Howto.gov has released an application programming interface for its Social Media Registry, a list of verified federal accounts.
A University of Vermont study shows mood of cities and states based on the language used in geotagged tweets, using a methodology that could be applied to other uses.
Agencies beware: A flaw in iOS 6.1 and some earlier versions allows someone to bypass the phone's screen lock and gain access to voice functions and contact lists.
If you want to know why agencies are increasingly interested in monitoring social media, this Web app helps put it in perspective.
The Internet Innovation Alliance looks to familiarize Congress with the basics of IP, wireless and broadband.
In a sign that it recognizes the reality of BYOD, the company formerly known as RIM will try to generate new consumer interest.
With all the communications options a smart phone provides, maybe you don’t need a voice plan any more. Or maybe you do.
Got an idea on how to improve government's use of mobile technology? You'll be welcome at the Mobile Gov Wikithon.
Apps that let users send self-destructing messages are touted as a way to combine BYOD with privacy, but they also raise real security questions for agencies.