Online services are supposed to be uncomplicated. It's the programmer's job to mask complexity.
IT marketing legend Regis McKenna joins host Mark Amtower on this week's Amtower Off Center for a wide ranging discussion of his marketing philosophy and his experiences in working with clients Apple, Intel, 3Com and other companies in Silicon Valley in the 1970s and 80s. September 10, 2018
Given the new iPhone's price, federal CIOs may decide to wait for its security features.
The government has a history of building monumental projects. In that sense, it's always acted like great American companies.
The White House kicked off tech week by hosting 18 private sector technology leaders from companies such as Amazon, Apple and Google at the American Technology Council meeting.
DoD's Defense Innovation Unit Experimental fell on hard times, but it could be hitting a resurgence.
Objectively speaking not one soul will be any the worse for not shelling out for a new iPhone.
To better cybersecurity, government agencies are starting the change the way they authenticate identities.
Apple's revenues fell 13 percent in its latest reporting quarter as sales of iPhones dropped 16 percent. But fundamentally Apple at the moment is lacking the next killer product or the next big thing.
Those with delicate privacy sensibilities or who thought Apple was a cultural phenomenon rather than a shrewd manufacturer, well, sorry if you're disappointed.
D.C. attorney and former federal prosecutor Steve Ryan of McDermott, Will & Emery discusses the future of the dispute between the Justice Department and Apple.
I see the FBI-Apple dispute as a cyber version of the "ticking bomb" conundrum: What means are justified to get information from a terrorist when you know there is a bomb ticking somewhere about to kill innocent people?
Commentary: No metric can really capture the essence of any object or program, or the people\'s dedication to it, says Federal Drive host Tom Temin.
The Defense Department is in the final stages of a test to show how derived credentials from the Common Access Card can secure smartphones and tablet computers. Richard Hale, the deputy CIO for cybersecurity, boldly predicts that by the end of the calendar year the military will be issuing derived credentials on mobile devices.