mobility

Randy Siegel,a mobile computing executive who has worked with the federal government’s civilian, defense and intelligence agencies on mobile strategies and applications for more than a dozen years, has joined Breaking Gov’s Board of Contributors.

Siegel, who until last month, served as the director of mission critical mobility initiatives at Motorola Solutions, was just named Senior Vice President of U.S. Federal Government sales and strategy for Fixmo, a startup backed by Kleiner Perkins, Motorola Ventures, and other venture capital firms. Fixmo’s mobile risk management technology has been developed as part of a Co-operative Research and Development Agreement (CRADA) with the U.S. National Security Agency. Keep reading →

Three years ago, the satirical news site, The Onion, published a story titled “Report: 90% Of Waking Hours Spent Staring At Glowing Rectangles.”

One early paragraph reads:

Researchers were able to identify nearly 30 varieties of glowing rectangles that play some role throughout the course of each day. Among them: handheld rectangles, music-playing rectangles, mobile communication rectangles, personal work rectangles, and bright alarm cubes, which emit a high-pitched reminder that it’s time to rise from one’s bed and move toward the rectangles in one’s kitchen.

_____________________________________________________
This is the third in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________
Though the article clearly has a mocking tone, there is a clear reason for interacting as we do with those glowing rectangles: some are merely the technological membrane through which we interact with other people, while others are the entry-ways to the technological world in which we create or consume media of all kinds, from music and videos to personal and professional email and documents.

And precisely because people have access to their music, to their pictures, to their personal social networks all the time, they expect to be able to access that content and those networks all the time, even when (a) their devices cannot connect to their private network or (b) their devices alone are not able to display the media they want to consume – because their batteries are drained, for example, or because the particular device is not optimized for the type of media they need.

The Benefits of Connecting

There are numerous reasons that employees may want to connect their personal devices (BYOD) to their work computers or office networks. First, if space is an issue on their hard drives, they can play music from their MP3 players (there is debate about music’s impact on productivity). Even if the issue is not space, but rather simply installing personal applications and/or data on a work machine, connecting an external player may be seen as a good work-around.

Second, personal devices run out of power and many can recharge through USB cables. Outlet space is often limited, especially in cubicles, which now comprise 70% of office spaces according to one report. In those circumstances, it seems logical to charge devices in series rather than in parallel.

Finally, and perhaps most persuasively, work is rarely confined to a single machine and the small devices people take with them everywhere are the perfect, and sometimes preferred media for storing documents that will be edited on multiple machines. And why not? Windows phones, iPhones, and Android phones all carry gigabytes of space that are available for those large PowerPoint presentations and image files that no one wants to send through email.

The Dangers of Connecting and How to Minimize Them

There are three main perils of connecting personal devices to work computers and networks. The primary concerns, of course, are malware and spyware. These twin dangers become more apparent whenever new viruses are discovered on Android phones, or the full implications of iPhone apps are realized.

Of secondary, but not insignificant, concern is that employees could use their personal devices to skirt the spirit of the official use-policy, if not its letter. For example, sites that place a toll on an organization’s bandwidth-Pandora, for example, or YouTube-may be blocked on workstations, but employees could run similar apps from their phones-Spotify and/or Amazon Prime Videos.

> Finally, there is simply the productivity issue. Do the media and applications that personal devices bring into the workplace ultimately boost, depress, or have no impact on productivity?

As with accessing work data, there are three ways that organizations can regulate connecting personal devices to work assets.

First, organizations can ban the practice entirely. Second, they can use technological filters, for example by requiring any device to have security enable before it can connect to a network or computer. Third, organizations can have only policy filters in place.

The most important point, however, is that the leadership addresses this issue in their mobile device use-policy and that all employees understand the risks in connecting their devices to work computers and networks.

Gadi Ben-Yehuda (Twitter: @GBYehuda) is Director for Innovation and Social Media at the IBM Center for the Business of Government.

Keep reading →

With the savings on real estate, energy costs and travel expenses along with improved productivity and worker satisfaction, some might think managers and employees would embrace the transition to a telework culture. But that hasn’t been the case for many in the federal workforce.

