computers outweigh the risks.
The zEnterprise EC-12 adds power, capacity and other features that could appeal to government.
GPO's transition from ink-on-paper to online documents leaves millions who don't have broadband Internet access without adequate access to government resources, according to the Center for Study of Responsive Law.