by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : October 2014
GCN OCTOBER 2014 • GCN.COM 27 can help agencies solve problems associ- ated with the bring-your-own-device movement, which can introduce unman- aged and untrusted personal devices into the government workplace. Since becoming available in 2012, AppVet has proved itself by eliminating the need for older, heavy radio equip- ment in the field, improving situational awareness and helping to save sol- diers’ lives. In one instance, soldiers in Afghanistan surrounded by the Taliban were able to use a mobile device to pinpoint an enemy position and direct fire at them. In another, a Medevac app was used to locate a helicopter landing zone so that a wounded soldier could be quickly evacuated, saving precious minutes. The effort not only brought together both academic and government research- ers and developers, but also allowed researchers from different departments at NIST — the Information Technology Lab and the Engineering Lab — to work together. — William Jackson With a prison population spread across 34 separate facilities, it’s difficult under the best of circumstances to keep track of inmates’ whereabouts, not to mention their appointments, special circumstances and sentence changes. For decades, California prisons managed this tracking manually, adding to paper files that were started the day inmates began their sentences. Over time, an inmate’s documents and files could grow to fill several boxes, depending on the sentence. There were some automated systems, but they were decades old and provided very limited functionality. In even the best-managed of the Department’s systems, data was often 24 hours out of date, which affected the accuracy of department’s reporting and access. In 2009, the California Department of Corrections and Rehabilitation made the decision to completely overhaul the process, first by digitizing all existing paper files and then by setting up a fully automated transaction processing system. “When inmates enters the prison system now, it’s all done online, like checking into a hotel,” said Russ Nich- ols, project director of the Strategic Offender Management System (SOMS). “ They are registered so that whatever action is taken on them next can be done on that inmate’s electronic file, from noting what type of special needs the inmate has to whether he is at the right place at the right time and what services he’s scheduled for.” Inmate movement and tracking are Corrections 2.0: State locks down inmate data With the Strategic Offender Management System, officials get real-time access to inmate data, which improves safety and increases efficiency PROJECT AT A GLANCE PROJECT: Strategic Offender Management System OFFICE: California Department of Corrections and Rehabilitation TECHNOLOGY USED: Marquis Software’s Electronic Offender Management Information System, Oracle transaction processing and EMC Captiva document capture and management, along with technology from Cisco, VMware and Adobe TIME TO IMPLEMENTATION: 2 years BEFORE: Paper inmate files and antiquated systems made it virtually impossible to track inmate data. AFTER: SOMS provides secure access to accurate and complete offender information. It has eliminated manual processes, enabled real-time data, and saved the state millions of dollars. PROJECT AT A GLANCE PROJECT: AppVet OFFICE: National Institute of Standards and Technology, in collaboration with George Mason University, under the DARPA TransApps program TECHNOLOGY USED: A framework of software assurance methodology, power and reliability analysis techniques, and standards-based cryptographic solutions TIME TO IMPLEMENTATION: Project began in early fiscal 2012 and the framework became operational that year. Funding ended in April 2014 BEFORE: Military personnel in the field had to use costly, heavy communications equipment with limited functionality or acquire and test commercial devices that were outdated by the time they could be put to use. AFTER: Personnel have access to current commercial devices and applications that can be tested in hours. AppVet has tested thousands of applications, exposing numerous security vulnerabilities.
November and December 2014