Still, telework comes with too many benefits to ignore, said panelists at the Telework Exchange Town Hall meeting Tuesday in Washington, D.C. Strong business cases, capable technology, improved employee performance (see GSA performance tracking dashboard video, above) and mandates to reduce greenhouse gases and federal real estate space make telework worth the culture change effort. Keep reading →

Citing a near tripling in the number of malicious software programs aimed at mobile devices in less than a year, a Congressional report is recommending the FCC and other federal agencies take a greater role urging private industry to develop stronger mobile security safeguards.

Cyber criminals are taking increasing advantage of inherent weaknesses in mobile devices and the applications that run on them, said Gregory Wilshusen, director of information security issues for the Government Accountability Office, an investigative arm of Congress.

Wilshusen, who oversaw the just-released report, said that in less than a year, the number of variants of malware programs has risen from about 14,000 to 40,000, or about 185%, according to figures supplied by Juniper Networks. These threats and attacks exploit vulnerabilities in the design and configuration of mobile devices, as well as the ways consumers use them.

Attacks against mobile devices generally occur through four different channels of activities, the report found: Keep reading →

The new computing generation has burst on the federal scene in a big way. The latest manifestation is solicitations coming from two cabinet agencies.

But they remind me of a scene many years ago. I spoke at the retirement party of a federal executive who had briefly worked on a program called seat management. I joked that more people were attending the party than had signed up for seat management, and got a roar of laughter.

“Seat”, as people called it, meant a contractor would supply to federal agencies a PC and all of the required software and services, charging a per-user, per-month fee.

_____________________________________________________
This article originally appeared on FedInsider.com. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________

Seat management, touted as the biggest thing since computers, went over like a lead balloon. But it turns out, the concept might have simply been ahead of its time.

Today, agencies one by one are putting their productivity applications in the cloud. Separately, they are providing mobile devices or letting employees bring their own under BYOD plans.

Marry cloud and BYOD and you have the 21st century version of seat management. The difference today is the seat can be in someone’s car or kitchen, at the beach or in an airplane.

About those two new request proposals demonstrating what is going on: Keep reading →

The U.S. Census Bureau is putting real-time economic statistics into the hands of Americans via a new mobile application called “America’s Economy.”

The new application, released today, will provide constantly updated statistics on the U.S. economy, including monthly economic indicators, trends, along with a schedule of upcoming announcements, according to Census officials. Keep reading →

One-third of federal executives involved with mobile technology say their agencies are now “walking” or “running” with mobile technology. But a number of barriers remain. And while government managers believe mobile technology can contribute significantly toward improved productivity and savings, the need to invest in new and more modern business processes remains critical to realizing the full potential of mobile technology in government.

That’s according to a new government-wide research study released today by Breaking Gov and presented during a one hour Breaking Gov webcast today, that began at 11:00 a.m. and will be available for viewing on demand. Keep reading →

Responses of 300 federal executives (blue bar is current rate; red bar is expectation over next 12-18 months.)

Nearly two thirds of federal executives involved with mobile computing decisions in a recent poll reported that tablet computers are now being used by at least some employees at their agencies. And the over half believe that at least 5% of agency employees will primarily use tablets in their work in the next 12 to 18 months. Keep reading →

A senior National Security Agency official today said the agency is racing to embrace an approach to mobile technology that once would have been unthinkable for one of the government’s most secretive agencies, by moving toward 100% end-to-end reliance on commercial communications technology.

NSA Director of Information Assurance Deborah Plunkett told an industry group today in Washington that, “Unless we do this, we will not be able to meet the demand signals from our customers.” Keep reading →

Mobile file sharing provider Accellion has partnered with Good Technology and Mocana Corp. to introduce three new enterprise content-sharing applications for mobile devices. The applications permit agency employees to share enterprise data, similar to technologies such as Dropbox, YouSendIt and Box, but in a way which meets military-grade security standards, allows multiple levels of authentication, and which works on with a variety of popular devices and applications.

Using Good Technology’s Good Dynamics product, and a similar virtual container product from Mocana, the new mobile apps that Accellion announced this week allows enterprise users to collaborate and view more than 200 different file types, editing and sharing files from a secure, encrypted location using smartphones and tablets. Keep reading →

Page 2 of 7123456...7