In this space over the coming weeks, we hope to turn your attention to the many ways the Census Bureau has met the digital challenge while at the same time transforming our approach from agency-centric to more information and customer centric. We understand that in an age of mobile technology, people are used to getting… Read more »
Want to know the weather? There’s an app for that. Want to know how long the TSA security line is at the airport? There’s an app for that, too! Blog Co-Author: Susan Wedge, IBM vice president for mobile In 2012, President Obama’s digital government plan ordered federal agencies to create at least two mobile apps. Read… Read more »
The best approach to (re-)designing your organization’s site is to strategize, understand possible approaches, and invest in solid design and development.
The public shift to mobile has been swift and astounding. To make mobile work for government — and consumers who expect 24/7 access — agencies should consider three things before undertaking mobile projects.
This is the last part of a three-part series exploring mobile enterprise and application platforms with Red Hat, a leader in the open source industry. Read the other two blog posts here and here. Power outages: they’re a reality far too often for cities and towns often by large storms. We’ve all been there –Read… Read more »
The adoption of BYOD is rapidly advancing. Expect to see more companies and agencies to utilize the BYOD platform within their business models in 2015.
There’s plenty of potential for government to offer mobile pay, but agencies should ask seven important questions before adopting mobile wallet technology.
This simple exchange illustrates why it’s so critical to be thinking about where mobile application development fits into your organization.
This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Increasingly, consumers want to bring their own technology solutions and devices into the workplace. However, “shadow IT” – unauthorized devices used within the workplace without the knowledge of the ITRead… Read more »
This is the first part of a three-part series exploring mobile enterprise and application platforms with Red Hat, a leader in the open source industry. Stay tuned in the next month for more! We may not realize them as such, but our mobile devices have become extremely personal. Think about it: your device knows everythingRead… Read more »