by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : June 2013
24 GCN JUNE 2013 • GCN.COM many of the applications traditionally used for this might not translate well to the mobile environment. The cloud is one obvious answer. Citrix and other companies are introducing solu- tions that can "mobilize" Windows appli- cations and desktops and deliver them as a service to mobile devices. Salesforce.com recently unveiled a cloud-based service that allows agencies to securely collaborate and to build mo- bile applications faster. The move to mobile could also bring Mi- crosoft back into contention. With previ- ously widespread operating systems such as Windows XP due to fade from view, that poses a problem for agencies that still have plenty of desktops and legacy appli- cations at that level. Windows 8, for those agencies willing to make the jump, could be an answer since it delivers a consistent interface experi- ence across all platforms. It has a "lot of potential to address the concerns people have for mobile devices," said Shawn Mc- Carthy, research director for IDC Govern- ment Insights. "It's worth a look for a lot of Security and device management top the list of just about everyone dealing with the adoption of mobile technology in the pub- lic sector. With the proliferation of both the numbers and types of mobile devices, and where and how users can access gov- ernment networks and data, security will become far more complex. Government is just starting to catch up to requirements for this: the Nation- al Institute of Standards and Technol- ogy (NIST) issued its latest guidelines on mobile security and management in July 2012 and the Defense Information Systems Agency (DISA) is expected to implement a mobile device management system later this year. Device manufacturers, meanwhile, have also been active. RIM's new line of BlackBerry 10 phones are expected to work with Common Access Cards (CACs) in the 10.1 and 10.2 versions. Other solu- tions, such as the Thursby PKard Reader iOS and the baiBrowser for iOS and An- droid authenticate for network access using CAC, Personal Identity Verification (PIV) or other cards. And biometrics so- lutions also are becoming more common. Another area where there will be signifi- cant change is in how mobile devices com- municate with each other. Agencies may have just gotten the hang of mobile device management, but they're rapidly learning that this may not be enough. Meanwhile, companies like Citrix are focusing on de- veloping secure containers and applica- tion management, potential answers to the problems of BYOD. Other companies, such as Novell and NTP, are working on secure ways to control file sharing. But either way, agencies will need some- thing in place, and soon. As Monica Basso and Jeffrey Mann noted in a recent report for Gartner, "Organizations must deploy [enterprise file synchronization and shar- ing] services to secure enterprise infor- mation assets. Failure to provide these capabilities will subject organizations to information leakage threats caused by us- ers who move data through uncontrolled personal cloud services." Having a mobile device is one thing, using it to conduct business and to col- laborate with colleagues is another, since government enterprises, I think." For most agencies, developing a mobile program means improving the networking and access points inside buildings, while making sure their workers have access to sufficient bandwidth to handle govern- ment-strength data transfer when they are in the field. In both cases that comes down to available budgets and what tech- nologies best fit their needs. Some parts of government have dif- ferent problems, however. The Defense Department wants to provide the utility of mobile to its front-line troops, for ex- ample, but it's not easy building regular mobile networks when people could be shooting at you. DARPA is looking for ideas by the end of the year on mobile ad-hoc networks, or MANETs, that would use the mobile devices themselves to function as net- work routers for each on the fly. Accord- ing to program manager Mark Rich, that "could provide more troops with robust services such as real-time video imagery, enhanced situational awareness and other services that we have not yet imagined." • BY RUTRELL YASIN EVERYTHING CONVERGES AND RIDES IN THE CLOUD Big data, analytics, mobile computing and social media will blend together, with services doled out by cloud brokers. The intersection of cloud, analytics, big data, mobile and social media, delivered through a broker model, will change how IT services are delivered and consumed by government agencies in the future. If the Internet is an information super- highway, cloud represents multiple high- ways upon which all the other disrup- tive technologies will ride, according to leading senior government IT managers. Agency managers will assume that ser- vices are deployed in some type of cloud; and the emphasis will be on extracting value from data, CIOs say. "The cloud will become part of the IT capability delivery model ... so hybrid models of public/private [clouds] will be common-place," said David McClure, as- sociate administrator of the General Ser- vices Administration's Office of Citizen Services and Innovative Technologies. Currently, on-demand computing is considered a fairly new way of providing the services IT departments have been [30 years of government IT]