mobile user texting

Alabama launches authentication app to stop tax refund fraud

By using the app, residents can ensure their tax returns aren't sent to someone who has stolen their identity.

traffic ( (Richard Semik)/

Solving congestion with traffic data as a service

Location information from third-party smartphone and navigation applications gives StreeLight Data a near real-time look at around 20 percent of an area's traffic.

responder communications

Parsing the 'chaos' of emergency communications

New technology from GlobalFlyte allows users to set up an 3-D audio space to boost comprehension of radio communications.

cigarette butts at the beach (Daleen Loest/

Health agency looks to app for help with litter cleanup

A Montana community is photographing cigarette-related litter to gather data for new policies related to tobacco use.

prisoner using a cellphone (FBI)

Micro-jamming tech could kill prison cellphone use

The U.S. Bureau of Prisons is testing whether it can prevent inmate cellphone use without disrupting services in the surrounding area.

holograph generated by smartphone (Zapp2Photo/

Gartner: 10 ways AI can improve smartphones

The combination of more powerful hardware and cloud-based artificial intelligence solutions will open the door to more advanced user experiences.

mobile browsing (ImYanis/

The mobile mandate: Congress requires mobile friendly websites

The Connected Government Act requires all new or redesigned federal websites to be mobile friendly.

AskRail ap

Full service app for railroad emergency response

AskRail app gives responders to a railroad incident details about the cars and their contents as well as resources on handling hazardous materials and maps of nearby facilities.

gis data in a disaster

Location intelligence powers next generation emergency response

By infusing mobile, sensor-based data with geographic information, public safety officials can increase situational awareness and improve information analysis.

smartphone authentication by taking picture of QR code (Douglas Levere, University at Buffalo)

Using smartphone photos for hardware authentication

Like matching bullets to a gun, researchers have been able to match photos to a smartphone camera using telltale "fingerprints" left on every image.

responders (FirstNet)

'Ruthless preemption' now live for FirstNet opt-in states

Non-emergency communications will be "shifted to another line" to make room for voice and data traffic from police, firefighters and other emergency personnel.

woman with laptop, phone, credit card (iJeab/

The credit card industry got it right, agencies should do the same

Behavior analytics working in concert with data loss prevention, tagging, multi-factor authentication and a light human touch would allow agencies to verify when an intruder is pretending to be an employee.

Topic Resources

More from 1105 Public Sector Media Group