Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Android
A British blogger has found a security hole in Facebook's mobile apps for Android and iPhone, which can be used to steal personal information.
The Defense Department says it's fast-tracking the construction of an infrastructure that will support future mobile devices in the military. A network that can securely support Apple and Android devices should be fully up and running by next year, while a secure app store will be online within a couple months.
Thanks to the National Security Agency, there is now a security enhanced version of Android. This project is designed for agencies with strict access-control policies, such as the Defense Department.
The Defense Information Systems Agency has granted approval for Android-based mobile devices to connect to DoD networks, provided they're secured using a specific set of guidelines
Attackers uploaded malware-laden copies of popular apps, such as Angry Birds. While Google removed the apps from its online store, more than 14,000 users downloaded them.
The Veterans Affairs Department wants to hedge its bets when it comes to its planned rollout of up to 100,000 tablet devices. IT leaders worry about the unpredictability of the mobile technology landscape, and don't want to spend millions to develop apps for a platform that risks being superseded by a competitor.
One man's goal to use technology to highlight government transparency allows voters to communicate directly with politicians about the policies they pass.
The global market for such products is expected to grow by 44 percent a year before reaching some $3 billion in 2016.
Host John Gilroy will talk about different mobile operating systems, and how to manage them with MaaS360's Jeff Ward and Josh Lambert.
September 27, 2011
Tags: technology , mobile applications , mobile technology , BlackBerry , smart phone , iPad , Microsoft Windows , symbian , iOS , maas360 , cloud computing , Network World , jeff ward , josh lambert , John Gilroy , Federal Tech Talk
Host John Gilroy is joined by Michael Beckley, chief technology officer, at Appian. They will talk about how business process management has changed and what you can do to stay ahead of those changes.
July 19, 2011(Encore presentation August 30, 2011),
Tags: contracting , business process management , cloud computing , enterprise architecture , collaboration , smart phones , Appian , Michael Beckley , iPhone , iPad , ipod touch , BlackBerry , John Gilroy , Federal Tech Talk , mobile technology , tempo