Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Android
A British blogger has found a security hole in Facebook's mobile apps for Android and iPhone, which can be used to steal personal information.
The Defense Department says it's fast-tracking the construction of an infrastructure that will support future mobile devices in the military. A network that can securely support Apple and Android devices should be fully up and running by next year, while a secure app store will be online within a couple months.
Thanks to the National Security Agency, there is now a security enhanced version of Android. This project is designed for agencies with strict access-control policies, such as the Defense Department.
The Defense Information Systems Agency has granted approval for Android-based mobile devices to connect to DoD networks, provided they're secured using a specific set of guidelines
Attackers uploaded malware-laden copies of popular apps, such as Angry Birds. While Google removed the apps from its online store, more than 14,000 users downloaded them.
The Veterans Affairs Department wants to hedge its bets when it comes to its planned rollout of up to 100,000 tablet devices. IT leaders worry about the unpredictability of the mobile technology landscape, and don't want to spend millions to develop apps for a platform that risks being superseded by a competitor.
One man's goal to use technology to highlight government transparency allows voters to communicate directly with politicians about the policies they pass.
The global market for such products is expected to grow by 44 percent a year before reaching some $3 billion in 2016.
Host John Gilroy will talk about different mobile operating systems, and how to manage them with MaaS360's Jeff Ward and Josh Lambert.
September 27, 2011
Tags: technology , mobile applications , mobile technology , BlackBerry , smart phone , iPad , Microsoft Windows , symbian , iOS , maas360 , cloud computing , Network World , jeff ward , josh lambert , John Gilroy , Federal Tech Talk
Host John Gilroy is joined by Michael Beckley, chief technology officer, at Appian. They will talk about how business process management has changed and what you can do to stay ahead of those changes.
July 19, 2011(Encore presentation August 30, 2011),
Tags: contracting , business process management , cloud computing , enterprise architecture , collaboration , smart phones , Appian , Michael Beckley , iPhone , iPad , ipod touch , BlackBerry , John Gilroy , Federal Tech Talk , mobile technology , tempo