by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : November 2012
[the index] optional art here, if available NOVEMBER 2012 Inside 10 DATAPOINT What are agencies' top security concerns? 12 HOW IT WORKS Kessack algorithm is latest cryptographic tool for authenticating documents. 12 DATAPOINT Top 10 paths for unauthorized data to leave agencies. 14 CASE STUDY New NIH center wastes no time setting up public-facing website. 15 EXPLAINER Yes, you really can mine big data without a degree in analytics. Commentary 18 CYBEREYE Vulnerabilities in solar electric system's control could open door to unauthorized access and malicious code. 19 REALITY CHECK What's the tipping point for the cloud? There are four waves you should be aware of. 34 EMERGING TECH Could NASA exoskeleton one day make wheelchairs obsolete? Features 20 ANALYSIS Why government demand for text analytics is growing Increasingly agencies are using tool to connect the data dots on everything from cybersecurity to airline safety. 26 CASE STUDY Advanced cellular system put to LTE test Tampa/St. Pete police deploy mobile public safety network as step toward proposed national system. 30 CASE STUDY How the Old Dominion installed new CRM Virginia sheds its legacy software, streamlines business functions and improves citizen services. Departments 8 NEWS ANALYSIS New Android OS helps secure 300,000 smart phones. 10 EXPLAINER How dividing password servers protects against breaches and hackers. What are the 10 biggest doubts about the cloud? Government regulations, exit strate- gies from cloud arrangements and data privacy are among 10 concerns where confidence in cloud computing is lowest, according to a joint survey by the Cloud Security Alliance and ISACA. The Cloud Market Maturity Study, conducted in the second quarter of 2012, sought to gauge the level of maturity and innovation in the cloud market from a global sample of cloud users, providers, consultants and integrators in both commercial and government organizations. IT managers said they need an exit strategy to move data from one cloud service provider to another if, for instance, their provider does not meet service-level agreements or agencies' regulatory and security requirements. According to the Cloud Matu- rity Study, cloud users were least confident about the following issues (ranked on a scale of 1 for least confi- dent to 5 for most confident): 1. Government regulations keeping pace with the market (1.80) 2. Exit strategies (1.88) 3. International data privacy (1.90) 4. Legal issues (2.15) 5. Contract lock in (2.18) 6. Data ownership and custodian responsibilities (2.18) 7. Longevity of suppliers (2.20) 8. Integration of cloud with internal systems (2.23) 9. Credibility of suppliers (2.30) 10. Testing and assurance (2.30) --- Rutrell Yasin GCN NOVEMBER 2012 • GCN.COM 3 20