Leveraging cutting-edge tools and platforms can be part of the solution for achieving fast, secure and scalable interoperability within the mission-critical legacy system.
The state of Utah has learned that in mobile technology, it pays to track where the adoption curve is trending rather than to wait for users to arrive first, says state chief technology officer David Fletcher.
The Intelligence Advanced Research Projects Activity will be hosting its first IARPA Day on Oct. 29-30 in the College Park, Md., area.
Mobile security provider Good Technology introduced a free tool to help agencies assess total cost of ownership of their mobile technology investments against industry standards.
The Army is harnessing big data to help commanders answer questions that were previously unsolvable by pulling relevant information from thousands of databases into a holistic common operating picture, specifically focused on readiness and resources. The Army Enterprise Management Decision Support System reaches out across 3,500 different database systems, drawing data from the most relevant… Read More »
Microsoft’s Internet Explorer family of browsers came out on top against socially engineered threats in head-to-head tests by NSS Labs with other popular browsers. In both raw numbers and weighted evaluations of performance, IE outperformed Google’s Chrome, Mozilla’s Firefox and Apple’s Safari browsers. This is good news for users of IE, which includes large swaths… Read More »
The company is putting a lot of resources into its effort to attract government cloud customers. Does it have an advantage over the competition?
Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.
If agencies are to stop being reactive in addressing cybersecurity, they must first change the way security is implemented on the ground floor.
The natural reaction is to go with the more powerful Pro, but the choice depends on how employees will be using the tablet.