by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : July 2013
[the index] optional art here, if available Inside BIG DATA Survey rates most critical tech for managing big data. 8 GEOSPATIAL ESRI ArcGIS deployed for DHS s Virtual USA. 9 CYBERSECURITY Agencies turn to BYOD solution from Silent Circle. 12 SMART PHONES DARPA adapts Android OS as ground sensor tech. Commentary 14 CYBEREYE Why the two-man rule for granting access to sensitive data is worth the trouble. 15 INTERNAUT Overlooked questions to ask before jumping into the cloud. 16 REALITY CHECK How to turn the government s open data policy into a reality. 34 EMERGING TECH The clock ticks on XP, and a tough transition looms for agencies. Features 20 SOFTWARE DEVELOPMENT How to build your agile agency game plan From Texas to the State Department to USPS, agencies are finding big and small ways to apply agile tactics. 24 CYBERSECURITY Reaping the benefits of automated security A growing number of products can help automate the job of IT security, but the key is building a standards-based system. 28 MOBILE COMPUTING 5 tablets: What they can -- and can't -- do for agency users How do these five models match up with your needs for on-the-go computing? Departments 7 DATA CENTERS As NSA spars over data policy, it prepares to open a new $1.2 billion Utah data center. Where is encryption applied in cloud environments? 37% Data owner encrypts it in transit to cloud 31% Data owner encrypts before sending to the cloud 11% Cloud provider encrypts it in the cloud 11% Data owner encrypts it in the cloud 10% Not applicable or none of the above A surprising one-third of organiza- tions who are moving sensitive data to a cloud said it is the cloud provider 's responsibility to protect the data, according to a survey done recently by the Ponemon Institute for Thales e-Security. The findings, reported in Global Trends in Cloud Encryption, show a high level of faith in providers' ability to do this, with 57 percent of respondents either agreeing or strongly agreeing that they are capa- ble. Despite this faith, 68 percent of respondents using the cloud encrypt their sensitive data before it leaves home, either in transit or for storage in the cloud. Although 53 percent of respon- dents now transfer sensitive data to the cloud, there is a significant level of concern about this trend, with 35 percent of those using the cloud now saying it has decreased their level of security. Only 15 percent feel it has increased security. --- William Jackson GCN JULY 2013 • GCN.COM 3 JULY 2013 28 7