A new ID card reader promises to ease the process for authenticating and securing access for mobile users, making it easier to manage remote employees.
As citizens explore ways to more actively contribute to the common good, government must create the environment, means and awareness to make that possible.
Five Early Builder projects focus on different aspects of first responder use to help FirstNet evaluate technical standards and capabilities, test new equipment and develop lessons learned.
A new mobile app from Texas Alcoholic Beverage Commission allows users to search the agency’s library of licenses and permits and report suspected violations.
A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.
For now, issues related to speed, accuracy and workflow keep social media from becoming a mainstream communication platform for emergency response.
The GCN Dig IT Awards celebrate discovery and innovation in government IT -- the cutting-edge technology and creative implementations that are supporting critical missions at all levels of the public sector.
Booz Allen Hamilton will be working with Microsoft to develop a single dockable product that workers can use like a desktop or or mobile device without losing any compute power or security.
Government employees and ordinary citizens alike expect services to excel wherever they are. These projects are delivering on that promise.
AlertBoston can now send tailored alerts via phone, text or email in four different languages.
Although there are inherent risks to increasing the number of personal mobile devices connected to government networks, the benefits are too good to ignore.
Emergency planners should use the same strategy individuals figured out for themselves after the Bastille Day attack in Nice: create multiple independent systems to ensure connectivity.
The state is launching new apps to provide residents with easier access to government services and information.
Today’s mobile IT environment -- with all of the issues bring-your-own-device policies and shadow IT mobile bring with it -- represents a starkly different world to secure and manage.