mobile tech

Three years ago, the satirical news site, The Onion, published a story titled “Report: 90% Of Waking Hours Spent Staring At Glowing Rectangles.”

One early paragraph reads:

Researchers were able to identify nearly 30 varieties of glowing rectangles that play some role throughout the course of each day. Among them: handheld rectangles, music-playing rectangles, mobile communication rectangles, personal work rectangles, and bright alarm cubes, which emit a high-pitched reminder that it’s time to rise from one’s bed and move toward the rectangles in one’s kitchen.

_____________________________________________________
This is the third in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________
Though the article clearly has a mocking tone, there is a clear reason for interacting as we do with those glowing rectangles: some are merely the technological membrane through which we interact with other people, while others are the entry-ways to the technological world in which we create or consume media of all kinds, from music and videos to personal and professional email and documents.

And precisely because people have access to their music, to their pictures, to their personal social networks all the time, they expect to be able to access that content and those networks all the time, even when (a) their devices cannot connect to their private network or (b) their devices alone are not able to display the media they want to consume – because their batteries are drained, for example, or because the particular device is not optimized for the type of media they need.

The Benefits of Connecting

There are numerous reasons that employees may want to connect their personal devices (BYOD) to their work computers or office networks. First, if space is an issue on their hard drives, they can play music from their MP3 players (there is debate about music’s impact on productivity). Even if the issue is not space, but rather simply installing personal applications and/or data on a work machine, connecting an external player may be seen as a good work-around.

Second, personal devices run out of power and many can recharge through USB cables. Outlet space is often limited, especially in cubicles, which now comprise 70% of office spaces according to one report. In those circumstances, it seems logical to charge devices in series rather than in parallel.

Finally, and perhaps most persuasively, work is rarely confined to a single machine and the small devices people take with them everywhere are the perfect, and sometimes preferred media for storing documents that will be edited on multiple machines. And why not? Windows phones, iPhones, and Android phones all carry gigabytes of space that are available for those large PowerPoint presentations and image files that no one wants to send through email.

The Dangers of Connecting and How to Minimize Them

There are three main perils of connecting personal devices to work computers and networks. The primary concerns, of course, are malware and spyware. These twin dangers become more apparent whenever new viruses are discovered on Android phones, or the full implications of iPhone apps are realized.

Of secondary, but not insignificant, concern is that employees could use their personal devices to skirt the spirit of the official use-policy, if not its letter. For example, sites that place a toll on an organization’s bandwidth-Pandora, for example, or YouTube-may be blocked on workstations, but employees could run similar apps from their phones-Spotify and/or Amazon Prime Videos.

> Finally, there is simply the productivity issue. Do the media and applications that personal devices bring into the workplace ultimately boost, depress, or have no impact on productivity?

As with accessing work data, there are three ways that organizations can regulate connecting personal devices to work assets.

First, organizations can ban the practice entirely. Second, they can use technological filters, for example by requiring any device to have security enable before it can connect to a network or computer. Third, organizations can have only policy filters in place.

The most important point, however, is that the leadership addresses this issue in their mobile device use-policy and that all employees understand the risks in connecting their devices to work computers and networks.

Gadi Ben-Yehuda (Twitter: @GBYehuda) is Director for Innovation and Social Media at the IBM Center for the Business of Government.

Keep reading →

Citing a near tripling in the number of malicious software programs aimed at mobile devices in less than a year, a Congressional report is recommending the FCC and other federal agencies take a greater role urging private industry to develop stronger mobile security safeguards.

Cyber criminals are taking increasing advantage of inherent weaknesses in mobile devices and the applications that run on them, said Gregory Wilshusen, director of information security issues for the Government Accountability Office, an investigative arm of Congress.

Wilshusen, who oversaw the just-released report, said that in less than a year, the number of variants of malware programs has risen from about 14,000 to 40,000, or about 185%, according to figures supplied by Juniper Networks. These threats and attacks exploit vulnerabilities in the design and configuration of mobile devices, as well as the ways consumers use them.

Attacks against mobile devices generally occur through four different channels of activities, the report found: Keep reading →


Data is often compared to water: people talk about data purity, data flow, and of course, data leaks.

One of the ways that companies try to avoid data leaks is through keeping tight control over the pipelines through which data moves, but when most (or all) of an organization’s employees carry smartphones through which they access data, it’s like having a spigot in every pocket. Organizations then face a choice: limit the functionality of devices by restricting their access to data, install technological filters on the devices to minimize the chance of a leak, or trust their employees to safeguard their devices and the data that they either hold or can access, or some combination of the latter two.
_____________________________________________________
This is the second in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________ Keep reading →

The race to meet a series of milestones for advancing federal mobility continues to encounter differing expectations and the underlying need for better methods for managing data, according to a group of federal IT leaders in the throes of delivering the Obama Administration’s Digital Government Strategy.

In a White House report issued last month, Administration officials listed a variety of accomplishments in the first 90 days of a year-long set of initiatives, declaring “agencies are making great strides towards putting a solid foundation for a 21st Century Digital Government in place.” Keep reading →

While iPhone aficionados may have to wait three to four more weeks to get their hands on the new iPhone 5, Apple officially released it latest mobile operating system, iOS 6, today. And that meant federal IT executives had yet another new mobile issue to contend with as they began in earnest to evaluate how the new operating system, which boasts 200 enhancements, might impact the growing use of Apple devices across the federal government.

“I think it’s safe to say that these continually improving and expanding features are a key reason why government workers find consumer mobile devices in general – and iOS devices in particular – so compelling for use in accomplishing their missions,” said Dr. Rick Holgate, assistant director for science and technology and chief information officer for the Bureau of Alcohol, Tobacco, Firearms & Explosives (ATF). Keep reading →

The Federal Chief Information Council today released a new version of its website CIO.gov, involving what it described as a complete overhaul under the hood. The new site, however, is still in need of tweaking.

In a notice posted to the site, viewers were informed: Keep reading →

New college graduates entering the workforce this year may have gotten their first iPhone in high school and their first email address in middle school. While the class of 2007 used laptops for research in their dorm rooms, this year’s graduates could fact-check.

Surely, these new hires will have different expectations for the technology employers will provide and how it will be used. Keep reading →


What if you could call your city public works department, located about 45 minutes from your home, request a recycling sticker, and have a city worker show up at your door 18 minutes later? That’s the power of Boston’s new City Worker App.

Piloted last year, the new mobile app integrates seamlessly with the city’s existing 311 system for non-emergency information calls and service requests. It takes all of the service requests made by citizens for potholes, graffiti, streetlight outages, and even recycling stickers, and routes them to the Android-based mobile device of the nearest work crew from the responsible department. Keep reading →

On May 1, 2010, when al-Qaeda sympathizer Faisal Shahzad attempted to detonate an improvised explosive device hidden in a parked car in the middle of New York’s Times Square, first responders had to rely on their knowledge of evacuation guidelines that for decades have only been accessible via bulky, hardcopy binders.

Although Shahzad’s bomb failed to detonate, the lessons from the response to that potentially deadly attack were not lost on the Department of Homeland Security’s Science & Technology Directorate (S&T). Keep reading →

Federal and state government agencies have been launching programs allowing their employees to use their personal mobile devices at work to access data and business applications with an eye toward saving money. But many are often unaware of hidden costs associated with BYOD programs.

While these programs can provide all of advantages of mobility, unless managed carefully, they will not deliver their primary selling point: reduced costs. Keep reading →

Page 2 of 14123456...14